Glossary (Work in Progress)
Last updated
Last updated
A satoshi is 1/100 millionth of a Bitcoin. In the Lightning Network, a satoshi is further divisible into 1000 pieces (millisatoshi). It is named after Bitcoin's creator, Satoshi Nakamoto.
mSats are each 1/1000 (a thousandth) of a satoshi. A satoshi is the smallest unit for bitcoin, but lightning can transact with even smaller units while channels are open. The amount is rounded down to the nearest satoshi when the channel is closed and broadcast to the blockchain to adhere to bitcoin's limit.
A payment is a transaction that occurs on the lightning network. Payments are routed through lightning payment channels and are not recorded in the bitcoin blockchain.
Credit: bitcoin.design
Since a private key can be used to prove that the holder controls a specific address, it can therefore authorize transactions from the address. This is called a digital signature.
One of the most important activities of the Bitcoin network is to verify that signatures are valid.
Credit: bitcoin.design
A bitcoin address’ public key can be derived from the private key. The address itself is a hash of the public key.
Every Bitcoin address has a public key and a corresponding private key, together they are called a keypair. If you have access to both the public and private key, you effectively control the funds in the address. As with HD wallets there are also keypairs that control branches in the hierarchical tree of the wallet, and at the very top is the extended keypair (x-pub and x-prv for short) that control all the addresses in the wallet.
The private key is a 64 hexadecimal (or 256 if described in binary 1’s and 0’s) character string generated by the encryption algorithm. They look something like this in hexadecimal form:
5KYZdUEo39z3FPrtuX2QbbwGnNP5zTd7yyr2SC1j299sBCnWjss
Or for the extended private key:
xprv9zrji5mK3nb4RbuR2ZYFtyzK3gn78KnEzkNP4ZxwwPPwcgQQVZqnjTMAGxmmM3jpmfsthQUtfD9iYPvnaqwejCjcyEswLqEhX4LPKNFUXT5
Credit: bitcoin.design
The lightning network extends bitcoin with payment channels to increase transaction speed and lower costs. It is becoming widely adopted and accepted as the preferred way to scale bitcoin.
Credit: bitcoin.design
Users of the lightning network use a lightning invoice to request a payment. It is defined by BOLT 11 and includes an amount to be paid, destination of the payment, and an optional message. Unlike bitcoin addresses, lightning invoices expire after a set amount of time. By default, this is set to 60 minutes.
Credit: bitcoin.design
A passphrase can be added to the recovery phrase for extra security. Technically, all recovery phrases have a passphrase. If it’s not set by the user, an empty string (“”) will be used by default. Using the recovery phrase with or without the user-defined passphrase will recover two DIFFERENT wallets. Passphrases are sometimes called the password, the extra word, or the 13th/25th word.
Credit: bitcoin.design
A custodial wallet is a wallet wherein the user’s private keys are held by a third party, such as an exchange. The third-party has full control over the user’s funds, while the user only has permission to send and receive bitcoin.
The third party is responsible for providing a backup to the wallet in case the user forgets their login information. A custodial wallet is subject to the security practices of the third party, which reduces the user's responsibility, but creates an increased risk to the seed phrase and the keys stored by the wallet if the third party is hacked.
Non-custodial wallets give the user full control over their funds and the associated private keys. By using a non-custodial wallet, a user is their own bank; they can initiate transactions and are responsible for the security of their wallet, including the protection of their seed phrase, which can be used to restore their wallet if it’s lost or compromised.
Faraday is analytics software developed by Lightning Labs that can help identify liquidity needs and profitable channels in a Lightning node.
The Lightning gossip network is used to broadcast information about channels and peers.
To receive Lightning payments, the recipient typically issues an invoice containing information such as a public key, payment hash, or an invoice amount and label. Invoices are defined in BOLT 11.
A watchtower consists of a client and a server. The client will share information relevant to channel breaches with the server, which will intervene in case they observe a breach on-chain. Watchtowers are needed in case the client is offline and unable to observe the breach themselves.
The transaction ID (txid) is the hash of a Bitcoin transaction. Channels are identified by the transaction ID of their funding transaction.
A Taproot-powered protocol for issuing assets on Bitcoin that can be transferred over the Lightning Network for instant, high-volume, low-fee transactions.
Taproot Assets (formerly Taro) is a new Taproot-powered protocol for issuing assets on the Bitcoin blockchain that can be transferred over the Lightning Network for instant, high-volume, low-fee transactions. At its core, Taproot Assets taps into the security and stability of the Bitcoin network and the speed, scalability, and low fees of Lightning.
Overview of Taproot Assets:
Allows assets to be issued on the Bitcoin blockchain
Leverages taproot for privacy and scalability
Assets can be deposited into Lightning channels
Assets can be transferred over the existing Lightning Network
A peer-to-peer network is any system not relying on a leader, in which connections are made directly between peers without intermediaries.
Each of the 21 million units of Bitcoin that will ever exist can be broken down further into 100,000,000 satoshis.
Why do invoices expire? If invoices had no expiry, recipients would likely run into memory/storage issues as the number of locally stored preimages grows with each payment attempt.
Credit: bitcoin.design
A Lightning Network channel is a peer-to-peer payment channel that enables instant and low-cost transactions between two parties.
Open a channel by sending a small amount of Bitcoin to another node or wallet, which serves as a deposit for the channel.
Nope, you don't need to run a node to use the Lightning Network. You can simply use a lightning wallet app to send and receive payments.
Channel reserve is the amount of Bitcoin required to open a payment channel. Higher reserves can make it harder to find nodes and open channels.
Lightning Network transactions can fail for a few common reasons. The most frequent one is usually just not having enough funds in your channel to cover the payment. Make sure you've got enough money in the account you're sending from and don't forget to factor in the network fees (~2% of the total amount you are trying to send).
Another common issue is the transaction not being able to find a route to the recipient's Lightning node. If that happens, just try again a few minutes later.
The Lightning Network is still evolving, so some failed transactions are normal. But those two things - insufficient funds and routing problems - tend to be the main culprits when a Lightning payment doesn't go through.
No, they're not quite the same.
A Bitcoin wallet stores your Bitcoin and conducts transactions directly on the main Bitcoin network. However, with a Lightning wallet, transactions are performed on top of the Bitcoin network using specialized channels between two parties. These channels enable off-chain transactions that Bitcoin itself doesn't track. Only the opening and closing of these channels are recorded on the Bitcoin network.
In summary, while both wallets involve Bitcoin, a Lightning wallet leverages additional channels to facilitate faster and more scalable transactions.
Non-custodial Wallet: A non-custodial wallet gives you full control over your private key and recovery phrase. This means that you are the only one who can initiate transactions, ensuring that your funds can only be accessed with your direct action. However, it's important to remember that if you forget or lose your recovery phrase, the wallet makers cannot help you regain access to your funds.
Custodial Wallet: On the other hand, a custodial wallet takes a slightly different approach. In this type of wallet, you don't have direct control over the recovery phrase. Instead, you typically sign in with your email and password. In a custodial wallet, you have to trust the wallet makers to secure your recovery phrase and your Bitcoin. Essentially, the wallet makers technically have control over your funds. Many exchanges provide custodial wallets as part of their services.
To sum it up, non-custodial wallets give you complete control, while custodial wallets require you to trust the wallet makers to secure your funds. It's important to understand the difference and choose the option that aligns with your preferences and level of trust.
Hot and cold describes a wallet in terms of being connected to the internet. Where a hot wallet is connected to the internet, a cold wallet is not.
The idea is that a cold wallet is less susceptible to third-party theft over the internet. Most software wallet applications would be seen as hot (although some can be used just for signing on a device not connected to the internet), and most hardware wallet applications would be seen as cold (although they are sometimes connected for signing purposes).
Lightning Bounties is a Web3 Bug Bounty Platform tailored to open-source developers and the Lightning Network. We provide a platform for developers, bug bounty hunters, and ethical hackers to discover and report bugs, vulnerabilities, and security issues within Lightning Network applications and protocols.
Lightning Bounties offers an opportunity for the Lightning community to proactively address potential security threats and ensure the overall safety and integrity of the network.
The platform facilitates the responsible disclosure of vulnerabilities and rewards individuals for their efforts in identifying and reporting security issues, ultimately contributing to the ongoing improvement and stability of the Lightning network.
Through Lightning Bounties, participants can engage in a collaborative effort to bolster the security of the Lightning ecosystem, and contribute to a safer and more reliable network for all users.
Lightning Bounties caters to two primary groups: developers and organizations.
Developers can showcase their skills, earn Bitcoin, and contribute to the growth of web3 technology.
Organizations can tap into a talented pool of developers to improve the quality and security of their software projects.