Back to the Blog

Bitcoin Lightning Network

Lightning Channel Coinjoins blog

Lightning Channel Coinjoins

Bitcoin’s privacy guarantees come from its pseudonymous addresses. They contain no information about the person who owns it. It’s just a human-readable representation of the smart contract that...

Read More
How do Lightning Network Fees Work? blog

How do Lightning Network Fees Work?

Lightning Network Routing The lightning network achieves high-frequency payments by taking payments off-chain. This means that information about a transaction is not broadcasted to the whole network as...

Read More
What are Blinded Paths and How do they Work? blog

What are Blinded Paths and How do they Work?

Learn how blinded paths operate within the context of the lightning network. This breakdown makes it simple to understand how privacy on Lightning is advancing....

Read More
Introducing Flow 2.0: A New LSP Focused on Just-In-Time Liquidity blog

Introducing Flow 2.0: A New LSP Focused on Just-In-Time Liquidity

An LSP that is focused on making Just In Time liquidity a generally available resource. No longer think inbound capacity or what channels you have....

Read More
What are Negative Fees and how Does it Affect the Lightning Network? blog

What are Negative Fees and how Does it Affect the Lightning Network?

Learn about negative fees and how they impact the lightning network. Negative fees allow a node to pay to forward a payment instead of charging to forward a...

Read More
Where Does the Yield Come From? preview

Where Does the Yield Come From?

The age old question. Where does the yield come from? Lorenzo breaks that down for us. #LightningNetwork...

Read More
How does an HTLC work? blog

How does an HTLC work?

For the lightning network to thrive, it needs a secure, trustless method to conduct off-chain transactions. It must ensure these transactions are valid, secure, and can be routed...

Read More
Lightning Privacy for Beginners blog

Lightning Privacy for Beginners

The goal of this blog is to educate on what common actions may inadvertently disclose information that you may otherwise not want to be known. ...

Read More
4 Real Use Cases for Lightning Network blog

4 Real Use Cases for Lightning Network

This article will go through several examples of what I expect the Lightning Network to provide the internet and the world in the coming years as creative people...

Read More
Why do Lightning nodes need inbound and outbound liquidity? blog

Why do Lightning nodes need inbound and outbound liquidity?

There are two possible ways of answering this question: with a brief and general answer or with a detailed and elaborated one. Let’s go through the general answer...

Read More
What are the differences between LND and CLN? blog

What are the differences between LND and CLN?

The Lightning Network protocol is formalized in specification documents called BOLTs (Basis of Lightning Technologies). All organizations that maintain Lightning Network node implementations must follow the specifications described...

Read More
What is Lightning Network Capacity blog

What is Lightning Network Capacity

Bitcoin’s Lightning network operates on top of the Bitcoin blockchain. For layer 2 to function and deliver global, instant, and zero-fee transactions, nodes must join the network and...

Read More