CoinInsight360.com logo CoinInsight360.com logo
A company that is changing the way the world mines bitcoin

WallStreet Forex Robot 3.0
Bitcoin Magazine 2025-01-08 19:02:07

The Lightning Network Privacy Big Picture: Don't Forget the NSA

One of the secondary benefits of how the Lightning Network works as a scaling solution is privacy. It’s by no means perfect or undefeatable privacy, but it is a better than naive use of the base layer blockchain itself. It’s also not perfectly balanced. The sender learns a good many details about the receiver, but the receiver learns nothing about the sender. For casual payments it is a big improvement for consumers over on-chain payments. It does have one big problem though, something not unique to Lightning, but a problem for all onion routed systems. Global Passive Adversaries. That means an actor who is able to passively monitor all the internet connections between everyone involved in a network like Lightning, or Tor. When a message crosses the network, the adversary can see a message move from one node to a second node, and also see that a message went from the second node to a third right after it received one from the first. If a global adversary exists, then while they cannot see the specific details of a message across the network, they can see where it originated from and where it arrived. That is plenty enough information to deanonymize a payment system like Lightning, where the chief matter of importance is after all who is paying who. This is the true fundamental shortcoming, Lightning can be very private for senders from their merchants, and soon with coming improvements for receivers from the person paying them, but it is very weak against a truly powerful global adversary. This can be mitigated however. Payments stand out to a global adversary because that is the majority of traffic nodes will send, and the timing relationship from A to B to C to D, etc. These heuristics can be broken by nodes sending fake traffic to each other regularly. Fake traffic could take the form of a constant barrage of fake packets, simply replacing fake ones with real messages when payments are routed. This would make it impossible to correlate anything. Other options would be to add decoy messages that continue on after the completion of a payment, or opportunistically make payments when such decoy messages reach you. Different strategies would have different degrees of success in creating privacy, but something needs to be done. Multiple improvements have been made, or are coming down the pipeline, in the form of BOLT 12 and blinded path invoices, but the larger picture is still the same as it was: totally transparent to a powerful adversary. Given the scale of importance Bitcoin has rapidly grown to, maybe it’s time to reconsider the larger picture of privacy and not just incremental local improvements. This article is a Take . Opinions expressed are entirely the author's and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.

阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约