|
|
|
@ -1124,17 +1124,22 @@ route discovery use a P2P model where nodes propagate channel
|
|
|
|
|
announcements to their peers in a "flooding" model, similar to how
|
|
|
|
|
Bitcoin propagates transactions.
|
|
|
|
|
|
|
|
|
|
++++
|
|
|
|
|
<p class="fix_tracking">
|
|
|
|
|
In our previous example, Alice's node uses one of these route discovery
|
|
|
|
|
mechanisms to find one or more paths connecting her node to Eric's node.
|
|
|
|
|
Once Alice's node has constructed a path, she will initialize that path
|
|
|
|
|
through the network by propagating a series of encrypted and nested
|
|
|
|
|
instructions to connect each of the adjacent payment channels.
|
|
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
<p class="fix_tracking">
|
|
|
|
|
Importantly, this path is only known to Alice's node. All other
|
|
|
|
|
participants in the payment route see only the adjacent nodes. From
|
|
|
|
|
Carol's perspective, this looks like a payment from Bob to Diana. Carol
|
|
|
|
|
does not know that Bob is actually relaying a payment from Alice. She
|
|
|
|
|
also doesn't know that Diana will be relaying a payment to Eric.
|
|
|
|
|
also doesn't know that Diana will be relaying a payment to Eric.</p>
|
|
|
|
|
++++
|
|
|
|
|
|
|
|
|
|
This is a critical feature of the LN because it ensures
|
|
|
|
|
privacy of payments and makes it difficult to apply surveillance,
|
|
|
|
|