Edited 16_security_privacy_ln.asciidoc with Atlas code editor

pull/910/head
kristen@oreilly.com 3 years ago
parent 2de46c97f8
commit 6a15dde294

@ -1,5 +1,6 @@
[[security_and_privacy]]
== Security and Privacy of the Lightning Network
== Security and Privacy of the pass:[<span class="keep-together">Lightning Network</span>]
((("security and privacy", id="ix_16_security_privacy_ln-asciidoc0", range="startofrange")))In this chapter, we look at some of the most important issues related to the security and privacy of the Lightning Network. First, we'll consider privacy, what it means, how to evaluate it, and some things you can do to protect your own privacy while using the Lightning Network. Then we'll explore some common attacks and mitigation techniques.
=== Why Is Privacy Important?
@ -101,7 +102,7 @@ This assures that the attacker has no information whatsoever.
However, the real network leaks information that allows an attacker to narrow down the search.
The smaller the anonymity set, the higher the chance of successful de-anonymization.
[role="pagebreak-before less_space"]
=== Differences Between the Lightning Network and Bitcoin in Terms of Privacy
((("security and privacy","differences between Lightning Network and Bitcoin in terms of privacy", id="ix_16_security_privacy_ln-asciidoc2", range="startofrange")))While it's true that transactions on the Bitcoin network do not associate real-world identities with Bitcoin addresses, all transactions are broadcast in cleartext and can be analyzed.

Loading…
Cancel
Save