Thinkbar 发布的文章
2023春运人口迁徙大数据
https://qianxi.baidu.com/?from=ditupc#/
- 迁徙规模指数:全国为总体迁徙规模,不区分迁入或迁出;城市级区分迁入或迁出
- 城市迁徙边界采用该城市行政区划,包含该城市管辖的区、县、乡、村
ARTHURCHIAO'S BLOG
Working Experience
Ericsson (2014-2016), Software Engineer
Trip.com (Ctrip, 2016-), Senior Architect, Tech Expert
Focus & Interests
Networking, BPF
Cloud, container, virtualization
Distributed storage
Low level techniques
Selected talks
Trip.com: Large Scale Cloud Native Networking & Security with Cilium/eBPF, eBPF Summit, 2022
Ctrip Network Architecture Evolution in the Cloud Computing Era, GOPS, 2019
Translated Books
《云安全实用指南》,电子工业出版社,2020
原著:Practical Cloud Security, Chris Dotson, O’Reilly 2019
Co-authored Books
《携程架构实践》,电子工业出版社,2020
A book named Ctrip Architecture Distilled, in Chinese
冠状病毒(COVID-19)
https://www.cdc.gov/coronavirus/2019-ncov/communication/index-cn.html
我们编写了以下中文版印刷材料,以支持COVID-19相关建议。所有材料均可免费下载。可用常规办公打印机或商用打印机打印。
使用自检
使用COVID-19自检时,请仔细遵循说明。如有问题,请联系您的医疗保健机构,包括如果您的症状恶化的情况。此打印资源可进行定制,将医疗保健机构名称和电话号码印制在上面。
切勿拖延:早检测早治疗
如果您出现COVID-19症状并且有很高的重症风险,请不要拖延。尽快进行检测,如检测结果为阳性,请联系您的医疗保健机构。治疗必须及早开始才有效。
冠状病毒(COVID-19)感染症状
COVID-19患者出现过轻到重度的呼吸道疾病。症状可能包括发烧、咳嗽和气短。症状通常在接触病源后2-14天出现。
冠状病毒(COVID-19)感染症状 [1 Page, 861 KB]
病毒载体疫苗的工作原理
此信息图解释了病毒载体疫苗的工作原理。
病毒载体疫苗的工作原理 [1 Page, 122 KB] | 繁体中文 [1 Page, 127 KB]
mRNA COVID-19疫苗的工作原理
此信息图解释了mRNA COVID-19疫苗的工作原理。
mRNA COVID-19疫苗的工作原理 [1 Page, 124 KB] | 繁体中文 [1 Page, 128 KB]
V-safe信息表
使用此信息表了解有关v-safe的更多信息,包括有关如何注册及完成健康登记的说明。
居家管理COVID-19症状要做的10件事
有关居家管理COVID-19症状要做的事情的说明资料。
居家管理COVID-19症状要做的10件事 [1 Page, 598 KB]
保证透析患者的安全
面向透析患者的资源,以详细了解如何保护自己免于感染COVID-19,以及及时接受治疗的重要性。
洗手
请按照以下步骤正确洗手,防止致病微生物传播。用肥皂和水洗手至少20秒。
保持冷静并清洗双手
经常使用肥皂和水洗手20秒以上,尤其是如厕后、进餐前以及擤鼻涕、咳嗽或打喷嚏后。
大小:宽11” x 高17” – 保持冷静并清洗双手 [1 Page, 159 KB]
文件传输-wormhole(虫洞)

简单,私密的文件分享
Wormhole 让你能以端到端加密和自动过期链接的方式分享文件。 所以你可以确保你分享的文件私密且不会一直留在互联网上。
我们为什么要建造虫洞
为什么大多数 Web 服务不端到端加密您的数据?
这实际上没有一个很好的理由。bulabulabula.....
Why We Built Wormhole
Why don't most web services end-to-end encrypt your data?
There's not really a good reason for this.
For example, take a service like Dropbox. They transfer your data over an encrypted connection to prevent eavesdroppers from snooping on the data as it traverses the internet. Then, once your data arrives at Dropbox's datacenters, they promise to store it in an encrypted form.
But what Dropbox fails to mention is that they have the key to unlock your files.
You can think of encryption like a lock. It's not enough that your data is locked up – it's important to know who has a key to unlock your data.
Every major website is designed so that the service provider possesses the key to your data. They can unlock your data whenever they want. They could give your data to the government. Or a rogue employee could poke around and you'd never know.
At a fundamental level, you're entrusting Dropbox to take care of your data – something they haven't always done well. For example, they once allowed anyone to log into any Dropbox account using any password. Encryption doesn't mean much if they'll unlock your data and give it to anyone on the internet.
The lesson is: If your data is "encrypted" but someone else has the key to unlock it, then it's not truly safe.
Let's look at why "end-to-end encryption" solves the problems with ordinary "encryption".
The importance of end-to-end encryption
With end-to-end encryption, data is encrypted and decrypted only at the "end points". That means that service providers in the middle don't have access to the keys, and therefore can't read your data.
Put simply, end-to-end encryption prevents your data from falling into the wrong hands.
We built Wormhole with end-to-end encryption. When you use Wormhole, a key is generated on your device and used to encrypt your files. In transit, your data is unreadable to Wormhole and service providers like your ISP. The key never leaves your device and you're the only one who has it – unless you decide to share it. With Wormhole, you're in control of who has access to your files.
When you share a Wormhole link, the key is automatically included in the link so it's easy to share with the exact people you want, and no one else. Wormhole never sees the key. And we don't want to see it.
Every design decision in Wormhole begins with the safety and privacy of your data in mind. We can't read your files, and no one else can either. Privacy isn’t an optional mode — it’s just the way that Wormhole works.
Ten times better
When building a new product, there's a rule of thumb that it must be at least ten times better than the existing products or people can't be bothered to switch. For most people, an app with better security or privacy alone isn't ten times better than an insecure or un-private alternative. Most people just don't care about the details of the apps they use.
This may be starting to change, but to make an app that is truly "better" for most people, you need more than just better privacy and security.
The fastest way to send files on the internet. Period.
We think Wormhole is ten times better.
Our #1 goal is speed – you should be able to get a share link in less than 2 seconds with the absolute minimum number of clicks.
That's why Wormhole supports instant file streaming. There's no need to wait for your files to finish uploading before you can copy the link and send it to your recipient. The recipient can start downloading even before the files have finished uploading.
We use super fast peer-to-peer transfer to send files directly to the recipient when possible. This improves speed and security – especially when transferring files over a local network, like when you just want to get a file from your phone onto your computer.
In addition, we store your encrypted files on our servers for 24 hours so the share link will keep working for your recipient even after you close the Wormhole site.
Comparison
Let's compare Wormhole to a few competitors:
WeTransfer
WeTransfer doesn't use end-to-end encryption. So the government, rogue employees, or hackers (in the case of a data breach) can see your data.
WeTransfer shows ads next to your files, with all the creepy tracking and third-party JavaScript security risks that come with that.
WeTransfer sends your data to tracking companies. For example, they connect to googletagmanager.com, facebook.net, bing.com, amazon-adsystem.com, and more.
WeTransfer requires your email address in order to use the service.
WeTransfer makes you wait for your files to fully upload before your recipient can start downloading. This is wasteful when you just want to get a file from two devices on the same network, like from your computer to your phone.
Dropbox
Dropbox doesn't use end-to-end encryption. So the government, rogue employees, or hackers (in the case of a data breach) can see your data.
Dropbox "accesses, stores, and scans" your files and shares them with "affiliates" and "third parties", according to their Terms of Service.
Dropbox requires your full name, email address, and other personal information in order to use the service.
Dropbox makes you wait for your files to fully upload before your recipient can start downloading, or before you can copy a share link.
A better way
We started a company – Socket Inc – to bring end-to-end encryption to consumer and enterprise apps. We plan to explore the limits of what web browsers can do – especially in terms of shifting computation to the client-side, to improve the security and privacy of web apps. Wormhole is our first foray into that.
We hope you join us on this journey.
Who we are
We're Feross and John.
Feross is the author and maintainer of WebTorrent, StandardJS, and 100s of other open source projects. His software is downloaded 500+ million times per month. He was a lecturer at Stanford where he created the course CS 253 Web Security.
John is the author and maintainer of stream-http and dozens of other open source projects. John is writing his own programming language – a semi-pure, functional reactive language called Xylem. Previously, he worked at Protocol Labs doing research on Distributed Hash Tables.