
Peeling the Onion
This article is the second (out of two) concerning Onion Routing. Therefore, it is recommended to read the first article before this one In a previous article I went into some details as to how Onion Routing allows payments to be processed accross the Lightning Network in a quite privacy preserving manner. More precisely, we saw how the identities of the emitter and the receiver of a payment are hidden via the use of successive layers of encryption in the messages that nodes exchange about a payment....