Event JSON
{
"id": "9921f14e23293268808915c6231d4e3a4f66271bc2c3fac3a2d21d1217fa8b31",
"pubkey": "0d6f3fb7f3c83755ea731380516167da6691cea0d7ddf4865505d291687ca343",
"created_at": 1679530141,
"kind": 1,
"tags": [
[
"e",
"d4e18ab2608819eb2f8e89dbef7275ef4604189adeaa2504eebae57e1af17e8c",
"",
"root"
],
[
"e",
"601a62e080e83881153972dedb96a74496a66313464271feed86ef279d3a3335",
"",
"reply"
],
[
"p",
"0d6f3fb7f3c83755ea731380516167da6691cea0d7ddf4865505d291687ca343"
],
[
"p",
"4dd147f12f402f90f296d9c2978bbe185b16d2b40bc87b5ff65fa9801ab36243"
]
],
"content": "请问有什么关于GFW是如何破解shadowsocks “访问者ip地址、目标url,加密协议,证书机构,流量包大小等信息”的好的文章吗?\n\n我瞄了一阵,只能找到他们如何鉴别是不是ss服务器的文\nhttps://gfw.report/talks/imc20/zh/\n",
"sig": "91ec8fadeee53c7ebb84b6a14454c8c23353195ee02e7ea5aeb5255a2dc716df74ab79e93fa7201f1082537c2369885ac3a43887668395f2cf26e297052bae19"
}