From elombrozo at gmail.com Sat Aug 1 10:41:21 2015 From: elombrozo at gmail.com (Eric Lombrozo) Date: Sat, 1 Aug 2015 03:41:21 -0700 Subject: [Lightning-dev] Stealing money from a hub? In-Reply-To: References: <87oaiunz8j.fsf@rustcorp.com.au> <87bnetnr5j.fsf@rustcorp.com.au> <0FD75A18-81F1-4C72-B430-F32A35E14475@gmail.com> Message-ID: <1F46EAD4-2B7C-46E7-B803-FF6BB14075C4@gmail.com> > On Aug 1, 2015, at 3:30 AM, Christopher Jamthagen wrote: > >> Sent: Saturday, August 01, 2015 at 11:57 AM >> From: "Eric Lombrozo" >> To: "Rusty Russell" >> Cc: "Christopher Jamthagen" , "lightning-dev at lists.linuxfoundation.org" >> Subject: Re: [Lightning-dev] Stealing money from a hub? > > > >> On Jul 30, 2015, at 4:48 PM, Rusty Russell wrote: >> But I realized yesterday, outsourcing needs a new sighash op mode (or >> normalized txids), so it's not really something to design a deployable >> system around today. >> Can you elaborate on this, Rusty? > > We wont know the txid of the revoked commitment transaction until the cheater signs and broadcasts it, thus we cannot pre-sign the stealing transaction for the third party. Got it. I suppose it would still be possible to have the third party notify you and request a signature when it occurs so that your device doesn?t have to sit and monitor the network and do the filtering, etc... -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 842 bytes Desc: Message signed with OpenPGP using GPGMail URL: