Author: Mats Jerratsch 2015-10-20 07:27:11
Published on: 2015-10-20T07:27:11+00:00
In this context, it is stated that even if every node on a network is an attacker's, it does not mean that the attacker cannot have a working link to the rest of the network. The attacker can still route all payments and monitor all activity while gaining profit by charging high fees. However, if a route to a third party is seen (Me -> Attacker -> Attacker -> Attacker -> Bob -> Carol -> Third party), it may be possible to work backwards and ask Bob and Carol to connect directly, which would increase the probability of finding a non-attacker node. The idea presented suggests that attackers can still maintain control over network activity despite personal attacks.
Updated on: 2023-05-23T20:58:21.915806+00:00