Honest question, if we have the option to buy P2P via lightning why should I care about whirlpool, coinjoin or any other mixer? After all, buying KYC on exchanges there will always be a user ID record without an exit.

#bitcoin #lightning #asknostr

Reply to this note

Please Login to reply.

Discussion

Expect no answer, there is none.

I see a lot of people making videos and talking about mixers, I would like a sincere opinion from the fans.

Coin join would be good if you’ve already purchased stats KYC and wanted to mix them up to make it harder to link back to you. But if you are buying p2p using new addresses each time you should be pretty anon.

In my opinion the best way to break KYC is to sell where you bought and then buy back without KYC

If you sell and make a gain you end up paying taxes and buy back much less Bitcoin. Otherwise yes good idea if you are in loss or break even

É o preço que você vai pagar para aprender a comprar de maneira correta, sem KYC 🤙

One potential reason would be having doxxed one or two UTXOs resulting from your lightning activities.

Likely when you're opening and closing channels your node software doesn't offer perfect UTXO hygiene, so it's something that can happen.

You also have certain entities spying on your channels, so when you close a channel they could then track the resulting UTXO.

But I could get around this problem just with good utxo management, no? Never reusing onchain addresses.

It's trivial to connect your lightning node, and so its channels, and so the UTXOs. Just signing up to Amboss, you've doxxed all your UTXOs. Being a good lightning node operator and linking contact details to your node, you've doxxed your UTXOs. To what extent is this important? That's an individual judgement.

Any UTXOs that come from my node and will eventually go into cold storage, whether from closed channels or a swap out, eventually get a whirlpool first.

Good point 🤔

Another utility of mixing is obviously if you want to spend on-chain to buy something who doxxes you (a package delivered at home, or as a company one of your supplier or client) and you don’t want your change to be spied on. Actually their are many reasons to mix but you are right it’s not a systematic issue.

That's because you're a dirty node

I also don't know what the core issue of this question is. i don't care about Kyc and coinjoin. because I always mix the UTXO between #Lighting and #Liquid and I also use npub on chain management. I don't know how far I am correct hi neglecting the danger. Lol I just do it like this. #BTC #nostr

You don't care about KYC? Do you buy bitcoin on exchanges by leaving your ID? If so... go back two spaces.

They’re for the homies with way too much bitcoin

This is a very interesting point, for large purchases you will have to go either through exchanges KYC or P2P onchain.

I wonder if there are millionaire P2P purchases?

Ransomware attacks are arguably this

I had never thought of that.

Path Probing: In a path probing attack, an attacker intentionally sends payments through the network in an attempt to discover the shape of the network and the distribution of liquidity. This works because the LN responds differently to a payment attempt depending on whether it would succeed or fail due to insufficient capacity in a channel. By repeatedly sending payments of varying sizes along different paths, an attacker can gain information about the distribution of funds in the network's channels. Over time, by correlating this data, an attacker could potentially gain an understanding of the network's structure and where liquidity is concentrated, enabling them to make educated guesses about the paths that real transactions are likely to take.

Timing Analysis: In a timing analysis attack, an adversary would monitor the time taken for transactions to pass through nodes in an attempt to correlate the timing of transactions entering and leaving different parts of the network. Even though the LN does not publicly broadcast transactions as in the base layer of Bitcoin, the timing of transactions can still be observed by malicious nodes. If an adversary runs multiple nodes, they can compare the time when transactions enter and leave their nodes. If they see a match (a transaction entering one node and leaving another with approximately the same amount at approximately the same time), they might be able to link those transactions together.

Buy monero p2p, send it then to 3 Wallets after that, so the linking is then impossible, then swap it to bitcoin on New bitcoin wallet, which was never usedtilkl now.

Thank you, I will read these articles

The counterparty in the p2p trade can spy on you too.

Imagine you're selling bitcoin, and the input of that tra sanction was created as a coinbase output in 2010, you just revealed your an OG miner with a big stash...

And in regards to lightning, you need an onchain transaction to open and close a lightning channel, and that should be done in a coinjoin for better privacy.

I need to study more about how the new node wallets on your cell phone will behave in this regard.