David A. Harding [ARCHIVE] on Nostr: 📅 Original date posted:2021-05-03 📝 Original message: On Mon, May 03, 2021 at ...
📅 Original date posted:2021-05-03
📝 Original message:
On Mon, May 03, 2021 at 11:01:48AM +1000, Lloyd Fournier wrote:
> 2. It is not easy to figure out whether it worked or not
Good point.
> 3. This is incompatible with covert recovery schemes like in [1] [...]
> (3) is also a problem with just doing encrypted backups -- going around
> looking for backups means you tell everyone that you are in recovery mode.
Eh, I assume nodes using the backup commons would, each time they're
restarted, go through the steps of downloading some number of backups
even if they haven't lost any data. This tests that the backups are
being stored faithfully (essential to any backup process) and provides
cover for cases where a node does lose data.
Thus encrypted backups seem fully compatible to me with covert recovery.
Sorry, I didn't realize that compatibility was one of your design goals
for seed-based peer rediscovery.
-Dave
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <
http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20210503/104ee3c0/attachment.sig>
Published at
2023-06-09 13:02:25Event JSON
{
"id": "567a77b509352f5a986ca7b3aa12e48d1ca30d1846d770a5c530516c5beed703",
"pubkey": "d3574a24208f4e3d0821bb4a69a0c3ae842043d444fa5c4a8c49c369918a6fb2",
"created_at": 1686315745,
"kind": 1,
"tags": [
[
"e",
"cf0209e285b65597d953bb5b8d3ccbf432a41374faf3f29d2e3020153d4f9b3a",
"",
"root"
],
[
"e",
"a4f1e1aa1ec81a125108bad5182a710375b8f420f739d36b8bb42923ac8aa052",
"",
"reply"
],
[
"p",
"b5ff7c704f90e4eebfa414c0a017a84544c32586a1bd2fc86c74c2914d03c25e"
]
],
"content": "📅 Original date posted:2021-05-03\n📝 Original message:\nOn Mon, May 03, 2021 at 11:01:48AM +1000, Lloyd Fournier wrote:\n\u003e 2. It is not easy to figure out whether it worked or not\n\nGood point.\n\n\u003e 3. This is incompatible with covert recovery schemes like in [1] [...]\n\u003e (3) is also a problem with just doing encrypted backups -- going around\n\u003e looking for backups means you tell everyone that you are in recovery mode.\n\nEh, I assume nodes using the backup commons would, each time they're\nrestarted, go through the steps of downloading some number of backups\neven if they haven't lost any data. This tests that the backups are\nbeing stored faithfully (essential to any backup process) and provides\ncover for cases where a node does lose data.\n\nThus encrypted backups seem fully compatible to me with covert recovery.\nSorry, I didn't realize that compatibility was one of your design goals\nfor seed-based peer rediscovery.\n\n-Dave\n-------------- next part --------------\nA non-text attachment was scrubbed...\nName: signature.asc\nType: application/pgp-signature\nSize: 833 bytes\nDesc: not available\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20210503/104ee3c0/attachment.sig\u003e",
"sig": "04e24d4c7094a0431a5a28d7c720fd710a3ddfb29e328725bbaf97c716936dcea3c626ab989ec54ddbd010c1fc19ced80d85380b87d69fead8114d2b613d6ff9"
}