Jump to content


Photo

Important notice about security


  • Please log in to reply
3 replies to this topic

#1 Staff

Staff

    Advanced Member

  • Staff
  • PipPipPip
  • 4500 posts

Posted 23 September 2011 - 02:51 PM

An "HideMyAss" VPN service user identity has been compromised and as a consequence personal freedom of the customer is now at stake. http://arstechnica.c...ctures-hack.ars

As a consequence, apparently to defend their activity by saying that they did nothing more than any other provider would have done, HideMyAss released a series of statements which are not correct.

For example, they claimed that "all VPN providers keep logs. When there was a court order issued to them, they WILL release it". On top of that, they released on their website a communiqué which, in our opinion, is harmful to the professional reputation and to the the status of mere conduit of a service provider.

For the aforementioned reasons, we would like to re-assure our users and our customers that nothing like that may happen with AirVPN, for a series of legislative (we are based in the EU, not in the USA, and we don't recognize USA jurisdiction, obviously) and above all technical reasons.

When we built our infrastructure we had in mind access from people who live in freedom of expression extremely hostile areas, where identity disclosure can lead to critical threats to physical safety and to personal freedom. Therefore we have planned solutions designed to give higher security and stronger anonymity layers which can be used by anyone.

These solutions have been designed so that you don't need to have "faith" in what we say (for example, when we say "we don't keep logs", how can you trust us if you're outside activists circles?), but to be inherently secure, regardless of what you think of us and regardless of which pressures we might receive from enforcement or criminal entities.

The key is that we must NOT know who you are (on the other hand, EU law prohibits us to investigate privately about your personal data and real identity, or to monitor your communications).

1) If you don't wish to leave a trail payment, the most secure way is to buy an account via our authorized Bitcoin reseller http://bitcoincodes.com. We encourage you to use TOR when you buy an account there and use the BitCoin client via TOR, to protect the Bitcoin payment with a layer of anonymity (Bitcoin per se is not really anonymous for transactions).

2) For extremely critical data transfer (whistleblowers, reports on organized crimes, etc.) please consider to use AirVPN over TOR. A simple example: https://airvpn.org/tor
Please note that it is not TOR over VPN, it's VPN over TOR.

3) If/when you need to communicate with us, always use a secure and safe e-mail account which can't be used to reveal your identity. In this way you can buy an account via Bitcoin or LibertyReserve by directly asking to us.

For some further information, you might be interested in reading this post: https://airvpn.org/i...Itemid=142#1745

If you live in freedom of expression hostile areas and you can't afford the payment, you can obtain a free access. Feel free to contact us. Some free access coupons are usually available also from the Telecomix cluster (best way to reach them is through their IRC servers).

Kind regards and datalove
AirVPN

#2 bubblebobble

bubblebobble

    Newbie

  • Banned
  • Pip
  • 5 posts

Posted 11 August 2013 - 08:13 AM

2) For extremely critical data transfer (whistleblowers, reports on organized crimes, etc.) please consider to use AirVPN over TOR. A simple example: https://airvpn.org/tor
Please note that it is not TOR over VPN, it's VPN over TOR.

I followed those instructions, and I've paid to use AirVPN over Tor for 6 months so far. I examined firewall logs and see that before a VPN connection is established over Tor, first your software will circumvent Tor and send my real IP address directly to AirVPN servers. Why is your software sending my real IP address to your servers?



#3 Staff

Staff

    Advanced Member

  • Staff
  • PipPipPip
  • 4500 posts

Posted 11 August 2013 - 10:15 AM

Hello,

 

the Air client connects to airvpn.org to retrieve the servers list etc. Use OpenVPN directly or OpenVPN GUI in order not to connect to airvpn.org. Anyway if you run OpenVPN over TOR, your real IP address is not communicated to any VPN server, client or not.

 

Kind regards



#4 VPS

VPS

    Newbie

  • Members
  • Pip
  • 8 posts

Posted 06 September 2013 - 11:00 PM

Hello,

the Air client connects to airvpn.org to retrieve the servers list etc. Use OpenVPN directly or OpenVPN GUI in order not to connect to airvpn.org. Anyway if you run OpenVPN over TOR, your real IP address is not communicated to any VPN server, client or not.

Kind regards



Informationweek (http://www.informati...sscom/231602248) writes:
>>Likewise, for extremely critical activities--"whistleblowers, reports on organized crimes"-- it recommended using VPN over Tor. "Please note that it is not Tor over VPN, it's VPN over Tor," it said.





Similar Topics Collapse

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Servers online.Servers online.
Users: 2504 - BW: 7021 Mbit/s
Not connectedNot connected.
Your current IP: 50.17.162.174
Guest Access.