![]() If you have more information to report please leave them here. Microsoft's AV detects V2Ray as "Trojan:Win32/Wacatac.C!ml", "Program:Win32/Wacapew.C!ml" each time we release a new version, and I have to manually contact them each time to remove it from the malware database. We are aware some anti-virus software detects V2Ray as malware, which it isn't, but we can't afford to pay the fee needed to make them not detect V2Ray as malware. ![]() Thanks LocalAddr() in UDP workers will now return correct local addr. Minor fixes from v2fly/v2ray-core#12 v2fly/v2ray-core#10 included. Pay attention to this change if you are designing a "V2Ray Panel", "Airport" or "V2Ray Service Provider". Unless the server is under attack, a well-behaved client is not influenced. ![]()
0 Comments
Leave a Reply. |