Oddbean new post about | logout
 All depends. First step is always running your own lightning node (which the vast majority don't do). But even after that there are a lot of caveats. Here are a few links with the technical details:

bitcoinmagazine.com/technical/state-of-bitcoin-lightning-network-privacy

https://abytesjourney.com/lightning-privacy/

https://github.com/lnbook/lnbook/blob/develop/16_security_privacy_ln.asciidoc#attacks-on-lightning

https://lightningprivacy.com/en/introduction

"We identified 27,183 private channels, discovered hidden balances, and showed how a passive adversary can infer payment endpoints with very high probability."
https://arxiv.org/pdf/2003.12470.pdf