Damus
Filou · 1d
Explain?
Cyph3rp9nk profile picture
This truly violates user privacy, since a state actor could create many nodes and carry out probing attacks, just like in Tor.

There are many ways to improve Lightning’s privacy, and this is certainly not one of them.

LND couldn’t care less about privacy; it’s only interested in promoting stablecoins and obeying the WEF.
1
Filou · 1d
Probing attacks very likely already exist on the network. Quite probable even that one of the large ‘trustworthy’ nodes on the network is a honeypot. But still, the reality is that first hop / last hop of any tx can never be known by any intermediary node.