Jump to content
Not connected, Your IP: 216.73.216.108

Leaderboard


Popular Content

Showing content with the highest reputation on 12/23/25 in all areas

  1. 1 point
    With IPv6 allowing practically infinite IPs it should be possible to assign a dedicated IPv6 address to each connection, allowing incoming connections to any port to be forwarded. This would be a great way to circumvent the port forwarding restrictions on IPv4 that exist because multiple clients have to share the same exit IP, and I think would make for a nice optional feature.
  2. 1 point
    Looking in Eddie, I can deduce a possible reason. If the scoring rule is set to Speed, which is the default, only four servers actually get a non-zero score, putting only those four into consideration of the Connect to best server function. The client count reflects that. I quick-tested a connection to Sweden on Android, and Copernicus was chosen to be the best server.. huh. Also interesting: The first three are hosted by Altushost, Segin is Netrouting, rest seems to be Kustbandet. ISP might play a role here, too.
  3. 1 point
    Tech Jedi Alex

    Red UI jumpscare reaction

    Yeah. You could say it's been defaced. Use the 😈 goddamn 👺 emojis "<evil grin>" this is so cringe lmao
  4. 1 point
    Privacy is not the only only reason to use a VPN. Also, while it would be possible to assert that traffic going to a specific IP is tunneled to the same end user, going through a VPN means you still don't know who that end person is or where they're located based on their IP. And since we're talking about incoming traffic, this kind of analysis is already possibly by also looking at the destination port of the incoming connection. This wouldn't affect IPv4 port forwarding. All IPv4 connections would still use a shared IPv4 exit address. It wouldn't even affect port forwarding for IPv6 users that don't enable this feature. This would just be an option to get a dedicated exit IP that would forward all traffic statelessly. Traffic going to the shared exit IPs would go through the same port forwarding translations it already does.
  5. 1 point
    zimbabwe

    More tunneling options

    Anyway I understand your position, no problem. Like Russians say "Сытый голодного не разумеет" ("the well-fed does never understand the hungry").
  6. 1 point
    zimbabwe

    More tunneling options

    You know, it's sort of sad to think that you must fall into the darkness just because you are not belonging to the "overwhelming majority of the world". China, Russia, Belarus, Venezuela, Turkmenistan, Egypt, Turkey. Who's next? I know we are all the "third world" but we are people and want the information! If no one will lend us a hand from the greater world, where life is still okay, we won't ever make it out of the darkness.
  7. 1 point
    Yes, it's annoying. I know your thinking, unknown TOR exit runners, you want to help the TOR network by providing one more exit node, because kind of I am afraid of possible legal consequences running a TOR exit node over my ISP line but now I'm behind a VPN and I want to help; it's okay so far. But it's not okay to not take into consideration that some of us use services and websites which constantly try to prevent TOR exit IPs from viewing them (not limited to TOR, some try to block all anonymizer services). A TOR server will be listed on a TOR exit servers list even after you shut it down and as long as it's there we suffer from blocks. Blocks we are trying to circumvent; that's what a proxy service is good for, right? In addition, AirVPN run two exits themselves. Given the bandwidth of these servers (100 MBit/s) I don't think your contribution is a great gain in overall TOR performance as your internet connection is most probably not that fast and not that stable (I assume you use your internet to watch Netflix, play games online and the like, creating traffic which lowers performance of the node). Third, you expose AirVPN and yourself to attacks from the internet by those who want to literally destroy TOR. Attacks on AirVPN's servers will cause line problems, line problems harm the user's experience. You as a TOR exit runner (although behind a VPN) expose yourself to attacks, too: It's not the AirVPN server who gets infected because a vulnerability in the TOR software is being abused; it's your computer. Your computer gets infected, and it's most probably your personal computer with your personal information on it. Your antivirus software is just a bunch of algorithms, too, it's not supposed to detect 100% of vulnerabilites in software and prevent their abuse. And: It's you who will be marked an extremist. If you think it's easy these days to help TOR you are mistaken. Maybe installation and setup is easy, to preserve your own security by running this piece of software sadly is not. So, before you start that TOR software again, think twice. Thank you.
×
×
  • Create New...