Telegram Group & Telegram Channel
Forwarded from Project V 官方公告
随便说几句关于单端口多用户的设计。简单来说这是一个先有鸡还是先有蛋的问题,服务器要知道连进来的是哪个用户,但流量是加密的,要知道用户ID才能进行解密。于是用户ID需要一套额外的沟通机制。

1. 总体性能最优的方案是 TLS 的证书交换机制,除了证书相关的几百个字节之外没有额外的开销,通讯性能也相当好。唯一的问题是证书交换时有明显的握手特征。
2. Shadowsocks 不支持多用户。服务器唯一的兼容做法是尝试使用每一个用户密钥解密流量,在用户量大的时候会影响握手性能。
3. SSR 支持多用户但有一个问题,其对用户ID的加密没有满足密码学的要求。
4. VMess 对于多用户的解决方案是预生成大量的密钥(每秒钟N个,N = AlterID + 1)并缓存哈希后的数据,用空间换时间的方式判断用户ID,并保证ID不会被破解。

Q: 用户ID被破解有什么意义?
A: 由于单个客户端长期使用单个ID(密钥),如果能从流量反推出稳定的ID,那也就间接证明了这些流量都用了某一种协议。



tg-me.com/v2msgclone/24
Create:
Last Update:

随便说几句关于单端口多用户的设计。简单来说这是一个先有鸡还是先有蛋的问题,服务器要知道连进来的是哪个用户,但流量是加密的,要知道用户ID才能进行解密。于是用户ID需要一套额外的沟通机制。

1. 总体性能最优的方案是 TLS 的证书交换机制,除了证书相关的几百个字节之外没有额外的开销,通讯性能也相当好。唯一的问题是证书交换时有明显的握手特征。
2. Shadowsocks 不支持多用户。服务器唯一的兼容做法是尝试使用每一个用户密钥解密流量,在用户量大的时候会影响握手性能。
3. SSR 支持多用户但有一个问题,其对用户ID的加密没有满足密码学的要求。
4. VMess 对于多用户的解决方案是预生成大量的密钥(每秒钟N个,N = AlterID + 1)并缓存哈希后的数据,用空间换时间的方式判断用户ID,并保证ID不会被破解。

Q: 用户ID被破解有什么意义?
A: 由于单个客户端长期使用单个ID(密钥),如果能从流量反推出稳定的ID,那也就间接证明了这些流量都用了某一种协议。

BY Project V 公告


Warning: Undefined variable $i in /var/www/tg-me/post.php on line 283

Share with your friend now:
tg-me.com/v2msgclone/24

View MORE
Open in Telegram


Project V 公告 Telegram | DID YOU KNOW?

Date: |

Telegram and Signal Havens for Right-Wing Extremists

Since the violent storming of Capitol Hill and subsequent ban of former U.S. President Donald Trump from Facebook and Twitter, the removal of Parler from Amazon’s servers, and the de-platforming of incendiary right-wing content, messaging services Telegram and Signal have seen a deluge of new users. In January alone, Telegram reported 90 million new accounts. Its founder, Pavel Durov, described this as “the largest digital migration in human history.” Signal reportedly doubled its user base to 40 million people and became the most downloaded app in 70 countries. The two services rely on encryption to protect the privacy of user communication, which has made them popular with protesters seeking to conceal their identities against repressive governments in places like Belarus, Hong Kong, and Iran. But the same encryption technology has also made them a favored communication tool for criminals and terrorist groups, including al Qaeda and the Islamic State.

How Does Bitcoin Work?

Bitcoin is built on a distributed digital record called a blockchain. As the name implies, blockchain is a linked body of data, made up of units called blocks that contain information about each and every transaction, including date and time, total value, buyer and seller, and a unique identifying code for each exchange. Entries are strung together in chronological order, creating a digital chain of blocks. “Once a block is added to the blockchain, it becomes accessible to anyone who wishes to view it, acting as a public ledger of cryptocurrency transactions,” says Stacey Harris, consultant for Pelicoin, a network of cryptocurrency ATMs. Blockchain is decentralized, which means it’s not controlled by any one organization. “It’s like a Google Doc that anyone can work on,” says Buchi Okoro, CEO and co-founder of African cryptocurrency exchange Quidax. “Nobody owns it, but anyone who has a link can contribute to it. And as different people update it, your copy also gets updated.”

Project V 公告 from ms


Telegram Project V 公告
FROM USA