Edited ch14_applications.adoc with Atlas code editor

develop
claylock 7 months ago
parent 77aa8efdb4
commit 62295a8048

@ -1124,17 +1124,22 @@ route discovery use a P2P model where nodes propagate channel
announcements to their peers in a "flooding" model, similar to how announcements to their peers in a "flooding" model, similar to how
Bitcoin propagates transactions. Bitcoin propagates transactions.
++++
<p class="fix_tracking">
In our previous example, Alice's node uses one of these route discovery In our previous example, Alice's node uses one of these route discovery
mechanisms to find one or more paths connecting her node to Eric's node. mechanisms to find one or more paths connecting her node to Eric's node.
Once Alice's node has constructed a path, she will initialize that path Once Alice's node has constructed a path, she will initialize that path
through the network by propagating a series of encrypted and nested through the network by propagating a series of encrypted and nested
instructions to connect each of the adjacent payment channels. instructions to connect each of the adjacent payment channels.
</p>
<p class="fix_tracking">
Importantly, this path is only known to Alice's node. All other Importantly, this path is only known to Alice's node. All other
participants in the payment route see only the adjacent nodes. From participants in the payment route see only the adjacent nodes. From
Carol's perspective, this looks like a payment from Bob to Diana. Carol Carol's perspective, this looks like a payment from Bob to Diana. Carol
does not know that Bob is actually relaying a payment from Alice. She does not know that Bob is actually relaying a payment from Alice. She
also doesn't know that Diana will be relaying a payment to Eric. also doesn't know that Diana will be relaying a payment to Eric.</p>
++++
This is a critical feature of the LN because it ensures This is a critical feature of the LN because it ensures
privacy of payments and makes it difficult to apply surveillance, privacy of payments and makes it difficult to apply surveillance,

Loading…
Cancel
Save