Honest question, if we have the option to buy P2P via lightning why should I care about whirlpool, coinjoin or any other mixer? After all, buying KYC on exchanges there will always be a user ID record without an exit.
#bitcoin #lightning #asknostr
Honest question, if we have the option to buy P2P via lightning why should I care about whirlpool, coinjoin or any other mixer? After all, buying KYC on exchanges there will always be a user ID record without an exit.
#bitcoin #lightning #asknostr
Expect no answer, there is none.
I see a lot of people making videos and talking about mixers, I would like a sincere opinion from the fans.
Coin join would be good if you’ve already purchased stats KYC and wanted to mix them up to make it harder to link back to you. But if you are buying p2p using new addresses each time you should be pretty anon.
In my opinion the best way to break KYC is to sell where you bought and then buy back without KYC
One potential reason would be having doxxed one or two UTXOs resulting from your lightning activities.
Likely when you're opening and closing channels your node software doesn't offer perfect UTXO hygiene, so it's something that can happen.
You also have certain entities spying on your channels, so when you close a channel they could then track the resulting UTXO.
But I could get around this problem just with good utxo management, no? Never reusing onchain addresses.
It's trivial to connect your lightning node, and so its channels, and so the UTXOs. Just signing up to Amboss, you've doxxed all your UTXOs. Being a good lightning node operator and linking contact details to your node, you've doxxed your UTXOs. To what extent is this important? That's an individual judgement.
Any UTXOs that come from my node and will eventually go into cold storage, whether from closed channels or a swap out, eventually get a whirlpool first.
Good point 🤔
Another utility of mixing is obviously if you want to spend on-chain to buy something who doxxes you (a package delivered at home, or as a company one of your supplier or client) and you don’t want your change to be spied on. Actually their are many reasons to mix but you are right it’s not a systematic issue.
That's because you're a dirty node
I also don't know what the core issue of this question is. i don't care about Kyc and coinjoin. because I always mix the UTXO between #Lighting and #Liquid and I also use npub on chain management. I don't know how far I am correct hi neglecting the danger. Lol I just do it like this. #BTC #nostr
You don't care about KYC? Do you buy bitcoin on exchanges by leaving your ID? If so... go back two spaces.
They’re for the homies with way too much bitcoin
Path Probing: In a path probing attack, an attacker intentionally sends payments through the network in an attempt to discover the shape of the network and the distribution of liquidity. This works because the LN responds differently to a payment attempt depending on whether it would succeed or fail due to insufficient capacity in a channel. By repeatedly sending payments of varying sizes along different paths, an attacker can gain information about the distribution of funds in the network's channels. Over time, by correlating this data, an attacker could potentially gain an understanding of the network's structure and where liquidity is concentrated, enabling them to make educated guesses about the paths that real transactions are likely to take.
Timing Analysis: In a timing analysis attack, an adversary would monitor the time taken for transactions to pass through nodes in an attempt to correlate the timing of transactions entering and leaving different parts of the network. Even though the LN does not publicly broadcast transactions as in the base layer of Bitcoin, the timing of transactions can still be observed by malicious nodes. If an adversary runs multiple nodes, they can compare the time when transactions enter and leave their nodes. If they see a match (a transaction entering one node and leaving another with approximately the same amount at approximately the same time), they might be able to link those transactions together.
Buy monero p2p, send it then to 3 Wallets after that, so the linking is then impossible, then swap it to bitcoin on New bitcoin wallet, which was never usedtilkl now.
https://voltage.cloud/blog/lightning-network-faq/lightning-network-privacy-explainer/
https://github.com/lnbook/lnbook/blob/develop/16_security_privacy_ln.asciidoc#attacks-on-lightning
https://abytesjourney.com/lightning-privacy/
"We identified 27,183 private channels, discovered hidden balances, and showed how a passive adversary can infer payment endpoints with very high probability."
Thank you, I will read these articles
The counterparty in the p2p trade can spy on you too.
Imagine you're selling bitcoin, and the input of that tra sanction was created as a coinbase output in 2010, you just revealed your an OG miner with a big stash...