pull down to refresh

Key Tweaking/Tainted rounds

Hmm, that's a fair point. Is anybody here familiar enough with the Cashu or Fedimint protocols to say whether or not this is a concern?

Pattern Matching/Behavioral/Heuristics

How so? All the mint ever knows is that someone is redeeming one token in exchange for another or in exchange for the payment of a lightning invoice.

Destination Blacklists

In this case, someone else could run a gateway connected to the same mint.

Spending Limits and Controls

This is only possible for outgoing lightning, AFAICT. Internally, the only thing that happens is trading one token for another. This could be limited, though.

Side-Channel Attacks

Not sure what they are.

Fee Manipulation

Again, only a problem when exchanging to lightning.

I'm not saying that ecash is trustless, but it's better than custodial lightning wallets.

Is anybody here familiar enough

No, the implementations are all larps borrowing open libraries they don't understand

in exchange for the payment of a lightning invoice

Ingest of that invoice requires other metadata

someone else could run a gateway connected to the same mint

The mint is the chokepoint, daisy chaining them just makes it worse

This is only possible for outgoing lightning

No shit, what else are the shitcoins good for?

Not sure what they are.

ECash relies on ignorance to proliferate

it's better than custodial lightning wallets

No it isn't, it is custodial completely, with worse overhead, and is an attack on Lightning's network effect as a payment spec

reply