Blog

The Ultimate Lightning Network Privacy Explainer blog

The Ultimate Lightning Network Privacy Explainer

In this piece, we’ll go through how private the lighting network is and what kind of heuristics or attacks can be put to use to de-anonymize users....

Read More
What are Blinded Paths and How do they Work? blog

What are Blinded Paths and How do they Work?

Learn how blinded paths operate within the context of the lightning network. This breakdown makes it simple to understand how privacy on Lightning is advancing....

Read More
What do Open-Channel Transactions Look Like On-Chain? blog

What do Open-Channel Transactions Look Like On-Chain?

Lightning Network FAQ

A lightning channel funding transaction, commonly called an “open-channel transaction”, is a transaction that is used to open a payment channel on the lightning network. It anchors the...

Read More
Introducing Flow 2.0: A New LSP Focused on Just-In-Time Liquidity blog

Introducing Flow 2.0: A New LSP Focused on Just-In-Time Liquidity

An LSP that is focused on making Just In Time liquidity a generally available resource. No longer think inbound capacity or what channels you have....

Read More
What are Negative Fees and how Does it Affect the Lightning Network? blog

What are Negative Fees and how Does it Affect the Lightning Network?

Learn about negative fees and how they impact the lightning network. Negative fees allow a node to pay to forward a payment instead of charging to forward a...

Read More
What the Voltage Crew Built On #FOSSFriday 1/27/2023 blog

What the Voltage Crew Built On #FOSSFriday 1/27/2023

FOSS Friday

It has been a few months since we wrote an update on FOSS Fridays at Voltage. Here is a quick update for Jan 2023....

Read More
Where Does the Yield Come From? preview

Where Does the Yield Come From?

The age old question. Where does the yield come from? Lorenzo breaks that down for us. #LightningNetwork...

Read More
How does an HTLC work? blog

How does an HTLC work?

For the lightning network to thrive, it needs a secure, trustless method to conduct off-chain transactions. It must ensure these transactions are valid, secure, and can be routed...

Read More
Lightning Privacy for Beginners blog

Lightning Privacy for Beginners

The goal of this blog is to educate on what common actions may inadvertently disclose information that you may otherwise not want to be known. ...

Read More
4 Real Use Cases for Lightning Network blog

4 Real Use Cases for Lightning Network

This article will go through several examples of what I expect the Lightning Network to provide the internet and the world in the coming years as creative people...

Read More
Solving $1 trillion dollar unpaid invoice problem blog

Solving $1 trillion dollar unpaid invoice problem

The lightning network is great for buying a coffee or a pizza from a merchant who accepts payments. Businesses can immediately save 2.9% + 30 cents per transaction....

Read More