I’ll be doing some revisions to the spec today for fixing some flaws.

Reply to this note

Please Login to reply.

Discussion

Most importantly, an attacker can request re-Initialization of the channel while only having the channel state, allowing them to pretend to be the public key way after the channel gets cut.

I’ll also be introducing a control command to stop using a channel.