Avatar
BitcoinTick
d2e3f36f117a15f07b329fad4d423b5151e2d7ba65968d9b442e91ec8fa22917

these new titans of the digital world aren’t immune to “the fatal conceit”. One day they will be leading the charge on something well intentioned with horrible downstream destruction.

So the JPM hit on MSTR ends with Saylor ceding the last few percent to partner banks. He basically just bribed the gate guards.

Wiki on G Edward Griffin calls him a conspiracy theorist. Jokes on you, I’m into that shit.

https://en.wikipedia.org/wiki/G._Edward_Griffin

Wow, actually accounts with real humans behind them here. Breath of fresh air.

Replying to Avatar 2Pac

Clearly this is written by an LLM but I think it conveys the key points —

Can Chainalysis track through Bitcoin Lightning after moving several hops?

Short answer: Yes, but with caveats. Chainalysis and similar blockchain analytics firms can trace activity that occurs on the Bitcoin network and can often de-anonymize some Lightning Network (LN) activity, especially when on-chain data is involved. The degree of traceability depends on how the LN channel operations interact with on-chain transactions and whether users reveal identifying information or reuse addresses.

How Lightning works at a high level

The Lightning Network is a layer-2 protocol built on top of Bitcoin to enable fast, off-chain payments.

Payments travel through a network of bidirectional payment channels between nodes.

The actual on-chain settlement (closing a channel, funding a channel) is done on the Bitcoin main chain.

Off-chain payments are routed through multiple LN nodes using hash-time-locked contracts (HTLCs) and do not require every step to be recorded on-chain.

What Chainalysis can see and infer

On-chain visibility: Chainalysis can see all Bitcoin transactions, inputs/outputs, addresses, and UTXO movements. If an on-chain transaction links to an LN channel funding or closing, that linkage can reveal associations between on-chain identities and LN activity.

LN metadata: Each LN payment involves HTLCs and potentially onion routing (Sphinx protocol) to obfuscate the destination. While the route is designed to be privacy-preserving, network-level metadata (IP addresses, timing, channel graph) can sometimes be correlated, especially if an adversary aggregates information from multiple sources (egress nodes, liquidity announcements, or multiple observers).

Endpoint exposure: If a user reuses the same on-chain address to fund multiple channels, or if a user sweeps funds to a single on-chain address, that can create traceability. Reusing multi-signature wallets or gossip data can also leak patterns over time.

Key limitations for tracing multi-hop LN payments

Off-chain privacy: The actual multi-hop LN payment path is largely off-chain, so there is no single immutable record of the path on the Bitcoin blockchain.

Route obfuscation: LN uses encrypted onion routing for payments, which makes it difficult for external observers to know the recipient or the full route.

Channel closings: When a channel is closed, the on-chain transaction can reveal the node ownership or channel funding, potentially linking participants if combined with other data.

Global correlation: Determining a link across multiple users or hops typically requires additional data (like timing, network topology, or external metadata). Without that, traceability is probabilistic rather than definitive.

Practical takeaway

If you move funds across the Lightning Network and eventually settle back on-chain, the on-chain transaction graph can reveal some associations, especially if you control or repeatedly reuse the same addresses or if there is a direct on-chain signature linking to a particular LN channel.

Across several hops, it becomes increasingly difficult to definitively trace the exact path purely from on-chain data. However, entities with broad observational capabilities (like exchanges, large clustering firms, or global metadata aggregators) can still infer relationships under certain circumstances.

For stronger privacy on LN, users typically:

Avoid reusing on-chain addresses for multiple channels.

Use fresh addresses for on-chain funding and closing operations.

Use privacy-preserving operational practices (e.g., avoid divulging network metadata, use privacy-centric wallets, consider CoinJoin-like on-chain privacy where appropriate, and be mindful of timing correlations).

Conclusion

Chainalysis can track and analyze Bitcoin and, to some extent, Lightning activity, especially when on-chain data is involved. However, multi-hop LN payments introduce privacy protections that make exact path reconstruction challenging. The risk of de-anonymization exists, particularly if on-chain transactions link to LN activity or if user behavior leaks identifying information. If you’re asking from a privacy/safety standpoint, the best practice is to understand both the on-chain and off-chain privacy implications and adopt cautious wallet and transaction hygiene.

Right, well I don’t reuse addresses and wasn’t when I was consolidating utxo after a coinjoin or joinmarket journey. My point is, I could use several lightning hops for a lot cheaper than several collaborative joinmarket spends on chain. The combination of the two of these technologies seems like a cost effective privacy path.

They can see channels but it’s a stretch to say any of these companies have the resources to track through several non kyc lightning wallets. The liquidity limitations mean we aren’t talking about enough in each transaction to be of interest to anyone.

For example, Cashapp and Strike top of funnel, maybe Zeus or your own lightning node as the last stop. Done often enough it should stay small enough.

Seems like you could move bitcoin through several non kyc lightning wallets cheaper than you could collaboratively mix on chain. What am I missing?

you always knew there would be final boss of affinity scam coins. the most powerful in the world are standing in the way of bitcoin and exposing their incentives. Which way modern man?