On Path Privacy [combined summary]



Individual post summaries: Click here to read the original discussion on the lightning-dev mailing list

Published on: 2020-01-20T01:21:46+00:00


Summary:

The Lightning Network is a payment protocol that enables instant micropayments through a network of nodes. However, one issue with the protocol is amount-based correlation, where payments can be linked together if they have the same amount. To address this problem, standardized multipart splitting amounts and self-payments are suggested as solutions. PTLCs are also discussed as a requirement for path decorrelation, but it increases the risk of payment failures.The article focuses on improving privacy in the Lightning Network and recognizes that while destination privacy can be improved, it may come at the cost of source privacy. Random walk loops are identified as a privacy concern, and the use of path length increasing algorithms to avoid forming loops is recommended. The article compares multipath and just-in-time (JIT) routing for privacy, concluding that JIT routing provides better privacy by using different hashes for payments, preventing easy correlation.Path decorrelation is introduced as a technique to mitigate privacy issues, and extended shadow routing is proposed as a way to achieve artificially-lengthened paths without compromising usability. However, it is noted that knowing the maximum CLTV-delta at the ultimate sender could compromise privacy at the source.The email response discusses the addition of random tweaks to channel traversal costs in the C-Lightning route randomization feature. A paper suggests adding random tweaks to route costs instead of individual channels, but implementing this may be challenging for pathfinding algorithms. The importance of decentralization in preserving privacy in the Lightning layer is emphasized, and suggestions are made to reduce inequality and promote privacy preservation among nodes.Privacy loss models in the Lightning Network are explored, highlighting strategies used by surveillors to lower channel fees and increase centrality. The "shortest path heuristic" is introduced as a method used by surveillors, and the risks associated with unpublished channels and forwarding logs are discussed. Techniques such as spreading out privacy-leaking information among nodes and eliding stored data are suggested to enhance privacy.Improving the Lightning Network routing algorithm is also addressed in the article. Random tweaks and usage discounting are proposed as approaches to improve efficiency and privacy. The article concludes by acknowledging the limitations of increasing path length and the risks associated with concentrated information on specific nodes.Overall, the article provides insights into privacy issues within the Lightning Network and suggests various techniques to enhance privacy. It emphasizes the importance of balancing destination privacy with source privacy and highlights the challenges in achieving decentralization and reducing inequality among nodes.


Updated on: 2023-07-31T22:30:19.694235+00:00