Jump to content
Not connected, Your IP: 216.73.216.44

Leaderboard


Popular Content

Showing content with the highest reputation on 08/25/21 in all areas

  1. 2 points
    blueport26

    Server replacement (UK)

    The problem with M247 is that they are the most widely used server provider across VPNs (and probably one of the cheapest), they have POPs in many cities. Some sites already block access solely on IP ranges used by M247. I suspect that it's really hard to find a new hosting/datacenter that will match all the security criteria and be traffic neutral (because of torrent seeding - DMCAs). From time to time I've used the servers that are in replacement now, and they gave me good speeds. Let's hope the new ones will be as good as old ones Regarding the content blocking. I've tested some other VPNs and found one that is doing something innovative in this regard. From what I could find they are somehow faking the IP address when I visit sites like ipinfo.io (which provide API for blockers). I think that allows them to bypass many restrictions while still hosting their servers at M247. Still I don't think we'll ever have a 100% working solution. Once workaround is found a new mechanism will be implemented by sites like netflix etc.
  2. 1 point
    Staff

    Article on VPN traffic tracing

    @airvpnforumuser 1) Irrelevant if not wasteful given PFS. Client certificate and keys do not allow decryption of traffic, so one that steals them has indeed nothing to decrypt. 2) That's up to the user. We think it's a bad idea to force renewal of a key of a simple API, for some good reasons tied to customers' behavior and needs. 3) Fluff and nonsense if referred to client certificate and static key. About PFS, what you propose is insecure, because by "rotating" key you would use the same keys over and over, periodically, so you violate the basic paradigm of Forward Secrecy, OpenVPN implements PFS, uses a one time key and renews it every 60 minutes by default. You can decide an arbitrary renewal time (<=60 minutes) and you will never use the same key again. 4) It's already possible (since 2012) but we ask you to contact us to do so. Our requirement is caused by attempted frauds in the past. 5) So what? 6) That was done recently, in 2019 if we recall it correctly. Due to some technical limitations with IPB you must anyway enter at least a character in your e-mail field, but that's all. In order not to overlap with other existing e-mail field contents. just enter a random string. 7) Incredibly awful and dangerous idea about server rotations, and we can easily see why no provider offers it. Key "rotation" is also a terrible idea, we (and OpenVPN) have something much better, check 3). We are very sorry to see how even our own customers are misinformed about AirVPN features or ignore essential features which have been implemented since years ago. We must be making mistakes in our communications, we will perform an internal exam (but we will not pay parasite reviewers to avoid that they hide such features, of course ). Kind regards
  3. 1 point
    Staff

    Article on VPN traffic tracing

    Hello! If all tier1 transit providers co-operated with each other to exchange all of their data and could do that with impunity in every country, you would have a global adversary-like entity, against which you can't prevent correlations between source and destination of a packet of yours.. You can protect your data content against the global adversary trivially (end-to-end encryption), but you can't hide the real destination and source of your own communications (provided that you don't perform illegal war-driving and similar actions of course). What you can do is making the correlation as expensive as possible, in order to render data harvesting through correlations no more financially attractive, as long as you are not a high profile target. Please read the following, old article of ours: https://airvpn.org/forums/topic/54-using-airvpn-over-tor/?do=findComment&comment=1745 Kind regards
  4. 1 point
    arteryshelby

    Server replacement (UK)

    Not only Latency.. They also fake geolocations and AirTeam still not admits this. For example Berlin Location is not Berlin but actually Frankfurt. Barcelona is not Bareclona but Madrid..
  5. 1 point
    Tech Jedi Alex

    Vpn détection

    I entered some of my VPS addresses, all are VPNs despite not being used for VPN purposes. Doesn't detect crap, just searches for database entries condemning everything that is not a residential IP to be a VPN without checking. And they even want to be paid for that. No words 🤐 For this site? Hack into someone's computer and use his/her internet. Voila, you're a normal user. For other scripts trying to actually detect VPN usage by looking at the MTU for example, probably. In theory, it all comes down to knowing what those detectors look at, then you adjust what they look at and see if it works.
×
×
  • Create New...