45
“Layer 2 solutions such as the Lightning Network might also be abused by criminals,” the report said. “This can be used, for example, to make payments to each other without making times and amounts of these payments visible. Similarly, new wallet encryption schemes may also complicate lawful access by law enforcement.”