欢迎来到环境100文库! | 帮助中心 分享价值,成长自我!

环境100文库

换一换
首页 环境100文库 > 资源分类 > PDF文档下载
 

Mysterium network (VPN)白皮书.pdf

  • 资源ID:3577       资源大小:1.41MB        全文页数:32页
  • 资源格式: PDF        下载权限:游客/注册会员/VIP会员    下载费用:10碳币 【人民币10元】
快捷注册下载 游客一键下载
会员登录下载
三方登录下载: 微信开放平台登录 QQ登录   微博登录  
下载资源需要10碳币 【人民币10元】
邮箱/手机:
温馨提示:
支付成功后,系统会自动生成账号(用户名和密码都是您填写的邮箱或者手机号),方便下次登录下载和查询订单;
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,既可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰   

Mysterium network (VPN)白皮书.pdf

Mysterium​ ​Network​ ​Project WHITEPAPER Release​ ​4 2017​ ​October Table​ ​of​ ​Contents 1.​ ​Motivation​ ​behind​ ​Mysterium 4 1.1.​ ​Mission​ ​Statement 4 1.2.​ ​Core​ ​Objectives 5 1.3.​ ​Mysterium​ ​Solution 5 1.4.​ ​Market​ ​driving​ ​forces 6 2.​ ​Token​ ​Mechanism 8 3.​ ​Plat​ ​layers 9 3.1.​ ​Decentralised​ ​Services​ ​Infrastructure​ ​and​ ​Databases​ ​Layers 10 3.2.​ ​Service​ ​Providers​ ​Layer 10 3.3.​ ​Service​ ​Clients​ ​Layer 10 4.​ ​Roadmap 10 4.1.​ ​Competitive​ ​Analysis 10 4.2.​ ​Funding​ ​Breakdown 11 4.2.1.​ ​Core​ ​Development​ ​–​ ​40 11 4.2.2.​ ​Operational​ ​–​ ​25 11 4.2.3.​ ​Marketing​ ​and​ ​Sales​ ​–​ ​25 11 4.2.4.​ ​Legal​ ​and​ ​Compliance​ ​–​ ​10 11 4.3.​ ​Development​ ​Roadmap 11 4.3.1.​ ​Phase​ ​I 11 4.3.2.​ ​Phase​ ​II 13 5.​ ​Token​ ​Creation​ ​Details 13 5.1.​ ​MYST​ ​Creation​ ​Ratios 14 5.2.​ ​Additional​ ​MYST 14 5.2.1.​ ​Future​ ​Funding 14 5.2.2.​ ​Founders,​ ​Foundation,​ ​Bounty​ ​program​ ​and​ ​Advisors 14 5.2.3.​ ​Seed​ ​Participants 14 5.2.4.​ ​Example​ ​of​ ​Token​ ​Structure​ ​after​ ​Creation​ ​is​ ​over 15 6.​ ​Mysterium​ ​Architecture 16 1 6.1.​ ​Technical​ ​Overview 16 6.1.1.​ ​Core​ ​components 17 6.2.​ ​Service​ ​Provisioning 17 6.3.​ ​Identity​ ​Service 17 6.3.1.​ ​Registered​ ​Identity​ ​Value 18 6.3.2.​ ​Cryptographic​ ​Mechanisms 19 6.4.​ ​Service​ ​Discovery 19 6.4.1.​ ​Outdated​ ​Service​ ​Announcement​ ​Handling 20 6.4.2.​ ​Service​ ​Proposal 20 6.4.3.​ ​Types​ ​of​ ​Services 21 6.4.4.​ ​Service​ ​Selection 21 6.5.​ ​Payments​ ​Handling 22 6.5.1.​ ​Accounts 22 6.5.2.​ ​Deposits 22 6.5.3.​ ​Issuing​ ​Promises 23 6.5.4.​ ​Clearing​ ​of​ ​Promises 23 6.5.5.​ ​Withdrawal 25 6.5.6.​ ​Risk​ ​Management 25 6.6.​ ​Messaging​ ​Between​ ​Nodes 26 6.6.1.​ ​Dialogues 26 6.6.2.​ ​Payment​ ​Scheme 27 6.6.3.​ ​Service​ ​sessions 29 7.​ ​Contact 31 2 cutive​ ​Summary Privacy​ ​-​ ​most​ ​of​ ​us​ ​think​ ​as​ ​if​ ​it’s​ ​a​ ​given​ ​fact​ ​of​ ​life,​ ​but​ ​behind​ ​the​ ​scenes​ ​there​ ​is​ ​a​ ​race​ ​going on​ ​with​ ​its​ ​participants​ ​secretly​ ​trying​ ​to​ ​get​ ​into​ ​as​ ​much​ ​of​ ​our​ ​private​ ​lives,​ ​as​ ​is​ ​possible. Today,​ ​as​ ​Internet​ ​users,​ ​we​ ​are​ ​being​ ​restricted​ ​in​ ​ways​ ​we​ ​are​ ​allowed​ ​to​ ​use​ ​services​ ​and applications​ ​due​ ​to​ ​censorship​ ​employed​ ​by​ ​various​ ​agenda​ ​groups​ ​from​ ​all​ ​over​ ​the​ ​world.​ ​It comes​ ​to​ ​us​ ​in​ ​many​ ​s. Nation​ ​states​ ​consistently​ ​monitor​ ​the​ ​Internet​ ​traffic​ ​so​ ​they​ ​can​ ​construct​ ​political​ ​profiles​ ​of​ ​its citizens.​ ​In​ ​such​ ​a​ ​paradigm,​ ​dissent​ ​becomes​ ​dangerous,​ ​and​ ​honest​ ​political​ ​discord​ ​in​ ​some places​ ​-​ ​an​ ​impossibility. In​ ​a​ ​similar​ ​manner,​ ​content​ ​and​ ​Internet​ ​Service​ ​Providers​ ​have​ ​become​ ​unhinged​ ​in​ ​their objective​ ​to​ ​monitor,​ ​track​ ​and​ ​profile​ ​every​ ​user​ ​across​ ​the​ ​Internet.​ ​The​ ​daily​ ​Internet​ ​activity, communications​ ​and​ ​habits​ ​of​ ​every​ ​user​ ​are​ ​consolidated​ ​and​ ​sold​ ​to​ ​advertisers​ ​and​ ​basically any​ ​willing​ ​buyers.​ ​Such​ ​transactions​ ​occur​ ​with​ ​little​ ​to​ ​no​ ​conscious​ ​consent​ ​of​ ​the​ ​users​ ​and with​ ​a​ ​complete​ ​disregard​ ​for​ ​any​ ​notion​ ​of​ ​personal​ ​privacy. Access​ ​to​ ​content​ ​is​ ​being​ ​restricted​ ​by​ ​its​ ​content​ ​providers​ ​to​ ​certain​ ​areas​ ​due​ ​to​ ​Intellectual Property​ ​limitations​ ​or​ ​purely​ ​because​ ​of​ ​low​ ​valuation​ ​of​ ​users​ ​from​ ​these​ ​particular​ ​locations. Today​ ​there​ ​is​ ​still​ ​a​ ​lack​ ​of​ ​investments​ ​into​ ​research,​ ​implementation​ ​and​ ​maintenance​ ​of​ ​tools capable​ ​of​ ​restoring​ ​privacy​ ​to​ ​the​ ​Internet​ ​users.​ ​These​ ​circumstances​ ​create​ ​the​ ​necessity​ ​for creation​ ​of​ ​protective​ ​measures​ ​designed​ ​to​ ​preserve​ ​the​ ​open​ ​and​ ​unobstructed​ ​nature​ ​of​ ​the Internet. With​ ​the​ ​invention​ ​and​ ​maturity​ ​of​ ​powerful​ ​peer-to-peer​ ​computing​ ​technologies​ ​such​ ​as Ethereum​ ​and​ ​Bitcoin,​ ​the​ ​capability​ ​to​ ​employ​ ​blockchain​ ​technology​ ​in​ ​the​ ​development​ ​of trustless​ ​censorship​ ​evasion​ ​mechanisms​ ​becomes​ ​feasible. Mysterium​ ​team​ ​believes​ ​in​ ​and​ ​strives​ ​to​ ​build​ ​a​ ​future​ ​that​ ​respects​ ​our​ ​privacy,​ ​which​ ​will result​ ​in​ ​disrupting​ ​existing​ ​and​ ​creating​ ​new​ ​industries​ ​in​ ​the​ ​near​ ​to​ ​long​ ​term.​ ​Looking forward,​ ​we​ ​expect​ ​Mysterium​ ​Network​ ​plat​ ​to​ ​​ ​the​ ​basis​ ​for​ ​a​ ​world​ ​of​ ​open​ ​access​ ​to content​ ​and​ ​applications​ ​to​ ​all​ ​citizens​ ​of​ ​this​ ​planet​ ​without​ ​fear​ ​of​ ​censorship​ ​or​ ​of​ ​someone secretly​ ​looking​ ​over​ ​our​ ​shoulder. 3 1.​ ​Motivation​ ​behind​ ​Mysterium 1.1.​ ​Mission​ ​Statement “Our​ ​mission​ ​is​ ​to​ ​create​ ​distributed,​ ​trustless​ ​and​ ​sustainable​ ​network​ ​-​ ​providing​ ​open​ ​access and​ ​privacy​ ​to​ ​all​ ​Internet​ ​users.” The​ ​Internet​ ​in​ ​its​ ​current​ ​state​ ​is​ ​neither​ ​open​ ​nor​ ​private.​ ​At​ ​Mysterium​ ​we​ ​believe​ ​censorship and​ ​spying​ ​is​ ​both​ ​unethical​ ​and​ ​unnecessary,​ ​which​ ​are​ ​s​ ​of​ ​intimidation​ ​and​ ​social​ ​control impeding​ ​technological​ ​and​ ​social​ ​progress. It’scommonlybelievedthat if youneedencryption-youmustbehidingsomething,assuming it’s something illegal. Hereisashort list of 6commonlyusedandverylegitimateusecases where​ ​strong​ ​encryption​ ​is​ ​a​ ​proven​ ​solution 1.travelersvisitingplaceswheretheirpersonalemailsocialmediaaccountsarecensoredor blocked​ ​by​ ​the​ ​local​ ​authorities; 2. communications in your private life about your political, religious, gender / orientation, entertainment​ ​preferences​ ​that​ ​could​ ​result​ ​in​ ​discrimination​ ​or​ ​reprisals​ ​against​ ​you; 3.​ ​businesses​ ​needing​ ​privacy​ ​to​ ​avoid​ ​corporate​ ​espionage; 4. journalistscommunicatingwithwhistleblowers,especiallywhenthesourceiswithinthevery government​ ​or​ ​corporation​ ​that​ ​controls​ ​the​ ​communication​ ​network​ ​being​ ​used; 5.dissidentsandactivistsneedingtoorganizemeetingsandprotestswithoutbeingspiedonby the​ ​powers​ ​they​ ​plan​ ​to​ ​protest; 6. citizens, protesters and journalists needingtosendreportsoneventsabout humanrights violationstotheoutsideworldnewsagencies-astheyoccur.Torequesthelportointhe outsideworld,whilebeingsurethatthelocalpowersthatbewillactivelytrytosuppressallkinds of​ ​communication. Thus​ ​we​ ​intend​ ​to​ ​develop​ ​the​ ​Mysterium​ ​Node​ ​Network,​ ​as​ ​an​ ​open​ ​and​ ​distributed​ ​peer​ ​to peer​ ​plat​ ​embedded​ ​with​ ​sustainable​ ​incentivization​ ​protocols,​ ​while​ ​using​ ​continuously evolving​ ​censorship​ ​evasion​ ​mechanisms,​ ​developed​ ​by​ ​the​ ​community.​ ​Once​ ​developed​ ​and released,​ ​Mysterium​ ​technology​ ​will​ ​enable​ ​anyone​ ​around​ ​the​ ​world​ ​to​ ​both​ ​provide​ ​and receive​ ​access​ ​to​ ​content​ ​and​ ​privacy,​ ​removing​ ​censorship​ ​imposed​ ​by​ ​third​ ​parties. We’ve​ ​spent​ ​a​ ​lot​ ​of​ ​time​ ​discussing​ ​the​ ​ethics​ ​of​ ​creating​ ​Mysterium​ ​tools​ ​which​ ​allow​ ​the avoidance​ ​of​ ​censorship.​ ​We​ ​believe​ ​the​ ​cost​ ​of​ ​censoring​ ​content​ ​is​ ​not​ ​worth​ ​the​ ​supposed benefits​ ​assumed​ ​lower​ ​crime,​ ​higher​ ​profits​ ​of​ ​certain​ ​corporations,​ ​stronger​ ​political​ ​power, etc..​ ​as​ ​these​ ​ends​ ​can​ ​be​ ​reached​ ​by​ ​other,​ ​more​ ​ethical​ ​means.​ ​Most​ ​of​ ​the​ ​solutions​ ​are​ ​well known​ ​to​ ​censors​ ​and​ ​effective​ ​filtering​ ​is​ ​used​ ​to​ ​limit​ ​access.​ ​For​ ​example​ ​machine​ ​learning​ ​is 4 applied​ ​by​ ​censors​ ​to​ ​study​ ​Internet​ ​usage​ ​patterns​ ​and​ ​detecting​ ​unwarranted​ ​behaviours. 1.2.​ ​Core​ ​Objectives Phase​ ​I​ ​Building​ ​a​ ​Decentralized​ ​Network​ ​of​ ​VPN​ ​Nodes Our​ ​first​ ​goal​ ​is​ ​to​ ​completely​ ​decentralize​ ​VPN​ ​node​ ​network,​ ​by​ ​using​ ​technologies​ ​such​ ​as existing​ ​VPN​ ​and​ ​proxy​ ​protocols,​ ​Ethereum​ ​blockchain,​ ​smart​ ​contracts,​ ​state-channels, decentralized​ ​database​ ​solutions,​ ​privacy​ ​ensuring​ ​coins​ ​like​ ​Monero​ ​or​ ​Zcash​ ​and​ ​other solutions. This​ ​will​ ​be​ ​achieved​ ​throughout​ ​the​ ​development​ ​of​ ​Phase​ ​I,​ ​which​ ​is​ ​made​ ​up​ ​of​ ​3​ ​different stages​ ​see​ ​​5.​ ​Roadmap​.​ ​At​ ​the​ ​end​ ​of​ ​the​ ​3rd​ ​Stage​ ​of​ ​Phase​ ​I,​ ​a​ ​completely​ ​decentralized and​ ​open​ ​source​ ​VPN​ ​network​ ​with​ ​all​ ​of​ ​its​ ​functions​ ​also​ ​decentralized​ ​will​ ​be​ ​released.​ ​No single​ ​point​ ​of​ ​failure​ ​will​ ​be​ ​possible​ ​from​ ​this​ ​time​ ​forward. Phase​ ​II​ ​Building​ ​Mysterium​ ​Protocol​ ​-​ ​as​ ​standard In​ ​Phase​ ​II​ ​-​ ​our​ ​vision​ ​is​ ​to​ ​build​ ​Mysterium​ ​protocol​ ​capable​ ​of​ ​“dissolving”​ ​user​ ​data​ ​and sending​ ​it​ ​deep​ ​into​ ​the​ ​Network​ ​of​ ​Mysterium​ ​Nodes​ ​without​ ​the​ ​possibility​ ​of​ ​trace​ ​or censorship.​ ​The​ ​Network​ ​will​ ​take​ ​care​ ​of​ ​sending​ ​this​ ​shredded​ ​and​ ​encrypted​ ​data​ ​in​ ​an unrecognizable​ ​​ ​to​ ​the​ ​receiving​ ​end,​ ​where​ ​Mysterium​ ​Protocol​ ​will​ ​ensure​ ​this​ ​user​ ​data to​ ​be​ ​“reassembled”​ ​again. Mysterium​ ​protocol​ ​will​ ​eventually​ ​become​ ​a​ ​combination​ ​of​ ​different​ ​elements​ ​united​ ​into​ ​a coherent​ ​system. Once​ ​complete,​ ​this​ ​Protocol​ ​will​ ​ensure​ ​that​ ​user​ ​data​ ​cannot​ ​be​ ​overtaken​ ​neither​ ​by​ ​nodes nor​ ​by​ ​third​ ​parties. 1.3.​ ​Mysterium​ ​Solution Mysteriumaims to be fully decentralized, peer to peer based andserverlessnodenetwork, designedtoprovideprivacyrestoringtechniquestoitsuserswithfinancialincentivizationtoits node operators providers. Mysterium achieves this goal by utilizing already-existing technologiessuchasEthereumblockchain, smart contractsandadvancingtheirfeatureswith state-channels,evolvingmechanismsofpromises,combinedwithcensorship-evasionprotocols developed​ ​by​ ​the​ ​community​ ​acting​ ​as​ ​applications​ ​of​ ​the​ ​network. Once​ ​Phase​ ​I​ ​Stage​ ​1​ ​is​ ​developed​ ​and​ ​released​ ​-​ ​this​ ​Network​ ​will​ ​protect​ ​user​ ​privacy​ ​and data,​ ​while​ ​enabling​ ​all​ ​users​ ​to​ ​share​ ​their​ ​spare​ ​bandwidth​ ​access​ ​with​ ​those​ ​who​ ​need​ ​this open​ ​access​ ​in​ ​exchange​ ​for​ ​financial​ ​compensation. 5 Mysterium​ ​network​ ​will​ ​act​ ​as​ ​a​ ​decentralized​ ​marketplace​ ​between​ ​providers​ ​and​ ​consumers participating​ ​in​ ​building​ ​and​ ​maintaining​ ​this​ ​infrastructure.​ ​The​ ​costs​ ​of​ ​providers​ ​will​ ​be​ ​paid​ ​by consumers​ ​using​ ​cryptographic​ ​currencies. The​ ​development​ ​of​ ​the​ ​technology,​ ​its​ ​capabilities​ ​and​ ​functionality​ ​will​ ​come​ ​in​ ​several​ ​phases to​ ​minimise​ ​risk,​ ​learn​ ​from​ ​early​ ​experience​ ​and​ ​to​ ​benefit​ ​from​ ​development​ ​of​ ​complementary technologieseg.​ ​state-channels.​ ​The​ ​decentralisation​ ​of​ ​all​ ​functions​ ​maintaining​ ​the​ ​network will​ ​be​ ​achieved​ ​by​ ​the​ ​end​ ​of​ ​the​ ​Phase​ ​I,​ ​Stage​ ​3​ ​see​ ​​5.​ ​Roadmap​. Participants​ ​of​ ​the​ ​Mysterium​ ​Token​ ​Sale​ ​will​ ​gain​ ​access​ ​to​ ​tokens​ ​which​ ​will​ ​​ ​the foundation​ ​to​ ​all​ ​transactions​ ​happening​ ​within​ ​the​ ​network.​ ​The​ ​network​ ​we​ ​are​ ​building​ ​will have​ ​opportunities​ ​for​ ​various​ ​levels​ ​of​ ​development​ ​by​ ​entrepreneurs​ ​and​ ​communities​ ​after​ ​it has​ ​been​ ​deployed.​ ​The​ ​Network​ ​will​ ​also​ ​be​ ​open​ ​to​ ​applications​ ​to​ ​make​ ​censorship​ ​less effective,​ ​ways​ ​to​ ​make​ ​payments​ ​easier​ ​and​ ​more​ ​efficient​ ​and​ ​new​ ​networking​ ​related services​ ​to​ ​be​ ​made​ ​available​ ​by​ ​reusing​ ​infrastructure​ ​and​ ​protocols​ ​developed​ ​by​ ​Mysterium Foundation. VPN-like​ ​services​ ​on​ ​Mysterium​ ​network​ ​will​ ​be​ ​available​ ​early​ ​into​ ​Phase​ ​I,​ ​after​ ​completion​ ​of Ist​ ​Stage.​ ​VPN​ ​service​ ​provided​ ​by​ ​the​ ​Network​ ​in​ ​this​ ​stage​ ​will​ ​be​ ​comparable​ ​with​ ​the​ ​and may​ ​even​ ​improve​ ​upon​ ​existing​ ​Centralized​ ​Virtual​ ​Private​ ​Networking​ ​services.​ ​Mysterium market​ ​model​ ​will​ ​result​ ​in​ ​creating​ ​a​ ​VPN​ ​service​ ​which​ ​is​ ​both​ ​competitive​ ​and​ ​almost​ ​infinitely scalable,​ ​giving​ ​other​ ​entities​ ​e.g.​ ​other​ ​VPN​ ​providers​ ​or​ ​app​ ​developers​ ​an​ ​option​ ​to​ ​buy VPN​ ​service​ ​from​ ​the​ ​Network,​ ​integrating​ ​it​ ​into​ ​their​ ​solutions.​ ​This​ ​competitiveness​ ​comes from​ ​the​ ​open​ ​nature​ ​of​ ​the​ ​network​ ​and​ ​the​ ​ease​ ​with​ ​which​ ​anyone​ ​can​ ​earn​ ​money​ ​by​ ​joining it​ ​as​ ​a​ ​VPN​ ​service​ ​provider.​ ​Further​ ​improvements​ ​and​ ​new​ ​applications​ ​will​ ​follow​ ​in​ ​later stages,​ ​with​ ​complete​ ​decentralization​ ​achieved​ ​by​ ​the​ ​end​ ​of​ ​Stage​ ​3. 1.4.​ ​Market​ ​driving​ ​forces Everyday​ ​more​ ​and​ ​more​ ​of​ ​our​ ​lives​ ​are​ ​transferred​ ​onto​ ​the​ ​Net,​ ​which​ ​inevitably​ ​creates​ ​more opportunity​ ​for​ ​our​ ​data​ ​to​ ​be​ ​stolen,​ ​hacked,​ ​filtered​ ​or​ ​abused. Research​ ​shows​ ​that​ ​increased​ ​data​ ​vulnerability​ ​is​ ​one​ ​of​ ​the​ ​main​ ​forces​ ​driving​ ​an​ ​expanding market​ ​for​ ​Internet​ ​privacy​ ​and​ ​security​ ​solutions 1 Government​ ​legislation There​ ​is​ ​a​ ​visible​ ​trend​ ​for​ ​governments​ ​to​ ​intrude​ ​into​ ​our​ ​private​ ​lives.​ ​As​ ​more​ ​of​ ​our​ ​lives​ ​are on​ ​the​ ​Internet​ ​this​ ​intrusion​ ​will​ ​only​ ​increase. 2 Western​ ​countries​ ​become​ ​accustomed​ ​to​ ​VPN​ ​services Currently,​ ​the​ ​main​ ​countries​ ​using​ ​VPN​ ​are​ ​located​ ​in​ ​Asia.​ ​However,​ ​following​ ​recent​ ​changes in​ ​western​ ​government​ ​policies,​ ​the​ ​number​ ​of​ ​people​ ​looking​ ​for​ ​Internet​ ​privacy​ ​solutions​ ​in the​ ​Western​ ​world​ ​is​ ​rapidly​ ​increasing. 6 3 Risk​ ​of​ ​c​yber​ ​threats​ ​grows Every​ ​year​ ​the​ ​number​ ​of​ ​cyberattacks​ ​increases​ ​followed​ ​by​ ​a​ ​greater​ ​awareness​ ​of​ ​the​ ​need for​ ​countermeasures.​ ​Companies​ ​and​ ​individuals​ ​tend​ ​to​ ​invest​ ​and​ ​change​ ​their​ ​online behaviour​ ​in​ ​response​ ​to​ ​cyberattacks,​ ​resulting​ ​in​ ​rapid​ ​expansion​ ​of​ ​VPN​ ​market. 4 Freelance​ ​workforce​ ​needs​ ​safe​ ​connection​ ​to​ ​corporate​ ​servers Every​ ​year​ ​more​ ​work​ ​is​ ​done​ ​by​ ​freelancers.​ ​Having​ ​a​ ​safe​ ​connection​ ​to​ ​corporate​ ​servers becomes​ ​more​ ​urgent.​ ​Small​ ​businesses​ ​also​ ​require​ ​secure​ ​communications,​ ​but​ ​creating​ ​their own​ ​VPN​ ​can​ ​be​ ​a​ ​financial​ ​challenge. Google​ ​trends​ ​graph​ ​for​ ​VPN​ ​days​ ​after​ ​USA​ ​Congress​ ​Over

注意事项

本文(Mysterium network (VPN)白皮书.pdf)为本站会员(华夏使者)主动上传,环境100文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知环境100文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2017 环境100文库版权所有
国家工信部备案号:京ICP备16041442号-6

收起
展开