Attacking the lightning network [combined summary]



Individual post summaries: Click here to read the original discussion on the lightning-dev mailing list

Published on: 2015-08-12T01:06:57+00:00


Summary:

In an email exchange between Joseph Poon and Anthony Towns, the vulnerability of double-spend attacks in Bitcoin is discussed. The conversation also explores how the Lightning Network could potentially reduce this vulnerability. It is noted that confirmation times matter less with the Lightning Network as it operates off-chain.However, the discussion takes a turn towards a scenario where a user can still execute a double-spend attack despite waiting for N confirmations, if it gains them a certain amount of money, denoted as $X. In this case, the user would open anonymous channels capable of receiving at least $X and initiate a doublespend fork. They would then proceed to construct multiple lightning channels simultaneously, funding them at $d each.Once the new channels become active after N confirmations, the user can rapidly route multiple payments from their new channels to their anonymous channels until they are no longer able to send any more. At this point, the user would publish the doublespending fork, resulting in the $d*n never being spent. They would then close their original anonymous channels, ultimately gaining $X.The only individuals negatively affected by this scheme are those who opened the $d channels after N confirmations. However, it is highlighted that none of the intermediary hubs involved need to know where the money ended up, making it challenging to recover the funds using iron pipe cryptography.Several constraints are identified, including the number of channels one can open within a specific timeframe (M-N blocks), the requirement of having more than $X funds available to commit to the double spend, and the capacity of the lightning network in terms of routable bitcoin.The email conversation concludes with Joseph Poon's signature, leaving readers with insights into the potential risks and limitations associated with double-spend attacks in the Lightning Network.


Updated on: 2023-07-31T18:13:17.346532+00:00