Nice to know they conclude, "We analyse countermeasures the network can implement and come to the conclusion that an adequate solution comprises constant message sizes as well as dummy traffic. "
Payment Censorship in the Lightning Network Despite Encrypted Communication
The authors demonstrate how to detect LN messages by their deterministic sizes and packet flows. These methods allow a network-level adversary to identify and censor payments in the Lightning Network.
😱
Paper: https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.12
Discussion
No replies yet.