Jump to content
Not connected, Your IP: 18.117.105.215

Leaderboard


Popular Content

Showing content with the highest reputation on 11/05/23 in Posts

  1. 1 point
    Actually, this is not necessary at all unless you don't want that server to be reachable on the physical interface. Well, you will need to specify the port at all times. If you don't want that, you absolutely need a reachable port 80/443 on some machine reverse-proxying requests to the domain.com machine.
  2. 1 point
    Hello! We're not aware of any security concern as they are layers "on top" of well tested tunnels without known vulnerabilities. Currently Russia and China users can access AirVPN, however should the need arise we strongly recommend Tor with private bridges with various pluggable transports. We have invested a lot on Tor infrastructure (see our mission), including support for an important amount of worldwide Tor exit nodes traffic, and Tor is free for everybody. No matter the obfuscation technique employed, a country or ISP can block any VPN service (and other services operated by small or average sized companies) by harvesting and blocking its servers IP addresses, a task which, on the contrary, becomes quite difficult with Tor, where volunteers all around the world set up private Tor bridges every day. https://bridges.torproject.org/ Kind regards
  3. 1 point
    In case anyone finds this thread and has the same question, I raised a ticket and got the below reply which worked perfectly for me.
  4. 1 point
    Yes, it's annoying. I know your thinking, unknown TOR exit runners, you want to help the TOR network by providing one more exit node, because kind of I am afraid of possible legal consequences running a TOR exit node over my ISP line but now I'm behind a VPN and I want to help; it's okay so far. But it's not okay to not take into consideration that some of us use services and websites which constantly try to prevent TOR exit IPs from viewing them (not limited to TOR, some try to block all anonymizer services). A TOR server will be listed on a TOR exit servers list even after you shut it down and as long as it's there we suffer from blocks. Blocks we are trying to circumvent; that's what a proxy service is good for, right? In addition, AirVPN run two exits themselves. Given the bandwidth of these servers (100 MBit/s) I don't think your contribution is a great gain in overall TOR performance as your internet connection is most probably not that fast and not that stable (I assume you use your internet to watch Netflix, play games online and the like, creating traffic which lowers performance of the node). Third, you expose AirVPN and yourself to attacks from the internet by those who want to literally destroy TOR. Attacks on AirVPN's servers will cause line problems, line problems harm the user's experience. You as a TOR exit runner (although behind a VPN) expose yourself to attacks, too: It's not the AirVPN server who gets infected because a vulnerability in the TOR software is being abused; it's your computer. Your computer gets infected, and it's most probably your personal computer with your personal information on it. Your antivirus software is just a bunch of algorithms, too, it's not supposed to detect 100% of vulnerabilites in software and prevent their abuse. And: It's you who will be marked an extremist. If you think it's easy these days to help TOR you are mistaken. Maybe installation and setup is easy, to preserve your own security by running this piece of software sadly is not. So, before you start that TOR software again, think twice. Thank you.
×
×
  • Create New...