{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:HAIVX3PE6ZTKRPVR76VGWYIJHG","short_pith_number":"pith:HAIVX3PE","canonical_record":{"source":{"id":"2605.12759","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2026-05-12T21:12:12Z","cross_cats_sorted":["cs.SI"],"title_canon_sha256":"50a2062e8723597306439a2d8bbb5f93518c555d4e4506ff76fb7d1bbd446d51","abstract_canon_sha256":"f3e8b8e9e1210129928e35c552bca5fc0f97f222f0c72a1028660d77d0d828f8"},"schema_version":"1.0"},"canonical_sha256":"38115bede4f666a8beb1ffaa6b610939aca016c3ee2c21ff63e92221ab3e8d1e","source":{"kind":"arxiv","id":"2605.12759","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.12759","created_at":"2026-05-18T03:09:48Z"},{"alias_kind":"arxiv_version","alias_value":"2605.12759v1","created_at":"2026-05-18T03:09:48Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.12759","created_at":"2026-05-18T03:09:48Z"},{"alias_kind":"pith_short_12","alias_value":"HAIVX3PE6ZTK","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"HAIVX3PE6ZTKRPVR","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"HAIVX3PE","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:HAIVX3PE6ZTKRPVR76VGWYIJHG","target":"record","payload":{"canonical_record":{"source":{"id":"2605.12759","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2026-05-12T21:12:12Z","cross_cats_sorted":["cs.SI"],"title_canon_sha256":"50a2062e8723597306439a2d8bbb5f93518c555d4e4506ff76fb7d1bbd446d51","abstract_canon_sha256":"f3e8b8e9e1210129928e35c552bca5fc0f97f222f0c72a1028660d77d0d828f8"},"schema_version":"1.0"},"canonical_sha256":"38115bede4f666a8beb1ffaa6b610939aca016c3ee2c21ff63e92221ab3e8d1e","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:09:48.499562Z","signature_b64":"xknzy0OOOMCB5Z8d3B3JlzPPx3wABlrYTzE1FBWBmS9P5p4NLZ4296PfLA3OhLllvnOKIPFSyY3dcWyvblq0AA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"38115bede4f666a8beb1ffaa6b610939aca016c3ee2c21ff63e92221ab3e8d1e","last_reissued_at":"2026-05-18T03:09:48.498719Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:09:48.498719Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.12759","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:09:48Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pS107jrtm52Ps0p9MQXJB3opboOtMNs2daLkPBIC7dKBNKFuiOKDw29mfpjau+/MohEvcKpa8C5W6A6+chCOCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T14:25:01.467557Z"},"content_sha256":"429d10323a2c0b0394f169307db31af9e68b47e24ea9091a1c53ca89c817ddb1","schema_version":"1.0","event_id":"sha256:429d10323a2c0b0394f169307db31af9e68b47e24ea9091a1c53ca89c817ddb1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:HAIVX3PE6ZTKRPVR76VGWYIJHG","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Predicting Channel Closures in the Lightning Network with Machine Learning","license":"http://creativecommons.org/licenses/by/4.0/","headline":"Temporal and behavioral signals from public gossip data predict Lightning Network channel closures, while network topology adds no value.","cross_cats":["cs.SI"],"primary_cat":"cs.LG","authors_text":"Anthony Potdevin, Emanuele Rossi, Harrison Rush, Jesse Shrader, Simone Antonelli, Vikash Singh, Vincent Davis","submitted_at":"2026-05-12T21:12:12Z","abstract_excerpt":"The Lightning Network (LN) is a second-layer protocol for Bitcoin designed to enable fast and cost-efficient off-chain transactions. Channels in the LN can be closed either by mutual agreement or unilaterally through a forced closure, which locks the involved capital for an extended period and degrades network reliability. In this paper, we study the problem of predicting channel closure types from publicly available gossip data, framing it as a temporal link classification task over the evolving channel graph. We construct a dataset spanning over two years of LN activity and benchmark a range"},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"Our experiments reveal that the dominant predictive signals are temporal and behavioural, namely how recently each endpoint was active and the per-node history of past closures, while the surrounding network topology provides no additional benefit. We find that a simple MLP operating on edge-level features, node-level event counts, and temporal patterns outperforms all graph-based approaches.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"That publicly available gossip data contains sufficient temporal and behavioral signals to predict closure types despite the inherent privacy of channel balances and payment flows that remain hidden.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"Simple MLPs using temporal and behavioral features from gossip data predict Lightning Network channel closure types better than temporal graph neural networks.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"Temporal and behavioral signals from public gossip data predict Lightning Network channel closures, while network topology adds no value.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"62e8905a704ff08b771155caf17f5df7f7d836ff9d6296f5467e6a43c5831232"},"source":{"id":"2605.12759","kind":"arxiv","version":1},"verdict":{"id":"3cc97e08-c2f5-4688-b779-08ca5249c844","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-14T21:09:07.468456Z","strongest_claim":"Our experiments reveal that the dominant predictive signals are temporal and behavioural, namely how recently each endpoint was active and the per-node history of past closures, while the surrounding network topology provides no additional benefit. We find that a simple MLP operating on edge-level features, node-level event counts, and temporal patterns outperforms all graph-based approaches.","one_line_summary":"Simple MLPs using temporal and behavioral features from gossip data predict Lightning Network channel closure types better than temporal graph neural networks.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"That publicly available gossip data contains sufficient temporal and behavioral signals to predict closure types despite the inherent privacy of channel balances and payment flows that remain hidden.","pith_extraction_headline":"Temporal and behavioral signals from public gossip data predict Lightning Network channel closures, while network topology adds no value."},"references":{"count":24,"sample":[{"doi":"","year":2016,"title":"The bitcoin lightning network: Scalable off-chain instant payments,","work_id":"1f321e5c-afed-4fb4-ad14-f0e926de6508","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.1145/3427796.3427837","year":2021,"title":"Node classification and geographical analysis of the lightning cryptocurrency network,","work_id":"c2af98ca-1c9b-4f87-81d9-ffe008ee9f53","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.1145/3321705.3329812","year":2019,"title":"On the difficulty of hiding the balance of lightning network channels,","work_id":"b16a55db-9842-40ad-b83d-b80ba5d8d3df","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2024,"title":"Benchmarking gnns using lightning network data,","work_id":"a39e5c8f-ef86-4276-baa3-67cf8be6f496","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2006,"title":"Temporal Graph Networks for Deep Learning on Dynamic Graphs","work_id":"148caacb-5e39-4b83-8a6b-07b844a00d64","ref_index":5,"cited_arxiv_id":"2006.10637","is_internal_anchor":true}],"resolved_work":24,"snapshot_sha256":"b2116b15cd8d2d1420ae6d31d53c46d4450a76c127fb04e76cc548607786a5ae","internal_anchors":1},"formal_canon":{"evidence_count":1,"snapshot_sha256":"b796bada9ea8c026615a30b3041897eb27607757d914ce464722b3bafe8043c0"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":"3cc97e08-c2f5-4688-b779-08ca5249c844"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:09:48Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"63vXcogxbPrhCdtqUs7tcxcCzi4S11sa6T5pU9Nwf9LEJG11ahN7pLFgrA7n3cj8tDvnOZ0fNeNzooduFVc+BQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T14:25:01.468180Z"},"content_sha256":"57a62cfb2dfef4464a2f488c74bc46a63f9ad22d29401895ef75772d5c1b4635","schema_version":"1.0","event_id":"sha256:57a62cfb2dfef4464a2f488c74bc46a63f9ad22d29401895ef75772d5c1b4635"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/HAIVX3PE6ZTKRPVR76VGWYIJHG/bundle.json","state_url":"https://pith.science/pith/HAIVX3PE6ZTKRPVR76VGWYIJHG/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/HAIVX3PE6ZTKRPVR76VGWYIJHG/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T14:25:01Z","links":{"resolver":"https://pith.science/pith/HAIVX3PE6ZTKRPVR76VGWYIJHG","bundle":"https://pith.science/pith/HAIVX3PE6ZTKRPVR76VGWYIJHG/bundle.json","state":"https://pith.science/pith/HAIVX3PE6ZTKRPVR76VGWYIJHG/state.json","well_known_bundle":"https://pith.science/.well-known/pith/HAIVX3PE6ZTKRPVR76VGWYIJHG/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:HAIVX3PE6ZTKRPVR76VGWYIJHG","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"f3e8b8e9e1210129928e35c552bca5fc0f97f222f0c72a1028660d77d0d828f8","cross_cats_sorted":["cs.SI"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2026-05-12T21:12:12Z","title_canon_sha256":"50a2062e8723597306439a2d8bbb5f93518c555d4e4506ff76fb7d1bbd446d51"},"schema_version":"1.0","source":{"id":"2605.12759","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.12759","created_at":"2026-05-18T03:09:48Z"},{"alias_kind":"arxiv_version","alias_value":"2605.12759v1","created_at":"2026-05-18T03:09:48Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.12759","created_at":"2026-05-18T03:09:48Z"},{"alias_kind":"pith_short_12","alias_value":"HAIVX3PE6ZTK","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"HAIVX3PE6ZTKRPVR","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"HAIVX3PE","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:57a62cfb2dfef4464a2f488c74bc46a63f9ad22d29401895ef75772d5c1b4635","target":"graph","created_at":"2026-05-18T03:09:48Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"Our experiments reveal that the dominant predictive signals are temporal and behavioural, namely how recently each endpoint was active and the per-node history of past closures, while the surrounding network topology provides no additional benefit. We find that a simple MLP operating on edge-level features, node-level event counts, and temporal patterns outperforms all graph-based approaches."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"That publicly available gossip data contains sufficient temporal and behavioral signals to predict closure types despite the inherent privacy of channel balances and payment flows that remain hidden."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"Simple MLPs using temporal and behavioral features from gossip data predict Lightning Network channel closure types better than temporal graph neural networks."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"Temporal and behavioral signals from public gossip data predict Lightning Network channel closures, while network topology adds no value."}],"snapshot_sha256":"62e8905a704ff08b771155caf17f5df7f7d836ff9d6296f5467e6a43c5831232"},"formal_canon":{"evidence_count":1,"snapshot_sha256":"b796bada9ea8c026615a30b3041897eb27607757d914ce464722b3bafe8043c0"},"paper":{"abstract_excerpt":"The Lightning Network (LN) is a second-layer protocol for Bitcoin designed to enable fast and cost-efficient off-chain transactions. Channels in the LN can be closed either by mutual agreement or unilaterally through a forced closure, which locks the involved capital for an extended period and degrades network reliability. In this paper, we study the problem of predicting channel closure types from publicly available gossip data, framing it as a temporal link classification task over the evolving channel graph. We construct a dataset spanning over two years of LN activity and benchmark a range","authors_text":"Anthony Potdevin, Emanuele Rossi, Harrison Rush, Jesse Shrader, Simone Antonelli, Vikash Singh, Vincent Davis","cross_cats":["cs.SI"],"headline":"Temporal and behavioral signals from public gossip data predict Lightning Network channel closures, while network topology adds no value.","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2026-05-12T21:12:12Z","title":"Predicting Channel Closures in the Lightning Network with Machine Learning"},"references":{"count":24,"internal_anchors":1,"resolved_work":24,"sample":[{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":1,"title":"The bitcoin lightning network: Scalable off-chain instant payments,","work_id":"1f321e5c-afed-4fb4-ad14-f0e926de6508","year":2016},{"cited_arxiv_id":"","doi":"10.1145/3427796.3427837","is_internal_anchor":false,"ref_index":2,"title":"Node classification and geographical analysis of the lightning cryptocurrency network,","work_id":"c2af98ca-1c9b-4f87-81d9-ffe008ee9f53","year":2021},{"cited_arxiv_id":"","doi":"10.1145/3321705.3329812","is_internal_anchor":false,"ref_index":3,"title":"On the difficulty of hiding the balance of lightning network channels,","work_id":"b16a55db-9842-40ad-b83d-b80ba5d8d3df","year":2019},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":4,"title":"Benchmarking gnns using lightning network data,","work_id":"a39e5c8f-ef86-4276-baa3-67cf8be6f496","year":2024},{"cited_arxiv_id":"2006.10637","doi":"","is_internal_anchor":true,"ref_index":5,"title":"Temporal Graph Networks for Deep Learning on Dynamic Graphs","work_id":"148caacb-5e39-4b83-8a6b-07b844a00d64","year":2006}],"snapshot_sha256":"b2116b15cd8d2d1420ae6d31d53c46d4450a76c127fb04e76cc548607786a5ae"},"source":{"id":"2605.12759","kind":"arxiv","version":1},"verdict":{"created_at":"2026-05-14T21:09:07.468456Z","id":"3cc97e08-c2f5-4688-b779-08ca5249c844","model_set":{"reader":"grok-4.3"},"one_line_summary":"Simple MLPs using temporal and behavioral features from gossip data predict Lightning Network channel closure types better than temporal graph neural networks.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"Temporal and behavioral signals from public gossip data predict Lightning Network channel closures, while network topology adds no value.","strongest_claim":"Our experiments reveal that the dominant predictive signals are temporal and behavioural, namely how recently each endpoint was active and the per-node history of past closures, while the surrounding network topology provides no additional benefit. We find that a simple MLP operating on edge-level features, node-level event counts, and temporal patterns outperforms all graph-based approaches.","weakest_assumption":"That publicly available gossip data contains sufficient temporal and behavioral signals to predict closure types despite the inherent privacy of channel balances and payment flows that remain hidden."}},"verdict_id":"3cc97e08-c2f5-4688-b779-08ca5249c844"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:429d10323a2c0b0394f169307db31af9e68b47e24ea9091a1c53ca89c817ddb1","target":"record","created_at":"2026-05-18T03:09:48Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"f3e8b8e9e1210129928e35c552bca5fc0f97f222f0c72a1028660d77d0d828f8","cross_cats_sorted":["cs.SI"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.LG","submitted_at":"2026-05-12T21:12:12Z","title_canon_sha256":"50a2062e8723597306439a2d8bbb5f93518c555d4e4506ff76fb7d1bbd446d51"},"schema_version":"1.0","source":{"id":"2605.12759","kind":"arxiv","version":1}},"canonical_sha256":"38115bede4f666a8beb1ffaa6b610939aca016c3ee2c21ff63e92221ab3e8d1e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"38115bede4f666a8beb1ffaa6b610939aca016c3ee2c21ff63e92221ab3e8d1e","first_computed_at":"2026-05-18T03:09:48.498719Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:09:48.498719Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"xknzy0OOOMCB5Z8d3B3JlzPPx3wABlrYTzE1FBWBmS9P5p4NLZ4296PfLA3OhLllvnOKIPFSyY3dcWyvblq0AA==","signature_status":"signed_v1","signed_at":"2026-05-18T03:09:48.499562Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.12759","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:429d10323a2c0b0394f169307db31af9e68b47e24ea9091a1c53ca89c817ddb1","sha256:57a62cfb2dfef4464a2f488c74bc46a63f9ad22d29401895ef75772d5c1b4635"],"state_sha256":"b83dc2c01c86ae7eb1f98df9322e258e3ba0790bdce3ab61630d3af9b6f45178"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Id5SNPp2t3DqbTZIaqL6iRUhHNqks7kiKAT8/FM2CLsXCHau94ykRF+xooqYMb0gWhSWcmXuaMJxz5Ti3gVyBQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T14:25:01.472380Z","bundle_sha256":"17f61f6517976c62143067cba66caa58ba7a6e04889fbab535a8c1ba5392ca77"}}