Author

Topic: How does Lightning network breach remedy work? (Read 224 times)

newbie
Activity: 13
Merit: 0
December 01, 2018, 03:59:06 PM
#3
It is great
staff
Activity: 3458
Merit: 6793
Just writing some code
The breach remedy is sufficient because it does not rely on unconfirmed transactions. It uses a relative locktime which actually requires inclusion in a block to work.
legendary
Activity: 1806
Merit: 1828
I'm just curious. Can a miner/pool operator open up lightning network channels and then proceed to close channels with older states favorable to them in a block, at a later time? This would be manually included rather than broadcast through the mempool. Or does the breach remedy sufficiently address this situation?

Edit: After doing more research, I think the breach remedy is sufficient because the victims would have the private keys of the old states, and could spend the attackers UTXO, am I correct? It's a bit confusing to me still. Huh
Jump to: