A Lightning channel can be thought of as a string of beads stretched between two people. Referring to Fig. 1, Alice can pay Bob by pushing one of her beads to his side. If Bob also has a Lightning channel with Carol, Alice can pay Carol through Bob: she pushes a bead over to Bob, who then pushes a bead over to Carol. The fundamental rule — and the reason behind the Lightning Network’s liquidity problems — is that the beads can move from side to side but cannot leave the string they’re on.

Image for post
Image for post
Fig. 1. Alice can send a payment to Carol by routing it through Bob. Because beads cannot leave the string they are on, Bob ends up with one more bead on his string with Alice, and one fewer bead on his string with Carol.

That’s all you need to know to understand the way money can flow in the Lightning Network. But this model doesn’t tell us anything about why Lightning payments are secure. For example, what is stopping Bob from simply keeping the bead Alice pushed towards him and never sending one on to Carol? The purpose of this article is to answer the question “what makes Lightning payments ‘trustless’?” …


Peter R. Rizun

Bitcoin Unlimited, Chief Scientist

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store