it's the same as saying Lightning is trustless when you have peers you have to route through
Your counterparty on flashnet can collude with flashnet to steal your money if you are a Taker. Your lightning peers can't do that. They could collude with miners to execute a 51% attack on bitcoin, censor your justice transactions, and steal from you that way. But that's a lot harder than phoning up flashnet and saying "hey, let's rug this guy." I appreciate the comparison, but flashnet introduces a lot bigger of a trust assumption than lightning does.
Your counterparty on flashnet can collude with flashnet to steal your money if you are a Taker. Your lightning peers can't do that. They could collude with miners to execute a 51% attack on bitcoin, censor your justice transactions, and steal from you that way. But that's a lot harder than phoning up flashnet and saying "hey, let's rug this guy." I appreciate the comparison, but flashnet introduces a lot bigger of a trust assumption than lightning does.
What I meant was that there are trust-assumptions on Lightning as well, but we still call it trustless. I agree that the attack vector may be bigger here, but incentives are not aligned. But, again, yes will revisit wording!
Also, this is just v1! Lots of room for improvement as always :)
If you want to keep chatting more than happy to @ t.me/lnpolarity
reply
What I meant was that there are trust-assumptions on Lightning as well, but we still call it trustless
I don't
Also, this is just v1! Lots of room for improvement as always
Keep up the good work! I love to see software like this come out
Very cool ideas