Skip to content

Commit

Permalink
Edited 16_security_privacy_ln.asciidoc with Atlas code editor
Browse files Browse the repository at this point in the history
  • Loading branch information
kristenORM committed Nov 15, 2021
1 parent 2de46c9 commit 6a15dde
Showing 1 changed file with 3 additions and 2 deletions.
5 changes: 3 additions & 2 deletions 16_security_privacy_ln.asciidoc
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
[[security_and_privacy]]
== Security and Privacy of the Lightning Network
== Security and Privacy of the pass:[<span class="keep-together">Lightning Network</span>]

((("security and privacy", id="ix_16_security_privacy_ln-asciidoc0", range="startofrange")))In this chapter, we look at some of the most important issues related to the security and privacy of the Lightning Network. First, we'll consider privacy, what it means, how to evaluate it, and some things you can do to protect your own privacy while using the Lightning Network. Then we'll explore some common attacks and mitigation techniques.

=== Why Is Privacy Important?
Expand Down Expand Up @@ -101,7 +102,7 @@ This assures that the attacker has no information whatsoever.
However, the real network leaks information that allows an attacker to narrow down the search.
The smaller the anonymity set, the higher the chance of successful de-anonymization.


[role="pagebreak-before less_space"]
=== Differences Between the Lightning Network and Bitcoin in Terms of Privacy

((("security and privacy","differences between Lightning Network and Bitcoin in terms of privacy", id="ix_16_security_privacy_ln-asciidoc2", range="startofrange")))While it's true that transactions on the Bitcoin network do not associate real-world identities with Bitcoin addresses, all transactions are broadcast in cleartext and can be analyzed.
Expand Down

0 comments on commit 6a15dde

Please sign in to comment.