Edited 16_security_privacy_ln.asciidoc with Atlas code editor

pull/899/head
kristen@oreilly.com 3 years ago
parent b276bb376a
commit ea8840662d

@ -102,7 +102,7 @@ However, the real network leaks information that allows an attacker to narrow do
The smaller the anonymity set, the higher the chance of successful deanonymization.
=== Differences Between Ln and Bitcoin in Terms of Privacy
=== Differences Between LN and Bitcoin in Terms of Privacy
While it's true that transactions on the Bitcoin network do not associate real world identities with Bitcoin addresses, all transactions are broadcast in cleartext and can be analyzed.
Multiple companies have been established to deanonymize users of Bitcoin and other cryptocurrencies.
@ -493,7 +493,7 @@ This is counterintuitive and surprising given that nodes could have just routed
This may mean that routing inefficiencies incentivized users to close triangles and not fall back on routing.
Hopefully, multi-part payments will help increase the effectiveness of payment routing.
=== Centralization in the Ln
=== Centralization in the LN
A common metric to assess the centrality of a node in a graph is its _betweenness centrality_. Central point dominance is a metric derived from betweenness centrality, used to assess the centrality of a network.
For a precise definition of central point dominance, the reader is referred to https://doi.org/10.2307/3033543[Freeman's work].

Loading…
Cancel
Save