There has been a lot of FUD around this, so I thought I’d share my experience with how I did it, with LND. Access control to LND is done via some sort of super-cookies called Macaroons. They can have all sorts of limitations – time limits, ip-address limit and limits on what kind of operations you […]
In this post I will compare centralization and uncensorability of LN with on-chain centralization. Today, most mining is done within a few large mining pools. Each of them can totally censor/refuse to mine transactions. If two of them collude to censor transactions from a known entity, you’ll have to wait until one of the smaller […]
Or pretty much any open source project on github. Start with downloading and compiling LND from scratch, if you haven’t already done so. A Linux system is probably easiest to get it to work on, but I have heard of people who run it on Windows too. https://github.com/lightningnetwork/lnd/blob/master/docs/INSTALL.md is the procedure you are looking for. Run […]
…but have got nothing to write? Fear not, I will! Tomorrow, there will be content here! But not every day!