diff --git a/14_encrypted_transport.asciidoc b/14_encrypted_transport.asciidoc index 5a895d4..982ef0f 100644 --- a/14_encrypted_transport.asciidoc +++ b/14_encrypted_transport.asciidoc @@ -609,7 +609,7 @@ Key rotation for a key `k` is performed according to the following steps: === Conclusion -Lightning's underlying transport encryption, is based on the Noise protocol and offers strong security guarantees of privacy, authenticity and integrity for all communications between Lightning peers. +Lightning's underlying transport encryption is based on the Noise protocol and offers strong security guarantees of privacy, authenticity and integrity for all communications between Lightning peers. Unlike Bitcoin where peers often communicate "in the clear" (without encryption), all Lightning communications are encrypted peer-to-peer. In addition to transport encryption (peer-to-peer), in the Lightning Network payments are *also* encrypted into onion packets (hop-to-hop) and payment details are sent out-of-band between the sender and recipient (end-to-end). The combination of all these security mechanisms is cumulative and provides layered defense against de-anonymization, man-in-the-middle attacks and network surveillance.