diff --git a/16_security_privacy_ln.asciidoc b/16_security_privacy_ln.asciidoc index e4069cd..2e09cc5 100644 --- a/16_security_privacy_ln.asciidoc +++ b/16_security_privacy_ln.asciidoc @@ -1,5 +1,6 @@ [[security_and_privacy]] -== Security and Privacy of the Lightning Network +== Security and Privacy of the pass:[Lightning Network] + ((("security and privacy", id="ix_16_security_privacy_ln-asciidoc0", range="startofrange")))In this chapter, we look at some of the most important issues related to the security and privacy of the Lightning Network. First, we'll consider privacy, what it means, how to evaluate it, and some things you can do to protect your own privacy while using the Lightning Network. Then we'll explore some common attacks and mitigation techniques. === Why Is Privacy Important? @@ -101,7 +102,7 @@ This assures that the attacker has no information whatsoever. However, the real network leaks information that allows an attacker to narrow down the search. The smaller the anonymity set, the higher the chance of successful de-anonymization. - +[role="pagebreak-before less_space"] === Differences Between the Lightning Network and Bitcoin in Terms of Privacy ((("security and privacy","differences between Lightning Network and Bitcoin in terms of privacy", id="ix_16_security_privacy_ln-asciidoc2", range="startofrange")))While it's true that transactions on the Bitcoin network do not associate real-world identities with Bitcoin addresses, all transactions are broadcast in cleartext and can be analyzed.