WEBVTT

00:00.000 --> 00:12.000
Okay, so I was told that we can go.

00:12.000 --> 00:19.000
So I used this time to show this slide who am I, so that we don't spend time on this.

00:19.000 --> 00:24.000
As yesterday I tested this presentation with my friend and the hotel.

00:24.000 --> 00:27.000
And it became clear that I have too many slides.

00:27.000 --> 00:31.000
So I want to focus rather on the second part, which is technical one,

00:31.000 --> 00:35.000
then on the kind of introduction report.

00:35.000 --> 00:40.000
But before going far there, I just want to understand the audience a little bit more.

00:40.000 --> 00:47.000
Could those of you who used enterprise with PN corporate to PN depend to connect to your corporate network?

00:47.000 --> 00:50.000
Could you raise your hands?

00:50.000 --> 00:52.000
Okay, so almost everybody.

00:52.000 --> 00:58.000
And how many of you could you also raise hands those who used actually commercial VPN?

00:58.000 --> 01:03.000
The VPN service when you need to pay some money to okay.

01:03.000 --> 01:05.000
So that was my understanding as well.

01:05.000 --> 01:08.000
So also significant amount of people, but not as much.

01:08.000 --> 01:09.000
Good.

01:09.000 --> 01:15.000
So who is Jerry from this title?

01:15.000 --> 01:20.000
Jerry's VPN provider with the properties described in the abstract of the presentation.

01:20.000 --> 01:25.000
And Jerry is not my employer.

01:25.000 --> 01:28.000
Actually, that's so important for me to mention this disclaimer.

01:28.000 --> 01:32.000
So that during this talk, I do not represent my current employer.

01:32.000 --> 01:38.000
So because otherwise, I say we will not get permission to have this presentation.

01:38.000 --> 01:48.000
So and Jerry's provider, which I calculate by closely this engineering team.

01:48.000 --> 01:55.000
And actually, I had this first credit experience to talk about.

01:55.000 --> 01:58.000
But obviously I discussed with them what I can disclose on what I can't.

01:58.000 --> 02:02.000
So all their identification information is prohibited.

02:02.000 --> 02:06.000
So I cannot disclose the name, the employees, the customers.

02:06.000 --> 02:16.000
And especially kind of limitation which I did like, but I have to agree is that I can't talk about the methods which they use today.

02:16.000 --> 02:21.000
Because the infrastructure of the VPN still works and function in the Russian.

02:21.000 --> 02:25.000
And it's still able to penetrate the Russian firewall.

02:25.000 --> 02:31.000
So then that's basically what we already discussed in the first minute.

02:31.000 --> 02:42.000
And here still I want to put a difference to describe a difference between enterprise VPN and personal or consumer commercial VPN.

02:42.000 --> 02:50.000
So the second one is used by individuals for the reasons for different reasons.

02:50.000 --> 02:55.000
But those reasons are very different than accessing the corporate network.

02:55.000 --> 03:02.000
So in the enterprise VPN and personal VPN, quite different than the nation, even if the underlying protocols are the same.

03:02.000 --> 03:11.000
So both can use IPSEC or OpenVPN, but the infrastructure around is different than the patterns of usage are different.

03:11.000 --> 03:16.000
So why consumer VPN is really used?

03:16.000 --> 03:24.000
So according to our experience, the most often it is used to bypass geo restrictions.

03:24.000 --> 03:37.000
For example, you want to watch some hockey match or play some game, which is not available in your country of residence.

03:37.000 --> 03:46.000
So then you need to have VPN and in this case VPN is used, not really for encryption purposes, but like the proxy is used.

03:46.000 --> 03:50.000
Too high to your rail IP and to be able to get access to the service.

03:50.000 --> 03:55.000
So but one of the interesting case is by passing sends a ship.

03:55.000 --> 04:00.000
So accessing blocked websites and services with countries with internet sends a ship.

04:00.000 --> 04:06.000
So like around China and obviously around Rafa.

04:06.000 --> 04:09.000
There is also some slight deviation about VPN.

04:09.000 --> 04:17.000
So again, just think about it when you have this presentation available.

04:17.000 --> 04:31.000
You don't really always need VPN and especially when you're buying that personal VPN as consumer VPN, you already shift in the trust from your internet service provider to the VPN provider.

04:32.000 --> 04:49.000
If it happens in Belgium or in Finland or in Sweden, then I would rather argue that I don't really want to shift the trust from a visa or waterfall to the small VPN provider register it in.

04:49.000 --> 04:54.000
I know kind of my own islands or whatever.

04:54.000 --> 04:56.000
And I would rather trust the list.

04:56.000 --> 04:59.000
But it's always about 15 on trust.

04:59.000 --> 05:07.000
But sometimes, so marketers of VPNs don't slide the statement, but it's actually really correct.

05:07.000 --> 05:08.000
I personally like it.

05:08.000 --> 05:13.000
That's the shift of trust and that's what this system recommends recommendations about.

05:13.000 --> 05:20.000
So, but there are countries where you really need where really you can't trust local ISPs.

05:20.000 --> 05:25.000
In particular, because you do want to get access to the resources which they block.

05:25.000 --> 05:29.000
And in this case, commercial VPN is a tool to get access to this data.

05:29.000 --> 05:33.000
Very important to say that it's not universal solution.

05:33.000 --> 05:36.000
And it's not Samsung which works always.

05:36.000 --> 05:40.000
In particular, I don't know how to pronounce it correctly.

05:40.000 --> 05:44.000
It's a one millionth problem in North Korea.

05:44.000 --> 05:45.000
So, this is an extreme case.

05:45.000 --> 05:50.000
And in this case, the state internet is disconnected physically from internet.

05:50.000 --> 05:52.000
There is no connectivity.

05:52.000 --> 05:58.000
So, if you want to get a connection to the internet, you need to go to specific rooms.

05:58.000 --> 06:02.000
This special place, this connectivity internet.

06:02.000 --> 06:05.000
So, in this case, of course, no VPN can help.

06:05.000 --> 06:09.000
But in China, in Russia, and even in Iran, it's not the case.

06:09.000 --> 06:14.000
So, now, let us focus on censorship in Russia.

06:14.000 --> 06:19.000
In 2020, six, how does it look from end user point of view?

06:19.000 --> 06:21.000
So, it's pretty simple.

06:21.000 --> 06:26.000
You can access the sites and services which you can access in Belgium.

06:26.000 --> 06:30.000
Certain services are slowed down.

06:30.000 --> 06:36.000
For example, in Telegram, you can't really talk via Telegram Messenger.

06:37.000 --> 06:39.000
But you can still send messages.

06:39.000 --> 06:45.000
And sometimes, of course, devices which use block services, IOT, they fail to work properly.

06:45.000 --> 06:48.000
So, that's how it looks from end user point of view.

06:48.000 --> 06:53.000
So, then, let us also look into the VPN business perspective.

06:53.000 --> 06:56.000
The perspective of VPN provider.

06:56.000 --> 07:05.000
What a reference state is doing to basically shut down the services.

07:05.000 --> 07:07.000
They provide it.

07:07.000 --> 07:09.000
It's developed for them.

07:09.000 --> 07:12.000
So, they send in a remote request to different platforms.

07:12.000 --> 07:15.000
For example, Apple store.

07:15.000 --> 07:18.000
They block hosting.

07:18.000 --> 07:23.000
So, if you are known Russian legal entity, you can actually buy VPS hosting services in Russia,

07:23.000 --> 07:28.000
which gives you a lot of opportunities for VPN business.

07:28.000 --> 07:30.000
The obvious one.

07:30.000 --> 07:33.000
So, then, they also catch in in cab streams.

07:33.000 --> 07:36.000
You can advertise in the Yandex ads.

07:36.000 --> 07:42.000
And you can actually, the card processing through VPN providers is also good.

07:42.000 --> 07:44.000
So, in, of course, marketing changes.

07:44.000 --> 07:47.000
My favorite one was kind of creative.

07:47.000 --> 07:51.000
So, they launched, I believe, it was one year ago.

07:51.000 --> 07:52.000
A couple of years ago.

07:52.000 --> 07:56.000
It was small propaganda campaign, small in terms of time window.

07:56.000 --> 07:59.000
Because looks like it wasn't effective and it didn't work.

07:59.000 --> 08:01.000
But it was propaganda campaign.

08:01.000 --> 08:05.000
Like, if you do use VPN, then your money will be stolen.

08:05.000 --> 08:11.000
So, basically, an idea was to form and public opinion that VPN adensures,

08:11.000 --> 08:13.000
and should be used.

08:13.000 --> 08:17.000
Obviously, they are blocked in VPN providers websites.

08:17.000 --> 08:23.000
And they have also the ban on popularizing VPN services.

08:23.000 --> 08:27.000
In the beginning of 2024, there was a exception for the talks.

08:27.000 --> 08:29.000
Like, we are having now.

08:29.000 --> 08:33.000
But in the end of 2024, this exception is removed.

08:33.000 --> 08:37.000
So, if you don't want to break our hand low, please leave the room.

08:37.000 --> 08:40.000
So, then, yeah.

08:40.000 --> 08:46.000
I can also say that, from, yeah, that's an excellent engineering point of view.

08:46.000 --> 08:51.000
I decided to coin this term.

08:51.000 --> 08:54.000
I don't know, I have not heard that before.

08:54.000 --> 08:57.000
But I believe that it deserves to be called great Russian firewall.

08:57.000 --> 09:02.000
It's not anymore the toy, which it was before 2022.

09:02.000 --> 09:07.000
It's now a serious filtering infrastructure,

09:07.000 --> 09:10.000
which covers the whole direction.

09:10.000 --> 09:15.000
And all customer traffic goes through this technical measures to combat threats.

09:15.000 --> 09:18.000
Customer traffic means, if you're connected to a local ASP,

09:18.000 --> 09:21.000
then it means that your traffic will go through this device.

09:21.000 --> 09:25.000
And those boxes are installed in ASP promises,

09:25.000 --> 09:31.000
but the provider personnel they do not have control over this boxes.

09:31.000 --> 09:35.000
I can't roll it by the state, although it is.

09:35.000 --> 09:38.000
Another thing, especially for those who can speak Russian,

09:38.000 --> 09:42.000
I recommend to watch this YouTube that's a link.

09:42.000 --> 09:45.000
A bit of brands for the brutal force.

09:45.000 --> 09:48.000
I believe he means police.

09:48.000 --> 09:53.000
Of course, they are basically probing the internet,

09:53.000 --> 10:00.000
testing which services have the VPN in particular, which I piece.

10:00.000 --> 10:02.000
So, in order to be able to block IPN.

10:02.000 --> 10:06.000
So, let's, active probing that's also known from great firewall of China,

10:06.000 --> 10:08.000
they use this technique as well.

10:08.000 --> 10:12.000
It's important to say that there are different settings for different

10:12.000 --> 10:18.000
internet service providers, different regions, and different types.

10:18.000 --> 10:21.000
So, it's flexible, it dynamic.

10:21.000 --> 10:23.000
Don't underestimate it.

10:23.000 --> 10:28.000
Don't think that this is something he will easily pass by.

10:28.000 --> 10:33.000
So, then, how it looks from VPN provider point of view.

10:33.000 --> 10:37.000
So, here I just tried to depict the simplified architecture of what you do.

10:37.000 --> 10:40.000
If you just decided to set up your own VPN node,

10:40.000 --> 10:42.000
for example, your perfect house in Germany.

10:42.000 --> 10:46.000
You have a partner in Germany, and you have your relatives in Russia,

10:46.000 --> 10:50.000
where you run, and you want them to be able to access

10:50.000 --> 10:52.000
your internet basically.

10:52.000 --> 10:54.000
The real one.

10:54.000 --> 10:57.000
So, what you will do, you will just install it.

10:57.000 --> 11:00.000
You can know it probably is standard protocols.

11:00.000 --> 11:04.000
Like IPC, open VPN, Warregard, whatever.

11:04.000 --> 11:08.000
And you will have several clients from the home country.

11:08.000 --> 11:12.000
There are other types of friends who will access this VPN node.

11:12.000 --> 11:20.000
So, the blue arrow here is those connections,

11:20.000 --> 11:22.000
which are controlled by the firewall.

11:22.000 --> 11:24.000
The Russian firewall, in this example,

11:24.000 --> 11:27.000
and which can be obviously blocked by it.

11:27.000 --> 11:30.000
Important points, there are not too much traffic usually,

11:30.000 --> 11:34.000
coming from those clients to VPN nodes,

11:34.000 --> 11:37.000
because you just have several customers.

11:37.000 --> 11:41.000
So, this is always simplified the architecture of

11:41.000 --> 11:43.000
commercial VPN provider,

11:43.000 --> 11:46.000
as you can see it's more complicated.

11:46.000 --> 11:49.000
So, you have obviously authentication

11:49.000 --> 11:51.000
authorization in the account,

11:51.000 --> 11:55.000
AA, AA, you have accounts database.

11:55.000 --> 11:58.000
You have a set of nodes,

11:58.000 --> 12:01.000
to which the clients are connected to nodes

12:01.000 --> 12:05.000
are probably located in different geographical regions,

12:06.000 --> 12:10.000
so that the customers can utilize different exit nodes,

12:10.000 --> 12:12.000
different exit IPs.

12:12.000 --> 12:15.000
There are many customers connecting to them

12:15.000 --> 12:18.000
from different countries with different regions,

12:18.000 --> 12:20.000
if you are talking about Russia.

12:20.000 --> 12:22.000
So, in the first example,

12:22.000 --> 12:25.000
most probably your relatives are in one or two cities.

12:25.000 --> 12:26.000
I'll like it in one or two cities.

12:26.000 --> 12:31.000
Here the clients are among the distributed

12:31.000 --> 12:34.000
and the whole area in the whole Russian.

12:34.000 --> 12:37.000
So, they are from URL, TIL, Moscow.

12:37.000 --> 12:39.000
And they are there.

12:39.000 --> 12:42.000
So, you expect to have super nodes,

12:42.000 --> 12:46.000
which actually will deliver to the clients

12:46.000 --> 12:49.000
some part of information, which is required to connect.

12:49.000 --> 12:53.000
So, that clients will not have hard-coded IP addresses

12:53.000 --> 12:54.000
of those nodes,

12:54.000 --> 12:56.000
but they will be, for example, distributed to the clients

12:56.000 --> 12:57.000
by super nodes.

12:57.000 --> 13:03.000
And all those blue arrows are still all those blue errors

13:04.000 --> 13:08.000
are still subject to be blocked by the GRIF.

13:08.000 --> 13:12.000
So, they have different attacks, vector attacks.

13:12.000 --> 13:15.000
So, that's observation.

13:15.000 --> 13:17.000
It's very proximate.

13:17.000 --> 13:20.000
And this is based on one we can provide the experience.

13:20.000 --> 13:23.000
So, don't take it to the kind of truth,

13:23.000 --> 13:25.000
but that's what we observed.

13:25.000 --> 13:28.000
So, before 2022, there are no depend blocks

13:28.000 --> 13:29.000
that it was a paradise.

13:30.000 --> 13:33.000
Again, maybe they were,

13:33.000 --> 13:35.000
but we have not tested them.

13:35.000 --> 13:37.000
2022 something happened.

13:37.000 --> 13:39.000
The war started.

13:39.000 --> 13:42.000
And Russian states decided that it's now

13:42.000 --> 13:45.000
which is time to finally block

13:45.000 --> 13:47.000
everything which they can block.

13:47.000 --> 13:49.000
So, then they started from

13:49.000 --> 13:50.000
blocked by DNS names,

13:50.000 --> 13:52.000
blocked by IPs.

13:52.000 --> 13:56.000
And in 2023, it was clear that

13:56.000 --> 13:59.000
it started to be used to the packet inspection.

13:59.000 --> 14:00.000
And after that,

14:00.000 --> 14:02.000
PPP, L2TP, OpenVPN,

14:02.000 --> 14:04.000
Standard OpenVPN,

14:04.000 --> 14:06.000
they stopped to work.

14:06.000 --> 14:08.000
So, in 2025,

14:08.000 --> 14:11.000
only they finally managed to fix

14:11.000 --> 14:14.000
the issue with X or application.

14:14.000 --> 14:16.000
So, there is this OpenVPN,

14:16.000 --> 14:19.000
a famous patch called X or application.

14:19.000 --> 14:20.000
In additional region,

14:20.000 --> 14:24.000
I have linked to the article about this.

14:24.000 --> 14:28.000
And it actually worked for PPP a long time.

14:28.000 --> 14:31.000
So, that the state was not able,

14:31.000 --> 14:36.000
the Russian fireball was not able to block it.

14:36.000 --> 14:39.000
So, then, in 2025, quite recently,

14:39.000 --> 14:41.000
then you think a PIT,

14:41.000 --> 14:44.000
so it was a white list,

14:44.000 --> 14:46.000
a TIS white list.

14:46.000 --> 14:49.000
So, it basically means that

14:49.000 --> 14:51.000
the users I allowed to connect

14:51.000 --> 14:53.000
only to specific IP addresses

14:53.000 --> 14:56.000
usually belonging to the Russian clouds,

14:56.000 --> 14:59.000
like my low cloud, the antics cloud.

14:59.000 --> 15:04.000
And they just simply can't access anything else.

15:04.000 --> 15:09.000
Not only CNN.com, but whatever.

15:09.000 --> 15:12.000
So, usually this is activated

15:12.000 --> 15:16.000
for a very limited time during some events.

15:16.000 --> 15:18.000
Military events,

15:18.000 --> 15:20.000
I mean, military attacks,

15:20.000 --> 15:23.000
also visits of the Mr. Putin himself

15:23.000 --> 15:25.000
to the cities,

15:25.000 --> 15:28.000
so then, as activated kind of region.

15:31.000 --> 15:35.000
Now, let us switch to some real stories

15:35.000 --> 15:37.000
about this jury.

15:37.000 --> 15:39.000
Okay, good.

15:39.000 --> 15:43.000
So, the first, the strategy,

15:43.000 --> 15:48.000
don't try to combat them.

15:49.000 --> 15:52.000
Russian fireball directly.

15:52.000 --> 15:55.000
The goal is to maximize false negatives.

15:55.000 --> 15:57.000
So, Russian fireball should think that this is

15:57.000 --> 16:00.000
a legitimate connection.

16:00.000 --> 16:02.000
If it thinks that the connection

16:02.000 --> 16:04.000
is illegitimate,

16:04.000 --> 16:06.000
or if it thinks that it can't understand

16:06.000 --> 16:09.000
that this connection will be blocked.

16:09.000 --> 16:11.000
So, the two types of blocks,

16:11.000 --> 16:13.000
full block,

16:13.000 --> 16:15.000
and no traffic comes to the all the ports,

16:15.000 --> 16:16.000
except for for free.

16:16.000 --> 16:18.000
And in this case, you can still do something.

16:18.000 --> 16:20.000
So, in basically, in the second case,

16:20.000 --> 16:22.000
it looks like that Russian fireball

16:22.000 --> 16:25.000
is not really sure that this is the prohibited service.

16:25.000 --> 16:27.000
Because they also are very keen on it.

16:27.000 --> 16:30.000
They are afraid of dropping down,

16:30.000 --> 16:32.000
stretching down some important service.

16:32.000 --> 16:35.000
So, they do want to have kind of

16:35.000 --> 16:38.000
confidence that this is illegitimate service

16:38.000 --> 16:40.000
from that point of view.

16:40.000 --> 16:44.000
So, and now, several stories.

16:44.000 --> 16:46.000
The first, you face, it was SNI by the blocker,

16:46.000 --> 16:47.000
blocking.

16:47.000 --> 16:49.000
So, you know till as hello,

16:49.000 --> 16:50.000
SNI field,

16:50.000 --> 16:51.000
and by analyzing the SNI field,

16:51.000 --> 16:53.000
you can understand which service,

16:53.000 --> 16:54.000
which is several.

16:54.000 --> 16:55.000
We connected two,

16:55.000 --> 16:58.000
and that's a very efficient way to block

16:58.000 --> 17:00.000
to block

17:00.000 --> 17:02.000
supernotes, for example.

17:02.000 --> 17:04.000
By the way, TLSCH,

17:04.000 --> 17:06.000
which is supposed to be the answer for this,

17:06.000 --> 17:08.000
Russians also understand it,

17:08.000 --> 17:11.000
and they just prohibits TLSCH,

17:11.000 --> 17:13.000
and blocked.

17:13.000 --> 17:17.000
That's my greetings to colleagues from Mozilla,

17:17.000 --> 17:19.000
who talked about this age this morning.

17:19.000 --> 17:21.000
So, GNS basic detection.

17:21.000 --> 17:24.000
We had previously, each we can note,

17:24.000 --> 17:26.000
had this domain names.

17:26.000 --> 17:29.000
I can figure it out.

17:29.000 --> 17:31.000
Several days can't.

17:31.000 --> 17:33.000
Passes, and it disappears.

17:33.000 --> 17:34.000
I mean, it blocks.

17:34.000 --> 17:35.000
It is blocked.

17:35.000 --> 17:37.000
So, it looks like that they actually

17:37.000 --> 17:38.000
were doing the checks.

17:38.000 --> 17:40.000
And of course, there were no reverses.

17:40.000 --> 17:42.000
It was from the regular DNS.

17:42.000 --> 17:43.000
It didn't help.

17:43.000 --> 17:44.000
So, if you use DNS,

17:44.000 --> 17:47.000
and if this DNS part of DNS name points to the VPN provider,

17:47.000 --> 17:50.000
then they will find the way and they will look at it.

17:50.000 --> 17:52.000
So, another one,

17:52.000 --> 17:55.000
if you run any standard VPN protocol,

17:55.000 --> 17:58.000
like OpenVPN, L2TP, something which can be,

17:58.000 --> 18:00.000
classified as VPN,

18:00.000 --> 18:02.000
detect as VPN,

18:02.000 --> 18:07.000
then it will also poison your server,

18:07.000 --> 18:11.000
and it will be marked as VPN server,

18:11.000 --> 18:12.000
and it will be marked.

18:12.000 --> 18:15.000
So, you really can use standard protocols

18:15.000 --> 18:18.000
on the server which is supposed to work in Russia.

18:18.000 --> 18:22.000
Then, it's sort of a application that was a long saga,

18:22.000 --> 18:24.000
and it was an evolution.

18:24.000 --> 18:27.000
So, in the beginning, it was enough to switch ports,

18:27.000 --> 18:29.000
then it was enough to switch application,

18:29.000 --> 18:31.000
mask.

18:31.000 --> 18:35.000
But then, they started to work very efficiently.

18:35.000 --> 18:38.000
So, several hours, and they detected,

18:38.000 --> 18:39.000
and they stopped it.

18:39.000 --> 18:40.000
They blocked.

18:40.000 --> 18:42.000
So, but for the whole year, it was possible to

18:42.000 --> 18:44.000
utilize Windows of opportunities.

18:44.000 --> 18:47.000
Then, widely, it's described in general,

18:47.000 --> 18:50.000
very challenging for gerend alike,

18:50.000 --> 18:53.000
but it's still possible to go through.

18:53.000 --> 18:56.000
So, how many of you to do ahead?

18:56.000 --> 18:57.000
Okay.

18:57.000 --> 18:59.000
So, then, regional and operator difference,

18:59.000 --> 19:01.000
are very important.

19:01.000 --> 19:03.000
If you have VPN provider,

19:03.000 --> 19:07.000
and you start to get the blocked request from your support,

19:07.000 --> 19:10.000
from your users in remote areas,

19:10.000 --> 19:15.000
then be prepared to get the same from the capital's very soon.

19:15.000 --> 19:19.000
So, that's recommendation for VPN providers,

19:19.000 --> 19:21.000
which, ideally, if you don't cover here,

19:21.000 --> 19:23.000
because I have less than one minute,

19:23.000 --> 19:27.000
important thing, fly under the radar as much as possible.

19:27.000 --> 19:30.000
Don't think that if you are detected,

19:30.000 --> 19:33.000
they can't find you, then they will go after you.

19:33.000 --> 19:35.000
The only way to fly under the radar,

19:35.000 --> 19:37.000
is to find nice false positives.

19:37.000 --> 19:40.000
And, that's kind of last.

19:40.000 --> 19:42.000
The future is dark, slight.

19:42.000 --> 19:45.000
So, I think that there are two scenarios for Russian internet

19:45.000 --> 19:46.000
and fusion.

19:46.000 --> 19:49.000
So, the one is most probable for, in my personal opinion,

19:49.000 --> 19:51.000
so this is quite beyond internet.

19:51.000 --> 19:54.000
So, that Russian internet will be totally disconnected

19:54.000 --> 19:56.000
from internet.

19:56.000 --> 19:58.000
And in this case, it will be end of the game,

19:58.000 --> 20:00.000
for VPN providers and Russian.

20:00.000 --> 20:02.000
For the reasons I described, in the case with North Korea.

20:03.000 --> 20:05.000
And the slightly better scenario,

20:05.000 --> 20:07.000
that it will be great China's far more.

20:07.000 --> 20:10.000
And in this case, it will just be more sophisticated

20:10.000 --> 20:11.000
more mature.

20:11.000 --> 20:14.000
But this terminology or a game will continue

20:14.000 --> 20:16.000
because if there is a connection,

20:16.000 --> 20:18.000
then there is a way to benefit it.

20:18.000 --> 20:20.000
So, that's it.

20:20.000 --> 20:22.000
I hope I managed to keep the time.

20:22.000 --> 20:23.000
Thank you.

20:23.000 --> 20:33.000
Thank you.

20:33.000 --> 20:40.000
Can you question this?

20:40.000 --> 20:43.000
Where was it?

20:43.000 --> 20:48.000
Test.

20:48.000 --> 20:49.000
Hello.

20:49.000 --> 20:51.000
Thanks for a very good presentation.

20:51.000 --> 20:56.000
How in this scenario, how does V2ray or X-ray

20:56.000 --> 21:00.000
VLS and reality protocols would work?

21:00.000 --> 21:02.000
That's exactly the point

21:02.000 --> 21:07.000
which I was not allowed to cover.

21:07.000 --> 21:10.000
But you have straight to the point.

21:10.000 --> 21:12.000
Okay, we're running out of time.

21:12.000 --> 21:13.000
I'm sorry.

