Faster, cheaper bitcoin transactions? Check. But at what cost?
For bitcoin users, many of whom were drawn to cryptocurrency for its promise of financial sovereignty, bitcoin is still synonymous with privacy. But the gap between the vision and the reality, in which user transactions today must be published to a globally distributed ledger, has long been one of the technology’s biggest points of controversy.
“Bitcoin is Twitter for your bank account. Everything is public to everyone,” Ian Miers, the co-founder of the privacy-centric cryptocurrency zcash, told CoinDesk.
Compounding matters, however, is that as bitcoin users get closer to gaining a whole new way to send transactions, powered by an innovation called the Lighting Network, concerns are spreading that privacy could degrade from its already imperfect state.
On the surface, the idea might seem promising – because Lightning payments occur “off-chain,” the information isn’t included in the blockchain that all nodes store.
But while there is no Lightning ledger so to speak, payments in the scheme are still broadcast across nodes within the network. Essentially, to ensure routing is always available, those using Lightning channels need to trust other network users to help relay transactions.
Conceptually, this means that participants within the system could pry on a transaction, or even potentially sell that information to governments or advertisers. This is a risk that’s worsened if the network becomes centralized into a “hub-and-spoke” type structure, where hubs are large, well-known and often-used entities.
“Lightning likely won’t improve privacy, it may make it much worse from an average consumer’s perspective,” Miers added.
And like many, more speculative concerns surrounding the upcoming tech, the risk to user privacy may not be obvious until the network is deployed – an uncertainty that, combined with a wave of efforts on behalf of Lightning developers to include privacy features, has led to mixed sentiments as to what the future of private bitcoin transactions might be.
According to privacy researcher Kristov Atlas, in a worst-case scenario, privacy attackers could “thrive” on hubs “vampirically feeding off” the data as he wrote in a blog post.
However, the upcoming Lightning release does have some privacy features embedded, and there’s reason to believe that developers are at least making advances on the problem.
To date, the most advanced privacy feature included within Lightning is called “onion routing,” and it’s part of the Basics of Lightning Technology (BOLT), a series of protocols that ensure the multiple iterations of Lightning can interoperate.
In onion routing, payments are passed through multiple channels, and only the minimum of information about that payment is exposed.
For instance, upon receiving an encrypted payment, a node can only know where that payment came from and to what node that payment should be relayed.
According to Olaoluwa Osuntokun, a leading figure in Lightning development who first suggestedthe scheme on the developer mailing list, the importance of this is that nodes can’t be selective when it comes to what payments they’re willing to take.
“Nodes shouldn’t be able to arbitrarily censor certain payments, or blacklist certain destinations within the channel graph,” Osuntokun explained.
Often compared to the Tor network for its use of onion routing, Lightning has occasionally been celebrated as a darknet for bitcoin payments – however, it’s comparatively untested, and could face some of the problems native to Tor as well.
“Similar to Tor, there exist known possibilities of timing leaks, and also unknown active attacks that may be viable,” Osuntokun said.
And according to some, there’s ways that onion-routing could be manipulated, leading to the loss of privacy, especially in an early Lightning network.
For example, the last node within a route, as well as whoever sent that payment, will know the transaction information, and theoretically, nodes could collude to break privacy, piecing together each layer of the payment in order to create a complete picture.
On top of this, there’s the risk of a “global adversary which is able to instantaneous monitor all channels on the network,” something that the current privacy protocol doesn’t address, Osuntokun continued.