Abstract Algebra BIP-324 Covenants Hiding Traffic Kyoto Last Mile of Lightning LSAT Network Metadata Spiral

Hiding Traffic Series

// Obscuring the shape of those bits

The BIP-324 spec describes methods for the communicating peers to exchange decoy bytes. The channel is encrypted so only the two peers know the data is a decoy! But why bother sending it then? The decoys can help hide the shape of the traffic between the peers from third party observers. This is especially important in bitcoin where activity is relatively easy to identify.

  1. How to Manage Decoys