@ -1174,6 +1174,7 @@ through the LN such that:
</ul>
++++
Using this onion-routed protocol, Alice wraps each element of the path
in a layer of encryption, starting with the end and working backward.
She encrypts a message to Eric with Eric's public key. This message is