Jump to content
Not connected, Your IP: 3.139.108.48

Leaderboard


Popular Content

Showing content with the highest reputation on 03/08/24 in Posts

  1. 1 point
    freyjamir

    Unraid + Qbittorrent + AirVPN

    Hello, I'm not well versed in networking so I'm sorry if my question is incredibly dumb. Right now I've got Qbittorrent working on docker in my Unraid server, it's working well in downloading but doesn't upload anything. I've already open a port for it and modify it on my docker configuration. Am I missing something ? Thank you for your time
  2. 1 point
    I may have had similar issue as OP. For me the CPU usage of Eddie-UI.exe was in range od 0.5%-3% constantly (even when Eddie was hidden in the tray). Since Eddie is open-source and I'm a .NET engineer (I troubleshot a lot of app performance problems at work) I sat one Saturday afternoon and found that the issue was in the method call that gets network interfaces from system. The fix is a couple lines of code - store NetworkInterface objects in process memory (monitor for changes) and call GetIPv4Statistics() on them instead if creating new ones every time. I'm running with this custom Eddie build for over a year now without observing regressions and the CPU usage is stable at 0.0-0.1% in background After seeing this topic I re-tested with and without the patch on version 2.24.2. The results are visible on the screenshots. @Staff Feel free to test this patch [git apply file.patch] I'm using Windows - haven't tested other platforms BR network-interface-get-improvement.patch
  3. 1 point
    I was digging around CourtListener RECAP - a free archive of US court cases containing some public court records from PACER that have been uploaded to it by CourtListener RECAP users - and decided to search for AirVPN. I found several hits in the case United States v. Klyushin (https://www.courtlistener.com/docket/61629108/united-states-v-klyushin/) and the very basic gist of this case is that Klyushin was convicted of hacking into a few financial firms to do insider trading. If you go to the CourtListener page linked above you can access all the PACER court documents that have been uploaded to RECAP. Just to clear up any misunderstandings these are all public federal court records that have been freely made available through RECAP. The most interesting of the documents from the case is #183 (https://www.courtlistener.com/docket/61629108/183/united-states-v-klyushin/) which is a transcript of day 4 of the jury trial. (PDF attached to this post.) Within this transcript it is stated: 1. IP address 185.228.19.147 (incorrectly said 288 here, but 228 elsewhere) belongs to DediPath, and was used by AirVPN (pg. 132). 2. A "pen register" or "trap and trace" was placed on this IP address which is a "caller ID of who is communicating with that IP address" (pg. 133). 3. The pen register was authorized by a federal judge (pg. 133). 4. The pen register was active on that IP address from January 28th, 2020, to February 23rd, 2020 (pg. 135). 5. The pen register records were from DediPath, the transcript does not state any involvement or knowledge by AirVPN (pg. 138). Document #217 (https://www.courtlistener.com/docket/61629108/217/united-states-v-klyushin/) is a transcript of day 9 of the jury trial. (Also attached to this post.) It provides confirmation of point 5 above and offers more detail on what the pen register captures: 1. The pen register was "sent to the company that hosted the destination IP" meaning DediPath directly (pg. 38). 2. The pen register captured headers only, meaning timestamps of packets, inbound and outbound, and directionality, but not any content of packets (pg. 38-39). This is quite interesting as I have seen this sort of tap hypothesized as something that could be used to log VPN servers, without the provider's knowledge (no matter what provider) - but up until now I was only aware that it was possible, not that it had actually been done. gov.uscourts.mad.232574.183.0.pdf gov.uscourts.mad.232574.217.0.pdf
×
×
  • Create New...