diff --git a/02_getting_started.asciidoc b/02_getting_started.asciidoc index 3e8b0a2..9feb234 100644 --- a/02_getting_started.asciidoc +++ b/02_getting_started.asciidoc @@ -82,7 +82,7 @@ But remember that this is just one way of categorizing Lightning wallets. Q3, quadrant 3, where a full Lightning node is used but the keys are held by a custodian is currently not common. Future wallets from that quadrant would let a user worry about the operational aspects of their node, but then delegate the access to the keys to a third party which may use primarily cold storage. -Lightning wallets can be installed on a variety of devices, including laptops, servers, and mobile devices. To run a full Lightning node (one that participates in "gossip" and creates its own map of the network for path finding and routing) you will need to use a server or desktop computer, as mobile devices and laptops are usually not powerful enough in terms of capacity, processing, battery life, and connectivity. +Lightning wallets can be installed on a variety of devices, including laptops, servers, and mobile devices. To run a full Lightning node you will need to use a server or desktop computer, as mobile devices and laptops are usually not powerful enough in terms of capacity, processing, battery life, and connectivity. The category "Third-party Lightning Nodes" can again be subdivided into: