diff --git a/ch03.asciidoc b/ch03.asciidoc index eb50d75..6485d46 100644 --- a/ch03.asciidoc +++ b/ch03.asciidoc @@ -308,9 +308,9 @@ We note that this is not an additional security assumption to Bitcoin as the sec ==== Additional Meta Data Invoices can encode some other useful meta data. -For example a short discription. +For example a short description. In case a user has several invoices to pay the user can read the description and make sure what the invoice was about. -As payment channel do not need to be publically announced the payee can also provide some private channels as routing hints to the invoice. +As payment channel do not need to be publicly announced the payee can also provide some private channels as routing hints to the invoice. These hints can also be used for public channels to point to those channels on which the payee has enough inbound liquidity to actually receive the amount. In case the payers lightning node is not able to send the payment over the lightning network invoices can also include a fallback address. We would however always recommend to open a new payment channel instead of doing an on chain transaction that does not add an additional payment channel @@ -318,7 +318,7 @@ Invoiceses also have an expiry time so that the payee can delete the preimage af === Delivering the payment -You have already learnt that payments start with the payee creating an invoice which includes a Payment Hash to make sure that payments are atomic and that noone on the path of payment channels can withold the transferred money to their benefit. +You have already learnt that payments start with the payee creating an invoice which includes a Payment Hash to make sure that payments are atomic and that no one on the path of payment channels can withhold the transferred money to their benefit. In this section we will dive into the ideas and methods that are being used to deliver a payment over the lightning network and utilizie everything that we have used so far. We need to introduce one missing protocol of the Lightning Network which is the gossip protocol. @@ -372,7 +372,7 @@ The user might only realize that probing is taking place if the payment is not g [NOTE] ==== -On the Internet we use the internet protocol and the IP forwading algorithm to forward internet packages from the sender to the destination. +On the Internet we use the internet protocol and the IP forwarding algorithm to forward internet packages from the sender to the destination. While the TCP/IP protocol stack allows reliable communication by resending packages that are not acknowledged this mechanism could not be reused directly in the lightning network. A payment that is not being forwarded would effectively mean that the money was stolen by a router and the sender cannot just send out another payment. While the routing protocol together with the border gateway protocol which are used for data and infrmation transport on the internet have the really nice property of allowing the internet hosts to collaboratively finding a path for the information through the internet we cannot reuse and adopt this protocol for forwarding payments on the Lightninh network.