The exploited mechanisms partially differ from those used by the attacks presented in this paper, since we do not make use of multi-hop payments, but rather direct channels between nodes.
Translation from academic: we confirm Flood & Loot scheme. However, this attack was being discussed once with Anton Kumaigorodsky who was quite skeptic about attack trade-offs by itself. Attacker has to spend a lot of money to cause congestion and after attack the outcome is not clear.
Looking deeper into history there where 3 papers about LN attacks which released simultaneously, these are:
📍 Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks 📍 Flood & Loot: A Systemic Attack On The Lightning Network 📍 Time-Dilation Attacks on the Lightning Network
Yes, and authors say
Translation from academic: we confirm Flood & Loot scheme. However, this attack was being discussed once with Anton Kumaigorodsky who was quite skeptic about attack trade-offs by itself. Attacker has to spend a lot of money to cause congestion and after attack the outcome is not clear.
Looking deeper into history there where 3 papers about LN attacks which released simultaneously, these are:
📍 Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks
📍 Flood & Loot: A Systemic Attack On The Lightning Network
📍 Time-Dilation Attacks on the Lightning Network