1) show me where he actually linked that video. he didn't (and wont) because ot plays like a monero commercial.

2) here is that video. actually watch it and you'll see that they CANNOT "trace monero transactions." unless someone has connections to their malicious node without a proxy they aren't getting significant data about a sender.

https://v.nostr.build/D4Nzp22vRF35IRnz.mp4

3) you have no idea, as an end user , what privacy protections you are getting in any given LN tx. bolt12 is awesome and I look forward to to actually being functional tech. Until it is implemented and battle tested, it is NOT a privacy solution.

Reply to this note

Please Login to reply.

Discussion

I linked to the video here: nostr:nevent1qgszrqlfgavys8g0zf8mmy79dn92ghn723wwawx49py0nqjn7jtmjagqyz8k23pc2ya8gjx5xdfludr2sj4mrs3lfqlwskc34n7w2whce757kngz4v8

It's not a monero commercial, it's a nail in monero's coffin

Now do how many people have gotten busted for using bitcoin.

Que the song

I don't think that video is the flex that you think it is. Granted this is well outside of my wheelhouse, but even the guy in the video admits multiple times that he's not really finding that much information. He also admits that this was from before. Whatever new XMR implementation dandelion is. I would assume that would make it even more difficult. That guy did not do a very good job of selling its ability to track XMR

I'm just trying to learn but that video is kind of a good commercial for XMR and is far from a nail in the coffin

After I've read these articles I think there is no general algorythm an/or toolset to analyze all possible Momero transactions. These cases spotted that there were some additional a-priori imformation about the suspects, therefore the law enforcement firms analyzed specifically the suspicious transactions.

> you have no idea, as an end user , what privacy protections you are getting in any given LN tx

Still looking for an LN tx? All day I've been asking monero users to show me an LN transaction and identify the sender, recipient, and amount. So far they haven't even found a *transaction to analyze.* Care to step up?

explain to me how

as an end user,

i should assess the privacy of ANY given LN tx.

I'll wait.

this

"if some rando on the Internet can't trace a random tx, it must be private"

game doesnt prove jack shit.

there IS **NO** lightning network TX. It does not exist.

you **can** cryptographically verify that intermediate nodes can't determine the recipient's identity, but there is NO public ledger of all the transactions.

there's no obscurity or hope, I recommend you to actually read about how lightning works, because you seem to have many misunderstandings

sigh

heres the standard info bro

yes I am aware it isnt a blockchain.

as an end user, i am making a transaction.

If I cannot evaluate my anonset before sending, It is not a good privacy tool.

https://www.voltage.cloud/blog/lightning-network-privacy-explainer

there is no anonset the way that it's there in monero.

when you generate a lightning invoice you have:

- a pubkey that says where your money needs to end up

- a signature proving the invoice is legit and hasn't been messed with

- a payment hash that works like your digital receipt

that's really all you need! the magic happens in how it works: each node in the path only sees one hop before and after itself.

This was helpful. Thanks.

and you aren't responding to a

ANY of the concerns in the site I linked.

theres a new one of these every few months.

Because this is a network that is effectively still in beta testing.

Quit trying to push it as a finished tested product

https://eprint.iacr.org/2021/384.pdf

First of all, he DID link the video, and second, I believe that you have a bit of a misunderstanding about how Lightning Network works. There truly is no such thing as a "Lightning transaction" in the traditional sense. On the Lightning Network, the only transactions that exist on the timechain are those to open and close channels. With bolt11, an invoice consists of a routing path (similar to TOR's onion, but technically slightly different), and payment information that is passed through that path. The actual "sending" of bitcoin happens through updating channel states between participants, which are essentially just promises backed by on-chain bitcoin in the channel. When you use bolt11 on Lightning Network, each hop in the routing path only knows its immediate predecessor and successor - they have no idea about the payment's origin or final destination, unless an attacker controlled all the nodes between you and the recipient of a payment they would have no way of knowing who you are sending money to, even if they were to track each payment at the packet level it would be extremely hard to figure out who the final payment goes to.

Also, with bolt12 route blinding lets the recipient hide their node identity from the sender, this means neither party needs to fully trust the other or reveal their network position.

Then you should actually WATCH the video.

Yes I am aware that the lightning network is not a blockchain

and that bolt 12 is supposed to fix all of our problems

and also that it isn't implemented yet

As I said

once these solutions are implemented

and tested

and have been around for a little while,

THEN you can start saying that it's a privacy tool.

Until that you're just posing.

I'm done arguing, need to get some sleep

I recommend you to take a look at:

- the bolt11 specification https://github.com/lightning/bolts/blob/master/11-payment-encoding.md

- bolt01 https://github.com/lightning/bolts/blob/master/01-messaging.md

- bolt04 https://github.com/lightning/bolts/blob/master/04-onion-routing.md

- bolt07 https://github.com/lightning/bolts/blob/master/07-routing-gossip.md

- bolt08 https://github.com/lightning/bolts/blob/master/08-transport.md

- https://www.bolt11.org/ paste in an invoice and look at how it works

bolt12 is only an **additional** privacy layer to what's already provided by the specification I linked you

hey if monero works for you keep using monero, nobody's stopping you, you're a sovereign individual like all of us 😉

Okay so with bolt12, this is going to sound really dumb and I'm clearly trying to figure this out.

Starting address and amount ->hops to node still same transaction nothing is hidden-> next node same transaction two nodes now hiding start point -> next node separation from start point but still same corn so where is obfuscation?

I don't understand this and need someone to explain it like I'm 10. To me even though the node hops and the start point maybe hidden the BTC is still able to be traced back to the original address that started the transaction right? Wouldn't the only way to really hide that be to have it drop in a pool of some sort then piece together totals from the pool mixing with multiple other piles of corn? Like the way whirlpool worked? I just don't get how it works, clearly, unless the start and end aren't important because you're just breaking the node to node until you flip on/off chain then save?

Does that make sense? Sorry I've been pretty sick and I feel like that was a flight of ideas lol

>I don't understand this and need someone to explain it like I'm 10

I will explain it to you like you're an adult: it's similar to how onion messaging works. You send an encrypted message to party K, who finds inside an encrypted message for party L. He sends it to party M, who finds an encrypted message inside for party N. And so on. No party knows who the sender is except the sender themselves.

>Starting address and amount ->hops to node still same transaction nothing is hidden

Lots of stuff is hidden: the routing node does not know who the sender or recipient is, nor if the amount is the full amount, a partial amount, or a decoy (aka a payment probe).

-> next node same transaction two nodes now hiding start point

It's not just that "two nodes" are hiding the starting point; the first routing node does not know if the previous person is the sender or just another routing node. So from his perspective there might be *any number* of nodes hiding the starting point. What hides the starting point is that you can't tell a starting point from another routing node.

> To me even though the node hops and the start point maybe hidden the BTC is still able to be traced back to the original address that started the transaction right?

No. Just like with onion messaging, routing nodes can ask one another if they routed the payment, and maybe some will collude and reply "yes, I helped route the payment." But even if all routing nodes collude, they can only ask the sender "Did you help route the payment?" and if he does not reply, they don't know if he was the sender or just a routing node who refuses to collude.

The video is great, every Monero user should watch it. And you are right, does not show that they can trace it.

And BTW, bolt12 has been already implemented.

not by the most wisely used LN implementation it hasn't

I have literally just used bolt12 in one of the most used lightning wallets.

To be fair it is more flakey than bolt11 right now because it's still not used by every node, but yeah didn't even feel the need to rebutt that, you're absolutely correct

oh come on

it isnt even *implemented by LND yet

It works with lnd when you run it with https://github.com/lndk-org/lndk

oh cool!

did not know about that

my point about stress testing still stands however

been hearing "bolt12 fixes this" for years already

How private was it?

bolt12 is optional in some wallets and is barely used

But that doesn't even matter because due to it's complexity most Lightning users are on custodial wallets so have no privacy from the custodian, hackers that will inevitably breach that data, and governments that compel those custodians to save that info and give it to them

He did link, but your nostr client might have cut off the very last link