Thursday, May 15, 2025
  • Home
  • Crypto
  • DEFI
  • NFT
  • Press Release
  • Contact Us
No Result
View All Result
No Result
View All Result

How Lightning Network Messaging Enables Privacy

Betty Snyder by Betty Snyder
May 23, 2020
in Mining
0
How Lightning Network Messaging Enables Privacy

“…using a network of…micropayment channels, Bitcoin can scale to billions of transactions per day with the computational power available on a modern desktop computer today. Sending many payments inside a given micropayment channel enables one to send large amounts of funds to another party in a decentralized manner.”
Thus reads “The Bitcoin Lightning Network” white paper, the seminal document for Bitcoin’s secondary payment network written by Thaddeus Dryja and Joseph Poon. This 2016 paper would refocus the debate on scaling, as notions of bigger blocks and on-chain growth largely gave way to a new network of payment channels and deferred on-chain settlement.
But who would have thought that some four years later, developers would look toward the Lightning Network not just as a payments solution, but as a new delivery method for encrypted messaging too?
Well, apparently a handful of forward-thinking Bitcoin developers: namely, Joost Jager and Paul Itoi.
Both Jager and Itoi have cooked up interesting methods for Lightning-powered messaging, though each use different technical mechanisms for transmissions. They’re also disseminating their solutions differently, with Itoi and his team launching its Sphinx Chat as an application and Jager releasing the source code for his Whatsat to the public directly.
We covered how these messaging apps work at the end of 2019. The TLDR: A recent update to Lightning has allowed for certain extra, arbitrary data to be added to Lightning transactions. For these use cases, these data would be messages, which can be sent directly to a peer for no cost or routed through the network for a small fee just like typical Lightning transactions. 
But why would you default to these protocols and not to other encrypted messaging options?
The answer lies in what Lightning messaging can offer that traditional encrypted options can’t.
Decentralized Pigeons
Some historical trivia: Messenger pigeons were one of many forms of communication in World War I. Especially popular among tank crews (who lacked other reliable forms of communication as radios were crude at this point in history), the messenger pigeon was a failsafe for when other options, like telephones, signal flares or runners, had failed or weren’t available.
But messenger pigeons were vulnerable. Knowing they carried vital messages, enemy soldiers would have an open season with these unfortunate high-soaring couriers. Of course, there was an answer to such setbacks: encryption.
Indeed, encrypted messaging would play a crucial role in World War I and many other wars. This, more or less, solved the problem of interception (if the enemy couldn’t decrypt the cipher, then it was useless, whether he got hold of it or not).
Come the 21st century and encryption has arrived at the forefront of national cybersecurity debates. For instance, some government officials have called for encrypted backdoors in mainstream consumer technology in the interest of “national security.”
And therein lies the problem. In WWI, the pigeons themselves were just the vessels for transmitting messages; in case anyone needed reminding, they didn’t produce the encrypted message themselves nor the keys to decrypt it — that was the job of military intelligence. 
But with electronic communication, the messaging app itself produces the means for encrypting the messages you send. So, in many cases, unless you or someone with the technical chops can review and verify the code, the application you use for encrypted chatting is only as secret as the app developer’s ability to keep their promise. This is why most Bitcoiners only trust open-source applications like Signal as being secure, while others like WhatsApp and Telegram are not to be trusted as such.
So, with traditional encrypted messengers, you often have the problem of a single point of failure. You are trusting a centralized entity (whose code you haven’t reviewed) at its word that the messages you send can only be decrypted by you and the recipient — that no backdoors exist. And you are also betting that governments won’t pressure these companies into giving them access (or that they already have).
Conversely, Lightning Network messaging relies on the infrastructure of Bitcoin’s decentralized secondary network. With some 11,000 (known) public nodes, Lightning Network messages are routed through this Tor-like network without any central arbiter. By setting up a direct channel with your recipient, you can beam the message directly to them without having to pass through an intermediary node at all. 
As Jager told Bitcoin Magazine in November 2019, there’s no central pillar that you can knockdown to compromise Lightning Network encrypted chatting.
“The difference is that there is no central server involved,” he said. “No single kill switch that could be used to shut down all communications. Or that is used more selectively to deny certain users to communicate.”
Private Pigeons 
As an extension, Lightning messages also have the benefit of being more private.
This follows the same line of argument that leads people to say Lightning transactions would also be more private. Since they are basically onion network-routed, the path for each message would be lost in the hops it takes on the network. The only way this may be compromised is if one node were responsible for, say, 50 percent or more of a message’s routing — a real possibility if the path from sender to receiver includes fewer mutually connected peers than not.
See Also

So in some cases, it may be better privacy-wise to set up direct payment channels for your messaging.
“Chatting over Lightning also makes it much harder to find out who is communicating with whom,” Jager said. “It is not required to have a direct (observable) TCP/IP connection between users and there is no central server either that could reconstruct the communication pathways.”
Of course, as we mentioned above, routed messages could still theoretically be deanonymized. But, as Jager said, “[p]rivacy and security are relative concepts.” 
This still could be more private than legacy options, and even if a node knows who the sender is, it still can’t intercept or decode their message.
Clunky Pigeons
Ultimately, Lightning messaging has a leg up against traditional encrypted chat when it comes to censorship-resistance and privacy. 
But this doesn’t mean that it’s perfect or that people will view it as the more attractive alternative. As we have seen with Bitcoin and FOSS writ large, the decentralized option is usually the most difficult to implement at scale and can be the most difficult to grasp for novice users. 
Still, devising a scheme that handles both messaging and payments under one roof could be a killer app, Jager thinks. Even more important is architecting a permissionless and censorship-resistant means of communication; in fact, decentralized money would likely necessitate such a tool, just as it would require decentralized identity.  
“The key benefit is integrating the ability to pay and communicate under one identity,” Jager said. “Our core belief: the privacy and censorship resistance that Lightning provides for payments should apply equally to speech. Using Lightning for chat will accelerate the adoption of bitcoin as a medium of exchange.”
So will Bitcoiners and the public beyond flock to Lightning messaging? With Sphinx Chat currently in closed beta, we’ll soon find out if this alternative lives up to the expectations and/or is as seamless to use as the alternatives. Jager believes that people will default to a Lightning-based alternative as snafus like the Equifax breach (and the creeping reality that the code for encrypted chat services will have backdoors built into their design) engenders distrust in centralized services. 
So, with the fate of private online communications up in the air, Lightning’s new use case may prove essential for establishing online sovereignty in an age of ever-increasing government surveillance.

You might also like

Casa Launches Free Wallet Service – Bitcoin Magazine

Human Rights Foundation Funding Bitcoin, CoinSwap – Bitcoin Magazine

Microsoft ION Launches Beta On Bitcoin Mainnet – Bitcoin Magazine

Post Views: 153
Previous Post

CryptoMining.Tools Is Building the Bitcoin Mining Community – Bitcoin Magazine

Next Post

Welcome to Bitcoin 2020! – Bitcoin Magazine

Betty Snyder

Betty Snyder

I’m a cryptocurrency and blockchain technology writer. My work has been featured in major publications such as CoinDesk, Bitcoin Magazine, and VentureBeat. I’ve been a respected voice in the cryptocurrency community and my insights into the industry have helped shape its development.

Next Post
Welcome to Bitcoin 2020! – Bitcoin Magazine

Welcome to Bitcoin 2020! – Bitcoin Magazine

  • Why must you pick a white label crypto exchange solution than developing a new one?
    Why must you pick a white label crypto exchange solution than developing a new one?
  • Bitcoin Product Demos During the Halving – Bitcoin Magazine
    Bitcoin Product Demos During the Halving – Bitcoin Magazine
  • Whitelabel Cryptocurrency Exchange platform and it’s 4 salient features!
    Whitelabel Cryptocurrency Exchange platform and it’s 4 salient features!
  • Despite Chaos, The Next BTC Price Rally Could Be Spurred By This Little-Known Bitcoin Indicator
    Crypto Pundit reveals what will likely ignite another parabolic Bitcoin Rally ⋆ ZyCrypto
  • Which is Best Crypto Trading Bot Platform?
    Which is Best Crypto Trading Bot Platform?

About

Cryptoate site is a comprehensive resource for everything related to cryptocurrency and blockchain. We aim to be a one-stop solution for all your crypto and blockchain news and events.

Email: [email protected]

Recent Posts

  • GateToken (GT) Burns 1,542,910.7518074 Tokens in Q1 2025, Steadily Reinforcing Long-Term Value
  • ProBit Global Lists Shardeum (SHM), Ushering in a New Era of Scalable and Decentralized Smart Contracts
  • Gate.io Releases Latest Proof of Reserves Report: Total Reserves Reach $10.865 Billion, with $2.415 Billion in Excess Reserves

Catagories

  • Mining
  • Crypto
  • Press Release
  • Price Analysis
  • Cryptocurrency
  • Trading
  • Cryptocurrencies
  • Blockchain

Calender

May 2025
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Apr    
  • Privacy Policy
  • About Us
  • Terms and Conditions
  • Contact Us
Social icon element need JNews Essential plugin to be activated.

Copyright © Cryptoate

No Result
View All Result
  • Home
  • Crypto
  • DEFI
  • NFT
  • Press Release
  • Contact Us

Copyright © Cryptoate