Total Pageviews

Thursday, 28 September 2023

许家印被抓走发出的信号

 —29/09/2023

在彭博曝出许家印被“监视居住”次日,恒大集团公告证实,其主席许家印“因涉嫌违法犯罪”被“采取强制措施”,恒大集团没有提供更多细节,但透出许家印确已失去人身自由,而且,他的二儿子也被带走。北京当局终于下手了,引起外界舆论纷纷。

法国世界报援引上海经济专家谢安迪(Andy Xie)分析称,“在中国,人们希望像他这样的人受到当局的控制。很明显,恒大是一个巨大的庞氏骗局”,不过,世界报这样评论:“许家印被捕,成为因警方调查而失踪的一长串中国大老板中的一员。在中国,公众人物失踪是司空见惯的事,由于制度的不透明,他们被长期关押,却得不到丝毫消息。”有人认为这是一个标志性事件,意味着一个时代的落幕。这是推特上很活跃的老蛮频道的看法:“许老板是全国第一个被采取刑事措施的地产老板,目前不知道罪名是什么。这么说吧,如果是恒大财富的非法集资罪,那还稍好一点。如果是地产项目挪用资金的罪名,那么,全国所有地产老板,没有一个逃得掉。”作者认为,对类似许老板这样的公众人物采取刑事措施,在程序上需要副国级领导的批示,所以,这不可能只是做做样子,而是一定会判实刑的。在他看来,“不管后续怎么样,总之,房地产的时代已经过去了,许家印就是这个时代落幕的标志。”

北京之春荣誉主编胡平则认为习近平当局近年来一手造成经济困境,包括三年强制性清零,给中国经济造成毁灭性影响,民怨沸腾,现在以惩治许家印这样的商界大亨来转移视线了他对美国之音表示,“许家印曾经是中国首富,是中国商界的一个标杆性人物。 他失去人身自由,而且很可能被判刑坐牢,这对中国商界的影响是可以想见。他会使很多商人,尤其是那些大商人、富商感到一种普遍的恐惧。一方面是兔死狐悲;另外一方面会造成一种所谓寒蝉效应。也就是说,会使很多商人感到在中国的经济形势恶化的情况之下,很可能拿他们开刀祭旗。”驻北京时曾多次见过许家印的日本『产经新闻』台北支局長矢板明夫对台湾媒体表示,许家印创造的商业帝国,其实就是一座用扑克牌立起来搭建的金字塔,非常不牢靠、经不起任何风吹草动。在谈到许家印被抓时,他认为,“习近平对许家印出手,最大目的就是要把中国经济恶化的大部分责任,推到别人身上以后,如果再有农民工领不到工钱、付了房款拿不到房子之类的事,都会变成是许家印的错”。还有人认为,多年来,中国政府明知地产行业存在巨大隐患,还一味鼓励加杠杆,现在维持不下去了就“卸磨杀驴”。周三援引知情人消息披露许家印已被带走“监视居住”的彭博社也分析:现在,这位富豪已成为习近平主席打击房地产行业过度杠杆和投机行为的最引人注目的牺牲品。近几十年来,中国的房地产业飞速发展,在中国,房地产还没建成就被用来为其他项目融资。但负债水平已达到如此严重的程度,以至于北京当局决定从 2020 年起加以制止。从那时起,房地产集团获得信贷的机会大大减少,其中一些公司已无力完成正在建造的项目,加重了买家的恐慌,由此加剧了潜在买家的信心危机。穆迪分析公司副总监赫伦-林(Heron Lim)告诉法新社:“如果恒大只是冰山一角,如果风险迅速扩大并成为现实,那么迄今为止避免了多次违约的在岸债务市场可能会爆发信心危机,将导致经济严重放缓”。这场史无前例的房地产危机最近几个月影响到了该行业的另一个重量级企业碧桂园,长期以来,碧桂园一直被认为财务状况良好。截至 2022 年底,该集团负债累累,估计约为 11,520 亿元人民币(1,500 亿欧元)。在中国,房地产占 GDP 的四分之一以上,并支撑着一支低技能工人大军,房地产危机爆发,严重加剧了这个世界第二大经济体的困境

如何在Linux上借助eCryptFS加密文件和目录

 

eCryptFS的基础知识简介

eCryptFS是一种堆叠加密文件系统,自2.6.19以来,它就得到Linux内核的支持(作为ecryptfs模块)。用eCryptFS加密的伪文件系统挂载到你现有的文件系统上。它在EXT文件系统系列及其他文件系统(比如JFS、XFS、ReiserFS和Btrfs,甚至NFS/CIFS共享区)上运行起来非常顺畅。Ubuntu使用eCryptFS 作为其加密主目录的默认方法,ChromeOS也是如此。eCryptFS在底层使用AES算法作为默认算法,但它也支持其他算法,比如blowfish、des3、cast5和cast6等算法。一旦你手动安装eCryptFS,就可以在这些算法当中作一个选择。

正如我说过的那样,Ubuntu让我们可以在安装过程中选择是否对我们的/home目录进行加密。这是使用eCryptFS的最简单的方法。

Ubuntu提供了一系列易于使用的工具,与eCryptFS结合使用可以简化我们的工作;不过在Ubuntu安装过程中启用eCryptFS完全形成一种特定的预配置安装。所以万一默认安装不适合你的要求,你就需要执行手动安装。我在本教程中将介绍如何将eCryptFS手动安装到主要的Linux发行版上。

安装eCryptFS

安装到Debian、Ubuntu或衍生版本上:

$ sudo apt-get install ecryptfs-utils

注意:如果你决定在Ubuntu安装过程中加密你的主目录,就要确保eCryptFS应该已经安装。

安装到CentOS、RHEL或Fedora上:

# yum install ecryptfs-utils

安装到Arch Linux上:

$ sudo pacman -S ecryptfs-utils

为了稳妥起见,安装程序包后,装入eCryptFS内核模块是个好的做法:

$ sudo modprobe ecryptfs

配置eCryptFS

现在不妨运行eCryptFS配置工具,开始加密某个目录:

$ ecryptfs-setup-private

它会要求输入登录密码和挂载密码。登录密码与你平常的那个登录密码一样。挂载密码则用来获得文件加密主密钥。退出,重新登录。

你会注意到eCryptFS在默认情况下创建了两个目录:主目录中的Private目录和.Private目录。~/.Private目录里面含有加密的数据,你可以访问~/Private目录中相应的解密数据。在你登录时, ~/.Private目录自动解密,映射到~/Private目录,那样你就能访问它。你退出后,~/Private目录自动卸载,~/Private目录里面的内容加密回到~/.Private目录。

eCryptFS知道你拥有~/.Private目录,并且自动解密到~/Private,不需要我们键入密码,它是通过eCryptFS PAM模块来做到这一点的,该模块为我们完成了这项任务。

万一你不想在登录时让~/Private目录自动挂载,只要在运行ecryptfs-setup-private工具时,添加“--noautomount”这个选项。同样,如果你不想在退出后让~/Private目录自动卸载,只要指定“--noautoumount”这个选项。不过那样的话,你就得亲自手动挂载或卸载~/Private目录了。

$ ecryptfs-mount-private ~/.Private ~/Private
$ ecryptfs-umount-private ~/Private

你可以运行下面这个命令,确认.Private文件已挂载:

$ mount

现在我们可以开始将任何敏感文件放入到~/Private文件夹里面,我们退出后,它们会自动加密,并在~/.Private文件夹里面严加保护起来。

这一切似乎相当神奇。从根本上来说,ecryptfs-setup-private工具让一切易于安装。如果你想多尝试一下,安装eCryptFS的特定部分,可以参阅官方说明文档:http://ecryptfs.org/documentation.html。

结束语

总之,如果你非常在意自己的隐私,我推荐的最佳方案就是将基于eCryptFS的文件系统级加密与全磁盘加密结合起来。不过总是要记住一点,光靠文件加密无法为你保证隐私。

使用SSH的X11 Forwarding运行Linux系统的GUI程序

 之前远程Linux桌面,一般用VNC或者XRDP。但是Ubuntu服务器版本的桌面系统稳定性有很大问题,因此近年来基本放弃了远程桌面的打算。

近日不得已需要用到Ubuntu系统的远程界面,设置了很久VNC或者屏幕共享仍然没成功。就在要放弃的时候,忽然想到可以用SSH的X11 Forwarding特性来远程执行Linux系统上的GUI程序啊!

于是在Mac电脑上下载Xserver程序,顺利运行了远程系统的GUI程序,本文做简要记录。

Linux X系统介绍

X系统(X Window System)最早由 MIT在 1984 年提出, 主要目的是希望能够实现一个与系统无关的通用窗口系统。在开发 X 时,开发者就希望窗口接口不要与硬件有强烈的相关性,否则就等于是一个新操作系统了, 会导致应用上的局限。因此 X系统在设计之初就是以应用程序的概念来开发的,而非以操作系统来开发。

X系统提出后不断经厂商更新,一直到 1987 年到 X11 版本,这一版 X 取得了明显的进步, 后来的窗口接口改良都是架构于此一版本,因此后来 X系统也被称为 X11 。

X系统采用Client/Server主从式架构,X Client和X Server 以 X Protocol 沟通。通常情况下,X server与X client都运行在同一台机器上,但因为X系统当初设计成是通过socket在X server与X client之间通信的,所以它们也可以运行在不同的机器上。

X Client执行具体逻辑,将需要绘制的画面告知X Server;X Server管理硬件,绘制界面,同时接受鼠标/键盘的输入。具体来说,我们看到的浏览器、LibreOffice、thunderbird等GUI程序都属于X Client,X server在后台运行,一般通过手动启动或者由Display Manager启动。
使用SSH的X11 Forwarding运行Linux系统的GUI程序。

理解了X Server和X Client的关系,通过SSH远程运行Linux GUI程序就比较简单了:

首先,确认远程服务器上的SSH服务端开启了X11Forwarding功能(默认开启):

# 编辑 /etc/ssh/sshd_config 文件
X11Forwarding yes
# 如果之前未开启,保存配置文件后重启sshd
systemctl restart sshd

解下来,远程服务器上安装xauth包。如果远程服务器安装时带桌面环境,xauth包已经默认安装,可以跳过这一步。无界面版的远程服务器需手动安装:

# CentOS
yum install -y xorg-x11-xauth
# Debian/Ubuntu
apt install -y xauth

接着,在本地电脑上安装X Server程序。运行带桌面环境的Ubuntu、Debian、Fedora、CentOS等Linux发行版的本地电脑,已经自带X Server,可以略过这一步。Windows、MacOS系统需要自行下载X Server程序:MacOS可到 https://www.xquartz.org/ 下载XQuartz程序,Windows可到 https://sourceforge.net/projects/vcxsrv/ 下载VcXsrv,或到 https://sourceforge.net/projects/xming/ 下载Xming,安装并运行X Server程序。

最后,开启X11 Forwarding选项,ssh连接到远程服务器,运行GUI程序:

# -X 选项开启X11 Forwarding
ssh -X user@host
# 运行远程GUI程序,界面将在本地电脑上显示出来
firefox

X11 Forwarding相关事项

1. 和VNC和XRDP等技术相比,X11 Forwarding数据传输量很大,效率低,不建议长时间使用;

2. 如上面所说,不需要在远程服务器上运行桌面系统,只需安装xauth包;

3. GUI形式的ssh客户端,需要在设置中开启X11 Forwarding。例如putty上的设置:

putty开启X11 Forwarding

参考

1. 使用SSH的X11 Forwarding远程执行GUI程序

2. 什么是 X Window System

3. Why is X11 forwarding so inefficient?

 

 


 

What Is The Difference Between Shell, Console, And Terminal?

 Linux系统有几个相近但不同的概念:shell、terminal、console、tty、pts,其中shell、terminal和console是经常接触,但很难说出区别的三个概念。这篇英文很好的解释了这几个概念的来源,以及相互之间的区别。

Short Bytes: What sounds like what could be a really bad joke, or a really good one if you’re into that humor, is actually an honest question. The shell, console, and terminal are all very dated concepts that we still use today, in albeit modified forms. Did you know that a terminal used to be a physical monitor and keyboard and a console was a port with a low-level connection to the operating system? But where does that leave the shell?

Introduction

As technology progresses, lines get blurred between objects and concepts that were previously very distinct. Words can be colloquialized to share the same meaning when they once had their own. Sometimes multiple devices can be melted down into a single box without any sign of their separate technological lineage. Something similar happened to the shell, the console, and the terminal.

For many years now, the wireless router has been the backbone of internet connectivity in most homes and many small offices. But many people fail to realize (except for the technically astute among you) that the device is actually made up of several devices that used to be independent of one another and quite well-defined. A typical wireless router, even the cheapest of cheap, contains a wireless access point, ethernet switch, router, stateful firewall, DNS server, DHCP server, QoS engine, and sometimes many more features (such as a DSL/coax modem). As a result, the technical layperson might refer to this device as “the wireless,” a modem, a router, or simply “the internet box.” All of which fail to encapsulate the whole story, and that’s only one example (and not even what this article is about).

Shell, Terminal, and Console — How are they different?

Anyone who has tried their hand at an operating system outside the realm of Microsoft and Apple in any serious capacity has undoubtedly come into contact with the command line interface. What do you call it? The shell? The console? The terminal? Does it matter? They all mean the same thing, right? The answer to that is yes and no. Just like the wireless router, these used to be (and technically still are) different parts of the same whole, despite the words sharing their meanings.

What is a Terminal?

To understand what a terminal is, we have to go back to the mainframe days. Mainframes were computers with many users. They were common in large businesses and on college and university campuses. But when you have dozens of people that want to use one computer at the same time, how do you make them share it? In today’s words, we would give them each a monitor, a keyboard, and a mouse. In the era of the mainframe, terminals were used. A ‘terminal’, as defined by dictionaries, is either the end of something or a point of contact, sometimes both. Mainframes had terminal stations equipped with a display and keyboard scattered around the premise. They were endpoints where users could access the mainframe.

What is a Console?

Today, consoles can be entirely in software, but that wasn’t always the case. Consoles go hand in hand with terminals. With respect to a mainframe, a console was both the port and the digital connection to the mainframe operating system from the terminal. A broader definition of a console is a desk or dashboard like interface from which a system is controlled and/or monitored. The terminal would be physically connected to the console port on the mainframe so that the user could control the mainframe digitally. On a Linux system you can press <ctrl> + <alt> + <F1 | F2 | F3 | …> to reach the different software consoles. Many systems still have serial-based console ports for management, such as professional network equipment.

What is a Shell?

The shell has a funny name, but only because the ‘kernel’ of an operating system is an even funnier name. A shell is the piece of material that wraps around a kernel. In computers, there is no difference (except that the shell and kernel are software). The shell is the command line interface you interact with. Examples of shells are BASH, CSH, and ZSH. The shell takes hand-typed commands and tells the operating system to execute them, or can take scripts and interpret logic within them in addition to instructing the operating system to execute the commands contained in the script.

Shell vs Console vs Terminal

So, what is the actual difference between shell, consol and terminal? The terminal connects to the console where the shell is presented. That’s simple enough, right? There are some other pieces of terminology that might be useful, though. A TTY is a teletypewriter. It is essentially the equivalent of the console port but is often virtualized in software. If you jump to a different virtual console on your Linux machine using the above keyboard combination and login in, you can see the multiple consoles with logged in users by running the who command. Then there are PTS devices which are Pseudo Terminal Slaves, a virtual device of sorts. They are a form of TTY, but one that is emulated to allow a TTY connection over a network or some other means. SSH and Telnet are good examples of programs that use PTS devices.

Over time, many words in technology have fallen victim to over generalization that tends to hide a rich and adventurous history of innovation and evolution. Considering this, it might be worthwhile to curb our adoption of reductive vernacular in an effort to preserve this history and possibly allow for a more technically informed layperson in the future.

dnsupdater

 Automatically update your DNS record to match your current external IP address.

Build GitHub release (latest by date) Total download

中文版

This app allows you updating your DNS records with your current external IP address.

It is recommended to run this program in your home server, or in your router。

You should NEVER run this program behind a proxy or a VPN. Running it behind a proxy is an unconsidered and untested scenario.

How-to

  • Download the latest release for your target

  • Extract the archive.

  • Rename config.yaml.template to config.yaml.

  • Finish your configuration in the config.yaml

  • Upload dnsupdater and config.yaml to the device you want this app to run. These 2 files must be under the same directory.

  • Set up a cron job like

0 0,12 * * * /home/yourname/dnsupdater/dnsupdater > /var/log/update-dns.log 2>&1 &

Important notes in configuration

  • The APIKey for your CloudFlare records should be a dedicated API token. You can generate one here with template Edit zone DNS.

  • Do not modify the property RegionID for your Aliyun DNS records. cn-hangzhou is the only accepted value for now.

  • About JSON path

Here's a list of operators used in JSON path:

Operator Description
$ The root element to query. This starts all path expressions.
@ The current node being processed by a filter predicate.
* Wildcard. Available anywhere a name or numeric are required.
.. Deep scan. Available anywhere a name is required.
.<name> Dot-notated child
['<name>' (, '<name>')] Bracket-notated child or children
[<number> (, <number>)] Array index or indexes
[start:end] Array slice operator
[?(<expression>)] Filter expression. Expression must evaluate to a boolean value.

So if you have a JSON like this:

{
  "ip": "103.156.184.21",
  "tz": "Asia/Taipei"
}

You can use $.ip to obtain the value in the field ip.

Build for other platforms

You can check for all preset targets by running the scripts in the scripts folder.

For Windows users:

build.bat /?

For *NIX users:

make help

Or you can specify your own GOARCH and GOOS (and maybe GOMIPS) with go build command to build the executable for your platform as long as Go provides support to it.

from https://github.com/boris1993/dnsupdater

 

在 macOS 中通过 SSH, 进行X11转发

 

本文记录如何在 macOS 中安装 X11 客户端,并通过 SSH 进行 X11 转发。

安装 X11 客户端

在 macOS 中,可以使用 XQuartz 作为 X11 客户端。可以到 XQuartz Releases下载安装包手动安装,也可使用 Homebrew 安装。

使用 Homebrew 安装 XQuartz 的命令如下:

$ brew cask install xquartz

注意安装期间需要提供管理员密码以完成安装。安装完成之后需要完全退出并重启终端模拟器。

检查远程服务器配置

编辑 /etc/ssh/sshd_config,设定如下条目:

X11Forwarding yes
X11DisplayOffset 10

然后重启 sshd 使配置生效:

sudo systemctl restart sshd

转发远程 X11 程序

使用 ssh -X 连接到远程服务器,执行任意 X11 程序,然后程序的窗口就会在本机显示。

浏览器指纹:原来我们一直被互联网巨头监视,隐私在网上裸奔、无处可藏

 

今天讲⼀些让您按捺不住和欲求不满的反浏览器追踪技术,揭开你是如果被互联网巨头监控的。
  • 场景一:在⽹站上浏览了某个商品,了解了相关的商品信息,但并没有下单购买,甚⾄没有进⾏登录操作,过两天⽤同台电脑访问其他⽹站的时候却发现很多同类商品的⼴告。
  • 场景二:在某博客中你有多个小号(水军),这些小号的存在就是为了刷某个帖子的热度或者进行舆论引导,又或者纯粹进行流量交易,即便你在切换账号的时候清空了cookie、本地缓存,重开路由器甚至使用VPN来进行操作,你觉得自己足够小心,并尽可能提高水军的真实性,但是管理人员可能还是知道这是同一个人在操作,从而被打击。
一般情况下,网站或者广告商都想要一种技术可以在网络上精确的定位到每一个个体,就算你没有账号,没有登录,也可以通过收集这些个体的数据,然后加以分析之后更加精确的去推送广告和其他的一些活动。
而这个技术就是浏览器指纹,这还是用前端技术来实现的。
01.webp定义
游览器指纹,就像现实生活中人的指纹一样,特异地标记着每个上网用户。
浏览器指纹:是一种通过浏览器对网站可见的配置和设置信息来跟踪Web浏览器的方法,浏览器指纹就像我们人手上的指纹一样,具有个体辨识度,只不过现阶段浏览器指纹辨别的是浏览器。
人手上的指纹之所以具有唯一性,是因为每个指纹具有独特的纹路、这个纹路由凹凸的皮肤所形成。每个人指纹纹路的差异造就了其独一无二的特征。
那么浏览器指纹也是同理,获取浏览器具有辨识度的信息,进行一些计算得出一个值,那么这个值就是浏览器指纹。
辨识度的信息可以是UA、时区、地理位置或者是你使用的语言等等,你所选取的信息决定了浏览器指纹的准确性。
指纹技术历史
第1代:服务端在客户端设置标志
第一代指纹追踪是cookie这类的服务端在客户端设置标志的追踪技术,evercookie是cookie的加强版。
第2代:单浏览器指纹
第二代指纹追踪是设备指纹技术,发现IP背后的设备。
通过JS获取操作系统、分辨率、像素比等等一系列信息,传到后台计算,然后归并设备。
第2.5代:跨浏览器指纹识别技术。
跨浏览器之后,第二代技术中很重要的canvas指纹、浏览器插件指纹都变了,所以很难把跨浏览器指纹归并到同一设备上。
因为设备指纹相同,很大概率上是同一台设备;但是,设备指纹不同时,不一定不是同一台设备。
第3代:跨设备指纹
第3代指纹追踪技术,则是发现设备后面的人。通过人的习惯、人的行为等等来对人进行归并,此项技术比较复杂。
总结
第一代、第二代的指纹追踪技术是可以直接通过JS收集信息的,第三代指纹追踪技术目前可看到的案例是2017年RSA创新沙盒的冠军 unifyid技术,unifyid在移动端安装软件、收集信息,不仅仅是通过js。
至于利用于web上,还任重而道远。
应用
  • 分析可能导致识别欺诈者和其他需要调查的可疑活动
  • ⼴告营销机器获取您的数据,以便跟踪您的在线活动
  • 银⾏使⽤此⽅法来识别潜在的欺诈案件
02.webp是什么让你暴露身份
当你使⽤浏览器访问某个⽹站的时候,浏览器【必定会暴露】某些信息给这个⽹站。
有些是跟HTTP协议相关的。
只要你基于HTTP协议访问⽹站,浏览器就【必定】会传输这些信息给⽹站的服务器。
因此,web⽹站的服务器必定可以获取到跟你的浏览器相关的某些信息
Bash
{
  "headers": {
    "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3",
    "Accept-Encoding": "gzip, deflate, br",
    "Accept-Language": "zh-CN,zh;q=0.9,en;q=0.8",
    "Host": "httpbin.org",
    "Sec-Fetch-Mode": "navigate",
    "Sec-Fetch-Site": "none",
    "Sec-Fetch-User": "?1",
    "Upgrade-Insecure-Requests": "1",
    "User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.90 Safari/537.36"
  }
}12345678910111213
基本的浏览器指纹
03.webp指纹采集
信息熵(entropy)是接收的每条消息中包含的信息的平均量,熵越高,则能传输越多的信息,熵越低,则意味着传输的信息越少。
浏览器指纹是由许多浏览器的特征信息综合起来的,其中特征值的信息熵也是不尽相同。
查看自己的浏览器指纹ID和基本信息。
04.webp这个网站也可以查看你浏览器的指纹相关信息:https://amiunique.org/fp。
它可查看到哪些信息呢?如下:
05.webp06.webp07.webp08.webp09.webp10.webp11.webp而且浏览器指纹还有一个开源项目了,纯JS实现的,只有引用这个项目就可以获取浏览器的各种信息或者系统的配置了。
现代而灵活的浏览器指纹库:https://github.com/fingerprintjs/finger。
使用也很简单,如下:
安装(Installation)
  • Bower: bower install fingerprintjs2
  • NPM: npm install fingerprintjs2
  • Yarn: yarn add fingerprintjs2
使用(Usage)
JavaScript
if (window.requestIdleCallback) {
    requestIdleCallback(function () {
        Fingerprint2.get(function (components) {
          console.log(components) // an array of components: {key: ..., value: ...}
        })
    })
} else {
    setTimeout(function () {
        Fingerprint2.get(function (components) {
          console.log(components) // an array of components: {key: ..., value: ...}
        })
    }, 500)
}12345678910111213
还有一个用纯JavaScript编写的设备信息和数字指纹的开源项目:https://github.com/jackspirou/clientjs。
总结
科技公司通过大数据,会对你进行一个大体的画像,然后按照你的喜好推送信息。
比如一些精准的广告,刺激你荷尔蒙的小视频等。
  • 就拿你在玩的抖音来说,你其实可以匿名使用,但是你爱抖胸妹子的喜好,不会因为重装抖音而消失,它已熟知了你的癖好。
  • 这些收集你浏览器信息的动作,默默的在后台发生,用户根本毫无觉察。
  • 你的每一次点击,都无情的出卖了你,这些信息会被综合分析,相关网站和部门,能够对你进行唯一性识别,进而锁定、追踪。
  • 你虽然没有注册账号,平台却为你分配了身份。
  • 这是识别方式,用于识别你这个个体,而收集的内容,可能更让人瞠目结舌,不要觉得垃圾数据多,存不下,行为数据比那些廉价的磁盘,值钱的多。
  • 包括你的每一次点击,停留的时长,阅读、观看的位置,都在全方位的展示你的个体。
  • 设备、IP、位置、操作习惯,都在不同的角度绘制你的指纹,让你在匿名的互联网上,无处可藏。
如果你没有足够专业的知识或者非常频繁更换浏览器信息的话,几乎100%可以通过浏览器指纹定位到一个用户,当然这也不见得全是坏事。
  • 泄露的隐私非常片面,只能说泄露了用户部分浏览网页时的行为。
  • 价值不够,用户行为并未将实际的账户或者具体的人对应起来,产生的价值有限。
  • 有益利用,利用浏览器指纹可以隔离部分黑产用户,防止刷票或者部分恶意行为。
最后
原来我们一直被互联网巨头监视,隐私在网上裸奔、无处可藏!
from https://archive.ph/hS0Fj

Ant-Media-Server

 

Ant Media Server is a live streaming engine software that provides adaptive, ultra low latency streaming by using WebRTC technology with ~0.5 seconds latency. Ant Media Server is auto-scalable and it can run on-premise or on-cloud.

antmedia.io

Welcome to Ant Media Server!

Are you ready to revolutionize your live video streaming experience? Look no further! Ant Media Server is your ultimate solution for high-quality, ultra-low latency streaming. With over 2000 enterprises worldwide already relying on our platform, you can trust us to deliver outstanding performance and exceptional user experiences.

TL;DR

Why Choose Ant Media Server?

  • Scalable Real-time Streaming: Experience sub-0.5 seconds latency and enjoy seamless live video streaming with Ant Media Server.
  • Extensive Protocol Support: Whether you need WebRTC, CMAF, HLS, RTMP, RTSP, SRT, Zixi, or more, Ant Media Server has got you covered.
  • Easy Integration: Our platform offers rich SDKs for iOS, Android, React Native, Flutter, Unity, and JavaScript, ensuring smooth integration with your existing infrastructure.
  • Secure and Robust: Rest assured that your streams are protected with advanced security features like SSL/TLS encryption, token authentication, IP filtering, and watermarking.
  • Community and Enterprise Editions: Choose the edition that suits your needs. Our Community Edition provides essential streaming functionality, while the Enterprise Edition offers advanced features and dedicated technical support.

Get Started with

Ant Media Server Today!

Ready to embark on your streaming journey? Here's what you need to do:

  1. Explore our Documentation: Dive into our comprehensive documentation to learn everything about Ant Media Server's features, installation guides, API references, and more.
  2. Join our Community: Engage with our vibrant community of developers, streaming enthusiasts, and experts on our forum. Share your ideas, get support, and stay updated with the latest developments.
  3. Try Demos: Curious to see Ant Media Server in action? Check out our live WebRTC samples to experience the power and performance firsthand.
  4. Download and Install: Get your hands on Ant Media Server Community by downloading the latest release from our GitHub repository. Follow the installation guide to set up your streaming environment effortlessly.
  5. Upgrade to Enterprise Edition: Unlock premium features and dedicated support by upgrading to our Enterprise Edition. Contact our sales team to discuss your requirements and get started.
  6. Spread the Word: Help us grow the Ant Media Server community! Share your positive experiences on G2 and other platforms, follow us on social media, and encourage others to join the revolution!

At Ant Media Server, we're passionate about delivering cutting-edge streaming solutions that empower businesses and individuals worldwide. Join us today and unleash the full potential of live video streaming!

🚀 Seamless Ant Media Server Deployment: Effortless & Trustworthy

Deploy Ant Media Server seamlessly on your favorite cloud platforms with 1-Click apps, cloud marketplaces, or Docker/Kubernetes/Scripts. Get started quickly and effortlessly with our streamlined deployment options.

Cloud Provider Community Edition Enterprise Edition
AWS Community Edition Enterprise Edition
Microsoft Azure Community Edition Enterprise Edition
Alibaba - Enterprise Edition
Digital Ocean Community Edition Enterprise Edition or Enterprise Edition Kubernetes
Linode Community Edition Enterprise Edition
Linux Install via Script SSL Setup
Docker Docker Compose Docker Swarm
Cluster Cluster installation Multi Level Cluster
Kubernetes Deploy on Kubernetes Kubernetes Autoscaling

Discover the Power of Ant Media: Start Your Free Trial Today!

Unleash Your Streaming Potential with Ant Media's Exceptional Support!

Whether you opt for our Community Edition, engaging with our active GitHub Discussions community, or our Enterprise Edition with email support. Explore our comprehensive support packages and tap into the resources that will elevate your streaming experience. No matter the edition, our goal is to deliver exceptional support, empowering you to create remarkable streaming experiences. Need help or have inquiries? Contact us at support@antmedia.io. Let's embark on a seamless streaming journey together!

antmedia.io

from https://github.com/ant-media/Ant-Media-Server