Notice: file_put_contents(): Write of 778 bytes failed with errno=28 No space left on device in /var/www/tg-me/post.php on line 50

Warning: file_put_contents(): Only 8192 of 8970 bytes written, possibly out of free disk space in /var/www/tg-me/post.php on line 50
V2Fly - Notification and Updates, V2Ray the second new | Telegram Webview: v2fly/33 -
Telegram Group & Telegram Channel
V2Ray v4.23.2 已发布。

更新内容
* TLS 改用 Golang 标准密码套件
* 增加 Illumos 支持
* Golang 升级至 1.14.1

注:v2ray/v2ray-core#2509 提及的潜在被识别风险已消除,如果您在使用 TLSWebSocket 功能并在意这项潜在的风险,应当尽快升级 客户端



V2Ray v4.23.2 released.

Updates
* TLS Cipher Suites follows Golang standard
* Add Illumos Suppport
* Update to Golang 1.14.1

Note: This release should address the potential threat, that the TLS ClientHello may be recognize by matching the constant TLS Cipher Suites string in the handshake packet. For more information, see v2ray/v2ray-core#2509. If you find this important in your application (i.e. using TLS or WebSocket), you should update your client side immediately.



tg-me.com/v2fly/33
Create:
Last Update:

V2Ray v4.23.2 已发布。

更新内容
* TLS 改用 Golang 标准密码套件
* 增加 Illumos 支持
* Golang 升级至 1.14.1

注:v2ray/v2ray-core#2509 提及的潜在被识别风险已消除,如果您在使用 TLSWebSocket 功能并在意这项潜在的风险,应当尽快升级 客户端



V2Ray v4.23.2 released.

Updates
* TLS Cipher Suites follows Golang standard
* Add Illumos Suppport
* Update to Golang 1.14.1

Note: This release should address the potential threat, that the TLS ClientHello may be recognize by matching the constant TLS Cipher Suites string in the handshake packet. For more information, see v2ray/v2ray-core#2509. If you find this important in your application (i.e. using TLS or WebSocket), you should update your client side immediately.

BY V2Fly - Notification and Updates, V2Ray the second new




Share with your friend now:
tg-me.com/v2fly/33

View MORE
Open in Telegram


V2Fly Notification and Updates V2Ray the second new Telegram | DID YOU KNOW?

Date: |

Newly uncovered hack campaign in Telegram

The campaign, which security firm Check Point has named Rampant Kitten, comprises two main components, one for Windows and the other for Android. Rampant Kitten’s objective is to steal Telegram messages, passwords, and two-factor authentication codes sent by SMS and then also take screenshots and record sounds within earshot of an infected phone, the researchers said in a post published on Friday.

In many cases, the content resembled that of the marketplaces found on the dark web, a group of hidden websites that are popular among hackers and accessed using specific anonymising software.“We have recently been witnessing a 100 per cent-plus rise in Telegram usage by cybercriminals,” said Tal Samra, cyber threat analyst at Cyberint.The rise in nefarious activity comes as users flocked to the encrypted chat app earlier this year after changes to the privacy policy of Facebook-owned rival WhatsApp prompted many to seek out alternatives.V2Fly Notification and Updates V2Ray the second new from hk


Telegram V2Fly - Notification and Updates, V2Ray the second new
FROM USA