Alan Siefert on Nostr: A few assumptions are made in some attacks in that analysis, such as “KYCed coins ...
A few assumptions are made in some attacks in that analysis, such as “KYCed coins used to open channels.” Also, some of the suggested mitigations are already active in LN implementations. Of course people fuck up. In any case, it’s definitely more private than non-coinjoined on-chain transactions.
Published at
2024-09-22 19:39:58Event JSON
{
"id": "a732c6e440519ae04ab4da98dd0ba9553b35edb796cb856de5845045e61e1886",
"pubkey": "f26606e331f128325ec99cd38782edbec134a5f911ea9fada7adce2ca9015b16",
"created_at": 1727033998,
"kind": 1,
"tags": [
[
"e",
"e1bd9fe7a8debba7d3090c95379a95fc419707363e9fbbcaaa8ffbcc7ffb4bfb",
"",
"root"
],
[
"e",
"65df141ba51593573d0ecbdbdba1f43a6b8350f011d4a59c24500f9a6cdead70",
"",
"reply"
],
[
"p",
"f985d309197c805e1719c73185b574fc3ee407d7c1b6157dee99c6ace2599bbb"
]
],
"content": "A few assumptions are made in some attacks in that analysis, such as “KYCed coins used to open channels.” Also, some of the suggested mitigations are already active in LN implementations. Of course people fuck up. In any case, it’s definitely more private than non-coinjoined on-chain transactions.",
"sig": "3897e2801f6dff9b174caef23cd967419df6cdb0e9ca4d808e609b4345e277d9a7ad52bc02c2aae09737876d9b9aede9c1491b70cc4f451932fc79522eae7698"
}