Ankit Gangwal [ARCHIVE] on Nostr: π Original date posted:2020-07-17 π Original message: Consider A wants to send ...
π
Original date posted:2020-07-17
π Original message:
Consider A wants to send some funds to E.
They donβt have a direct payment channel among them. So, they use a following path A-B-C-D-E. A is the sender of payment and E is final recipient.
E sends the hash of a secret r to A, A passes on the hash to B, B to C, C to D, and D to E.
E discloses the secret to C (a partner in crime with E) and E do not respond to D. C gives the secret to B (settling the HTLC between them). Then, B gives the secret to A (settling the HTLC between them).
A sent (and lost) the money, as E denies receiving the money (and the promised service/good).
How the lightening network sees this? Out of their control?
--
A_G
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20200717/bea3d39b/attachment.html>
π Original message:
Consider A wants to send some funds to E.
They donβt have a direct payment channel among them. So, they use a following path A-B-C-D-E. A is the sender of payment and E is final recipient.
E sends the hash of a secret r to A, A passes on the hash to B, B to C, C to D, and D to E.
E discloses the secret to C (a partner in crime with E) and E do not respond to D. C gives the secret to B (settling the HTLC between them). Then, B gives the secret to A (settling the HTLC between them).
A sent (and lost) the money, as E denies receiving the money (and the promised service/good).
How the lightening network sees this? Out of their control?
--
A_G
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20200717/bea3d39b/attachment.html>