<?xml version="1.0"?>
<rss version="2.0"><channel><title>AirVPN Announcements</title><link>https://airvpn.org/feed/announcements/</link><description>Announcements</description><language>en</language><item><title>[ENDED] End of season sale</title><link><![CDATA[https://airvpn.org/forums/topic/79530-ended-end-of-season-sale/?do=findComment&comment=261554]]></link><description><![CDATA[Hello! 
	 



	We're very glad to announce a special promotion on our long term Premium plans for the end of Summer or Winter, according to the hemisphere you live in.



	



	 
 


	You can get prices as low as 2.06 €/month with a three years plan, which is a 70% discount when compared to monthly plan price of 7 €.
 
 


	If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. 
	 
	Please check plans special prices on https://airvpn.org and https://airvpn.org/buy 
	 
 


	Promotion expires on 2026-03-31 UTC.
 


	 
	Kind regards &amp; datalove 
	AirVPN Staff]]></description><pubDate>Wed, 11 Mar 2026 10:06:32 +0000</pubDate></item><item><title>Eddie Desktop Edition 2.25 beta released</title><link><![CDATA[https://airvpn.org/forums/topic/79305-eddie-desktop-edition-225-beta-released/?do=findComment&comment=261184]]></link><description><![CDATA[Hello!



	
		
			
				
					 
				 

				
					We're very glad to inform you that a new Eddie Air client version has been released: 2.25 beta. It is ready for public beta testing.
				 

				
					 
				 

				
					How to test our experimental release:
				 

				
					
						Go to download page of your OS
					
					
						Click the button Switch to EXPERIMENTAL
					
					
						Download and install
					
				
				 
				This is a new version of Eddie Desktop (Windows / Linux / MacOS).
				
					The primary purpose of this release is to address several specific issues, including a significant CVE affecting macOS only. We expect it to be promoted to STABLE shortly.
				 

				
					We are currently working on a substantial codebase refactoring aimed at evolving Eddie Desktop into a more modern client.
				 
				 
				 
				Main changelog:
				
					
						[change] [all] Encrypted profiles: save with PBKDF2-SHA256; backward-compatible decrypt of SHA-1 profiles
					
					
						[bugfix] [linux] Fix for distro without systemd
					
					
						[change] [all] Fine-tuning of "netlock.allow_ping" option
					
					
						[new] [all] "netlock.allow_ndp", default true
					
					
						[change] [all] OpenVPN 2.6.17
					
					
						[bugfix] [macOS] CVE-2025-14979: fix (shortcut-cli removed)
					
					
						[change] [windows] hardened SSH key file permissions to reliably remove orphaned ACL entries and prevent "bad permissions" errors
					
					
						[change] [windows] Updated projects and scripts to Visual Studio 2026
					
				
				 
				Kind regards &amp; datalove 
				AirVPN Staff]]></description><pubDate>Wed, 25 Feb 2026 17:34:23 +0000</pubDate></item><item><title>Six new 10 Gbit/s servers available (UK)</title><link><![CDATA[https://airvpn.org/forums/topic/79279-six-new-10-gbits-servers-available-uk/?do=findComment&comment=261152]]></link><description><![CDATA[Hello!
 


	
		
			
				
					 
					We're very glad to inform you that six new 10 Gbit/s full duplex servers located in Manchester and London (UK) are available: Amansinaya, Arber, Baiduri (London), Bubup, Cebo, Caophraya (Manchester). The first three mentioned servers are located in London, the other ones in Manchester. 
					 
					This addition replaces any previous UK 1 Gbit/s server in order to upgrade the whole UK infrastructure to 10 Gbit/s only servers, with per server 10 Gbit/s dedicated lines and ports, and modern hardware as announced here: 
					https://airvpn.org/forums/topic/79154-uk-infrastructure-upgrade-to-10-gbits-full-duplex/ 
					 
					The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator"). 
					 
					The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. 
					 
					Full IPv6 support is included as well. 
					 
					As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. 
					 
					You can check the status as usual in our real time servers monitor . Click a server name to display specific server stats. 
					 
					Do not hesitate to contact us for any information or issue. 
					Kind regards &amp; datalove 
					AirVPN Staff]]></description><pubDate>Tue, 24 Feb 2026 17:30:40 +0000</pubDate></item><item><title>UK Infrastructure upgrade to 10 Gbit/s full duplex</title><link><![CDATA[https://airvpn.org/forums/topic/79154-uk-infrastructure-upgrade-to-10-gbits-full-duplex/?do=findComment&comment=260881]]></link><description><![CDATA[Hello! 
	 
	We are very pleased to inform you that we are taking the necessary steps to completely renovate our infrastructure in the United Kingdom. 
	 
	The current servers will be dismissed and replaced by six 10 Gbit/s servers with newer and much more powerful hardware. Each 10 Gbit/s server will be connected to a full duplex 10 Gbit/s dedicated line and port. Each new server replaces 2.5 current 1 Gbit/s servers in order to increase remarkably the available bandwidth per connected client. 
	 
	At the end of the upgrade, UK will offer a theoretical peak of 60 Gbit/s (full duplex) instead of the current 15 Gbit/s, through adequately powerful servers. 
	 
	According to our plan, three servers will be located in London and three in Manchester. The new servers will start operations around 19-22 February 2026. Current 1 Gbit/s servers will cease operations on the night between 28 February and 01 March (UTC). Any plan changes and/or delays will be communicated promptly. 
	 
	UPDATE 2026-02-24: the servers are almost ready and will be available not later than 2026-02-25 (UTC). Because of the unforeseen delay, we are considering to extend the current 1 Gbit/s UK servers operations up to the end of March 2026. 
	 
	UPDATE 2026-02-25: all the new servers are operational and the old servers will be decommissioned on 2026-02-28 (UTC). 
	 
	Kind regards &amp; datalove 
	AirVPN Staff]]></description><pubDate>Fri, 13 Feb 2026 10:58:04 +0000</pubDate></item><item><title>Three new 10 Gbit/s servers available (CA)</title><link><![CDATA[https://airvpn.org/forums/topic/78643-three-new-10-gbits-servers-available-ca/?do=findComment&comment=260037]]></link><description><![CDATA[Hello!
 


	
		
			
				
					 
					We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Toronto (Ontario), Canada, are available: Castula, Chamukuy and Elgafar.  
					 
					The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator"). 
					 
					The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. 
					 
					Full IPv6 support is included as well. 
					 
					As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. 
					 
					You can check the status as usual in our real time servers monitor : 
					https://airvpn.org/servers/Castula 
					https://airvpn.org/servers/Chamukuy 
					https://airvpn.org/servers/Elgafar/ 
					 
				 

				
					Do not hesitate to contact us for any information or issue. 
					 
					Kind regards &amp; datalove 
					AirVPN Staff]]></description><pubDate>Wed, 07 Jan 2026 16:50:50 +0000</pubDate></item><item><title>New 10 Gbit/s server available (US)</title><link><![CDATA[https://airvpn.org/forums/topic/78458-new-10-gbits-server-available-us/?do=findComment&comment=259772]]></link><description><![CDATA[Hello!
 


	
		
			
				
					 
					We're very glad to inform you that a new 10 Gbit/s full duplex server located in Los Angeles, California, is available: Revati. 
					 
					The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator"). 
					 
					The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. 
					 
					Revati supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. 
					Full IPv6 support is included as well. 
					 
					As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. 
					 
					You can check the status as usual in our real time servers monitor , by clicking the server name. Direct link: https://airvpn.org/servers/Revati 
					 
					Do not hesitate to contact us for any information or issue. 
					 
					Kind regards &amp; datalove 
					AirVPN Staff]]></description><pubDate>Tue, 30 Dec 2025 10:39:23 +0000</pubDate></item><item><title>[ENDED] Christmas Deal 2025</title><link><![CDATA[https://airvpn.org/forums/topic/78014-ended-christmas-deal-2025/?do=findComment&comment=259068]]></link><description><![CDATA[Hello! 
	  
	We're very glad to announce a special promotion on our long terms Premium plans. 
	  
	You can get prices as low as 2.20 €/month with a three years plan, which is a 68% discount when compared to monthly plan price of 7 €. 
	 
	You can also send an AirVPN plan as a gift: you have the option to print or send a colorful, dedicated picture with the code to activate the plan. You can do it in your account Client Area -&gt; Your membership: Purchase and credit -&gt; Print X-Mas after you have bought a coupon. 
	 
 


	 
 


	



	 
 


	If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day.



	 
	 
	Please check plans special prices on https://airvpn.org and https://airvpn.org/buy --- Promotion will end on January the 8th, 2026 (UTC). 
	 
 


	AirVPN does not inspect and/or log client traffic and offers:
 


	
		five simultaneous connections per account (additional connection slots available if needed)
	
	
		inbound remote port forwarding
	
	
		unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2100 Mbit/s with WireGuard
	
	
		flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level.
	
	
		powerful API
	
	
		IPv6 full support
	
	
		comfortable management of your client certificates and keys
	
	
		AES-GCM and ChaCha20 OpenVPN ciphers on all servers
	
	
		Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys
	
	
		internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported.
	
	
		free and open source software
	
	
		client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS
	
	
		GPS spoofing on Android application
	



	 
	AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows. 
	Promotion due to end on 2026-01-08 (UTC). 
	 
 


	Kind regards &amp; datalove 
	AirVPN Staff]]></description><pubDate>Tue, 16 Dec 2025 09:12:40 +0000</pubDate></item><item><title>Eddie Android edition 4.0.0 preview available</title><link><![CDATA[https://airvpn.org/forums/topic/77633-eddie-android-edition-400-preview-available/?do=findComment&comment=258445]]></link><description><![CDATA[Hello! 
	 
 


	We're very glad to announce that Eddie Android edition 4.0.0 preview is available



	2026-11-28: Eddie Android edition 4.0.0 Beta 1 is available 
	2026-01-14: Eddie Android edition 4.0.0 Beta 2 is available 
	2026-03-04: Eddie Android edition 4.0.0 Beta 3 is available 
	 
 


	2026-03-27: Eddie Android edition 4.0.0 Release Candidate 1 is available



	 
	This is a major update: for the first time Eddie Android edition features AmneziaWG complete support.



	 
	Eddie Android edition is a fully integrated with AirVPN, free and open source client allowing comfortable connections to AirVPN servers and generic VPN servers offering compatible protocols. Eddie 4.0.0 aims primarily at adding, besides the already available OpenVPN and WireGuard, a thorough and comfortable AmneziaWG support.  
	 
	AmneziaWG is a free and open source fork of WireGuard by Amnezia inheriting the architectural simplicity and high performance of the original implementation, but eliminating the identifiable network signatures that make WireGuard easily detectable by Deep Packet Inspection (DPI) systems. It can operate in several different ways, including a fallback, "compatibility mode" with WireGuard featuring anyway various obfuscation techniques. 
	 
 


	What's new in Eddie 4.0.0

 


	
		AmneziaWG support
	
	
		Amnezia WireGuard API
	
	
		stronger anti-blocking logic:
		
			
				ability to log in to the service and download AirVPN infrastructure and user data while connected through a profile with a specific option on the left pane
			
			
				ability to read and use local user data when bootstrap servers are unreachable
			
		
	
	
		CPS packets database of 30+ real websites, currently allowing accurate QUIC + HTTP/3 traffic mimicry to and from real web sites through AmneziaWG CPS. Each entry is easily selectable and identified by a clear label
	
	
		support for wrapping both IPv4 and IPv6 traffic over an IPv6 tunnel with WireGuard and AmneziaWG (previously available only with OpenVPN)
	
	
		new "Open with..." option on top of the usual "Share" (now renamed "Export") option to manage and export comfortably generated profiles on any Android version with any suitable application
	
	
		updated AmneziaWG parameters allowed ranges 
	
	
		support of latest AmneziaWG padding features
	
	
		vastly improved NetworkMonitor and Tile Service
	
	
		updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries
	
	
		full compatibility from Android 5.1 to Android 16, including Android TV
	
	
		bug fixes
	
	
		see the complete changelog below
	



	 
 


	AmneziaWG overview

 


	From the official documentation: https://docs.amnezia.org/documentation/amnezia-wg AmneziaWG offers:
 


	
		
			Dynamic Headers for All Packet Types (compatibility with WireGuard: YES)
		 

		
			During tunnel initialization, the library generates a set of random constants applied to each of the four WireGuard packet formats: Init, Response, Data, Under‑Load. These constants:
		 

		
			As a result, no two clients have identical headers, making it impossible to write a universal DPI rule. 
			 
		 

		
			
				Replace predictable WireGuard packet identifiers;
			
			
				Shift offsets of Version/Type fields;
			
			
				Modify reserved bits.
			
		
	
	
		
			Handshake Length Randomization and message padding (compatibility with WireGuard: NO)
		 

		
			In WireGuard, the Init packet is exactly 148 bytes, and the Response packet is exactly 92 bytes. AmneziaWG adds message paddings:
		 

		
			
				S1: int - padding of handshake initial message
			
			
				S2: int - padding of handshake response message
			
			
				S3: int - padding of handshake cookie message
			
			
				S4: int - padding of transport messages 
				 
				Offsets of the remaining fields are automatically adjusted, and MAC tags are recalculated accordingly. In order to keep backward compatibility with WireGuard, S1, S2, S3 and S4 must be set to 0. 
			
		
	

 


	
		
			Obfuscation Packets I1-I5 (Signature Chain) &amp; CPS (Custom Protocol Signature) (compatibility with WireGuard: partial, with fallback) 
			Before initiating a "special" handshake (every 120 seconds), the client may send up to five different UDP packets fully described by the user in the CPS format. In this way AmneziaWG can mimic perfectly QUIC, DNS and other protocols adding powerful methods to circumvent blocks. QUIC is particularly interesting as HTTP/3 is built on it and currently, from Chrome and other compatible browsers, 50% of traffic to/from Google is QUIC traffic. Therefore, blocking QUIC may have major disruptions for any ISP. Note that a CPS database of 30+ real web sites is available in Eddie Android edition: you can activate CPS mimicking traffic to real web sites with a tap. Eddie will take care to compile properly Amnezia's In parameters for accurate mimicry. 
			 
		 
	
	
		
			Junk‑train (Jc) (compatibility with WireGuard: YES)
		 

		
			Immediately following the sequence of I-packets, a series Jc of pseudorandom packets with lengths varying between Jmin and Jmax is sent. These packets blur the timing and size profile of the session start, significantly complicating handshake detection. 
			 
		 
	
	
		
			Under‑Load Packet (compatibility with WireGuard: YES)
		 

		
			In WireGuard, a special keep-alive packet (“Under-Load”) is used to bypass NAT timeouts. AmneziaWG replaces its fixed header with a randomized one, the value of which can be set manually. This prevents DPI from filtering short ping packets, ensuring stable tunnel connections, especially on mobile networks. 
			 
		 
	



	 
 


	How to use Eddie with AmneziaWG

 
To enable AmneziaWG mode, just tap the connection mode available in the main and other views. It will rotate between WireGuard, AmneziaWG and OpenVPN. Set it to AmneziaWG. In its default AmneziaWG mode, Eddie will use all the possible obfuscation, except protocol mimicking, that keeps WireGuard compatibility, thus allowing connections to AirVPN servers. The default settings choice was possible thanks to the invaluable support of persons living in countries where VPN blocks are widespread. Such settings have been tested as working and capable to bypass the current blocking methods in various countries. You may consider to modify them if they are ineffective to bypass "your" specific blocks. 
 

	In Settings &gt; Advanced, you will find, at the bottom of the page, a new "Custom Amnezia WG directives" item. By tapping it you will summon a dialog that will let you customize any possible AmneziaWG parameter. 
	 
	You can maintain backward compatibility with WireGuard in the dialog WireGuard section, or enable the full AmneziaWG support in the Amnezia section, which is not compatible (at the moment) with AirVPN WireGuard servers. This mode will be mostly valuable in a not distant future, when AirVPN servers will start to support AmneziaWG natively. You may also enable QUIC or DNS mimicking for additional obfuscation efficacy.  
	 
	In order to maintain WireGuard backward compatibility, with or without QUIC or DNS mimicking, you must set: 
	S1 = S2 = S3 = S4 = 0 
	Hn ∈ {1, 2, 3, 4} 
	H1 ≠ H2 ≠ H3 ≠ H4 
	 
	Furthermore, do not exceed the valid limit of the J parameters (anyway Eddie will not let you do it). In this preview version, Eddie's formal control of the input data is based on the following document. We strongly recommend you read it if you need to modify manually parameters: 
	https://github.com/amnezia-vpn/amneziawg-linux-kernel-module?tab=readme-ov-file#configuration 
	 
 


	Custom Protocol Signature with database included



	Working in AmneziaWG mode, Eddie implements QUIC and DNS mimicry and obfuscation packets for each specific "I" parameter (by using the corresponding "Generate" button). You can enable them with a tap on the proper buttons. You may mimic QUIC and DNS even to connect to WireGuard based servers. Please do not modify In parameters if you don't know exactly what you're doing. 
	 
	Eddie's CPS database is available at your fingertip for accurate mimicry of traffic to and from real web sites using HTTP/3 (other protocols may be added in the future), so you don't need to look for and enter specific sequences. Settings &gt; Advanced &gt; Custom AmneziaWG directives &gt; Enable CPS &gt; Presets &gt; select the web site whose traffic must be imitated . Currently, you can find a database that contains more than 30 actual packet signatures and sequences of real web sites. Select one and Eddie will adjust all the parameters automatically and will use them in the next AmneziaWG connection. 
	 
	When you enable QUIC mimicking and you maintain WireGuard backward compatibility, you add a powerful tool against blocks, because the first packets will be actual QUIC packets. AmneziaWG will fall back to WireGuard compatibility very soon. However, when DPI and SPI tools, and demultiplexers in general, identify the initial QUIC flow, most of them will be unable to detect a WireGuard flow for several minutes. This has been tested thoroughly with deep packet inspection on Linux and FreeBSD based machines by AirVPN staff. 
	 
	Therefore, in different blocking scenarios the QUIC mimicry increases likelihood of successful block bypass. NOTE: the same does not happen with DNS mimicry. In this case DPI / SPI tools identify the stream initially as DNS, but are much quicker (just in a few dozens of packets) to identify the stream as WireGuard's, after the initial DNS identification.
 


	 
 


	How to use Eddie in network where the "bootstrap" servers can not be reached



	Eddie downloads user and infrastructure data, essential to use the service, from special "bootstrap servers" through an encrypted flow inside HTTP. If the bootstrap servers are blocked or the underlying protocol to port 80 is filtered out, Eddie is unable to proceed. Starting from this Eddie 4 version, the ability to retrieve such data locally has been added. Whenever bootstrap servers are unreachable, Eddie can read the latest available local data to connect to a VPN server. Once connected the bootstrap servers are again reachable and the local data are immediately updated for future usage. The local data remain valid as long as you don't need to change user. 
	 
	On top of all of the above, Eddie can now retrieve such data through the login procedure that now can be started even when a connection to a VPN server was previously established via a profile. Therefore, when you are in a restrictive network that blocks access to bootstrap servers, you can connect through a profile generated by AirVPN web site Configuration Generator. After this first connection, log your account in to the service by selecting the specific option on the left pane, enter your AirVPN account credentials as usual and make sure that Remember me checkbox is ticked: Eddie will download all the necessary files and store them locally. 
	 
	This procedure is "once and for all", at least as long as you don't need to change account. After this initial connection, Eddie will be able to log your account in to the infrastructure, retrieve servers data and establish connections without profiles and without bootstrap servers, offering again full AirVPN integration even when bootstrap servers are unreachable. Only If you change account you must repeat the procedure.
 


	 
	 New: "Open with..." option added to "Export" option



	Different Android versions allow management of files with different restrictions. Different apps may support different intents on specific Android versions. To enlarge total compatibility, now Eddie offers two different options to export and manage files, including generated profiles. You will find the usual "Share" option (note: now renamed into "Export") coupled with a new "Open with..." option. Some apps support only one intent, other apps only specific intents on specific Android versions, and so on. By adding this option Eddie enlarges considerably the amount of apps you will be able to open and/or share files with. 
 


	Download link, checksum and changelog



	https://eddie.website/repository/Android/4.0.0-RC1/EddieAndroid-4.0.0-RC-1.apk 
	 
 


	This is a build debug package and side load is mandatory. 
	 
	If you decide to test, please report at your convenience any bug and problem in this thread. If possible generate a report from the app in a matter of seconds: by tapping the paper plane icon on the Log view bar rightmost side you will generate a full system report which will include both log and logcat and have it sent to our servers. Then you just need to send us the link the app shows you (open a ticket if you prefer to do it in private).
 


$ sha256sum EddieAndroid-4.0.0-RC-1.apk 
e5c6908b4645aace23b906b18b64dc83c958d0a9177c1533f68ab618eef7712a  EddieAndroid-4.0.0-RC-1.apk


	 
	Changelog 4.0.0 (VC 37)

 


	Release Candidate 1 (2026-03-27)
 


	 
 
Changelog 4.0.0 RC 1 (VC 37) Release date: 27 March 2026 by ProMIND 
 
AirVPNUser.java

	
		[ProMIND] getOpenVPNProfile(): interface changed. Arguments connectIPv6 and mode6to4 replaced with VPN.IPVersion
	
	
		[ProMIND] getWireGuardProfile(): interface changed. Arguments connectIPv6 and mode6to4 replaced with VPN.IPVersion
	

 
AmneziaCPSDatabase.java

	
		[ProMIND] new class
	

 
LogActivity.java

	
		[ProMIND] createExportLog(): Amnezia VPN type is now properly shown in "VPN Status" and "VPN Profile" sections
	
	
		[ProMIND] Added onKeyDown() for dpad navigation of log
	
	
		[ProMIND] Removed ViewMode enum
	
	
		[ProMIND] Removed web view mode
	

 
MainActivity.java

	
		[ProMIND] onKeyDown(): added missing control to reload manifest button for left and right buttons
	

 
OpenVPNTunnel.java

	
		[ProMIND] onEvent(): on CONNECTED event, log IPVersion/mode
	

 
QuickConnectFragment.java

	
		[ProMIND] quickConnectToAirVPN(): check favorite/forbidden lists of servers and countries according to "Forbid quick connection to connect servers in my country" setting before starting connection (prevent empty list error)
	

 
SettingsActivity.java

	
		[ProMIND] ameziaSettingsDialog(): added Amnezia CPS preset management
	
	
		[ProMIND] ameziaSettingsDialog(): added Ok and Cancel buttons to the bottom of dialog
	

 
SettingsManager.java

	
		[ProMIND] added Amnezia CPS preset methods
	
	
		[ProMIND] AIRVPN_FORBID_QUICK_CONNECTION_TO_USER_COUNTRY_DEFAULT is now set to false
	
	
		[ProMIND] added AIRVPN_IP_VERSION_4_OVER_6
	

 
SupportTools.java

	
		[ProMIND] added method checkHomeCountryConnection()
	

 
VPN.java

	
		[ProMIND] added enum IPVersion
	

 
VPNProfileDatabase.java

	
		[ProMIND] checkWireGuardProfile(): improved formal check for Amnezia's CPN "I*" directives (valid formal values, empty gaps)
	

 
WireGuardTunnel.java

	
		[ProMIND] run(): log Amnezia CPS settings and modes
	
	
		[ProMIND] run(): log IPVersion/mode
	

 


	Beta 3 (2026-03-04)
 


	Changelog 4.0.0 beta 3 (VC 37) Release date: 4 March 2026 by ProMIND 
	 
	Native Library
 


	
		[ProMIND] removed obsoleted Google's breakpad dependency
	
	
		[ProMIND] removed files breakpad.cpp and breakpad.h (bye bye mister!)
	
	
		[ProMIND] api.h: removed LR_BREAKPAD_INITIALIZATION_ERROR from LibResult enum (bye bye mister!)
	
	
		[ProMIND] api.cpp init(): removed calls to breakpad code (bye bye mister!)
	
	
		[ProMIND] api.cpp cleanup(): removed calls to breakpad code (bye bye mister!)
	
	
		[ProMIND] updated to OpenVPN-AirVPN 3.12 (20260206)
	
	
		[ProMIND] updated to OpenSSL version 3.6.1
	



	 
	amnezia_custom_settings_dialog.xml
 


	
		[ProMIND] removed random amnezia values button
	
	
		[ProMIND] added S3 and S4 input fields
	



	 
	AirVPNManifest.java
 


	
		[ProMIND] added method loadStoredManifest()
	



	 
	AirVPNServerProvider.java
 


	
		[ProMIND] added members useServerWhitelists, useCountryWhitelists, useServerBlacklists and useCountryBlacklists
	
	
		[ProMIND] added methods isUsingServerWhitelists(), setUseServerWhitelists(), isUsingServerBlacklists(), setUseServerBlacklists(), isUsingCountryWhitelists(), setUseCountryWhitelists(), isUsingCountryBlacklists() and setUseCountryBlacklists()
	



	 
	AirVPNTileService.java
 


	
		[ProMIND] implemented NetworkMonitorListener
	
	
		[ProMIND] added boolean isBusy member
	
	
		[ProMIND] onClick(): prevent multiple execution in case the service is busy
	
	
		[ProMIND] setTileStatus(): removed network connection case
	
	
		[ProMIND] setTileStatus() renamed to setTileVpnStatus()
	
	
		[ProMIND] added method setTileNetworkStatus()
	



	 
	ConnectAirVPNServerFragment.java
 


	
		[ProMIND] createVpnProfile(): in case of country connection, properly set AirVPNServerProvider's white and black list usage
	
	
		[ProMIND] exportVPNProfile(): protocol and port number is now correctly added to the profile name
	



	 
	ConnectVpnProfileFragment.java
 


	
		[ProMIND] added enum AddVPNProfileResult
	
	
		[ProMIND] addVPNProfile(): now returns AddVPNProfileResult
	
	
		[ProMIND] addVPNProfile(): check profile validity before importing by calling VPNProfileDatabase's checkOpenVPN3Profile() and checkWireGuardProfile()
	
	
		[ProMIND] addVPNProfile(): profile import result is now sent to the logger
	
	
		[ProMIND] selectVPNProfile(): in case of errors or warnings during import, shows a dialog to the user
	



	 
	BootVPNConnector.java
 


	
		[ProMIND] startConnection(): "remember me" is set, do local login and load locally stored manifest
	



	 
	EddieLibraryResult.java
 
[ProMIND] removed BREAKPAD_INITIALIZATION_ERROR


	 
	LogActivity.java
 


	
		[ProMIND] added method redactProfile()
	
	
		[ProMIND] createExportLog(): in case the app is using a custom profile, call redactProfile()
	

 


	MainActivity.java
 


	
		[ProMIND] onNetwork* events are now sent to the log
	



	 
	NetworkMonitor.java
 


	
		[ProMIND] added member registeredNetworks
	
	
		[ProMIND] notifyStatusToListener(): updated to the new NetworkMonitorListener.onNetworkNotConnected() interface
	
	
		[ProMIND] getNetworkDescription(): it now takes Network object as argument
	
	
		[ProMIND] added method getActiveNetworkDescription()
	
	
		[ProMIND] subscribeListener(): it now sends a network staus event to the listener upon registration
	



	 
	NetworkMonitorListener.java
 


	
		[ProMIND] Added networkDescription argument to method onNetworkNotConnected()
	



	 
	QuickConnectFragment.java
 


	
		[ProMIND] onCreate(): in case "remember me" is set, after loading the locally stored user instance, call AirVPNManifest.loadStoredManifest()
	



	 
	SettingsActivity.java
 


	
		[ProMIND] selectAirVPNDefaultVPNType(): Added AmneziaWG label to WireGuard VPN type
	
	
		[ProMIND] ameziaSettingsDialog(): added S3 and S4 support and management
	
	
		[ProMIND] ameziaSettingsDialog(): removed member btnGenerateRandomAmneziaWG
	



	 
	SettingsManager.java
 


	
		[ProMIND] added Amnezia S3 and S4 settings and methods
	



	 
	VPN.java
 


	
		[ProMIND] enum Status: added FATAL_ERROR
	



	 
	VPNManager.java
 


	
		[ProMIND] added method isVpnFatalError()
	



	 
	VPNProfileDatabase.java
 


	
		[ProMIND] added methods checkOpenVPN3Profile() and checkWireGuardProfile()
	



	 
	VPNService.java
 


	
		[ProMIND] onNetwork* events are not sent to the log anymore
	
	
		[ProMIND] startForegroundVPNService() is now called in onCreate()
	



	 
	WireGuardClient.java
 


	
		[ProMIND] generateRamdonAmneziaSettings renamed to generateRamdonAmneziaSettingsForWireguard()
	



	 
	 
 


	Beta 2 (2026-01-14)
 


	 
	LogActivity.java
 


	
		[ProMIND] added View log button (open with...)
	



	 
	MainActivity.java
 


	
		[ProMIND] method startAirVPNManifestRefresh() renamed to startAirVPNDocumentRefresh()
	
	
		[ProMIND] method stopAirVPNManifestRefresh() renamed to stopAirVPNDocumentRefresh()
	
	
		[ProMIND] member timerAirVPNManifestRefresh renamed to timerAirVPNDocumentRefresh
	
	
		[ProMIND] onCreate(): do exported files cleanup
	
	
		[ProMIND] onDestroy(): do exported files cleanup
	
	
		[ProMIND] drawer: added login item
	
	
		[ProMIND] drawer: changed login and logout icons
	
	
		[ProMIND] navigationViewItemSelected(): added code for AirVPN login
	
	
		[ProMIND] onResume(): show proper drawer's login/logout item
	



	 
	QuickConnectFragment.java
 


	
		[ProMIND] onCreate(): removed AirVPN autologin (superseeded by extended "remember me" local login)
	
	
		[ProMIND] onCreate(): in case "remember me" is set, do local login by using locally stored user instance
	



	 
	SettingsActivity.java
 


	
		[ProMIND] ameziaSettingsDialog(): fixed formal check for jc
	
	
		[ProMIND] removed AirVPN Autologin option (superseeded by extended "remember me" local login)
	



	 
	SettingsManager.java
 


	
		[ProMIND] removed added SYSTEM_AIRVPN_AUTOLOGIN and SYSTEM_AIRVPN_AUTOLOGIN_DEFAULT (superseeded by extended "remember me" local login)
	
	
		[ProMIND] removed methods isAirVPNAutologinEnabled() and setAirVPNAutologin()
	



	 
	SupportTools.java
 


	
		[ProMIND] added enum ShareMode
	
	
		[ProMIND] sharePlainText(): added argument share mode
	
	
		[ProMIND] sharePlainText(): the code is now compliant to all supported Android versions
	
	
		[ProMIND] sharePlainText(): exclude "myself" from helper apps
	
	
		[ProMIND] removeShareFile() renamed to removeShareFiles()
	
	
		[ProMIND] sharePlainText(): share/view files are now removed on app exit
	

 


	 
 


	Beta 1 (2026-11-25)
 


	 
	Native Library
 


	
		[ProMIND] updated to version 4.0.0, API 10
	
	
		[ProMIND] added Amnezia WireGuard API
	
	
		[ProMIND] updated to OpenVPN-AirVPN 3.12 (20251126)
	



	 
	AirVPNUser.java
 


	
		[ProMIND] getWireGuardProfile(): added Amnezia support
	



	 
	 
	ConnectAirVPNServerFragment.java
 


	
		[ProMIND] showConnectionInfo(): added AmneziaWG logo display
	
	
		[ProMIND] onCreateContextMenu(): added AmneziaWG items
	
	
		[ProMIND] onContextItemSelected(): added AmneziaWG items
	
	
		[ProMIND] added method loadVPNProfile()
	



	 
	ConnectVpnProfileFragment.java
 


	
		[ProMIND] added Amnezia support
	



	 
	EddieLibraryResult.java
 


	
		[ProMIND] added Amnezia WireGuard API
	



	 
	QuickConnectFragment.java
 


	
		[ProMIND] onCreateView(): added AmneziaWG logo display
	
	
		[ProMIND] updateStatusBox(): added AmneziaWG logo display
	



	 
	SettingsActivity.java
 


	
		[ProMIND] added "Custom AmneziaWG directives" setting
	



	 
	SettingsManager.java
 


	
		[ProMIND] added Amnezia specific settings and methods
	

 
SupportTools.java

	
		[ProMIND] removed method getVPNProfile()
	



	 
	VPN.java
 


	
		[ProMIND] added methods enableAmneziaWireGuard() and isWireGuardAmneziaEnabled()
	



	 
	VPNManager.java
 


	
		[ProMIND] added method isWireGuardAmneziaEnabled()
	



	 
	VPNProfileDatabase.java
 


	
		[ProMIND] added AMNEZIA type
	



	 
	WebViewerActivity.java
 


	
		[ProMIND] EddieWebViewClient.shouldOverrideUrlLoading(): it now properly opens android asset files
	



	 
	WireGuardClient.java
 


	
		[ProMIND] added WireGuard tunnel node to constructor 
	
	
		[ProMIND] added methods for generating Amnezia's junk settings
	



	 
	WireGuardTunnel.java
 


	
		[ProMIND] added support for Amnezia WireGuard
	
	
		[ProMIND] added Mode enum
	
	
		[ProMIND] added tunnel node to constructor 
	



	 
	EddieLibrary.java
 


	
		[ProMIND] added Amnezia WireGuard API
	

 
Kind regards &amp; datalove 
AirVPN Staff]]></description><pubDate>Fri, 28 Nov 2025 16:35:47 +0000</pubDate></item><item><title>Two new 10 Gbit/s servers available (NL)</title><link><![CDATA[https://airvpn.org/forums/topic/77377-two-new-10-gbits-servers-available-nl/?do=findComment&comment=258075]]></link><description><![CDATA[Hello!
 


	
		
			
				
					 
					We're very glad to inform you that two new 10 Gbit/s full duplex servers located in Amsterdam, the Netherlands, are available: Taiyangshou and Vindemiatrix.  
					 
					The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator"). 
					 
					The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. 
					 
					Full IPv6 support is included as well. 
					 
					As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. 
					 
					You can check the status as usual in our real time servers monitor : 
					https://airvpn.org/servers/Taiyangshou 
					https://airvpn.org/servers/Vindemiatrix 
					 
				 

				
					Do not hesitate to contact us for any information or issue. 
					 
					Kind regards &amp; datalove 
					AirVPN Staff]]></description><pubDate>Sun, 16 Nov 2025 09:01:31 +0000</pubDate></item><item><title>[ENDED] 2025 Black Friday Sale</title><link><![CDATA[https://airvpn.org/forums/topic/77311-ended-2025-black-friday-sale/?do=findComment&comment=257986]]></link><description><![CDATA[Hello! 
	 
	We're very glad to inform you that the Black Friday weeks have started in AirVPN!
 


	



	Save up to 74%



	when compared to one month plan price



	 
 


	Check all plans and discounts here: https://airvpn.org/buy



	 
 


	If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day.
 


	 
	AirVPN is one of the oldest and most experienced consumer VPN on the market, operating since 2010. It never changed ownership and it was never sold out to data harvesting or malware specialized companies as it regrettably happened to several competitors. Ever since 2010 AirVPN has been faithful to its mission. 
	 
	AirVPN does not inspect and/or log client traffic and offers:
 


	
		five simultaneous connections per account (additional connection slots available if needed)
	
	
		state of the art and flexible inbound remote port forwarding
	
	
		active daemons load balancing for unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2000 Mbit/s with WireGuard
	
	
		flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level.
	
	
		powerful API
	
	
		IPv6 full support
	
	
		comfortable management of your client certificates and keys
	
	
		AES-GCM and ChaCha20 OpenVPN ciphers on all servers
	
	
		Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys
	
	
		internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported.
	
	
		free and open source software
	
	
		client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS
	
	
		GPS spoofing on Android application
	



	 
	AirVPN is the only VPN provider which is actively developing OpenVPN 3 library with a fork that's currently 330 commits ahead of OpenVPN master and adds key features and bug fixes for a much more comfortable and reliable experience: 
	https://github.com/AirVPN/openvpn3-airvpn 
	 
	AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows. 
	Promotion due to end on 2025-12-03 (UTC). 
	 
	Kind regards &amp; datalove 
	AirVPN Staff]]></description><pubDate>Fri, 14 Nov 2025 10:35:56 +0000</pubDate></item><item><title>New 1 Gbit/s server available (SG)</title><link><![CDATA[https://airvpn.org/forums/topic/77104-new-1-gbits-server-available-sg/?do=findComment&comment=257658]]></link><description><![CDATA[Hello!
 


	
		
			
				
					 
					We're very glad to inform you that a new 1 Gbit/s full duplex server located in Singapore is available: Azelfafage. 
					 
					The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator"). 
					 
					The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. 
					 
					Just like every other Air server, Azelfafage supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. 
					Full IPv6 support is included as well. 
					 
					As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. 
					 
					You can check the server status as usual in our real time servers monitor: 
					https://airvpn.org/servers/Azelfafage
				 

				
					 
					Do not hesitate to contact us for any information or issue. 
					 
					Kind regards and datalove 
					AirVPN Team ﻿]]></description><pubDate>Fri, 07 Nov 2025 14:03:00 +0000</pubDate></item><item><title>New 1 Gbit/s server available (NZ)</title><link><![CDATA[https://airvpn.org/forums/topic/77102-new-1-gbits-server-available-nz/?do=findComment&comment=257656]]></link><description><![CDATA[Hello!
 


	
		
			
				
					 
					We're very glad to inform you that a new 1 Gbit/s full duplex server located in Auckland (NZ) is available: Mothallah. 
					 
					The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator"). 
					 
					The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. 
					 
					Just like every other Air server, Mothallah supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. 
					Full IPv6 support is included as well. 
					 
					As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. 
					 
					You can check the server status as usual in our real time servers monitor: 
					https://airvpn.org/servers/Mothallah
				 

				
					 
					Do not hesitate to contact us for any information or issue. 
					 
					Kind regards and datalove 
					AirVPN Team ﻿]]></description><pubDate>Fri, 07 Nov 2025 13:53:49 +0000</pubDate></item><item><title>Eddie Android edition 3.3.0 available</title><link><![CDATA[https://airvpn.org/forums/topic/76488-eddie-android-edition-330-available/?do=findComment&comment=256912]]></link><description><![CDATA[Hello! 
	 
	We're very glad to inform you that Eddie Android edition 3.3.0 has been released. 
	 
	Eddie Android edition is a fully integrated with AirVPN, free and open source WireGuard and OpenVPN GUI client. It is based on official WireGuard library and latest OpenVPN3-AirVPN library (free and open source software library by AirVPN), allowing comfortable connections to both OpenVPN and WireGuard servers. Source code is available on GitLab: https://gitlab.com/AirVPN/EddieAndroid 
	 
	Eddie Android edition 3.3.0 is linked against updated libraries. It is compatible with Android 5.1 and higher versions, up to Android 16, and features revamped ergonomics and important new features. 
	 
 


	What's new



	
		full compatibility with Android 15 and 16
	
	
		compatible with Android 5.1 and higher versions
	
	
		new, remarkably improved NetworkMonitor
	
	
		improvements in ergonomics for faster and more comfortable use
	
	
		updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries
	
	
		ability to start and connect during the device bootstrap on all supported Android TV and Android versions, with or without "Always on VPN"
	
	
		opt in ability to auto connect when the app is launched through the new option Settings &gt; AirVPN &gt; Start quick VPN connection at application startup. It requires an account that had logged in with "Remember me" checked
	
	
		updated code, SDK 16 100% compliant
	
	
		see the complete changelog here: https://gitlab.com/AirVPN/EddieAndroid/-/blob/master/ChangeLog.txt
	

 


	Main features

 


	
		WireGuard and OpenVPN support
	
	
		Battery-conscious application, with low RAM footprint
	
	
		Ergonomic and friendly interface
	
	
		Ability to start and connect the application at device bootstrap and/or at app launch, with or without "Always on VPN"
	
	
		GPS spoofing
	
	
		Traffic splitting and reverse traffic splitting on an application basis. You can define which apps must have traffic inside or o﻿utside the VPN tunnel through white and black list
	
	
		Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish
	
	
		Full integration with AirVPN
	
	
		Quick tile button
	
	
		Enhanced security thanks to locally stored encrypted data through optional ﻿master password (warning: this option prevents the app from automatically connecting during the startup)
	
	
		Quick one-tap connection and smart, fully automated server selection
	
	
		Smart server selection ﻿with custom settings ﻿
	
	
		Manual server selection ﻿﻿﻿﻿
	
	
		Full Android TV compatibility including D-Pad support. Mouse emulation is not required. ﻿
	
	
		Ability to generate configuration files based on the user settings for both OpenVPN and WireGuard
	
	
		Increased accessibility for ﻿visually impaired persons ﻿
	



	 
	 
 


	Download link

Eddie Android edition 3.3.0 APK can be downloaded here: 
https://airvpn.org/android/eddie 
 

	A quick start guide is available at the same above linked page. Quick link to the APK: https://airvpn.org/tv  
	 
	Eddie Android edition is also available on the Google Play Store: https://play.google.com/store/apps/details?id=org.airvpn.eddie 
	and on the Amazon App Store: https://www.amazon.com/Eddie-AirVPN-official-OpenVPN-GUI/dp/B07KTD6DH9 
	 
	Eddie Android edition is the only VPN application developed by AirVPN for Android. Beware of imitations on the Play Store with very similar names that conceal potential scams.
 


	How to sideload Eddie Android edition on Android TV and FireOS devices



	https://airvpn.org/android/eddie/apk/tv/
 


	 
 


	 
	Kind regards &amp; datalove 
	AirVPN Staff]]></description><pubDate>Tue, 21 Oct 2025 10:32:51 +0000</pubDate></item><item><title>[ENDED] Spooky 2025 Halloween Deal</title><link><![CDATA[https://airvpn.org/forums/topic/76343-ended-spooky-2025-halloween-deal/?do=findComment&comment=256726]]></link><description>Hello! 
	 
	We reluctantly have to announce gloomy news to you all: Spooky Halloween Deals are now available in AirVPN...  
	 
 


	
 


	 
 


	Save up to 74% on AirVPN longer plans (*) 
	(*) When compared to 1 month plan price



	Deal will expire on 2025-11-04 UTC



	 



	Check all plans and discounts here: https://airvpn.org/plans 
	 
	If you're already our customer and you wish to jump aboard for a longer period with this un-boo-lievable deal, any additional plan will be added on top of already existing subscriptions and you will not lose any day. 
	 
	Every plan gives you all the features that made AirVPN a nightmare for snoopers and a scary service for competitors. Just check this frighteningly long list of terrific features if you dare:
 


	
		a clear mission without compromises https://airvpn.org/mission
	
	
		exclusive and comfortable remote inbound port forwarding system
	
	
		flexible, opt-in block lists against malware and other hostile entities. Pick predefined lists, add exceptions or additional blocks, define your own lists, or just use our totally neutral DNS by default
	
	
		improved API functions to let you control and configure VPN features and account settings
	
	
		active OpenVPN 3 AirVPN library open source development
	
	
		WireGuard integration
	
	
		IPv6 support, including IPv6 over IPv4
	
	
		refined load balancing to squeeze every last bit per second from VPN servers
	
	
		free and open source software for Android, Linux, Mac and Windows offering advanced features
	
	
		easy "Configuration Generator" web interface for access through third party software
	
	
		guaranteed minimum bandwidth allocation
	
	
		GDPR compliance and very high privacy protection standards
	
	
		no log and/or inspection of clients' traffic
	
	
		effective traffic leaks prevention by AirVPN software
	
	
		Tor support via AirVPN software on Linux, Mac and Windows
	
	
		various cryptocurrencies accepted without any intermediary
	
	
		no obligation to use our free and open source software to enter AirVPN infrastructure. Interoperability is an AirVPN priority.
	
	
		perfectly clear and easy to read Privacy Notice and Terms https://airvpn.org/privacy
	

 
No tricks, only treats! 
 
We witch you a spooktacular Halloween 
AirVPN Staff</description><pubDate>Fri, 17 Oct 2025 07:56:45 +0000</pubDate></item><item><title>[ENDED] End of season sale</title><link><![CDATA[https://airvpn.org/forums/topic/75053-ended-end-of-season-sale/?do=findComment&comment=255050]]></link><description><![CDATA[Hello! 
	 



	We're very glad to announce a special promotion on our long term Premium plans for the end of Summer or Winter, according to the hemisphere you live in.



	



	 
 


	You can get prices as low as 2.06 €/month with a three years plan, which is a 70% discount when compared to monthly plan price of 7 €.

 


	If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. 
	 
	Please check plans special prices on https://airvpn.org and https://airvpn.org/buy
 


	All reported discounts are computed against the 7 EUR/month plan. Promotion expires on 2025-09-22 UTC.
 


	 
	Kind regards &amp; datalove 
	AirVPN Staff]]></description><pubDate>Fri, 12 Sep 2025 07:57:49 +0000</pubDate></item><item><title>Two new 10 Gbit/s servers available (CH)</title><link><![CDATA[https://airvpn.org/forums/topic/74583-two-new-10-gbits-servers-available-ch/?do=findComment&comment=254418]]></link><description><![CDATA[Hello!
 


	
		
			
				
					 
					We're very glad to inform you that two new 10 Gbit/s full duplex servers located in Zurich, Switzerland, are available: Athebyne and Toliman.  
					 
					The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator"). 
					 
					The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. 
					 
					Full IPv6 support is included as well. 
					 
					As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. 
					 
					You can check the status as usual in our real time servers monitor : 
					https://airvpn.org/servers/Athebyne 
					https://airvpn.org/servers/Toliman 
					 
				 

				
					Do not hesitate to contact us for any information or issue. 
					 
					Kind regards &amp; datalove 
					AirVPN Staff]]></description><pubDate>Thu, 21 Aug 2025 07:16:14 +0000</pubDate></item><item><title>Eddie Android edition 3.3.0 preview available</title><link><![CDATA[https://airvpn.org/forums/topic/74480-eddie-android-edition-330-preview-available/?do=findComment&comment=254279]]></link><description><![CDATA[Hello! 
	 
	Eddie Android edition is a fully integrated with AirVPN, free and open source WireGuard and OpenVPN GUI client. It is based on official WireGuard library and latest OpenVPN3-AirVPN library (free and open source software library by AirVPN), allowing comfortable connections to both OpenVPN and WireGuard servers.  
	 
	We're very glad to inform you that Eddie Android edition 3.3.0 beta 1 is now available. 
	UPDATE 2025-09-12: Eddie Android edition 3.3.0 beta 2 is now available 
	UPDATE 2025-10-14: Eddie Android edition 3.3.0 Release Candidate 1 is now available 
	UPDATE 2025-10-21: Eddie Android edition 3.3.0 has been released. Please jump to 
 



	What's new



	
		full compatibility with Android 15 and 16
	
	
		also compatible with Android 5.1 and higher versions
	
	
		improvements in ergonomics for faster and more comfortable use
	
	
		updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries
	
	
		ability to start and connect during the device bootstrap on all supported Android TV and Android versions, with or without "Always on VPN"
	
	
		ability to auto connect when the app is launched. Opt in: please note the new Start quick VPN connection at application startup option in Settings &gt; AirVPN. It requires an account that logged in with "Remember me" checked
	
	
		new, improved NetworkMonitor
	
	
		updated code now SDK 16 100% compliant
	
	
		see the complete changelog at the bottom
	

 


	 
	If you decide to test, please report at your convenience any bug and problem in this thread. If possible generate a report from the app in a matter of seconds: by tapping the paper plane icon on the Log view bar rightmost side you will generate a full system report which will include both log and logcat and have it sent to our servers. Then you just need to send us the link the app shows you (open a ticket if you prefer to do it in private). 
	 
 


	Download link, checksum and changelog



	https://eddie.website/repository/Android/3.3.0-RC1/EddieAndroid-3.3.0-RC1.apk 
	 
 


	This is a build debug and side load is mandatory. 
	 
 


$ sha256sum EddieAndroid-3.3.0-RC1.apk 
e1adb583bea5b8d8cca3d445957ab6b25af8a282dd0d0d719d281c4506859793  EddieAndroid-3.3.0-RC1.apk


	 
	Changelog 3.3.0 RC 1 (VC 35) - Release date: 14 October 2025 by ProMIND



	 
 


	
		[ProMIND] Replacement of deprecated or non SDK 16 compliant code in java classes
	



	 
	map_app_bar.xml
 


	
		[ProMIND] viewpager changed to androidx.viewpager2.widget.ViewPager2
	



	 
	BootVPNActivity.java
 


	
		[ProMIND] class renamed to BootVPNConnector. It does not extend Activity class anymore
	



	 
	BootVPNConnector.java
 


	
		[ProMIND] removed all Android's Activity class overrides
	
	
		[ProMIND] removed static qualifier from startConnection() method
	



	 
	ConnectAirVPNServerFragment.java
 


	
		[ProMIND] getCountryFlagResource(): removed deprecated getResourceId()
	



	 
	EddieBroadcastReceiver.java
 


	
		[ProMIND] onReceive(): replaced BootVPNActivity calls with BootVPNConnector
	



	 
	EddieEvent.java
 


	
		[ProMIND] refactored event names
	



	 
	MainActivity.java
 


	
		[ProMIND] viewPager object is now instance of ViewPager2 class
	
	
		[ProMIND] onCreate(): viewPagerAdapter changed to conform to new class inheritance
	
	
		[ProMIND] onCreate(): tabLayout changed to conform to new ViewPagerAdapter class inheritance
	
	
		[ProMIND] onCreate(): added and revised D-Pad navigation for ViewPager2 class
	
	
		[ProMIND] onKeyDown(): adapted to ViewPager2 class specifications and added specific D-Pad navigation
	



	 
	NetworkMonitor.java
 


	
		[ProMIND] New class. Replaces the old and deprecated NetworkStatusReceiver class
	



	 
	NetworkMonitorListener.java
 


	
		[ProMIND] New class. Replaces the NetworkStatusListener class
	



	 
	NetworkStatusListener.java
 


	
		[ProMIND] Class removed
	



	 
	NetworkStatusReceiver.java
 


	
		[ProMIND] Class removed
	



	 
	QuickConnectFragment.java
 


	
		[ProMIND] onCreate(): perform reserve "start quick connection at app startup" according to user settings
	
	
		[ProMIND] onAirVPNManifestChanged(): check whether a quick connection at app startup is to be started
	
	
		[ProMIND] updateConnectionStatus(): it now controls the whole UI and according to Network status
	
	
		[ProMIND] onNetworkNotAvailable(): it now calls updateConnectionStatus()
	
	
		[ProMIND] onNetworkConnected(): it now calls updateConnectionStatus()
	
	
		[ProMIND] onNetworkNotConnected(): it now calls updateConnectionStatus()
	
	
		[ProMIND] onNetworkTypeChanged(): it now calls updateConnectionStatus()
	



	 
	SettingsActivity.java
 


	
		[ProMIND] added "Start quick connection at app startup" setting
	



	 
	SettingsManager.java
 


	
		[ProMIND] SYSTEM_OPTION_START_VPN_AT_STARTUP renamed to SYSTEM_OPTION_START_VPN_AT_DEVICE_STARTUP
	
	
		[ProMIND] SYSTEM_OPTION_START_VPN_AT_STARTUP_DEFAULT renamed to SYSTEM_OPTION_START_VPN_AT_DEVICE_STARTUP_DEFAULT
	
	
		[ProMIND] isStartVpnAtStartupEnabled() renamed to isStartVpnAtDeviceStartupEnabled()
	
	
		[ProMIND] setStartVpnAtStartup() renamed to setStartVpnAtDeviceStartup()
	
	
		[ProMIND] added SYSTEM_START_QUICK_CONNECTION_AT_APP_STARTUP and SYSTEM_START_QUICK_CONNECTION_AT_APP_STARTUP_DEFAULT
	
	
		[ProMIND] added methods isStartQuickConnectionAtAppStartupEnabled() and setStartQuickConnectionAtAppStartup()
	



	 
	ViewPagerAdapter.java
 


	
		[ProMIND] class now inherits FragmentStateAdapter
	
	
		[ProMIND] adapted old methods to the new parent class requirements and added the mandatory ones
	



	 
	VPN.java
 


	
		[ProMIND] added method getPrimaryDns()
	



	 
	VPNService.java
 


	
		[ProMIND] tryBootConnection(): replaced BootVPNActivity calls with BootVPNConnector
	



	 
	 
	 
 


	Changelog 3.3.0 beta 2 (VC 35) - Release date: 12 September 2025 by ProMIND 
	 
 


	
		[ProMIND] replaced code with lambda expressions in all classes and where applicable
	
	
		[ProMIND] added drawables quick_connect_off_focus and quick_connect_on_focus
	
	
		[ProMIND] updated bundle AirVPN manifest
	



	 
	 
	Native Library
 


	
		[ProMIND] updated to OpenVPN3-AirVPN 3.12 (20250911)
	



	 
	about.html
 


	
		[ProMIND] replaced the hard coded version values with placeholders (just another rotten piece of the grate grill curse consigned to oblivion)
	



	 
	AirVPNUser.java
 


	
		[ProMIND] getOpenVPNProfile(): obsoleted ncp-disable option is no longer added to the profile
	
	
		[ProMIND] class getUserLocation: renamed to getUserLocationAsyncTask. It now inherits AsynchronousTask class
	



	 
	 
	AsynchronousTask.java
 


	
		[ProMIND] new class (replacement for Android's deprecated AsyncTask class)
	



	 
	ConnectAirVPNServerFragment.java
 


	
		[ProMIND] onCreateView(): replaced deprecated startActivityForResult()
	



	 
	ConnectVpnProfileFragment.java
 


	
		[ProMIND] removed deprecated setUserVisibleHint() override
	
	
		[ProMIND] onClickSelectProfileButton(): replaced deprecated startActivityForResult()
	



	 
	LogActivity.java
 


	
		[ProMIND] saveLog(): infoDialog is now set to high priority
	
	
		[ProMIND] class SendReportToAirVPN: renamed to SendReportToAirVPNAsyncTask. It now inherits AsynchronousTask class
	



	 
	MainActivity.java
 


	
		[ProMIND] navigationViewItemSelected(): "case R.id.nav_about", replace about.html placeholders with corresponding BuildConfig fields
	
	
		[ProMIND] navigationViewItemSelected(): "case R.id.nav_settings:", replaced deprecated startActivityForResult()
	



	 
	PackageChooserActivity.java
 


	
		[ProMIND] class ApplicationListLoader: renamed to ApplicationListLoaderAsyncTask. It now inherits AsynchronousTask class
	



	 
	QuickConnectFragment.java
 


	
		[ProMIND] onResume(): focus for quick button is requested only in case device is TV
	
	
		[ProMIND] onPause(): clear focus to quick button
	
	
		[ProMIND] btnQuickConnect.setOnFocusChangeListener.onFocusChange(): it now calls setConnectButton()
	
	
		[ProMIND] setConnectButton(): added logic for TV focus images and set them accordingly
	



	 
	SettingsActivity.java
 


	
		[ProMIND] selectApplicationFilter(): replaced deprecated startActivityForResult()
	



	 
	SettingsManager.java
 


	
		[ProMIND] SettingsManager(): replaced deprecated getDefaultSharedPreferences() with getSharedPreferences()
	



	 
	SupportTools.java
 


	
		[ProMIND] class RequestAirVPNDocument: renamed to RequestAirVPNDocumentAsyncTask. It now inherits AsynchronousTask class
	



	 
	 
	Changelog 3.3.0 beta 1 - Release date: 18 August 2025 by ProMIND
 


	 
 


	
		[ProMIND] removed default font override definition. It now uses system default
	
	
		[ProMIND] revised all UI layout in order to conform to new specifications
	



	 
	Native Library
 


	
		[ProMIND] completely removed the obsolete non JNI code, related declarations and functions (so long, obnoxious grill grate, and no thanks for all the rotten fish)
	
	
		[ProMIND] updated to version 3.0.0, API 9
	
	
		[ProMIND] updated to OpenVPN3-AirVPN 3.12 (20250606)
	
	
		[ProMIND] updated to WireGuard f333402
	
	
		[ProMIND] updated to OpenSSL 3.5.1
	
	
		[ProMIND] common.hpp: included file &lt;openvpn/log/logbasesimple.hpp&gt; in order to conform to new OpenVPN3 logging specifications
	
	
		[ProMIND] openvpnclient.hpp: removed deleted OpenVPN3 methods tun_builder_add_dns_server(), tun_builder_add_search_domain() and tun_builder_set_adapter_domain_suffix()
	
	
		[ProMIND] openvpnclient.hpp: added OpenVPN3 method tun_builder_set_dns_options()
	



	 
	AndroidManifest.xml
 


	
		[ProMIND] set MainActivity's theme to StartupTheme style
	



	 
	colors.xml
 


	
		[ProMIND] added startupBackground color
	



	 
	main_drawer.xml
 


	
		[ProMIND] logout item has been grouped and moved to the bottom
	



	 
	styles.xml
 


	
		[ProMIND] added StartupTheme style
	



	 
	OpenVPNTunnel.java
 


	
		[ProMIND] removed onTunBuilderSetAdapterDomainSuffix() method
	



	 
	QuickConnectFragment.java
 


	
		[ProMIND] checkPermissions(): updated notification manager and channel. Added extra warning text to dialog.
	
	
		[ProMIND] onResume(): request focus for btnQuickConnect
	



	 
	SettingsActivity.java
 


	
		[ProMIND] layout: added summary text for notification channel layout
	
	
		[ProMIND] onCreate(): updated notification manager and channel
	



	 
	SettingsManager.java
 


	
		[ProMIND] SYSTEM_OPTION_SHOW_MESSAGE_DIALOGS_DEFAULT is now set to false
	



	 
	VPNService.java
 


	
		[ProMIND] alertNotification(): updated notification manager and channel
	



	 
 


	How to sideload Eddie Android edition on Android TV and FireOS devices



	https://airvpn.org/android/eddie/apk/tv
 


	 
	 
	 
	 
	Kind regards &amp; datalove 
	AirVPN Staff]]></description><pubDate>Mon, 18 Aug 2025 13:37:14 +0000</pubDate></item><item><title>Servers withdrawal announcement (CH)</title><link><![CDATA[https://airvpn.org/forums/topic/74245-servers-withdrawal-announcement-ch/?do=findComment&comment=253961]]></link><description><![CDATA[Hello! 
 
We inform you that the following servers in Zurich (CH) will be decommissioned within the specified date: 
Alpherg (2025-08-22) 
Xuange (2025-09-16) 
 
They will be replaced by two 10 Gbit/s servers in Zurich with more powerful hardware. 
 
Kind regards &amp; datalove 
AirVPN Staff]]></description><pubDate>Wed, 13 Aug 2025 08:34:54 +0000</pubDate></item><item><title>New 10 Gbit/s server available (SE) and replacement</title><link><![CDATA[https://airvpn.org/forums/topic/74049-new-10-gbits-server-available-se-and-replacement/?do=findComment&comment=253680]]></link><description><![CDATA[Hello!
 


	
		
			
				
					 
					We're very glad to inform you a new 10 Gbit/s full duplex servers located in Stockholm, Sweden, is available: Segin.  
					 
					It will replace, with a more powerful hardware, Ain. Ain will be decommissioned on 2025-08-18. 
					 
					The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator"). 
					 
					The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. It supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. 
					 
					Full IPv6 support is included as well. 
					 
					As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. 
					 
					You can check the status as usual in our real time servers monitor : 
					https://airvpn.org/servers/Segin 
					 
				 

				
					Do not hesitate to contact us for any information or issue. 
					 
					Kind regards &amp; datalove 
					AirVPN Staff]]></description><pubDate>Thu, 07 Aug 2025 07:35:05 +0000</pubDate></item><item><title>New 10 Gbit/s server available (RO)</title><link><![CDATA[https://airvpn.org/forums/topic/74032-new-10-gbits-server-available-ro/?do=findComment&comment=253657]]></link><description><![CDATA[Hello!
 


	
		
			
				
					 
					We're very glad to inform you a new 10 Gbit/s full duplex server located in Bucharest, Romania, is available: Nembus. 
					 
					The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator. 
					 
					The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. It supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. 
					 
					Full IPv6 support is included as well. 
					 
					As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. 
					 
					You can check the status as usual in our real time servers monitor : 
					https://airvpn.org/servers/Nembus 
					  ﻿
				 

				
					Do not hesitate to contact us for any information or issue. 
					 
					Kind regards &amp; datalove 
					AirVPN Staff]]></description><pubDate>Wed, 06 Aug 2025 14:46:00 +0000</pubDate></item><item><title>New 10 Gbit/s server available (US)</title><link><![CDATA[https://airvpn.org/forums/topic/74031-new-10-gbits-server-available-us/?do=findComment&comment=253656]]></link><description><![CDATA[Hello!
 


	
		
			
				
					 
					We're very glad to inform you a new 10 Gbit/s full duplex server located in Miami, Florida (USA), is available: Dziban. 
					 
					The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator. 
					 
					The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. It supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. 
					 
					Full IPv6 support is included as well. 
					 
					As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. 
					 
					You can check the status as usual in our real time servers monitor : 
					https://airvpn.org/servers/Dziban 
					 
				 

				
					Do not hesitate to contact us for any information or issue. 
					 
					Kind regards &amp; datalove 
					AirVPN Staff]]></description><pubDate>Wed, 06 Aug 2025 14:33:11 +0000</pubDate></item><item><title>[ENDED] Japan: scheduled power maintenance in Tokyo</title><link><![CDATA[https://airvpn.org/forums/topic/74015-ended-japan-scheduled-power-maintenance-in-tokyo/?do=findComment&comment=253640]]></link><description><![CDATA[Hello! 
	 
	Please be informed of the following, unavoidable scheduled power maintenance in Tokyo needed by our provider to maintain/replace Automatic Transfer Switch (ATS) systems. 
	 
	Start: Thursday, August 14th, 2025, 02:00 local time (UTC+9) 
	End: Thursday, August 14th, 2025, 03:00 local time (UTC+9) 
	 
	The expected downtime is 30 minutes anywhere in the above mentioned time frame. The downtime will affect every and each server in Tokyo. 
	 
	Kind regards &amp; datalove 
	AirVPN Staff]]></description><pubDate>Wed, 06 Aug 2025 08:22:33 +0000</pubDate></item><item><title>macOS: Hummingbird 2.0.0 available</title><link><![CDATA[https://airvpn.org/forums/topic/73447-macos-hummingbird-200-available/?do=findComment&comment=252908]]></link><description><![CDATA[Hello! 
	 
	We're very glad to inform you that Hummingbird 2.0.0 for macOS (Mojave or higher version required) is available. Different native versions for Intel and M1/M2/M3/M4 based Mac computers are available for maximum performance. 
	 
	Hummingbird is free and open source released under GPLv3: https://gitlab.com/AirVPN/AirVPN-Suite
 


	Main features

 


	
		Lightweight and stand alone binary client supporting both OpenVPN and WireGuard
	
	
		No heavy framework required, no GUI
	
	
		Small RAM footprint
	
	
		Lightning fast
	
	
		Based on OpenVPN 3 library fork by AirVPN and WireGuard
	
	
		Robust leaks prevention through Network Lock based on pf
	
	
		Proper handling of DNS push by VPN servers
	
	
		New, more flexible Network Lock
	

 


	What's new



	 



	
		linked against OpenVPN3-AirVPN 3.12 library
	
	
		all libraries and dependencies have been updated
	
	
		added complete WireGuard support by means of the official WireGuard tools provided by its developers. Installation of wg and wireguard-go binaries is currently required, as WireGuard library is not available on macOS. Please check the user's manual (README.md file included in the packages) WireGuard support section for comfortable, step by step instructions.
	
	
		new Network Lock related options offering more flexibility. Now you can accept or deny incoming, outgoing or both ICMP-echo packets, and independently you can permit or forbid IPv6 NDP, which is based on ICMPv6. The new options supported by Hummingbird (please check the readme file for additional details) are: 
		--allow-ping 
		--allow-ipv6ndp
	
	
		Apple ARM based systems version is now C++20 compliant (required by Sequoia) 
		 
	



	 
	 
 


	Important note for high speed line users

Because of some architectural specifications and implementation in macOS Hummingbird may warn the user about shortage of buffer space, specifically when connected with the UDP. This condition is signaled by Hummingbird with the below messages in the log:


UDP send exception: send: No buffer space available ERROR: NETWORK_SEND_ERROR
The error is caused by the maximum network sockets size set in macOS, a value usually small and unsuited for modern high speed networks. The solution consists in increasing the maximum allowed size for socket buffers and, in case the problem persists, the number of mbuf clusters. The procedure is simple, please find out all the details in the manual. Open the README.md file with any viewer and consult the "Note on macOS and UDP" section.


	 



	Download the software here:

https://airvpn.org/macos/hummingbird/


	 

 
 
Kind regards &amp; datalove 
AirVPN Staff]]></description><pubDate>Fri, 25 Jul 2025 08:44:37 +0000</pubDate></item><item><title>Linux: AirVPN Suite 2.0.0 available</title><link><![CDATA[https://airvpn.org/forums/topic/73446-linux-airvpn-suite-200-available/?do=findComment&comment=252907]]></link><description><![CDATA[Hello! 
	 
	We're very glad to announce that AirVPN Suite 2.0.0 Release is available. Special thanks to the outstanding community beta testers whose continued support in over a year and a half has been invaluable and decisive to find out and address several, insidious bugs. 
	 
	Dedicated community forum here: https://airvpn.org/forums/forum/47-airvpn-suite/ 
	 
	AirVPN Suite 2.0.0 introduces AirVPN's exclusive per app traffic splitting system, bug fixes, revised code, WireGuard support, and the latest OpenVPN3-AirVPN 3.12 library. Please see the respective changelogs for a complete list of  changes for each component of the suite. 
 


	The 2.0.0 Suite includes:
 


	
		Bluetit: lightweight, ultra-fast D-Bus controlled system daemon providing full connectivity and integration to AirVPN servers, or generic OpenVPN and WireGuard servers. Bluetit can also enforce Network Lock and/or connect the system to AirVPN during the bootstrap
	
	
		Goldcrest: Bluetit client, allowing full integration with AirVPN servers, users, keys, profiles as well as generic OpenVPN and WireGuard servers
	
	
		Hummingbird: lightweight and standalone binary for generic OpenVPN and WireGuard server connections
	
	
		Cuckoo: traffic split manager, granting full access and functionality to AirVPN's traffic split infrastructure
	
	
		airsu:  a "run and forget" tool to automatically set and enable the user environment for the X.Org or Wayland based ecosystem without any user input
	



	 
	WireGuard support 
	 



	WireGuard support is now available in Bluetit and Hummingbird. OpenVPN or WireGuard selection is controlled by Bluetit run control file option airvpntype or by Goldcrest option -f  (short for --air-vpn-type). Possible values: openvpn, wireguard. New 2.0.0 default: wireguard. 
	 
	Bluetit run control file (/etc/airvpn/bluetit.rc) option:
 


airvpntype: (string) VPN type to be used for AirVPN connections. Possible values: wireguard, openvpn. Default: wireguard


	Goldcrest option:
 


--air-vpn-type, -f : VPN type for AirVPN connection &lt;wireguard|openvpn&gt;
 


	 
	Suspend and resume services for systemd based systems

 
For your comfort, the installation script can create suspend and resume services in systemd based systems, according to your preferences. allowing a more proper management of VPN connections when the system is suspended and resumed. The network connection detection code has also been rewritten to provide more appropriate behavior. 
 
 

	Asynchronous mode

 
A new asynchronous mode (off by default) is supported by Bluetit and Goldcrest, allowing asynchronous connections. Network Lock can be used accordingly in asynchronous connections. Please consult the readme.md file included in every tarball for more information and details. 
 

	Word completion on bash and zsh



	 
	Auto completion is now available by pressing the TAB key when entering any Goldcrest or Hummingbird option and filename on a bash or zsh interpreter. Auto completion files are installed automatically by the installation script. 
	 
	 
 


	AirVPN's VPN traffic splitting

 
AirVPN Suite version 2.0.0 introduces traffic splitting by using a dedicated network namespace. The VPN traffic is carried out in the default (main) namespace, ensuring all system data and traffic to be encrypted into the VPN tunnel by default. No clear and unencrypted data are allowed to pass through the default namespace. Any non-tunneled network traffic must be explicitly requested by an authorized user with the right to run cuckoo, the AirVPN traffic split manager tool. 
 
AirVPN's traffic splitting is managed by Bluetit and configured through run control directives. The system has been created in order to minimize any tedious or extensive configuration, even to the minimal point of telling Bluetit to enable traffic splitting with no other setting. 
 
In order to enable and control AirVPN's traffic splitting, the below new run control directives for /etc/airvpn/bluetit.rc have been implemented:


	
		allowtrafficsplitting: (on/off) enable or disable traffic splitting. Default: off
	
	
		trafficsplitnamespace: (string) name of Linux network namespace dedicated to traffic splitting. Default: aircuckoo
	
	
		trafficsplitinterface: (string) name of the physical network interface to be used for traffic splitting. All the unencrypted and out of the tunnel data will pass through the specified network device/interface. In case this directive is not used and unspecified, Bluetit will automatically use the main network interface of the system and connected to the default gateway. Default: unspecified
	
	
		trafficsplitnamespaceinterface: (string) name of the virtual network interface to be associated to the Linux network namespace dedicated to traffic splitting. Default: ckveth0
	
	
		trafficsplitipv4: (IPv4 address|auto) IPv4 address of the virtual network interface used for traffic splitting. In case it is set to 'auto', Bluetit will try to automatically assign an unused IPv4 address belonging to the system's host sub-network (/24) Default: auto
	
	
		trafficsplitipv6: (IPv6 address|auto) IPv6 address of the virtual network interface used for traffic splitting. In case it is set to 'auto', Bluetit will try to automatically assign an unused IPv6 address belonging to the system's host sub-network (/64) Default: auto
	
	
		trafficsplitfirewall: (on/off) enable or disable the firewall in Linux network namespace dedicated to traffic splitting. The firewall is set up with a minimal rule set for a very basic security model. Default: off
	

AirVPN's traffic splitting is designed in order to minimize any further configuration from the system administrator. To actually enable traffic splitting, it is just needed to set "allowtrafficsplitting" directive to "on" and Bluetit will configure the traffic split namespace with the default options as explained above. When needed, the system administrator can finely tune the traffic splitting service by using the above directives.


	 

 


	Power and limitations



	 



	The adopted solution offers a remarkable security bonus in terms of isolation. For example, it gets rid of the dangerous DNS "leaks in" typical of cgroups based traffic splitting solutions. However, the dedicated namespace needs an exclusive IP address. If the system is behind a NAT (connected to a home router for example) this is not a problem, but if the system is not behind any NAT, i.e. it is assigned directly a public IP address, you will need another public IP address for the network namespace dedicated to traffic splitting. You will need to manually set the other public IP address on the trafficsplitipv4 or trafficsplitipv6 directive as the guessing abilities of Bluetit may work only within a private subnet. Please keep this limitation in mind especially if you want to run the Suite with per app traffic splitting on a dedicated or virtual server in some datacenter, as they are most of the times NOT behind any NAT.
 


	 
 


	Introducing Cuckoo, the AirVPN traffic splitting manager tool

 
To generate out of the tunnel traffic, any application software must be run inside the "traffic split" namespace by using the dedicated traffic split tool cuckoo which can be run by users belonging to the airvpn group only. It cannot be used by the superuser. 
 
The usage is documented in the manual and on the inline help.

	 
	The traffic split namespace uses its own routing, network channels and system DNS. It will not interfere or communicate in any way with the default namespace using its own encrypted tunnel.
 


	 
 


	Programs started with cuckoo are regular Linux processes and, as such, can be managed (stopped, interrupted, paused, terminated and killed) by using the usual process control tools. The programs started by cuckoo are assigned to the user who started cuckoo. 
	 
	As a final note, in order to work properly, the following permissions must be granted to cuckoo and they are always checked at each run.
 


	
		
			Owner: root
		 
	
	
		
			Group: airvpn
		 
	



	Permissions: -rwsr-xr-x (owner can read, write, execute and setuid; group can read and execute, others can read and execute) 
	 
 


	Special note for snap packages users



	Snap is a controversial, locking-in package management system developed by Canonical and praised by Microsoft. It packages applications as snaps, which are self-contained units that include all necessary dependencies and run in a sandboxed environment in its default namespace. Therefore, "snap" applications will bypass the order by the system via Cuckoo to have an application running in one specific namespace created for reverse traffic splitting. As a result, snap applications will jettison the Suite's reverse traffic splitting feature. Currently, you must avoid snap packages of those applications whose traffic must flow outside the VPN tunnel. The issue is particularly relevant ever since Ubuntu migrated certain packages exclusively to Snap, such as Chromium and Firefox. At the moment it is still possible to eradicate snap from various distributions, including Ubuntu, quickly.
 


	 



	Special note for firewalld users

Please read here, it's very important: https://airvpn.org/forums/topic/70164-linux-network-lock-and-firewalld/ 
 

	AirVPN Switch User Tool Airsu



	Running an application in a graphical environment requires a user having a local environment properly set, in particular variables and access to specific sockets or cookies. They are usually set at the moment of graphical login, while they may not be properly set in case a user logged in by using the system tool su. 
	In this specific case the user will not probably be allowed to access the graphical environment, so any GUI application will not start. 
	AirVPN’s airsu is used for this specific purpose and configures the user environment to the current X.Org (X11) or Wayland based manager, thus allowing access to GUI applications when run through cuckoo. 
	 
 


	Note on GUI software and Web Browsers

Complete compatibility with both X11 and Wayland based environments has been implemented.


	 
	Because of the specific Linux architecture and namespaces, some applications may need to specify the graphical environment in order to start and use the currently selected window manager on an X.Org (X11) or Wayland based habitat. Cuckoo can automatically do this by “injecting” predefined options to some preset applications, in particular those based on the chromium engines, most of them being web browsers. To see the list of predefined applications, please start cuckoo with --list-preset-apps option. 
	 
	When running an application with cuckoo, the user should make sure to actually start a new instance. This is usually granted by starting an application from the command line (such as running it with cuckoo). By starting an application from the desktop environment this may not happen. 
	 
 


	Download AirVPN Suite 2.0.0

The Suite is available in various flavors: ARM 64 bit, ARM 64 bit legacy, ARM 32 bit, ARM 32 bit legacy, x86-64 and x86-64 legacy. Download page:  
https://airvpn.org/linux/suite/


	 
	 
	Changelog and source code

Changelog for each component is available inside each package and on GitLab. Source code is available on GitLab: 
https://gitlab.com/AirVPN/AirVPN-Suite 
 
Kind regards and datalove 
AirVPN Staff]]></description><pubDate>Fri, 25 Jul 2025 08:34:54 +0000</pubDate></item><item><title>Metallah server withdrawal announcement (US)</title><link><![CDATA[https://airvpn.org/forums/topic/73218-metallah-server-withdrawal-announcement-us/?do=findComment&comment=252647]]></link><description>Hello! 
 
We're sorry to inform you that due to sloppy support by the datacenter provider (Racklot) we have decommissioned the server Metallah. Metallah went down on June the 18th, 2025, because IP addresses were null-routed. After more than a month, in spite of various contacts and solicitations, Racklot still fails to restore the routing. Our patience is over and we're acting accordingly. This was the last server still not supporting IPv6 (again for the laziness and the sloppy behavior of Racklot), so we finally have IPv6 support on every and each server. 
 
Kind regards</description><pubDate>Sun, 20 Jul 2025 08:27:27 +0000</pubDate></item></channel></rss>
