You haven't signed in yet, you can have a better experience after signing in
You haven't signed in yet, you can have a better experience after signing in
{{item.spec_option}}
{{item.spec}}
System
¥{{auction.sku_info.price}}
Reference price
Not only is it a powerful SSH tool, but it also provides a local console and more to come
The development related features launched allow you to focus on creating excellent code
App、 Quick actions, multi-level grouping, dazzling colors, login credentials
AI empowerment, intelligent command prompts, decompression for the brain
AI answers, AI prompts, command prompts, translation
Customized layout, easy operation of files and real-time system monitoring
SSH、 Monitoring panel, custom layout, bookmark jump, proxy
Many friends are worried that their server connection information will be leaked, questioning the synchronization of service information and whether it will be illegally used by Little T 🥶
Don't worry, Little T won't be able to obtain your actual connection information. Your password and key information are stored in encrypted form
Sensitive information security is divided into two parts: encryption keys and encryption methods,
The key in encryption is our warehouse password,
The encryption method is currently the mainstream symmetric encryption method.
Warehouse password
The warehouse password is the only credential for decrypting cloud warehouses,Only exists locally
Use warehouse passwords to encrypt sensitive information end-to-end, ensuring that sensitive information is not leaked
Encryption Method AES
For example:
Password original text: woshimima
Warehouse password: x8jWjqo049ekZPdx
Encrypted ciphertext: U2FsdGVkX19p1/dulwizh8dhUGxGwVcimuZcH5Rdtmw=
What Little T actually stores is U2FsdGVkX19p1/dulwizh8dhUGxGwVcimuZcH5Rdtmw=,
This is impossible for Little T to crack, and the warehouse password is also stored locally, which Little T does not have either
It is also because of security issues that Little T requires everyone to set a warehouse password, and it is also recommended that everyone not set it too simply, preferably not using commonly used passwords
Original source:https://www.yuque.com/u64817/isrom7/pw025mkugprf0yaw