New research: Bitcoin Lightning Network could have multiple security holes
To make Bitcoin more scalable, Joseph Poon and Thaddeus Dryja created the Lightning Network in 2016. The project improves scalability by creating a second layer on the Bitcoin blockchain, and significantly increases transaction speed, as transactions do not require confirmation from all nodes on the network.
Image source: pixabay
However, after a formal security audit last September, the network was found to have multiple vulnerabilities.
- US Presidential candidate Bloomberg: Cryptocurrency value has exceeded 100 billion US dollars, to provide clear regulatory rules for crypto assets
- Financial One Account released the first financial report after listing: revenue of 2.328 billion yuan, loss of 1.661 billion yuan
- Talking about the impact of the epidemic on digital currency: how digital currency can promote social collaboration and value exchange
Blockchain technology company Blockstream and some of its enterprise projects have been actively involved in the development of the Lightning Network. They even developed a C-lightning implementation of the network in C.
Recently, Christian Decker, a researcher at Blockstream, and Utz Nisslmueller, Klaus-Tycho Foerster, and Stuttgart in the Department of Computer Science at the University of Vienna A research paper was co-authored by Stefan Schmid.
Considering how the Lightning Network uses Gossip algorithms and detection mechanisms to support nodes, this paper investigates whether these mechanisms can be used to access sensitive transaction data.
This paper proposes two attack methods: probing attack and timing attack.
A probe attack is an attempt by a malicious participant to proactively determine the maximum amount of money that can be transferred on a connected target channel. A timed attack is defined as an attack that an attacker attempts to take to find out how long it takes for a routed payment to actually reach its destination.
The research paper shows that as long as "only one channel's balance is lower than or equal to the second lowest balance on the route from the attacking node", it is practical to track payment on any node's reachable channel from the attacking node.
However, researchers also point out that nodes that call themselves private can prevent broadcasts via Gossip, which can be useful for mobile wallets or nodes with limited runtime, such as personal computers.
In addition, although the research team believes that due to the nature of Lightning Network routing, it is impossible to find out the time to the original payment source, they also found that the timing attack "has generated uniformity on the local network with almost no external interference Results of the distribution. "
This research shows that the off-chain routing mechanism of the Layer 2 expansion solution can be used to obtain the status of the private information network, which may pose a threat to end users, because most users connect to a single, well-connected node in order to communicate with Other users interact.
With the continuous development of the Lightning Network, these problems are expected to be resolved, allowing the Bitcoin blockchain to expand and meet the requirements for large-scale adoption.
We will continue to update Blocking; if you have any questions or suggestions, please contact us!
Was this article helpful?
93 out of 132 found this helpful
Related articles
- Comment: BCH halving time is earlier than BTC, will it be involved in the death spiral?
- Analysis: Bitcoin rushes to 20,000, at least $ 5 billion needed
- Views | Coronavirus forces hundreds of millions of RMB of cash to be disinfected, outbreak may accelerate DCEP launch
- Is DeFi a moth again? Ethereum smart wallet application Authenticeum exposed to fatal vulnerability
- Tiger's founder Wang Ruixi talks about hedging attributes is one of the most important attributes of Bitcoin | Chain Node AMA
- Bitcoin's Secret History: Who Drived the Early Propaganda of Bitcoin?
- Defi protocol bZx was attacked twice in one week, highlighting industry concerns