Why Nostr? What is Njump?
2023-06-29 18:47:03
in reply to

devrandom [ARCHIVE] on Nostr: 📅 Original date posted:2023-06-28 🗒️ Summary of this message: The validating ...

📅 Original date posted:2023-06-28
🗒️ Summary of this message: The validating lightning signer has released its beta version, offering security against fund loss and malicious nodes. Developers can join the Matrix room and try out the CLN or LDK nodes. The beta version is secure but not foolproof, so it is recommended to use it with limited funds until the production release. The release includes features like encrypted cloud state backup, disaster recovery, validation rules, and more. Planned updates include running in a no-std environment and improving performance for embedded processors. Future releases will include routing, BOLT-12 support, VSS integration, and multisig. Developers are encouraged to contribute to the project.
📝 Original message:
The VLS team is pleased to announce the [Beta release](https://gitlab.com/lightning-signer/validating-lightning-signer/-/releases/v0.9.1) of the validating lightning signer. This is our MVP2 release, designed to be secure against accidental fund loss and malicious nodes.

We encourage LN application developers to join our [Matrix room](https://matrix.to/#/#vls:matrix.org), submit a [feature request](https://gitlab.com/lightning-signer/validating-lightning-signer/-/issues/new?issuable_template=Feature%20Request), or take VLS for a spin with sample [CLN](https://gitlab.com/lightning-signer/vls-hsmd) or [LDK nodes](https://gitlab.com/lightning-signer/lnrod).

While the VLS beta is secure against the most common ways a malicious node may steal user funds, it does not yet capture all scenarios in which a user might lose funds. We recommend running VLS in testnet or with limited funds in production until we reach our production release milestone and you are comfortable it adequately protects against all scenarios relevant to your use case.

Highlights for developers:

* Works with CLN and LDK
* Encrypted cloud state backup
* Disaster recovery from signer and node failure
* Complete set of layer-2 [validation rules](https://gitlab.com/lightning-signer/validating-lightning-signer/-/blob/main/docs/policy-controls.md)
* Optional validation rules (e.g. velocity, approval)
* A complete set of layer-1 validation rules (on-chain channel state tracking)
* Heartbeat generation
* Allowlist for approved destinations
* UTXO set oracle guarantees safe on-chain state
* [See here](https://gitlab.com/lightning-signer/validating-lightning-signer/-/blob/main/CHANGELOG.md) for a full changelog

[Click here](https://vls.tech/posts/vls-beta/) to learn more.

Planned for the next release:

* Signer runs in `no-std` environment without a standard library
* Signer can run on modest amounts of RAM and ROM
* Tuning performance for embedded processors

Planned for later releases:

* Routing
* BOLT-12 Support
* VSS Integration
* Multisig

What’s that you say? You’re a dev looking for a fun and impactful FOSS project to contribute to? Look no further, we could use your help. Get in touch with us on [Matrix](https://matrix.to/#/#vls:matrix.org) to see how you can get involved.

--
Devrandom
Author Public Key
npub1a04k8w0sg5trcey0tkz04maryv3q76yre2vqj8yrr4lfmf3m999qtyuuph