Bitcoin Forum
May 12, 2021, 05:34:48 AM *
News: Latest Bitcoin Core release: 0.21.1 [Torrent]
   Home   Help Search Login Register More  
Pages: [1]
Author Topic: How does Lightning network breach remedy work?  (Read 173 times)
Offline Offline

Activity: 1806
Merit: 1823

View Profile
October 08, 2018, 02:16:50 AM
Last edit: October 08, 2018, 02:05:45 PM by bones261

I'm just curious. Can a miner/pool operator open up lightning network channels and then proceed to close channels with older states favorable to them in a block, at a later time? This would be manually included rather than broadcast through the mempool. Or does the breach remedy sufficiently address this situation?

Edit: After doing more research, I think the breach remedy is sufficient because the victims would have the private keys of the old states, and could spend the attackers UTXO, am I correct? It's a bit confusing to me still. Huh
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
Offline Offline

Activity: 2464
Merit: 3744

Just writing some code

View Profile WWW
October 08, 2018, 09:39:42 AM
Merited by Foxpup (2), Welsh (2), bones261 (2), ETFbitcoin (1)

The breach remedy is sufficient because it does not rely on unconfirmed transactions. It uses a relative locktime which actually requires inclusion in a block to work.

Pages: [1]
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!