Hi fellow LN node runners and other afficionados,
I've run a very well-connected and highly-ranked LN node in the past. Due to some technical problems, I had to shut it down. This node was not anon, i.e. it was linked to my Twitter profile, I promoted it in the Plebnet Telegram groups, etc.
I am thinking of coming back online. At this point, I am still hesitating between going fully anon or basically restarting the previous node and leverage my old contacts.
For the sake of this post, I'd like to get your recommendations, best practices, list to guides on how to run a fully anon node, i.e. I can run it but no one can ever link it to my real world identity, and it cannot be shutdown by any regulatory agency in the future. Based on these recommendations, I'll form my opinion if that this a feasible goal.
I'd like to know what to do from start to end.
- Which implementation to use? I liked my previous experience using LND so implementation doesn't matter, that's what I'd like to use again.
- Is it ok to use any LND channel management tool? I used LNDg in the past and would like to use it again?
- How can I fund my node with a part of my stack which might contain previously tainted coins due to having already been used for running an LN node. How can I move those funds to a separate stack that cannot be linked back to the rest of my stack?
- I had bad experience with Tor-only and switched to a hybrid node using VPN. This was the best decision I made in terms of uptime reliability, absence of payment failures, etc. This is thus important to me as I'd like to become an important and well-connected routing node again. In the context of an anon node, is there a way to be hybrid again? What about my real-world identity that is linked to my VPN provider? Are there VPN providers that do not require such KYC? What of the risk of my VPN provider cutting me off in the future as they start considering all nodes to be money-transmitters and thus require licenses.
- How to open channels in a private way? Taproot-related, etc?
- How to run this node efficiently where one needs to perform swap-outs to close liquidity loops? I used to use amongst others Wallet of Satoshi to move off-chain liquidity back on-chain. Is that also a possible attack vector in determining my node's identity?
- Any other weakness related to off-chain chain-analysis which last time I checked made running an anon LN node a hard problem.
- I am by no means a privacy or even IT expert. The last technical problem I encountered required me to interact with other Plebs on Telegram to help me recover my funds due to corrupted channel.db
- How to connect another less private node to my anon node without compromising that anon node's privacy?
- How to use tools such as LN+ to find inbound liquidity while at the same time not compromising my identity?
- How to connect to previous favorite node runners without them linking my former characteristic behavior as an LN node runner and associated identity to my new anon node?
- Anything else I'm forgetting?
Running a profitable LN node is a difficult problem, doing it anonymously seems to be much harder. But as things stand, this might be a wise choice to make to be able to stay in the game and help the LN become a reliable censorship resistant tool. However, all this effort might be useless if only one piece of the privacy puzzle breaks down. Is it reallistically even possible to do this in the current stage of the LN? I was listening to the recent Kevin Rooke (@kr) podcast with Ben Carman, and there seem to be many weak spots still that I haven't thought of.
Please tag any person who might actually know more about this. Feel free to share it outside of SN too so that this post can also possibly become the reference for anyone who would like to reproduce this.
Thank you!
This is a lot to dig into. It's late in the night, so I'll throw some pointers, but it's not addressing all of your very well founded questions.
That's it for now, hope it's useful, even though it's a bit erratic.
Thanks. I'll definitely dig into @Darthnode's guides. Forgot about them when I wrote the post. His ideological recommendation is usually not to care about possible regulators, but if at least, one can make it harder for them to intervene, one should do it. And his guides provide exactly such information.
And indeed, before caring about any LN privacy, I should first work on my online privacy in general.
What about updating the OS is related to privacy specifically? It sounds like good advice, but not sure in the context of privacy.
Yes, the social souroundings of your node need to be tight as well, to ensure your identity is anonymous and protected. Recalled a couple of options I forgot yesterday, wanted to mention them since they are important:
On your last question on OS updates: This was more about security, not about privacy per se. But if your security is weak, it creates attack vectors to expose your identity, too. So keep a natural habbit keeping your OS up-to-date secures your stack and your identity. One more thing: #raspiblitz has everything Tor'ed (even OS updates), so your ISP basically doesn't know shit about you
The drawbacks are speed and reliability as @1fatmess mentioned further below. But as long speed is not a key factor, tor is a great obfuscation method.
Hope this helps and adds to your research list
Apart from what @Hakuna and others told you here I would add these for you to read:
Thanks a lot. I'll dig into them. Thank you for your invaluable contributions to the field.
If you look at the breakdown by implementation, it's almost all LND, CLN is around 13%, eclair is under 2%. It would be great to have more CLN, especially because... TARO makes me nervous. I understand that's where you're expertise is though.
Yes, I follow the sentiment. I did like using LNDg a lot though, so unless I find something else equivalent, I might have to stick with LND. CLN is doing good work.
Currently, LND is the one that has had several publicized bugs, but that comes with being the most used implementation I imagine. It's probably the most stress-tested at the moment.
Taro and RGB are indeed something I'll be watching closely. Even though they claim that only entry and exit nodes will knowingly be interacting with Taro/RGB, it'll definitely change the routing dynamics from routing nodes in between if things catch on.
https://abytesjourney.com/lightning-privacy/
Looks like a great starting point. Will read it carefully as well as the many links inside and incorporate it into my study material for the coming weeks. Thank you!
deleted by author
Thank you. I'll be happy to read your findings in the future. Please ping me when you do share them.
I'll look into Lnproxy.