[Lightning-dev] Stealing money from a hub?

Eric Lombrozo elombrozo at gmail.com
Sat Aug 1 10:41:21 UTC 2015


> On Aug 1, 2015, at 3:30 AM, Christopher Jamthagen <cjamthagen at gmx.com> wrote:
> 
>> Sent: Saturday, August 01, 2015 at 11:57 AM
>> From: "Eric Lombrozo" <elombrozo at gmail.com>
>> To: "Rusty Russell" <rusty at rustcorp.com.au>
>> Cc: "Christopher Jamthagen" <cjamthagen at gmx.com>, "lightning-dev at lists.linuxfoundation.org" <lightning-dev at lists.linuxfoundation.org>
>> Subject: Re: [Lightning-dev] Stealing money from a hub?
> 
> 
> 
>> On Jul 30, 2015, at 4:48 PM, Rusty Russell <rusty at rustcorp.com.au> wrote:
>> But I realized yesterday, outsourcing needs a new sighash op mode (or
>> normalized txids), so it's not really something to design a deployable
>> system around today.
>> Can you elaborate on this, Rusty?
> 
> We wont know the txid of the revoked commitment transaction until the cheater signs and broadcasts it, thus we cannot pre-sign the stealing transaction for the third party.

Got it. I suppose it would still be possible to have the third party notify you and request a signature when it occurs so that your device doesn’t have to sit and monitor the network and do the filtering, etc...
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20150801/45729f48/attachment-0001.sig>


More information about the Lightning-dev mailing list