How to Identify and Protect Against Routing Attacks in the Lightning Network

previous post