If you query Air's DNS servers and you view certain websites, your connection is redirected through a rerouting server. A list of these rerouting servers is at the bottom of the Status page. So I connect to Kitalpha in CH and want to view the german ARD stream of the FIFA World Cup for some crazy reason. General connection would be
ME <> Kitalpha <> ARD
ARD logs a connetion from Kitalpha which is in Switzerland. ARD only permits viewing it from Germany. Geoblock. That's what we call it. Geolocation is something different. This rerouting makes supporting websites do something like this, but only if AirVPN knows you are heading there, therefore, the DNS query must go to Air's DNS on 10.xxx.0.1 (leaks should therefore be prevented):
ME <> Kitalpha <> DE <> ARD
ARD logs a connection from DE which is in Germany. Geoblock circumvented, have fun watching men cry on every touch. There is a very good portion of paranoia in the terms 14-eyes country and 5-eyes country. No one really knows what these mean, what kind of a threat they stand for. They just pop up when it comes to discussing anonymity. Be aware that VPNs are pseudonymous connections. They create loud noises in networks, making them neither untraceable nor indisruptable. It's a tech to securely connect two endpoints, such as your home and your company. Pretty much everyone between you and AirVPN knows of this connection if someone bothers to dig a little deeper. He/she only have difficulty in seeing the contents of the tunnel. Problem is the same as with good old mail encryption. It will encrypt the contents but I'm more interested whether you contacted breivik.a@naziparty.no sometime, anyway. Or whether you have a certain number belonging to Said or Cherif Kouachi in your WhatsApp contact history (unlikely, but in principle...) Because the really interesting shit is never encrypted. This is what your paranoia should be directed at if you insist on it.