Wanna stay compliant? Use the Lightning Network.

Reply to this note

Please Login to reply.

Discussion

Compliant to what?

What she wrote

This is why keysend and AMP are both important, and, by all the fiat-encapsulated dev shops, deprecated.

They try to tell everyone that LN nodes sharing their ID keys is in some way harmful, yet without that you can't send payments to them without first confessing to them what your LN identity key is.

That is fishy, if you ask me.

The path is onion style, but they deliberately waffle and prevaricate you into giving away your endpoint's address, which makes the entire thing of using onion layers kinda nutty, like, peanut butter and lavender oil mixed together. Can't tell if food or concealed poop.

Everything chainalysis claims they can do is a lie. That whole company is Theranos 2.0

🤢

"After having to admit to the lack of scientific evidence for the accuracy of its software and the publication of an expert report describing the use of Chainalysis’ heuristics as “reckless”, Chainalysis finds itself trying to evade an audit of its software’s source code."

https://bitcoinmagazine.com/technical/chainalysis-denounces-bitcoin-core-contributor-as-unqualified

https://github.com/lnbook/lnbook/blob/develop/16_security_privacy_ln.asciidoc#attacks-on-lightning

"We identified 27,183 private channels, discovered hidden balances, and showed how a passive adversary can infer payment endpoints with very high probability."

https://arxiv.org/pdf/2003.12470.pdf