CTV vaults in the wild



Summary:

The conversation between Antoine and ZmnSCPxj focuses on the design of Taproot-based vaults and their vulnerabilities. While hashchain-based vault designs are immutable, they do not allow for modifications to the unvault_tx/tocold_tx transactions and therefore cannot recover from transaction field corruption or key endpoints compromise. With Taproot, a master key can back out of any contract, which could be buried in the desert to be guarded over by generations of Fremen riding giant sandworms until the Bitcoin Path prophesied by the Kwisatz Haderach, Satoshi Nakamoto, arrives. However, relying on presigned transactions comes with higher assumptions on the hardware hosting the flow keys. The presence of trusted hardware in the vault design may lead one to ask what's the security advantage of vaults compared to classic multisig setup. Vault users might be interested to pay the fee witness premium just to get the tower accountability feature. The conversation also addresses the issues of watchtowers used by both Lightning Network and vault users. A LN channel is likely to have high-frequency updates in both LN-penalty/Eltoo design, while a vault has low-frequency updates such as once-a-day spending. However, generating noise traffic from the vault entity to adopt a classic LN channel pattern may address this point. But, as a vault "high-stake" user, you might not be eager to leak your watchtower IP address or even Tor onion service to "low-stake" LN channel swarms of users. The conversation also touches on the usage of anchor outputs in order to allow mummified unvault transactions to have their feerate adjusted dynamically. While the usage of anchor output is safe for any vault deployment where the funds stakeholders trust each other or where the watchtowers are trusted, it is not so when a distrusted party can spend the anchor output.


Updated on: 2023-06-15T17:44:24.195904+00:00