Bitcoin Forum
April 26, 2024, 07:01:40 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Cheating the penalty system with lightening network by force publishing old com.  (Read 207 times)
legriffon (OP)
Newbie
*
Offline Offline

Activity: 5
Merit: 7


View Profile
May 10, 2022, 08:09:55 PM
Merited by BlackHatCoiner (4), Welsh (3)
 #1

I'm currently reading Mastering the Lightning Network by Antonopoulos, Osuntokun, and Pickhardt (2021). I wanted to know the risks of nefarious actors posing as merchants or other suitable channel partners who create seemingly legit channels, but also infect their partners through other means with malware, trojans, RATs, etc. that then causes the victim to unknowingly force publish an old commitment transaction thereby unknowingly punishing themselves and forfeiting their funds to the attacker. Is this a plausible threat to the lightning network, and if so, how best to mitigate such a threat? I've included a passage from the book as a refresher of the channel construction process below. By the way for anyone who hasn't read it, it's a great book thus far.


Let us go through the channel construction scenario again, adding a penalty mechanism to protect against cheating:
1. Alice creates a channel with Bob and puts 100k satoshi into it.
2. Alice sends 30k satoshi to Bob and puts 100k satoshi into it.
3. Alice tries to cheat Bob out of his earned 30k satoshi by publishing an old commitment transaction claiming the full 100k satoshi for herself.
4. Bob detects the fraud and punishes Alice by taking the full 100k satoshi for
himself.
5. Bob ends up with 100k satoshi, gaining 70k satoshi for catching Alice cheating.
6. Alice ends up with 0 satoshi.
7. Trying to cheat Bob out of 30k satoshi, she loses the 70k satoshi she owned. With a strong penalty mechanism, Alice is not tempted to cheat by publishing an old
commitment transaction because she risks losing her entire balance.


1714158100
Hero Member
*
Offline Offline

Posts: 1714158100

View Profile Personal Message (Offline)

Ignore
1714158100
Reply with quote  #2

1714158100
Report to moderator
The Bitcoin network protocol was designed to be extremely flexible. It can be used to create timed transactions, escrow transactions, multi-signature transactions, etc. The current features of the client only hint at what will be possible in the future.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714158100
Hero Member
*
Offline Offline

Posts: 1714158100

View Profile Personal Message (Offline)

Ignore
1714158100
Reply with quote  #2

1714158100
Report to moderator
DaveF
Legendary
*
Offline Offline

Activity: 3458
Merit: 6235


Crypto Swap Exchange


View Profile WWW
May 10, 2022, 09:20:10 PM
Merited by Welsh (3), ABCbits (2)
 #2

I'm currently reading Mastering the Lightning Network by Antonopoulos, Osuntokun, and Pickhardt (2021). I wanted to know the risks of nefarious actors posing as merchants or other suitable channel partners who create seemingly legit channels, but also infect their partners through other means with malware, trojans, RATs, etc. that then causes the victim to unknowingly force publish an old commitment transaction thereby unknowingly punishing themselves and forfeiting their funds to the attacker. Is this a plausible threat to the lightning network, and if so, how best to mitigate such a threat? I've included a passage from the book as a refresher of the channel construction process below. By the way for anyone who hasn't read it, it's a great book thus far.


Let us go through the channel construction scenario again, adding a penalty mechanism to protect against cheating:
1. Alice creates a channel with Bob and puts 100k satoshi into it.
2. Alice sends 30k satoshi to Bob and puts 100k satoshi into it.
3. Alice tries to cheat Bob out of his earned 30k satoshi by publishing an old commitment transaction claiming the full 100k satoshi for herself.
4. Bob detects the fraud and punishes Alice by taking the full 100k satoshi for
himself.
5. Bob ends up with 100k satoshi, gaining 70k satoshi for catching Alice cheating.
6. Alice ends up with 0 satoshi.
7. Trying to cheat Bob out of 30k satoshi, she loses the 70k satoshi she owned. With a strong penalty mechanism, Alice is not tempted to cheat by publishing an old
commitment transaction because she risks losing her entire balance.


If there was a 'nefarious actor' that could get access to your LN server machine, it would be better for them to then close ALL your channels and send themselves all your BTC.
If they enough control of your machine to mess with your channels your are pretty much screwed anyway.

-Dave

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
n0nce
Hero Member
*****
Offline Offline

Activity: 882
Merit: 5814


not your keys, not your coins!


View Profile WWW
May 10, 2022, 10:24:40 PM
Last edit: May 11, 2022, 07:32:05 PM by n0nce
Merited by vapourminer (1), ABCbits (1)
 #3

I'm currently reading Mastering the Lightning Network by Antonopoulos, Osuntokun, and Pickhardt (2021). I wanted to know the risks of nefarious actors posing as merchants or other suitable channel partners who create seemingly legit channels, but also infect their partners through other means with malware, trojans, RATs, etc. that then causes the victim to unknowingly force publish an old commitment transaction thereby unknowingly punishing themselves and forfeiting their funds to the attacker. Is this a plausible threat to the lightning network, and if so, how best to mitigate such a threat? I've included a passage from the book as a refresher of the channel construction process below. By the way for anyone who hasn't read it, it's a great book thus far.


Let us go through the channel construction scenario again, adding a penalty mechanism to protect against cheating:
1. Alice creates a channel with Bob and puts 100k satoshi into it.
2. Alice sends 30k satoshi to Bob and puts 100k satoshi into it.
3. Alice tries to cheat Bob out of his earned 30k satoshi by publishing an old commitment transaction claiming the full 100k satoshi for herself.
4. Bob detects the fraud and punishes Alice by taking the full 100k satoshi for
himself.
5. Bob ends up with 100k satoshi, gaining 70k satoshi for catching Alice cheating.
6. Alice ends up with 0 satoshi.
7. Trying to cheat Bob out of 30k satoshi, she loses the 70k satoshi she owned. With a strong penalty mechanism, Alice is not tempted to cheat by publishing an old
commitment transaction because she risks losing her entire balance.


So first of all, you made some mistakes when copying this quote; to prevent any confusions I'm copy-pasting directly from GitHub (or are these mistakes in the print version? I don't own the print version... yet).
Let us go through the channel construction scenario again, adding a penalty mechanism to protect against cheating:
  • Alice creates a channel with Bob and puts 100k satoshi into it.
  • Alice sends 30k satoshi to Bob.
  • Alice tries to cheat Bob out of his earned 30k satoshi by publishing an old commitment transaction claiming the full 100k satoshi for herself.
  • Bob detects the fraud and punishes Alice by taking the full 100k satoshi for himself.
  • Bob ends up with 100k satoshi, gaining 70k satoshi for catching Alice cheating.
  • Alice ends up with 0 satoshi.
  • Trying to cheat Bob out of 30k satoshi, she loses the 70k satoshi she owned.
With a strong penalty mechanism, Alice is not tempted to cheat by publishing an old commitment transaction because she risks losing her entire balance.

As DaveF correctly said, if someone can infect you in a way that he can force you to send faulty / old channel state updates to the blockchain, he might just as well close all your channels and send himself all your BTC via an on-chain transaction. So no, this is not an attack vector on Lightning.

To protect against compromises of your computer / server, follow basic security practices (and beyond, depending on the amounts at risk).

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
NotATether
Legendary
*
Offline Offline

Activity: 1582
Merit: 6687


bitcoincleanup.com / bitmixlist.org


View Profile WWW
May 11, 2022, 04:17:08 AM
Merited by Welsh (3), n0nce (1)
 #4

I would suggest that Lightning implementations encrypt all stale commitment transactions with a random AES salt (the key would be based on the data of the new commitment transaction, so that it can't be discovered until late at runtime) to prevent their broadcasting by malware.

A deterministic operation can be done with the new commitment tx as the input to possibly combine other variables (such as date/time) that may also be stored by the impl. as part of the commitment, to achieve a random salt to totally prevent this from being guessed as well. The exact manipulation agorithm for the salt is something I still need to work on though.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
ABCbits
Legendary
*
Offline Offline

Activity: 2856
Merit: 7407


Crypto Swap Exchange


View Profile
May 11, 2022, 11:25:36 AM
Merited by vapourminer (1)
 #5

I wanted to know the risks of nefarious actors posing as merchants or other suitable channel partners who create seemingly legit channels, but also infect their partners through other means with malware, trojans, RATs, etc. that then causes the victim to unknowingly force publish an old commitment transaction thereby unknowingly punishing themselves and forfeiting their funds to the attacker.

First of all, how would they infect victim's device? If you're referring to social engineering attack where they persuade the victim to download or run something, the main problem is victim's security awareness. Other means such as finding vulnerability on LN client which run arbitrary script from LN message[1] is very unlikely to happen.

Is this a plausible threat to the lightning network, and if so, how best to mitigate such a threat?

No.

[1] https://docs.lightning.engineering/lightning-network-tools/lnd/send-messages-with-keysend

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
legriffon (OP)
Newbie
*
Offline Offline

Activity: 5
Merit: 7


View Profile
May 11, 2022, 02:20:33 PM
 #6

I'm currently reading Mastering the Lightning Network by Antonopoulos, Osuntokun, and Pickhardt (2021). I wanted to know the risks of nefarious actors posing as merchants or other suitable channel partners who create seemingly legit channels, but also infect their partners through other means with malware, trojans, RATs, etc. that then causes the victim to unknowingly force publish an old commitment transaction thereby unknowingly punishing themselves and forfeiting their funds to the attacker. Is this a plausible threat to the lightning network, and if so, how best to mitigate such a threat? I've included a passage from the book as a refresher of the channel construction process below. By the way for anyone who hasn't read it, it's a great book thus far.


Let us go through the channel construction scenario again, adding a penalty mechanism to protect against cheating:
1. Alice creates a channel with Bob and puts 100k satoshi into it.
2. Alice sends 30k satoshi to Bob and puts 100k satoshi into it.
3. Alice tries to cheat Bob out of his earned 30k satoshi by publishing an old commitment transaction claiming the full 100k satoshi for herself.
4. Bob detects the fraud and punishes Alice by taking the full 100k satoshi for
himself.
5. Bob ends up with 100k satoshi, gaining 70k satoshi for catching Alice cheating.
6. Alice ends up with 0 satoshi.
7. Trying to cheat Bob out of 30k satoshi, she loses the 70k satoshi she owned. With a strong penalty mechanism, Alice is not tempted to cheat by publishing an old
commitment transaction because she risks losing her entire balance.


So first of all, you made some mistakes when copying this quote; to prevent any confusions I'm copy-pasting directly from GitHub (or are these mistakes in the print version? I don't own the print version... yet).
Let us go through the channel construction scenario again, adding a penalty mechanism to protect against cheating:
  • Alice creates a channel with Bob and puts 100k satoshi into it.
  • Alice sends 30k satoshi to Bob.
  • Alice tries to cheat Bob out of his earned 30k satoshi by publishing an old commitment transaction claiming the full 100k satoshi for herself.
  • Bob detects the fraud and punishes Alice by taking the full 100k satoshi for himself.
  • ob ends up with 100k satoshi, gaining 70k satoshi for catching Alice cheating.
  • Alice ends up with 0 satoshi.
  • Trying to cheat Bob out of 30k satoshi, she loses the 70k satoshi she owned.
With a strong penalty mechanism, Alice is not tempted to cheat by publishing an old commitment transaction because she risks losing her entire balance.

As DaveF correctly said, if someone can infect you in a way that he can force you to send faulty / old channel state updates to the blockchain, he might just as well close all your channels and send himself all your BTC via an on-chain transaction. So no, this is not an attack vector on Lightning.

To protect against compromises of your computer / server, follow basic security practices (and beyond, depending on the amounts at risk).

Probably just a copy and paste error, as you will see you have also made a copy and paste error and missed out a capital B on "ob", thanks for pointing it out though.
legriffon (OP)
Newbie
*
Offline Offline

Activity: 5
Merit: 7


View Profile
May 11, 2022, 02:29:37 PM
 #7

I'm currently reading Mastering the Lightning Network by Antonopoulos, Osuntokun, and Pickhardt (2021). I wanted to know the risks of nefarious actors posing as merchants or other suitable channel partners who create seemingly legit channels, but also infect their partners through other means with malware, trojans, RATs, etc. that then causes the victim to unknowingly force publish an old commitment transaction thereby unknowingly punishing themselves and forfeiting their funds to the attacker. Is this a plausible threat to the lightning network, and if so, how best to mitigate such a threat? I've included a passage from the book as a refresher of the channel construction process below. By the way for anyone who hasn't read it, it's a great book thus far.


Let us go through the channel construction scenario again, adding a penalty mechanism to protect against cheating:
1. Alice creates a channel with Bob and puts 100k satoshi into it.
2. Alice sends 30k satoshi to Bob and puts 100k satoshi into it.
3. Alice tries to cheat Bob out of his earned 30k satoshi by publishing an old commitment transaction claiming the full 100k satoshi for herself.
4. Bob detects the fraud and punishes Alice by taking the full 100k satoshi for
himself.
5. Bob ends up with 100k satoshi, gaining 70k satoshi for catching Alice cheating.
6. Alice ends up with 0 satoshi.
7. Trying to cheat Bob out of 30k satoshi, she loses the 70k satoshi she owned. With a strong penalty mechanism, Alice is not tempted to cheat by publishing an old
commitment transaction because she risks losing her entire balance.


If there was a 'nefarious actor' that could get access to your LN server machine, it would be better for them to then close ALL your channels and send themselves all your BTC.
If they enough control of your machine to mess with your channels your are pretty much screwed anyway.

-Dave

Yea obviously if there is remote access using their high level of access to empty accounts is going to be their best bang for buck.
I would suggest that Lightning implementations encrypt all stale commitment transactions with a random AES salt (the key would be based on the data of the new commitment transaction, so that it can't be discovered until late at runtime) to prevent their broadcasting by malware.

A deterministic operation can be done with the new commitment tx as the input to possibly combine other variables (such as date/time) that may also be stored by the impl. as part of the commitment, to achieve a random salt to totally prevent this from being guessed as well. The exact manipulation agorithm for the salt is something I still need to work on though.


I think something like this is good, it acts as a safeguard, should a bug or vulnerability in software ever be discovered that would make manipulation possible, it could provide another layer of defence.
franky1
Legendary
*
Online Online

Activity: 4200
Merit: 4447



View Profile
May 17, 2022, 03:03:42 PM
 #8

social engineering to get people to download particular wallets is easy.

take a semi-nefarious scheme recently
a certain company wanted to offer 'turbo' channels where funds appeared in channels before actual funds locked (before any confirms) but to accept such channels people had to use their wallet/software.
so its easy to convince people to use a particular wallet if they simply say they offer a new feature, but only available via a certain wallet before you even get a chance to have a channel

also 99.9999% of people have no clue about viewing raw TX data or the LN payment data. heck even some pretending to be LN devs have no clue of the data structure of format that passes between channel partners.
or what they are actually signing or whats actually being passed in api calls to servers or IP packet data.
heck most dont even see the agreement of payments happening. because the GUI hides it behind glossy images and buttons and labels, they just get to set a limit of what to allow and then have the program 'autopilot it' without needing them to press any buttons at each event/per payment.

as for methods to steal funds through people you already have channels with. well this has been done so many times its no longer funny.
its why the LN devs are starting to make middlemen to be managers/watchtowers and also having idea's of 3-of-3 signatories and other things to try to avoid one person blackmailing/freezing/extorting/punishing the other.

and yes even the LN devs have lost value in many many attempts to bug fix many issues the network still has.
USE AT YOUR OWN RISK AND DONT BELIEVE THE UTOPIAN DREAM ADVERTS

LN is more at risk of loss than bitcoin is.
LN has more flaws/bugs and issues than bitcoin.
LN has more ways to extort, cheat and steal than bitcoin
LN is not bitcoin

I DO NOT TRADE OR ACT AS ESCROW ON THIS FORUM EVER.
Please do your own research & respect what is written here as both opinion & information gleaned from experience. many people replying with insults but no on-topic content substance, automatically are 'facepalmed' and yawned at
n0nce
Hero Member
*****
Offline Offline

Activity: 882
Merit: 5814


not your keys, not your coins!


View Profile WWW
May 18, 2022, 12:13:11 AM
 #9

social engineering to get people to download particular wallets is easy.
If you can social engineer someone to download an infected version of Lightning, it's not Lightning's fault when they lose funds. They literally can't do anything against this - like any other software.
You could just as well get them to download an infected Bitcoin Core or simply a complete RAT virus that gives you full control of the system and the ability to steal all of their cryptocurrencies, right? What's this to do with flaws in Lightning?

By your definition, Bitcoin Core is also a bad software because I could convince someone to use my modified binary that generates wallets from a fixed randomness that I predefined myself.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Welsh
Staff
Legendary
*
Offline Offline

Activity: 3248
Merit: 4110


View Profile
May 18, 2022, 11:54:17 AM
 #10

LN is more at risk of loss than bitcoin is.
LN has more flaws/bugs and issues than bitcoin.
LN has more ways to extort, cheat and steal than bitcoin
Might be worth going into the reasons why you believe this. Bugs,  and flaws would be hard to measure, since not all bugs are discovered in either of the software's. Unless, you have done the math, and Lightening has already exceeded the amount of bugs that bitcoin has had.

Not sure how it has more ways to extort, cheat or steal than Bitcoin, though?

If you can social engineer someone to download an infected version of Lightning, it's not Lightning's fault when they lose funds. They literally can't do anything against this - like any other software.
You could just as well get them to download an infected Bitcoin Core or simply a complete RAT virus that gives you full control of the system and the ability to steal all of their cryptocurrencies, right? What's this to do with flaws in Lightning?

By your definition, Bitcoin Core is also a bad software because I could convince someone to use my modified binary that generates wallets from a fixed randomness that I predefined myself.
Yeah, there's no additional security risk with downloading from a bad source, any more so than Bitcoin core, Electrum or whatever wallet software you're using. The security risk is a lot of people don't do their research, and don't verify software. Ideally, because you have to download the software first of all to be able to verify it, doing so in a isolated machine or isolated environment is best. e.g Qubes OS disposable qube, verify it, and then simply copy it to wherever you want it.

I disagree, many prefer to use whatever software they already familiar. Switching to different software means you need to learn again and handle any migration (in this case moving Bitcoin and make new backup). There's reason why people keep using Windows 7 and Office 2007.
Yeah, people don't like change, and that's why it's hard to get things done sometimes. Slightly astray, but it goes hand in hand with your later statement about poor security awareness. Those that are ignoring that their software or operating system is no longer being offered security updates, are those that don't have very good security awareness.

It's easy if your target have poor security awareness or easily swayed.
Which is unfortunately the majority of users. Also, it might not just be down to these, it might just be complacency. There's a ton of examples of people getting too comfortable, and therefore complacent in their practices, and ultimately paying the price for it.
BlackHatCoiner
Legendary
*
Online Online

Activity: 1498
Merit: 7291


Farewell, Leo


View Profile
May 18, 2022, 12:17:12 PM
Merited by Welsh (3)
 #11

Not sure how it has more ways to extort, cheat or steal than Bitcoin, though?
I don't know if that applies, but if we're talking about ways to generally lose money in Lightning we have:

  • Loss of your partner's revocation keys.
  • Loss of your commitment transactions.
  • Loss of money by going offline for a long time.

The first two can happen if you lose backups.

Unless, you have done the math, and Lightening has already exceeded the amount of bugs that bitcoin has had.
The times he's whinnied about Lightning, definitely exceed both.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
DaveF
Legendary
*
Offline Offline

Activity: 3458
Merit: 6235


Crypto Swap Exchange


View Profile WWW
May 18, 2022, 02:16:53 PM
 #12

I feel there are 2 different things being discussed here.

Running lightning isn't the easiest thing in the world unless you are going for one of the prepacked nodes. You DO need to have or at least should have a good working knowledge of linux and how BTC works in general.
If you don't then you really should learn a bunch before doing it with any real amounts of money*

Running BTC as a full node can be bone dead simple if you don't want to build from source. Download binary, verify signature, run it.
If your PC that you are running it on is compromised you may loose your money. If it's the same PC you do your online banking on, and it's compromised, you may loose your money.

HOWEVER, we are BTC enthusiasts here. I have said it before and will say it again, we are EDGE cases, that 1% of users, whatever you want to call us.
For most people using a wall known and well proven SPV wallet like Electrum is fine.

If you think you have to technical ability and knowledge to run a LN node that you built from source form scratch and get hit by something that the OP suggested then guess what. You did not have the ability and knowledge. Step one of running a LN node. Don't run anything else on that sever. Because, you know what, even if it was not malicious software but just something that caused other issues and a crash. You now have to go figure out why and what happened and get your node back up before the other people start force closing because you have been offline.

-Dave

* As always real amounts of money will vary from person to person. If I loose $100 it would suck but not matter in the long run. If Bill Gates looses $100 he would not even notice. If someone living in poverty looses $100 it could really wreck them

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
n0nce
Hero Member
*****
Offline Offline

Activity: 882
Merit: 5814


not your keys, not your coins!


View Profile WWW
May 18, 2022, 03:13:11 PM
 #13

It's easy if your target have poor security awareness or easily swayed.
Which is unfortunately the majority of users. Also, it might not just be down to these, it might just be complacency. There's a ton of examples of people getting too comfortable, and therefore complacent in their practices, and ultimately paying the price for it.
I agree with Welsh here; social engineering is a very common and viable attack and it's performed millions of times a day. However it makes 0 sense to attribute this to any software in particular, since faked / infected binaries can be made from any open (or closed - think pirated copies of expensive software) source software.

HOWEVER, we are BTC enthusiasts here. I have said it before and will say it again, we are EDGE cases, that 1% of users, whatever you want to call us.
For most people using a wall known and well proven SPV wallet like Electrum is fine.
That's exactly right; however the majority that uses (or should use.. some use exchanges or online wallets  Roll Eyes) SPV wallets, can also just use a Breez, Muun or Phoenix node.

I feel like the initial question has been sufficiently answered, though, hasn't it?

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!