Mats Jerratsch [ARCHIVE] on Nostr: 📅 Original date posted:2015-10-20 📝 Original message: > But you can tell, just ...
📅 Original date posted:2015-10-20
📝 Original message:
> But you can tell, just by seeing whether a well-known third party's
> lightning address is routable? If every node on your network is an
> attacker's, then you won't see the third party's address.
>
> If you do see a route to the third party (ie, Me -> Attacker -> Attacker
> -> Attacker -> Bob -> Carol -> Third party), then you could work backwards
> asking Carol and Bob to connect directly to you, which would get you a
> non-attacker node with reasonable probability, assuming there are any.
No you can't, that's the whole point. ;)
Just because they are attacking you personally does not mean they do
not have a working link to the rest of the network. They can still
route all your payment and (1) monitor all your activity (2) gain some
profit by charging some high fees off of you.
Maybe I am missing something though..
📝 Original message:
> But you can tell, just by seeing whether a well-known third party's
> lightning address is routable? If every node on your network is an
> attacker's, then you won't see the third party's address.
>
> If you do see a route to the third party (ie, Me -> Attacker -> Attacker
> -> Attacker -> Bob -> Carol -> Third party), then you could work backwards
> asking Carol and Bob to connect directly to you, which would get you a
> non-attacker node with reasonable probability, assuming there are any.
No you can't, that's the whole point. ;)
Just because they are attacking you personally does not mean they do
not have a working link to the rest of the network. They can still
route all your payment and (1) monitor all your activity (2) gain some
profit by charging some high fees off of you.
Maybe I am missing something though..