Copyedit documentation

Close #1378
This commit is contained in:
Mingye Wang 2024-01-25 15:10:29 +08:00 committed by Artoria2e5
parent 17aebc56c1
commit 3223e020e4
4 changed files with 28 additions and 28 deletions

View File

@ -4,16 +4,17 @@ icon: material/lightning-bolt
# Hysteria 2 # Hysteria 2
The most popular Chinese-made simple protocol based on QUIC, the selling point is Brutal, Hysteria 2 is a simple, Chinese-made protocol based on QUIC.
a congestion control algorithm that can resist packet loss by manually specifying the required rate by the user. The selling point is Brutal, a congestion control algorithm that
tries to achieve a user-defined bandwidth despite packet loss.
!!! warning !!! warning
Even though GFW rarely blocks UDP-based proxies, such protocols actually have far more characteristics than TCP based proxies. Even though GFW rarely blocks UDP-based proxies, such protocols actually have far more obvious characteristics than TCP based proxies.
| Specification | Binary Characteristics | Active Detect Hiddenness | | Specification | Resists passive detection | Resists active probes |
|---------------------------------------------------------------------------|------------------------|--------------------------| |---------------------------------------------------------------------------|---------------------------|-----------------------|
| [hysteria.network](https://v2.hysteria.network/docs/developers/Protocol/) | :material-alert: | :material-check: | | [hysteria.network](https://v2.hysteria.network/docs/developers/Protocol/) | :material-alert: | :material-check: |
## :material-text-box-check: Password Generator ## :material-text-box-check: Password Generator

View File

@ -4,15 +4,15 @@ icon: material/send
# Shadowsocks # Shadowsocks
As the most well-known Chinese-made proxy protocol, Shadowsocks is the most well-known Chinese-made proxy protocol.
Shadowsocks exists in multiple versions, It exists in multiple versions,
but only AEAD 2022 ciphers TCP with multiplexing is recommended. but only AEAD 2022 ciphers TCP with multiplexing is recommended.
| Ciphers | Specification | Cryptographic Security | Binary Characteristics | Active Detect Hiddenness | | Ciphers | Specification | Cryptographically sound | Resists passive detection | Resists active probes |
|----------------|------------------------------------------------------------|------------------------|------------------------|--------------------------| |----------------|------------------------------------------------------------|-------------------------|---------------------------|-----------------------|
| Stream Ciphers | [shadowsocks.org](https://shadowsocks.org/doc/stream.html) | :material-alert: | :material-alert: | :material-alert: | | Stream Ciphers | [shadowsocks.org](https://shadowsocks.org/doc/stream.html) | :material-alert: | :material-alert: | :material-alert: |
| AEAD | [shadowsocks.org](https://shadowsocks.org/doc/aead.html) | :material-check: | :material-alert: | :material-alert: | | AEAD | [shadowsocks.org](https://shadowsocks.org/doc/aead.html) | :material-check: | :material-alert: | :material-alert: |
| AEAD 2022 | [shadowsocks.org](https://shadowsocks.org/doc/sip022.html) | :material-check: | :material-check: | :material-help: | | AEAD 2022 | [shadowsocks.org](https://shadowsocks.org/doc/sip022.html) | :material-check: | :material-check: | :material-help: |
## :material-text-box-check: Password Generator ## :material-text-box-check: Password Generator

View File

@ -4,15 +4,15 @@ icon: material/horse
# Trojan # Trojan
As the most commonly used TLS proxy made in China, Trojan can be used in various combinations, Torjan is the most commonly used TLS proxy made in China. It can be used in various combinations,
but only the combination of uTLS and multiplexing is recommended. but only the combination of uTLS and multiplexing is recommended.
| Protocol and implementation combination | Specification | Binary Characteristics | Active Detect Hiddenness | | Protocol and implementation combination | Specification | Resists passive detection | Resists active probes |
|-----------------------------------------|----------------------------------------------------------------------|------------------------|--------------------------| |-----------------------------------------|----------------------------------------------------------------------|---------------------------|-----------------------|
| Origin / trojan-gfw | [trojan-gfw.github.io](https://trojan-gfw.github.io/trojan/protocol) | :material-check: | :material-check: | | Origin / trojan-gfw | [trojan-gfw.github.io](https://trojan-gfw.github.io/trojan/protocol) | :material-check: | :material-check: |
| Basic Go implementation | / | :material-alert: | :material-check: | | Basic Go implementation | / | :material-alert: | :material-check: |
| with privates transport by V2Ray | No formal definition | :material-alert: | :material-alert: | | with privates transport by V2Ray | No formal definition | :material-alert: | :material-alert: |
| with uTLS enabled | No formal definition | :material-help: | :material-check: | | with uTLS enabled | No formal definition | :material-help: | :material-check: |
## :material-text-box-check: Password Generator ## :material-text-box-check: Password Generator
@ -211,4 +211,3 @@ but only the combination of uTLS and multiplexing is recommended.
] ]
} }
``` ```

View File

@ -4,15 +4,16 @@ icon: material/alpha-t-box
# TUIC # TUIC
A recently popular Chinese-made simple protocol based on QUIC, the selling point is the BBR congestion control algorithm. TUIC is a Chinese-made simple protocol based on QUIC that has recently become popular.
Its selling point is the BBR congestion control algorithm.
!!! warning !!! warning
Even though GFW rarely blocks UDP-based proxies, such protocols actually have far more characteristics than TCP based proxies. Even though GFW rarely blocks UDP-based proxies, such protocols actually have far more obvious characteristics than TCP based proxies.
| Specification | Binary Characteristics | Active Detect Hiddenness | | Specification | Resists passive detection | Resists active probes |
|-----------------------------------------------------------|------------------------|--------------------------| |-----------------------------------------------------------|---------------------------|-----------------------|
| [GitHub](https://github.com/EAimTY/tuic/blob/dev/SPEC.md) | :material-alert: | :material-check: | | [GitHub](https://github.com/EAimTY/tuic/blob/dev/SPEC.md) | :material-alert: | :material-check: |
## Password Generator ## Password Generator
@ -205,4 +206,3 @@ A recently popular Chinese-made simple protocol based on QUIC, the selling point
] ]
} }
``` ```