ThunderNetwork - A Java LightningNetwork Implementation Working Today



Summary:

The conversation between Joseph Poon and Mats Jerratsch focuses on the security issues with the Lightning Network Implementation. The implementation has two primary attack vectors, Funding and HTLCs which can be partially mitigated with a reserve. In the scenario where Alice broadcasts a mutated version of Commitment 20, Bob is out 1 BTC. However, if Alice attacks Bob, she's not out any money, but Bob has funds locked up in a 2-of-2. Bob must then negotiate with Alice to get his money back. Alice will probably want some convenience fee. It’s impossible to mitigate this by setting some reserve requirement because as long as Alice has more money than Bob, she can do it. It is possible to say that the minimum (stealable) amount of Alice must be higher than any sum of concurrent payments minus the blockchain fees. This way Bob can always claim all the payments of all Commitments of the Channel and still stay in positive net balance. However, only open payments are problematic, settled balance can always be stolen with just one transaction.


Updated on: 2023-05-23T19:14:39.701790+00:00