The KEY project uses a distributed node cluster architecture, and the system is deployed through a multi-node cluster. Currently, you are connected to a protective node, and the core service layer is protected by this architecture. What you accessed is only the protective node distributed by the server, not the actual server of the project. The purpose is to effectively protect the real server from being attacked and to improve access speed in various regions.

#KEY #keychain