Validating Lightning Signer

684 posts

Validating Lightning Signer banner
Validating Lightning Signer

Validating Lightning Signer

@VLSProject

Non-custodial Lightning security for serious balances. Off-node keys + full validation = a compromised node can’t steal funds Open source Rust SDK. https://t.co/uyM2m1tBs7

Katılım Eylül 2020
51 Takip Edilen1.1K Takipçiler
Sabitlenmiş Tweet
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
“Non-custodial” is not a security model on Lightning. Because signing must be online, the real question is: If your node is compromised, what can the attacker do?
English
2
7
7
385
Validating Lightning Signer
For Lightning to work as a payment network for goods and services, businesses need to hold meaningful channel balances. Not pocket change. Real operating capital. No business is ok with that paired with hot wallet security.
English
0
4
5
73
Validating Lightning Signer
An attacker who compromises your Lightning node does not need to extract keys. They can use the node's own signing authority to: - close channels to their address - route payments through their nodes at extreme fees - approve revoked states In each case, you lose.
English
0
4
8
327
Validating Lightning Signer
VLS tracks Lightning state independently. It knows the current commitment number, which states have been revoked, what the channel setup looks like. It does not trust the node's version of reality.
English
0
0
0
35
Validating Lightning Signer
Most Lightning losses do not involve breaking cryptography. They involve normal software bugs: concurrency issues, stale state, missing limits. The node signs because the node has the authority to sign.
English
0
0
0
49
Validating Lightning Signer
Lightning can carry payroll, settlements, merchant revenue, subscription payments. But only if the infrastructure holding those funds is built for that responsibility. Hot wallets were not designed for it.
English
0
0
0
55
Validating Lightning Signer
Every Lightning incident is a data point for the next enterprise evaluating whether to adopt it. The fewer incidents, the faster the dominoes fall. Security infrastructure is adoption infrastructure.
English
0
0
1
46
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
In many parts of the world, custodial wallets are the only Lightning option. Custodians can freeze accounts, comply with regime sanctions, or simply lose user funds. Non-custodial Lightning with real security gives people a way out.
English
0
3
3
117
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
Your Lightning node can be compromised through a remote exploit, a supply-chain attack, a leaked credential, a malicious plugin, or a compromised update path. None of these require breaking cryptography. All of them can drain funds if keys live on the node.
English
0
1
1
72
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
The reason large merchants have not adopted Lightning is not speed or UX. It is that the security model does not match the amounts involved. Fix the security model, and the business case unlocks.
English
1
1
1
125
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
Hardening a node (enclaves, HSMs) lowers the odds of compromise. VLS changes what happens if node compromise succeeds anyway. T hose are complementary, not competing, strategies.
English
0
1
2
83
Bitcoin Board
Bitcoin Board@btc_board·
@VLSProject running a node is running a business security isn't optional, it's the rails
English
1
0
1
12
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
Lightning's promise is instant, cheap, global payments. That promise is worth nothing to a merchant who loses their operating capital to a node compromise. The promise needs a security foundation.
English
1
0
1
76
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
Taking custody of customer funds means licenses, audits, compliance filings, and balance-sheet exposure. VLS makes it possible to skip all of that by keeping signing authority with the user.
English
0
1
3
93
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
Separation of duties is standard in treasury operations. VLS brings that principle to Lightning: the team running the node does not control signing authority.
English
0
3
3
98
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
If large merchants do not feel safe holding real Lightning balances, they will not integrate it into checkout. No merchant integration means no spending users. Security is a prerequisite for growth of the network.
English
0
0
0
49
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
Lightning as a payment network for real commerce requires balances that would make any hot wallet operator uncomfortable. The solution is not to stay small. The solution is to fix the security.
English
0
1
1
101
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
Important: we've taken down the VLS GitHub repo. It was a mirror of GitLab, where VLS actually lives. Recent GitHub security issues made us nervous about vulnerabilities sneaking into the mirror. For a security project, that risk is not worth it. Find us on GitLab. Link in profile.
English
0
4
8
508
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
Lightning nodes are large, networked programs with broad attack surface: - peer connections - RPC interfaces - plugins - database layers - OS dependencies - update mechanisms Every one of these is a potential entry point.
English
0
3
3
159
Validating Lightning Signer
Validating Lightning Signer@VLSProject·
One Lightning incident reported publicly does more damage to adoption than ten successful integrations. The asymmetry is brutal. And it's not the good kind. Investing in security infrastructure is investing in the ecosystem's credibility.
English
0
1
2
96