Edited ch14_applications.adoc with Atlas code editor

develop
claylock 8 months ago
parent 5bc96836d9
commit d80bd77fad

@ -1151,23 +1151,28 @@ scheme called https://oreil.ly/fuCiK[Sphinx]. This routing protocol
ensures that a payment sender can construct and communicate a path ensures that a payment sender can construct and communicate a path
through the LN such that: through the LN such that:
- Intermediate nodes can verify and decrypt their portion of route ++++
information and find the next hop. <ul>
<li> Intermediate nodes can verify and decrypt their portion of route
information and find the next hop.</li>
- Other than the previous and next hops, they cannot learn about any <li> Other than the previous and next hops, they cannot learn about any
other nodes that are part of the path. other nodes that are part of the path.</li>
- They cannot identify the length of the payment path or their own <li>They cannot identify the length of the payment path or their own
position in that path. position in that path.</li>
- Each part of the path is encrypted in such a way that a network-level <li>Each part of the path is encrypted in such a way that a network-level
attacker cannot associate the packets from different parts of the path attacker cannot associate the packets from different parts of the path
to each other. to each other.</li>
- Unlike Tor (an onion-routed anonymization protocol on the internet), <li><p class="fix_tracking">Unlike Tor (an onion-routed anonymization protocol on the internet),
there are no "exit nodes" that can be placed under surveillance. The there are no "exit nodes" that can be placed under surveillance. The
payments do not need to be transmitted to the Bitcoin blockchain; the payments do not need to be transmitted to the Bitcoin blockchain; the
nodes just update channel balances. nodes just update channel balances.</p>
</li>
</ul>
++++
Using this onion-routed protocol, Alice wraps each element of the path Using this onion-routed protocol, Alice wraps each element of the path
in a layer of encryption, starting with the end and working backward. in a layer of encryption, starting with the end and working backward.

Loading…
Cancel
Save