Bitcoin Forum
October 25, 2020, 02:52:22 AM *
News: Latest Bitcoin Core release: 0.20.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: How does Lightning network breach remedy work?  (Read 127 times)
bones261
Legendary
*
Offline Offline

Activity: 1806
Merit: 1823



View Profile
October 08, 2018, 02:16:50 AM
Last edit: October 08, 2018, 02:05:45 PM by bones261
 #1

I'm just curious. Can a miner/pool operator open up lightning network channels and then proceed to close channels with older states favorable to them in a block, at a later time? This would be manually included rather than broadcast through the mempool. Or does the breach remedy sufficiently address this situation?

Edit: After doing more research, I think the breach remedy is sufficient because the victims would have the private keys of the old states, and could spend the attackers UTXO, am I correct? It's a bit confusing to me still. Huh
1603594342
Hero Member
*
Offline Offline

Posts: 1603594342

View Profile Personal Message (Offline)

Ignore
1603594342
Reply with quote  #2

1603594342
Report to moderator
1603594342
Hero Member
*
Offline Offline

Posts: 1603594342

View Profile Personal Message (Offline)

Ignore
1603594342
Reply with quote  #2

1603594342
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1603594342
Hero Member
*
Offline Offline

Posts: 1603594342

View Profile Personal Message (Offline)

Ignore
1603594342
Reply with quote  #2

1603594342
Report to moderator
1603594342
Hero Member
*
Offline Offline

Posts: 1603594342

View Profile Personal Message (Offline)

Ignore
1603594342
Reply with quote  #2

1603594342
Report to moderator
achow101
Moderator
Legendary
*
expert
Offline Offline

Activity: 2282
Merit: 3513


Just writing some code


View Profile WWW
October 08, 2018, 09:39:42 AM
Merited by Foxpup (2), Welsh (2), bones261 (2), ETFbitcoin (1)
 #2

The breach remedy is sufficient because it does not rely on unconfirmed transactions. It uses a relative locktime which actually requires inclusion in a block to work.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!