Good morning Ankit,
I believe what you describe is a specific form of what is called the Wormhole
attack.
In the general form, the Wormhole attack has two forwarding nodes in a path
that are coordinating with each other, and they can "teleport" the preimage
from one to the other, skipping inter
Hey Ankit,
The lightning network sees the possession of a preimage as a proof of
payment. And I believe everyone agrees that a court should rule in favor of
A forcing E to deliver the good or reimburse A. The reason is that
possession of the preimage matching the signed payment hash from E is a
mu