Jump to content
Not connected, Your IP: 216.73.216.49

Leaderboard


Popular Content

Showing content with the highest reputation on 06/22/25 in all areas

  1. 1 point
    Are there any settings I can change in Eddie, that would help access sites that block vpn's by default? Thanks!
  2. 1 point
    fsy

    How effective is VPN really?

    My use cases show it's not. 1. I connect to a VPN to jump to I2P and Tor when they are blocked by specific ISP that lets AirVPN connections but not Tor's. Once the VPN connection is live I can then connect to Tor or I2P and further enhance identity protection and actually hide how I use the Internet from the ISP. 2. I use the VPN even with an ISP that does not enforce blocks, in order to access medical sites, use political tools and any other activity I am not comfortable to let my ISP know or store for years - since in some countries there's mandatory data retention from one to six years of all traffic including metadata. Tor would do the same but most Tor exit nodes block specific connections, or the final service block Tor, or the service I need would be too slow for the Tor network. Typically when I have to download large documents and tools whose source would provide important clues (that would remain stored for years for data retention again) regarding my health status, my political preferences and any other thing I don't want to be potentially used for profiling or other purposes by my ISP - and everyone accessing my ISP data - , and/or stored for years. 3. I connect to a VPN when I am forced to use a crappy ISP that shapes anything, literally anything, except HTTP-S and makes FTP and anything else a pain. By connecting on TCP to port 443 I can enjoy FTP and some other protocols full speed, even when the activity is not privacy sensitive. In this case too Tor is very problematic for performance and because most exit nodes block some destination ports I need for FTP etc. These are my own use cases and I think that they are not uncommon. I guess that a few bucks a month is a fair price even for one of them. OK, case 3 is not very privacy-related and could be off topic from your initial message, but it shows how a VPN can be worthy in occurrences not strictly privacy related.
  3. 1 point
    BettyIsBoop

    Rapidgator IP listing

    I try to download some files hosted on rapidgator. For example : https://rapidgator.net/file/3beb278dab934f9724bba53940b1d49e/SBot12.zip.html I already added a lot of IP out of VPN for rapidfator, then I can start to enter the captcha, and after waiting time :i have Denied by IP alert (using jdownloader, but same with web). The i try listing all the rapidgator IP to put out pof VPN , here start tyhe list 195.211.220.0/24 195.211.221.0/24 195.211.222.0/24 195.211.223.0/24 188.130.164.0/24 109.202.105.0/24 (ULTRANET) But i still have Denied by IP after captcha. Someone know where to get the IP list of rapidgator ?
  4. 1 point
    Hi everyone, I'm using AirVPN through WireGuard on my OpenWrt router (latest stable version), but I'm having trouble getting IPv6 to work properly. IPv4 traffic goes through the VPN just fine, but IPv6 traffic does not. Here are my relevant settings and config: // network: config interface 'loopback' option device 'lo' option proto 'static' option ipaddr '127.0.0.1' option netmask '255.0.0.0' config globals 'globals' option ula_prefix 'fdef:xxxx:xxxx::/48' option packet_steering '1' config device option name 'br-lan' option type 'bridge' list ports 'lan1' list ports 'lan2' list ports 'lan3' list ports 'lan4' config interface 'lan' option device 'br-lan' option proto 'static' option ipaddr '192.168.1.1' option netmask '255.255.255.0' option ip6assign '60' config interface 'wan' option device 'wan.10' option proto 'dhcp' option peerdns '0' list dns '1.1.1.2' config interface 'wan6' option device 'wan.10' option proto 'dhcpv6' option reqaddress 'try' option reqprefix 'auto' option peerdns '0' list dns '2606:4700:4700::1112' config device option type '8021q' option ifname 'wan' option vid '10' option name 'wan.10' config interface 'vpn' option proto 'wireguard' option private_key '***REDACTED***' list addresses '10.x.x.x/32' list addresses 'fdxx:xxxx:xxxx:xxxx::xxxx/128' config wireguard_vpn 'wgserver' option public_key '***REDACTED***' option preshared_key '***REDACTED***' option endpoint_host 'xxx.xxx.xxx.xxx' option endpoint_port '1637' option persistent_keepalive '15' option route_allowed_ips '1' list allowed_ips '0.0.0.0/0' list allowed_ips '::/0' // firewall config defaults option syn_flood '1' option input 'REJECT' option output 'ACCEPT' option forward 'REJECT' config zone 'lan' option name 'lan' list network 'lan' option input 'ACCEPT' option output 'ACCEPT' option forward 'ACCEPT' config zone 'wan' option name 'wan' list network 'wan' list network 'wan6' list network 'vpn' option input 'REJECT' option output 'ACCEPT' option forward 'REJECT' option masq '1' option mtu_fix '1' config forwarding option src 'lan' option dest 'wan' # IPv6-related firewall rules omitted for brevity but mostly default ICMPv6 & DHCPv6 Despite ::/0 being in the allowed_ips for the WireGuard interface, my IPv6 traffic still seems to go out through the regular WAN or not at all. Does anyone know what I'm missing or how to properly force all IPv6 traffic through the VPN tunnel like IPv4? Thanks in advance!
  5. 1 point
    Hello! Eddie should allow the execution of binaries when they are not owned by root, only if they pass the checksum verification. If they don't, only files owned by root will be run with root privileges. The files packaged with Eddie should pass the checksum verification. Why it does not happen is a matter of an ongoing investigation by the developers. With that said, the system refusal to change ownership even to the superuser is probably caused by a terminal that's not allowed to have full disk access, according to System Integrity Protection. You should grant Terminal program full disk access in the following way: Make sure that Terminal is not running. Open System Preferences > Security & Privacy from the Apple menu.. Click the padlock icon at one corner of the window and enter your administrator password to make changes. Go to the Privacy tab. Click the [+] button at the bottom of the list on the right. Navigate to Terminal program location in the Applications folder ([...]/Applications/Utilities/Terminal). Add Terminal to the list and make sure that its checkbox is ticked. Then, open the terminal and try again to change ownership of the relevant files sudo chown root <full path and name of the file> You will need to change ownership of both wg and wireguard-go files. Kind regards
×
×
  • Create New...