From matsjj at gmail.com Tue Oct 20 07:27:11 2015 From: matsjj at gmail.com (Mats Jerratsch) Date: Tue, 20 Oct 2015 09:27:11 +0200 Subject: [Lightning-dev] Preventing MITM - Providing new nodes with real pubkeys In-Reply-To: <20151019215801.GA18268@navy> References: <20151016230141.GA22262@navy> <20151019014100.GA19146@navy> <20151019215801.GA18268@navy> Message-ID: > But you can tell, just by seeing whether a well-known third party's > lightning address is routable? If every node on your network is an > attacker's, then you won't see the third party's address. > > If you do see a route to the third party (ie, Me -> Attacker -> Attacker > -> Attacker -> Bob -> Carol -> Third party), then you could work backwards > asking Carol and Bob to connect directly to you, which would get you a > non-attacker node with reasonable probability, assuming there are any. No you can't, that's the whole point. ;) Just because they are attacking you personally does not mean they do not have a working link to the rest of the network. They can still route all your payment and (1) monitor all your activity (2) gain some profit by charging some high fees off of you. Maybe I am missing something though..