安裝 Steam
登入
|
語言
簡體中文
日本語(日文)
한국어(韓文)
ไทย(泰文)
Български(保加利亞文)
Čeština(捷克文)
Dansk(丹麥文)
Deutsch(德文)
English(英文)
Español - España(西班牙文 - 西班牙)
Español - Latinoamérica(西班牙文 - 拉丁美洲)
Ελληνικά(希臘文)
Français(法文)
Italiano(義大利文)
Bahasa Indonesia(印尼語)
Magyar(匈牙利文)
Nederlands(荷蘭文)
Norsk(挪威文)
Polski(波蘭文)
Português(葡萄牙文 - 葡萄牙)
Português - Brasil(葡萄牙文 - 巴西)
Română(羅馬尼亞文)
Русский(俄文)
Suomi(芬蘭文)
Svenska(瑞典文)
Türkçe(土耳其文)
tiếng Việt(越南文)
Українська(烏克蘭文)
回報翻譯問題
Yes; and you don't need a potentially much more dangerous and susceptible HTTP connection for that. Because as you already point out: HTTPS connections would fail if the certificate doesn't match!
Specifically they would fail with a dedicated status that indicates the certificate isn't valid for the domain. Which is just about the clearest signal you can get that someone is trying to intercept your traffic.
And if the connection fails for other reasons, such as a transient loss of connectivity or transient down time, then the request would already fail at the transport level and you'd get an explicit status error which indicates that.
There is literally zero; z-e-r-o reason such a probe has to be done over plain-text HTTP.
https://developer.android.com/about/versions/11/features/captive-portal
https://www.chromium.org/chromium-os/chromiumos-design-docs/network-portal-detection/
https://support.mozilla.org/en-US/kb/captive-portal
https://captivebehavior.wballiance.com
Best guess is that it is how Steam determines that you are online or offline - can you connect to the valve servers or not.. that explains the zero content and plain http connection - since there is no data, there is no need for encryption.
It's as good as if they used a raw tcp / udp packet
This is where DNS CAA comes in to patch this type of issue.