Bitcoin Forum
May 05, 2024, 06:06:52 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: How does Lightning network breach remedy work?  (Read 205 times)
bones261 (OP)
Legendary
*
Offline Offline

Activity: 1806
Merit: 1827



View Profile
October 08, 2018, 02:16:50 AM
Last edit: October 08, 2018, 02:05:45 PM by bones261
 #1

I'm just curious. Can a miner/pool operator open up lightning network channels and then proceed to close channels with older states favorable to them in a block, at a later time? This would be manually included rather than broadcast through the mempool. Or does the breach remedy sufficiently address this situation?

Edit: After doing more research, I think the breach remedy is sufficient because the victims would have the private keys of the old states, and could spend the attackers UTXO, am I correct? It's a bit confusing to me still. Huh
1714889212
Hero Member
*
Offline Offline

Posts: 1714889212

View Profile Personal Message (Offline)

Ignore
1714889212
Reply with quote  #2

1714889212
Report to moderator
1714889212
Hero Member
*
Offline Offline

Posts: 1714889212

View Profile Personal Message (Offline)

Ignore
1714889212
Reply with quote  #2

1714889212
Report to moderator
The Bitcoin software, network, and concept is called "Bitcoin" with a capitalized "B". Bitcoin currency units are called "bitcoins" with a lowercase "b" -- this is often abbreviated BTC.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714889212
Hero Member
*
Offline Offline

Posts: 1714889212

View Profile Personal Message (Offline)

Ignore
1714889212
Reply with quote  #2

1714889212
Report to moderator
1714889212
Hero Member
*
Offline Offline

Posts: 1714889212

View Profile Personal Message (Offline)

Ignore
1714889212
Reply with quote  #2

1714889212
Report to moderator
1714889212
Hero Member
*
Offline Offline

Posts: 1714889212

View Profile Personal Message (Offline)

Ignore
1714889212
Reply with quote  #2

1714889212
Report to moderator
achow101
Moderator
Legendary
*
expert
Offline Offline

Activity: 3388
Merit: 6581


Just writing some code


View Profile WWW
October 08, 2018, 09:39:42 AM
Merited by Foxpup (2), Welsh (2), bones261 (2), ABCbits (1)
 #2

The breach remedy is sufficient because it does not rely on unconfirmed transactions. It uses a relative locktime which actually requires inclusion in a block to work.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!