3. same goes for the 1:1000 rate
you HOPE its a 1:1000 rate but you dont find out until you are trying to settle.
Nah, you find out by checking the code. The wallet code would need to be modified to use a different multiplier when checking the other peer's side of the channel opening. I'm not aware of anyone having attempted this so far, but it would be really interesting if you have a source to indicate otherwise!
I hadn't thought of this attack, even though you must acknowledge it's an implementation attack / malicious wallet and not a flaw in Lightning.
It's as if I distributed a Bitcoin L1 wallet which shows balances 10x higher and pay you 10$ instead of 100$, and then you hand me over an item that's worth 100$.
i know you pretend that everyone reviews code and then has some command line to then search for raw data and read the content to see their msat balance amount is fair rated to their state commitment amount at 1:1000 rate.. but people dont do that. especially your niche userbase you are trying to recruit that are just phone app users.
Code has to be checked; for sure. No matter if L1 or L2. Only difference on L1 is that you can check on some block explorers, but the demographic you're talking about don't do that, either.
That's why I always recommend sticking to 'tried and tested' open-source wallets (i.e. someone else has checked the code) and encourage making sure through sites like
https://walletscrutiny.com/ that the binaries actually match the code.
you lot are the ones not thinking with open minds. you cant even want to admit that LN has flaws.
We do, we do.
Just read in this thread. It was repeated over and over again that it has
different drawbacks (including risks) and different advantages over L1.
all you lot dream about is everyone floods into use LN and then go to sleep so you can raid their funds.
you lot never seem to have the risk awareness mindset as if you care about protecting the users you want to grab and pull into your silly subnetwork
Oh wow now you're accusing us of trying to steal from people? Two things: (1) it is only possible with channel partners; never have we encouraged people to open channels with us. Generally there's very little talk about who to open channels with and there is nobody actively trying to get as many channels with newbies as possible, from what I can tell. (2) lock times are a thing; 'over night' is more a saying than a definitive duration required for such an attack.
4. LN does not have mechanisms to weed out bad actors using non backed channels or where states are abused by changing the 1:1000 by changing it to say 1:10 on their outbound amount designated for their victim partner they want to cheat.. again a service can do this and the network has no security to prevent it
Again, the victim's software client would also have to have been altered to accept such a closing transaction. This makes the attack scope equal as trying to get someone to accept your Bitcoin L1 transaction by giving them a hacked client which shows all amounts x10.
now to n0nce:
as for you thinking there is no 1:1000 rate and its just some rounding thing where only 1 sat can be lost
https://github.com/lightningnetwork/lnd/blob/master/lnwire/msat.go#L12here the 1000 rate.. and look how its used alot to convert msat to sat.. which you are avoiding reading and understanding
yes n0nce you showed L19 of same github of a COMMENT misinforming. but
you never cared to see the CODE or read the entire thing [that's an assumption you just made up! you don't know if I read it or not.]the mSatScale uint64 = 1000
is not the same as "if <1000 then 0"
The code that does this is actually in line 43.
uint64(m) / mSatScale
The
/ in Golang divides and just cuts the rest (i.e. rounding down). See in this example. I basically converted 9,999msat with the same code used in
lnd and it was automagically rounded down to 9sat.
I do write and read code, don't worry.
I picked the comment because it was easy for everyone to understand and the code was right beneath it. I just explained you the code snippet from L40 onwards; it calculates sats from msats, just like I have been describing all along.
All through the magic power of the
/ operator. Explained
here in golang docs.
where the app is wrote by a malicious dev
This must be the worst argument I've ever heard. Of course a malicious wallet can scam you. Just like a malicious L1 wallet, like a malicious banking app or a malicious faked Bitcointalk login page.