Edited ch14_applications.adoc with Atlas code editor

develop
claylock 7 months ago
parent 5bc96836d9
commit d80bd77fad

@ -1151,23 +1151,28 @@ scheme called https://oreil.ly/fuCiK[Sphinx]. This routing protocol
ensures that a payment sender can construct and communicate a path
through the LN such that:
- Intermediate nodes can verify and decrypt their portion of route
information and find the next hop.
++++
<ul>
<li> Intermediate nodes can verify and decrypt their portion of route
information and find the next hop.</li>
- Other than the previous and next hops, they cannot learn about any
other nodes that are part of the path.
<li> Other than the previous and next hops, they cannot learn about any
other nodes that are part of the path.</li>
- They cannot identify the length of the payment path or their own
position in that path.
<li>They cannot identify the length of the payment path or their own
position in that path.</li>
- Each part of the path is encrypted in such a way that a network-level
<li>Each part of the path is encrypted in such a way that a network-level
attacker cannot associate the packets from different parts of the path
to each other.
to each other.</li>
- Unlike Tor (an onion-routed anonymization protocol on the internet),
<li><p class="fix_tracking">Unlike Tor (an onion-routed anonymization protocol on the internet),
there are no "exit nodes" that can be placed under surveillance. The
payments do not need to be transmitted to the Bitcoin blockchain; the
nodes just update channel balances.
nodes just update channel balances.</p>
</li>
</ul>
++++
Using this onion-routed protocol, Alice wraps each element of the path
in a layer of encryption, starting with the end and working backward.

Loading…
Cancel
Save