The simple way the chain is used to remove trust on Lightning is naturally beautiful.
Using asymmetry, lime delays, and revocation made possible only by the native features of the main chain, the incentives are put in place to disincentivize dishonest actors.
This is so bullish - any system can potentially be made to allow enemies to cooperate using Bitcoin’s native properties.