|
|
|
@ -1151,23 +1151,28 @@ scheme called https://oreil.ly/fuCiK[Sphinx]. This routing protocol
|
|
|
|
|
ensures that a payment sender can construct and communicate a path
|
|
|
|
|
through the LN such that:
|
|
|
|
|
|
|
|
|
|
- Intermediate nodes can verify and decrypt their portion of route
|
|
|
|
|
information and find the next hop.
|
|
|
|
|
++++
|
|
|
|
|
<ul>
|
|
|
|
|
<li> Intermediate nodes can verify and decrypt their portion of route
|
|
|
|
|
information and find the next hop.</li>
|
|
|
|
|
|
|
|
|
|
- Other than the previous and next hops, they cannot learn about any
|
|
|
|
|
other nodes that are part of the path.
|
|
|
|
|
<li> Other than the previous and next hops, they cannot learn about any
|
|
|
|
|
other nodes that are part of the path.</li>
|
|
|
|
|
|
|
|
|
|
- They cannot identify the length of the payment path or their own
|
|
|
|
|
position in that path.
|
|
|
|
|
<li>They cannot identify the length of the payment path or their own
|
|
|
|
|
position in that path.</li>
|
|
|
|
|
|
|
|
|
|
- Each part of the path is encrypted in such a way that a network-level
|
|
|
|
|
<li>Each part of the path is encrypted in such a way that a network-level
|
|
|
|
|
attacker cannot associate the packets from different parts of the path
|
|
|
|
|
to each other.
|
|
|
|
|
to each other.</li>
|
|
|
|
|
|
|
|
|
|
- Unlike Tor (an onion-routed anonymization protocol on the internet),
|
|
|
|
|
<li><p class="fix_tracking">Unlike Tor (an onion-routed anonymization protocol on the internet),
|
|
|
|
|
there are no "exit nodes" that can be placed under surveillance. The
|
|
|
|
|
payments do not need to be transmitted to the Bitcoin blockchain; the
|
|
|
|
|
nodes just update channel balances.
|
|
|
|
|
nodes just update channel balances.</p>
|
|
|
|
|
</li>
|
|
|
|
|
</ul>
|
|
|
|
|
++++
|
|
|
|
|
|
|
|
|
|
Using this onion-routed protocol, Alice wraps each element of the path
|
|
|
|
|
in a layer of encryption, starting with the end and working backward.
|
|
|
|
|