mirror of
https://github.com/lnbook/lnbook
synced 2024-11-18 21:28:03 +00:00
Edited 16_security_privacy_ln.asciidoc with Atlas code editor
This commit is contained in:
parent
4c54529d4f
commit
dab3b10a0b
@ -241,7 +241,7 @@ Note that in any case, Mallory's estimation becomes twice as precise after just
|
|||||||
She can continue probing, choosing the next probing amount such that it divides the current estimation interval in half.
|
She can continue probing, choosing the next probing amount such that it divides the current estimation interval in half.
|
||||||
This well-known search technique is called _binary search_.
|
This well-known search technique is called _binary search_.
|
||||||
With binary search, the number of probes is _logarithmic_ in the desired precision.
|
With binary search, the number of probes is _logarithmic_ in the desired precision.
|
||||||
For example, to obtain Alice's balance in a channel of 1 million satoshis up to a single satoshi, Mallory would only have to perform log~2~(1,000,000) ≈ 20 probings.
|
For example, to obtain Alice's balance in a channel of 1 million satoshis up to a single satoshi, Mallory would only have to perform log~2~ (1,000,000) ≈ 20 probings.
|
||||||
If one probing takes 3 seconds, one channel can be precisely probed in only about a minute!
|
If one probing takes 3 seconds, one channel can be precisely probed in only about a minute!
|
||||||
|
|
||||||
Channel probing can be made even more efficient.
|
Channel probing can be made even more efficient.
|
||||||
|
Loading…
Reference in New Issue
Block a user