From ea8840662dfa023bfde788bcfeff76e99b776dfe Mon Sep 17 00:00:00 2001 From: "kristen@oreilly.com" Date: Fri, 15 Oct 2021 06:44:36 -0700 Subject: [PATCH] Edited 16_security_privacy_ln.asciidoc with Atlas code editor --- 16_security_privacy_ln.asciidoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/16_security_privacy_ln.asciidoc b/16_security_privacy_ln.asciidoc index ea22a84..c6a9022 100644 --- a/16_security_privacy_ln.asciidoc +++ b/16_security_privacy_ln.asciidoc @@ -102,7 +102,7 @@ However, the real network leaks information that allows an attacker to narrow do The smaller the anonymity set, the higher the chance of successful deanonymization. -=== Differences Between Ln and Bitcoin in Terms of Privacy +=== Differences Between LN and Bitcoin in Terms of Privacy While it's true that transactions on the Bitcoin network do not associate real world identities with Bitcoin addresses, all transactions are broadcast in cleartext and can be analyzed. Multiple companies have been established to deanonymize users of Bitcoin and other cryptocurrencies. @@ -493,7 +493,7 @@ This is counterintuitive and surprising given that nodes could have just routed This may mean that routing inefficiencies incentivized users to close triangles and not fall back on routing. Hopefully, multi-part payments will help increase the effectiveness of payment routing. -=== Centralization in the Ln +=== Centralization in the LN A common metric to assess the centrality of a node in a graph is its _betweenness centrality_. Central point dominance is a metric derived from betweenness centrality, used to assess the centrality of a network. For a precise definition of central point dominance, the reader is referred to https://doi.org/10.2307/3033543[Freeman's work].