Post
Topic
Board Bitcoin Discussion
Re: Lightning Network Observer
by
BlackHatCoiner
on 02/12/2022, 12:35:56 UTC
where abczx was to pay d.. C can abuse d's receipt and d ends up with loss
What the hell is a lightning receipt? Do you mean that C can alter the script A has signed (which says that it pays D an amount under that one condition) and steal money from D?

Don't prevent the attack you're still talking about, though.
To fully comprehend franky's nonsense, you have to read one of his posts wherein he explains that running a pruned node is less secure, because an attacker can compromise your machine and alter the UTXO set. It doesn't even pass the laugh test:

pruned nodes validity of the UTXOset is only as good as the date it added the UTXO to it. if there is a hack, bug. you cant just copy and paste the UTXO set to a new computer and continue. you have to re download the entire blockchain again to ensure things did not change. the UTXO set has no hash to confirm or deny changes occured due to hacks or bugs of someones node. and thus no hash to compare to other persons versions to verify you al have the same set.
pruning is a network security risk of conformity(consensus of confirmed immutable utxo's)
pruning removes the immutable security part