Could possibly be moved up to the section describing funding, as both
sides need to be able to derive the proper state hints to arrive at the
same set of commitment transactions.
A party can't pick its to_self_delay (the CSV delay) itself, as that
would mean they can set it to effectively zero and be able to breach at
will. Instead, both sides propose a CSV delay for the other, effectively
enforcing time delay that allows them to act in the face of a breach.
Similar to the prior commit, here we remove another piece of personally
identifiable information: the public key of Rene's known (?) routing
node on the public network.
As is the chapter uses 144.76.235.20 which has a PTR DNS record to
rene-pickhardt.de. Rather than include possibly private information
relating to the authors of the book, we opt to use an IP address from a
known private range. This doesn't take away from the example, but lets
us include less personally identifying information in the book.