Jump to content
Not connected, Your IP: 3.227.3.146

Leaderboard


Popular Content

Showing content with the highest reputation since 10/18/19 in Posts

  1. 7 points
    Staff

    Spooky Halloween Deals

    Hello! We reluctantly have to announce gloomy news to you all: Spooky Halloween Deals are now available in AirVPN... Save up to 74% on AirVPN longer plans (*) (*) When compared to 1 month plan price Check all plans and discounts here: https://airvpn.org/plans If you're already our customer and you wish to jump aboard for a longer period any additional plan will be added on top of already existing subscriptions and you will not lose any day. Every plan gives you all the features that made AirVPN a nightmare for snoopers and a scary service for competitors: active OpenVPN 3 open source development ChaCha20 cipher on OpenVPN Data Channel for higher performance and longer battery life on tablets and smart phones IPv6 support, including IPv6 over IPv4 configurable remote port forwarding refined load balancing to squeeze every last bit per second from VPN servers free and open source software for Android, Linux, Mac and Windows easy "Configuration Generator" web interface for access through third party software guaranteed minimum bandwidth allocation GDPR compliance and very high standards for privacy protection no log and/or inspection of clients' traffic effective traffic leaks prevention by AirVPN software Tor support via AirVPN software on Linux, Mac and Windows various cryptocurrencies accepted without any intermediary crystal clear, easy to read Privacy Notice and Terms https://airvpn.org/privacy No tricks, only treats! Grim regards & datathrills AirVPN Staff
  2. 3 points
    Hello! We are very glad to introduce a new client software for Linux 64 bit and Linux Raspbian 32 bit (which is frequently installed in Raspberry PI), based on our own AirVPN OpenVPN 3 library. The software is an initial and temporary step toward a more refined product to meet right now various demands by many Linux and *BSD users. It does not have a code name yet, and it is just "AirVPN OpenVPN 3 client" at the moment. It will evolve in to an integrated client and daemon targeting Linux, Mac, OpenBSD and FreeBSD platforms. Main features: lightweight and stand alone binary no heavy framework required, no GUI tiny RAM footprint (less than 3 MB currently) lightning fast based on OpenVPN 3 library fork by AirVPN with tons of critical bug fixes from the main branch, new ciphers support and never seen before features ChaCha20-Poly1305 cipher support on both Control and Data Channel providing great performance boost on Raspberry PI and any Linux-based platform not supporting AES-NI robust leaks prevention through Network Lock based either on iptables or nftables through automatic detection proper handling of DNS push by VPN servers, working with resolv.conf as well as any operational mode of systemd-resolved additional features Versions for Mac, FreeBSD and OpenBSD will follow in the near future. The software is currently in alpha stage and it must be therefore and implicitly considered unstable and under development. Source code will be made public at the release of a stable version. If you wish to test, feel free to download the binaries here and report in this very thread any bug, glitch and anything you wish: Linux 64 bit version: https://eddie.website/repository/eddie/airvpn-static1.0alpha/airvpn-static-linux-1.0-alpha2.tar.gz Raspbian 32 bit version: https://eddie.website/repository/eddie/airvpn-static1.0alpha/airvpn-static-raspberry-1.0-alpha2.tar.gz How to install AirVPN client for Linux x86_64 and Raspberry Requirements ------------ Linux x86-64 CPU/architecture A reasonably recent 64 bit Linux distribution tar sha512sum (optional) Raspberry Linux Raspbian distribution tar sha512sum (optional) Linux Installation ------------------ Download airvpn-static-linux-1.0-alpha2.tar.gz [optional] Download airvpn-static-linux-1.0-alpha2.tar.gz.sha512 This file is required to check the integrity of the above tar archive. It is not mandatory but it is strongly advised to download this file and check the tar archive [optional] Open a terminal window [optional] Check the integrity of the tar archive by issuing this command: "sha512sum --check airvpn-static-linux-1.0-alpha.tar.gz.sha512" (without quotes) [optional] Make sure the command responds with "airvpn-static-linux-1.0-alpha.tar.gz: OK" Change your current directory to a convenient place, such as your home directory. This can be done by issuing the command "cd ~" (without quotes) Extract the tart archive by issuing this command on your terminal window: tar xvf airvpn-static-linux-1.0-alpha.tar.gz The process will create a directory airvpn-static-linux-x86_64 Issue the "cd airvpn-static-linux-x86_64" (without quotes) [optional] Check the integrity of the binary file airvpn. Issue this command from your terminal window: sha512sum --check airvpn.sha512" (without quotes) [optional] Make sure the command responds with "airvpn: OK" [optional] Check dynamic library availability. Issue the command "ldd airvpn" and make sure all the required dynamic libraries are available. No line of the output must contain "not found" the Linux client is now ready to be used and possibly copied to a different directory of your system. Please note the client needs root privileges. Your user must therefore be included in your system's "sudoers" (depending on specific Linux distribution) Raspberry/Raspbian Installation ------------------------------- Download airvpn-static-raspberry-1.0-alpha2.tar.gz [optional] Download airvpn-static-raspberry-1.0-alpha2.tar.gz.sha512 This file is required to check the integrity of the above tar archive. It is not mandatory but it is strongly advised to download this file and check the tar archive [optional] Open a terminal window [optional] Check the integrity of the tar archive by issuing this command: "sha512sum --check airvpn-static-raspberry-1.0-alpha.tar.gz.sha512" (without quotes) [optional] Make sure the command responds with "airvpn-static-raspberry-1.0-alpha.tar.gz: OK" Change you current directory to a convenient place, such as your home directory. This can be done by issuing the command "cd ~" (without quotes) Extract the tart archive by issuing this command on your terminal window: tar xvf airvpn-static-raspberry-1.0-alpha.tar.gz The process will create a directory airvpn-static-raspberry Issue the "cd airvpn-static-raspberry" (without quotes) [optional] Check the integrity of the binary file airvpn. Issue this command from your terminal window: sha512sum --check airvpn.sha512" (without quotes) [optional] Make sure the command responds with "airvpn: OK" [optional] Check dynamic library availability. Issue the command "ldd airvpn" and make sure all the required dynamic libraries are available. No line of the output must contain "not found" the Raspberry/Raspbian client is now ready to be used and possibly copied to a different directory of your system. Please note the client needs root privileges. Your user must therefore be included in your system's "sudoers" Running the Client ------------------ Run the client and display its help and become familiar with its options. From your terminal window issue this command: sudo ./airvpn --help After having entered root password, the client responds with: AirVPN OpenVPN 3 Client 1.0 alpha 1 usage: ./airvpn [options] <config-file> [extra-config-directives...] --help, -h : show this help page --version, -v : show version info --eval, -e : evaluate profile only (standalone) --merge, -m : merge profile into unified format (standalone) --username, -u : username --password, -p : password --response, -r : static response --dc, -D : dynamic challenge/response cookie --cipher, -C : encrypt packets with specific cipher algorithm (alg) --proto, -P : protocol override (udp|tcp) --server, -s : server override --port, -R : port override --ncp-disable, -n : disable negotiable crypto parameters --network-lock, -N : enable/disable network filter and lock (on|off, default on) --gui-version, -E : set custom gui version (text) --ignore-dns-push, -i : ignore DNS push request and use system DNS settings --ipv6, -6 : IPv6 (yes|no|default) --timeout, -t : timeout --compress, -c : compression mode (yes|no|asym) --pk-password, -z : private key password --tvm-override, -M : tls-version-min override (disabled, default, tls_1_x) --tcprof-override, -X : tls-cert-profile override (legacy, preferred, etc.) --proxy-host, -y : HTTP proxy hostname/IP --proxy-port, -q : HTTP proxy port --proxy-username, -U : HTTP proxy username --proxy-password, -W : HTTP proxy password --proxy-basic, -B : allow HTTP basic auth --alt-proxy, -A : enable alternative proxy module --dco, -d : enable data channel offload --cache-password, -H : cache password --no-cert, -x : disable client certificate --def-keydir, -k : default key direction ('bi', '0', or '1') --force-aes-cbc, -f : force AES-CBC ciphersuites --ssl-debug : SSL debug level --google-dns, -g : enable Google DNS fallback --auto-sess, -a : request autologin session --auth-retry, -Y : retry connection on auth failure --persist-tun, -j : keep TUN interface open across reconnects --peer-info, -I : peer info key/value list in the form K1=V1,K2=V2,... --gremlin, -G : gremlin info (send_delay_ms, recv_delay_ms, send_drop_prob, recv_drop_prob) --epki-ca : simulate external PKI cert supporting intermediate/root certs --epki-cert : simulate external PKI cert --epki-key : simulate external PKI private key --recover-network : recover network settings after a crash or unexpected exit The client needs a valid OpenVPN profile in order to connect to a server. You can create an OpenVPN profile by using the config generator available at airvpn website in your account "Client Area" To start a connection: sudo ./airvpn your_openvpn_file.ovpn To stop a connection, just type CTRL+C. The client will initiate the disconnection process and will restore your original network settings according to your options. To start a connection with a specific cipher: sudo ./airvpn --ncp-disable --cipher CHACHA20-POLY1305 your_openvpn_file.ovpn Please note, in order to properly work, the server you are connecting to must support the cipher specified with the "--cipher" option. If you wish to use CHACHA20-POLY1305 cipher, you can find AirVPN servers supporting it in our real time servers monitor https://airvpn.org/status : they are marked in yellow as "Experimental ChaCha20". To disable the network filter and lock: sudo ./airvpn --network-lock off your_openvpn_file.ovpn To ignore the DNS servers pushed by the VPN server: sudo ./airvpn --ignore-dns-push your_openvpn_file.ovpn Please note: the above options can be combined together according to their use and function. Note on network filter and lock ------------------------------- The client's network filter and lock uses natively iptables and nftables. The client will automatically use the infrastructure available on your system. Please note: services firewalld and ufw may interfere with the client's network filter and lock and you are strongly advised to not issue any firewall related command while the VPN connection is active. Note on DNS ----------- The client currently supports both resolv.conf and systemd-resolved service. When the client is running you are strongly advised to not issue any resolved related command (such as resolvectl) or change the resolv.conf file in order to make sure the system properly uses DNS pushed by the VPN server. Please note: DNS system settings are not changed in case the client has been started with "--ignore-dns-push". In this specific case, the connection will use your system's DNS. Recover your network settings ----------------------------- The client is currently in alpha stage and it must be therefore and implicitly considered unstable and under development. In case the client crashes or it is killed by the user (i.e. kill -9 `pidof airvpn`) as well as in case of system reboot while the connection is active, the system will keep and use all the network settings determined by the client; hence, your network connection will not work as expected, every connection is refused and the system will seem to be "network locked". To restore and recover your system network, you can use the client with the "--recover-network" option sudo ./airvpn --recover-network Please note in case of crash or unexpected exit, when you subsequently run the client it will warn you about the unexpected exit and will require you to run it again with the "--recover-network" option. It will also refuse to start any connection until the network has been properly restored and recovered. Kind regards and datalove AirVPN Staff
  3. 3 points
    renehoss

    Spooky Halloween Deals

    I for one am not happy about this gigantic popup on my computer screen every time I start a VPN session. This pop up is reason for me to _not_ prolong my subscription at this time and will decide at the moment it ends. Surely disappointed. I am a paying customer and do _not_ whish to be spammed by irrirating popups. Please fix this by making this kind of advertisments an option in the settings.
  4. 3 points
    BlueBanana

    ANSWERED Eddie and torrenting

    Disable µTP in the settings, as it is known to slow down your speeds. Forward a port in the AirVPN client area, enter it in qBittorrent and disable UPnP. Don't forget turn on AirVPNs Network Lock; better safe than sorry! Regards, BB
  5. 2 points
    Hello! We're very glad to inform you that three new 1 Gbit/s servers located in Chicago (Illinois, USA) are available: Fang, Kruger and Sneden. Note that the aforementioned servers replace Alkaid, Microscopium and Pavonis which do not meet anymore our technical requirements in terms of uptime and line reliability and will be withdrawn at the end of November. AirVPN clients will automatically show new servers; if you use OpernVPN or some other OpenVPN frontend, you can generate all the files to access any server through our configuration/certificates/key generator (menu "Client Area" -> "Config generator"). Servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like all the other AirVPN servers do, Fang, Kruger and Sneden support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols, smart load balancing between OpenVPN daemons and hardened security against various attacks with separate entry and exit-IP addresses. You can check servers status as usual in our real time servers monitor: https://airvpn.org/servers/Fang https://airvpn.org/servers/Kruger https://airvpn.org/servers/Sneden Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  6. 2 points
    BlueBanana

    OpenVPN 2.4.8 released

    Hello, to whom it may concern, OpenVPN 2.4.8 has been released today: https://openvpn.net/community-downloads/ Happy Helloween! BB
  7. 2 points
    Hello! @giganerd Bug detected and fixed, a new testing version is almost ready to be deployed. Thanks! @QueenSasha Thank you, actually speed, efficiency and low RAM footprint have been a priority in OpenVPN 3.3 AirVPN design. Glad to hear that you get remarkable performance boost in Raspberry. Our OpenVPN 3 development goes on and is aimed as usual to bug fixing and new features implementation. Developer will answer soon to your technical questions, in the meantime feel free to keep us posted if you find any glitch or bug. @usr32 Great comparison thank you! We are surprised that you could beat AES with ChaCha20 in an AES-NI supporting machine. Can you please specify the whole architecture? We would like to make some verifications with OpenVPN 3+mbedTLS for AES-NI support in specific archs. @GJElde So you made an OpenVPN text configuration file +x and you tried to run it? @maxandjim Thank you, we will investigate asap. Kind regards
  8. 2 points
    spiderdisco

    Spooky Halloween Deals

    A notice about saving money is fine in an email. Having a popup on my computer telling me to "save money now!" is not the appropriate way to convey this information. Maybe it would have been in 1998, but its 2019 and popup ads are frowned upon by most people. There is a reason every modern web browser blocks pop up ads by default. Its an annoying and disrespectful way to get someones attention. We are paying customers and you already have our email addresses, just send us an email. That's how every other business communicates with their customers. I'm very happy with my AirVPN service, but I feel this type of notification should be handled differently.
  9. 2 points
    ssling

    Spooky Halloween Deals

    I don't think so. Giving better prices only month after this promo wouldn't be fair for customers.
  10. 2 points
    Staff

    Eddie Desktop 2.18beta released

    Version 2.18.5 (Wed, 30 Oct 2019 15:03:32 +0000) [new] Linux - systemd service [change] Code cleanup for stable release [bugfix] Windows - Service installation issue in Windows 7 [bugfix] Windows - SSL connections [bugfix] Suppression of some unwanted elevated log [bugfix] Windows bug 'Do you want to reset Eddie to default settings?' [bugfix] Fix for occasional error on exit, 'Object reference not set to an instance of an object'. All other reported issues are under investigation.
  11. 2 points
    Staff

    OpenVPN AirVPN 3.3.2 released

    Hello! We're very glad to inform you that on October the 10th 2019, we released a new version of OpenVPN AirVPN library fixing critical bugs affecting main OpenVPN 3 branch for Linux since years ago. Please see the changelog here: https://github.com/AirVPN/openvpn3-airvpn/blob/master/CHANGELOG.txt Critical bug fixes are essential to offer an OpenVPN AirVPN library based client on Linux. As those bugs remained unresolved for years in the main branch and made OpenVPN 3 de facto unusable in a safe way in Linux, we could not wait anymore. Therefore, we will be able to release a first beta version for Linux and macOS of a command line based, light-weight client software based on OpenVPN AirVPN 3.3.2 around October the 20th. FreeBSD and OpenBSD versions remain planned for the very near future. Kind regards and datalove AirVPN Staff
  12. 1 point
    Hello! We're very glad to inform you that two new 1 Gbit/s servers located in Vancouver (Canada) are available: Nahn and Sham. The AirVPN client will show automatically the new servers; if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). Servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other "second generation" Air server, Nahn and Sham support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check servers status in our real time servers monitor: https://airvpn.org/servers/Nahn https://airvpn.org/servers/Sham Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  13. 1 point
    The scoring rule is set at the bottom of the window, either "speed" or "latency". Roughly translated the rating means: ⭐⭐⭐⭐⭐ - "This is among the best servers for throughput for you." / "This server's latency is among the best for you." ⭐- "This server is unlikely to give you good speeds." / "Don't expect a quick and reactive experience when connected to this server."
  14. 1 point
    Hello! We're very glad to inform you that two new 1 Gbit/s servers located in Los Angeles (California, USA) are available: Groombridge and Teegarden. Note that Groombridge and Teegarden replace Heze and Persei which do not meet anymore our technical requirements in terms of uptime and line reliability and will be withdrawn at the end of November. AirVPN clients will automatically show new servers; if you use OpernVPN or some other OpenVPN frontend, you can generate all the files to access Groombridge and Teegarden through our configuration/certificates/key generator (menu "Client Area" -> "Config generator"). Servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like all the other AirVPN servers do, Groombridge and Teegarden support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols, smart load balancing between OpenVPN daemons and hardened security against various attacks with separate entry and exit-IP addresses. You can check servers status as usual in our real time servers monitor: https://airvpn.org/servers/Groombridge https://airvpn.org/servers/Teegarden Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  15. 1 point
    Flx

    Cloudflare WARP VPN

    Yup useless to the users. The only one thing it is good for "Collecting data and more data".
  16. 1 point
    mith_y2k

    Cloudflare WARP VPN

    I didn’t know about the IP, I verified and Cloudflare confirmed it. It looks like it’s useless. it’s a shame because performance looked good. I’d love Airvpn with ChaCha for iOS
  17. 1 point
    Anybody know if AirVPN will be doing another Black Friday deal for renewing Annual Subscriptions to the service? Cheers muchly
  18. 1 point
    Hello! AirVPN OpenVPN 3 client version 1.0 alpha 2 is now available. It addresses reported bugs and should resolve them. AirVPN OpenVPN 3 Client 1.0 alpha 2 - 7 November 2019 Changelog [ProMIND] DNS resolver has now a better management of IPv6 domains [ProMIND] DNS resolver has now a better management of multi IP domains [ProMIND] Minor bug fixes ======== Linux 64 bit build can be downloaded here: https://eddie.website/repository/eddie/airvpn-static1.0alpha/airvpn-static-linux-1.0-alpha2.tar.gz SHA512: https://eddie.website/repository/eddie/airvpn-static1.0alpha/airvpn-static-linux-1.0-alpha2.tar.gz.sha512 Linux Raspbian 32 bit build can be downloaded here: https://eddie.website/repository/eddie/airvpn-static1.0alpha/airvpn-static-raspberry-1.0-alpha2.tar.gz SHA 512: https://eddie.website/repository/eddie/airvpn-static1.0alpha/airvpn-static-raspberry-1.0-alpha2.tar.gz.sha512 Thank you for your tests! Kind regards
  19. 1 point
    Monotremata

    Eddie Desktop 2.18beta released

    2.18.5 working great like the rest of em on MacOS 10.14.6 here!
  20. 1 point
    Trying a clean Raspian install on a Pi4 and noticed typos in the instructions. Files are named alpha and the shell commands are alfa.
  21. 1 point
    sorry, i am deeply ashamed, what a stupid mistake.
  22. 1 point
    A problem....... error
  23. 1 point
    colorman

    eddie-ui_2.13.6_linux_x64

    Am now trying out the latest AirVPN client based on OpenVPN 3.3 AirVPN. No problems discovered so far.
  24. 1 point
    Thank you for the comprehensive reply. I fully agree, my request only for practicality. Not for paranoia or more security. Not being able to refresh the ip from the modem, it seemed to me the solution to my problem. Anyway thanks.
  25. 1 point
    The most provocative question one can ask about such things is: Can you explain the benefits? The overwhelming majority cannot answer this question without ultimately revealing they're paranoid for no reason. I propose that your paranoia is to be destroyed. You are not even remotely as important for prying eyes as you believe. Unless you are a regime critic, a war correspondent, a certain kind of politician or anyone else who'd have a very good reason to be prosecuted, expecting a jail sentence I mean, but then a VPN shouldn't be your only layer of "protection". Tor is a better alternative for these people. This option will force a full reconnect, causing noise in networks. Those who cause noise are more likely noticed. So from whom exactly are you trying to hide? Once or twice this feature was asked for by users, I believe Staff once even answered but I can't for the love of it find the posts again, sorry. Anyway, back then it wouldn't happen, and I think today little changed, if at all.
  26. 1 point
    interesting, we are going to test on openSUSE 15.1. Thanks GJ no problems so far, only internet a bit slow
  27. 1 point
    # -------------------------------------------------------- # Air VPN | https://airvpn.org | Monday 3rd of December 2018 07:15:00 PM # OpenVPN Client Configuration # AirVPN_DE-Frankfurt_Ogma_UDP-443 # -------------------------------------------------------- client dev tun proto udp6 resolv-retry infinite nobind persist-key persist-tun auth-nocache route-delay 5 verb 3 explicit-exit-notify 5 push-peer-info setenv UV_IPV6 yes remote-cert-tls server cipher AES-256-CBC comp-lzo no key-direction 1 remote-random pull-filter ignore "dhcp-option DNS" ### ROUTEN ### route 192.168.0.0 255.255.0.0 192.168.110.1 # Ogma remote 2001:ac8:20:2b:fbca:14fa:873e:4051 443 # Cervantes remote 2001:ac8:20:2c:463c:42f4:f700:3d77 443 # Serpens remote 2a00:c98:2050:a007:b750:ad0d:3df1:5950 443 # Mirfak remote 2001:ac8:20:99:744e:9a79:9f43:89c7 443 # Veritate remote 2a00:c98:2050:a02f:d4fa:1823:c0b2:2a77 443 # Mesarthim remote 2a02:c205:0:1031:79f8:734d:afb7:43c 443 # Tucana remote 2a00:c98:2050:a02f:b240:4a82:7fb6:af29 443 # Alsephina remote 2001:ac8:20:97:ec6c:776:1763:3ee7 443 # Menkalinan remote 2001:ac8:20:98:5307:a6cf:d139:d129 443 # unknown yet remote 2001:ac8:20:2a:fa58:8bc5:ea41:6ecc 443 remote 2001:ac8:20:9a:9a5a:d9af:457a:bae8 443 remote 2001:ac8:20:5:6000:4b07:7b1c:4c0 443 remote 2a00:c98:2050:a02f:9a5:8bac:eb1d:d313 443 remote 2001:ac8:20:96:b054:682e:3392:c1ff 443
  28. 1 point
    robertoohoho

    Spooky Halloween Deals

    Hi, The popup showed twice on my system (OS X). This method doesn't match what I expect from AirVPN, no matter the good intentions behind. Anyways, I renewed. Regards.
  29. 1 point
    Flic

    Spooky Halloween Deals

    Great idea mazurka7 Air staff, you listening?
  30. 1 point
    maxx0r

    Spooky Halloween Deals

    Thanks, Guys! Renewed for another year.
  31. 1 point
    scgt1

    Spooky Halloween Deals

    I got it as well. But I'm certain there's going to be those who find it annoying. Perhaps Staff should just add a "Notifications" tab underneath "Logs" or "Overview" and just let a red 1 appear - much like the forum notifications. I virtually hardly ever come to the forums and sure enough your right the complainers are starting to flow in. Who would have thought a notice about saving money is a bad thing. Frankly there should be a check box in the Eddie client to disable such notices if it's not there already that way those that get butt hurt over a simple notice that isn't any different then one from their computer OS saying updates were done please restart to complete installation. Always going to be those that like a feature and those that don't can't make everyone happy no matter which side of the line they are on.
  32. 1 point
    Saint666

    Spooky Halloween Deals

    thanks for the deal but i don't appreciate The client notice that popup. maybe a setting to disable that would be nice, or is that the the System Notifications check-mark?
  33. 1 point
    sambia65

    Spooky Halloween Deals

    Thanks a lot for this!
  34. 1 point
    BlueBanana

    Spooky Halloween Deals

    Well, the 3 year deal comes at 1.79 / month. Honestly, how much cheaper do you want it...? 😳😂 Regards BB
  35. 1 point
    Alathfar made it to the top today (31oct19) with a maximum of 652.6 MBit.... https://airvpn.org/servers/Alathfar/ 😳 Regards BB
  36. 1 point
    Thanks, I changed the settings. Everything up and running. I still have no idea why all of a sudden VPN connections failed. I had not touched the config at all. But as long as it is working now, I am fine.
  37. 1 point
    serenacat

    Why You Can’t Trust NordVPN

    Although it degrades DNS, page loading, torrents, etc with >200ms ping times to SG/HK/JP/US Air servers from Australia, it seems likely that the Assistance and Access Bill https://en.wikipedia.org/wiki/Mass_surveillance_in_Australia#Assistance_and_Access_Bill could be used for hidden compliance by any local datacentre (and including their individual staff members with threatened prison time) to provide a similar mechanism to that used to hack the Finnish NordVPN server. It is a positive for AirVPN not to provide servers in these contexts such as AU.
  38. 1 point
    Hello! Vulnerable IPMI, iDRAC etc. which are then kept not updated and whose access is not even communicated to the customer is a negligent and intolerable behavior, however it's not impossible. Good datacenters keep such an access restricted to a VPN, but it's plausible that in some cases access is exposed to some public Internet address. Speaking only about Dell's iDRAC, a study led in 2018 evaluated that tens of millions of servers are critically vulnerable. And that's only Dell, while other management systems add other vulnerabilities. As disabling a remote management system is not a comfortable solution, because it could be needed for any emergency remote OS installation/maintenance/reboot/whatever, since AirVPN birth we verify IPMI, DRAC, iLOM etc. etc., restrict access to them to a tiny pool of IP addresses reserved to Air management if the server is exposed to the Internet (if it's in a VPN, the risk is remarkably reduced, as the attacker should find a way to enter the VPN first and discover the address inside the VPN) and keep it up to date (datacenters sometimes do not even bother to give you an updated system). That said, inside jobs can potentially crumble any and each caution, that's why it's important to rely on reputable datacenters; furthemore, if NordVPN statement is true, as incredible as it may sound, then the datacenter committed an outstanding negligence which perhaps might even be considered malicious in court, for having failed to inform NordVPN about the existence of a remote management system capable to bypass any server defense. However, we would like to read a statement from the datacenter company, before jumping to conclusions. Eliminating hazards completely is impossible, but risk mitigation is a task which must be always pursued with due diligence. Kind regards
  39. 1 point
    sudo pkill -15 openvpn && sudo systemctl restart networking
  40. 1 point
    Clodo

    Has Air given up on Eddie for desktop?

    About Eddie 3.x : we are still working on that, but we can't give out right now 'screenshot', as the UI is in draft/debug stage, sorry. Development of 3.x depends on some core-changes that we made directly in 2.x series in the latest months. We have released a beta version of the new 2.X series here: Still under testing in different OS and configs due to a lots of internal changes.We hope to improve the reactivity and feedback with this release, promote it as a stable version as soon as possible, and restart with frequent releases.
  41. 1 point
    Hello! I note the change: So everything below the 1 year plans, do not get the discount anymore. It's still weird to me, that the birthday celebrations still aren't the ones with the biggest and widest discounts. Seems more worthy to me . Happy birthday.
  42. 1 point
  43. 1 point
    I wrote a quick Lua script that parses the address ranges from ipinfo.io and converts them to OpenVPN routes. Here's a link to the code: http://bit.ly/2Gu8Q2Y Here's a list of routes that covers all the current Netflix ranges: https://pastebin.com/raw/zRyv6KDj
  44. 1 point
    I have solved the problem. It had to do with the DOS Defense protection of my Draytek router's firewall. I now use TCP instead of UDP and I now get full speed! So take a look at your router's firewall if you are experiencing the same problems. Edit: Some Swedish servers are also slow for me, but that's another issue.
  45. 1 point
    AIRVPN DOES NOT RECOGNIZE ANYMORE VERISIGN, AFILIAS AND ICANN AUTHORITY. OUR COMMITMENT AGAINST UNITED STATES OF AMERICA UNFAIR AND ILLEGAL DOMAIN NAMES SEIZURES. The United States of America authorities have been performing domain names seizures since the end of 2010. The seizures have been performed against perfectly legal web-sites and/or against web-sites outside US jurisdiction. Administrators of some of those web-sites had been previously acquitted of any charge by courts in the European Union. The domain name seizures affect the world wide web in its entirety since they are performed bypassing the original registrar and forcing VeriSign and Afilias (american companies which administer TLDs like .org, .net, .info and .com) to transfer the domain name to USA authorities property. No proper judicial overview is guaranteed during the seizure. Given all of the above, we repute that these acts: - are a violation of EU citizens fundamental rights, as enshrined in the European Convention on Human Rights; - are an attack against the Internet infrastructure and the cyberspace; - are a strong hint which shows that decision capacities of USA Department of Justice and ICE are severely impaired; and therefore from now on AirVPN does not recognize VeriSign, Afilias and/or ICANN authority over domain names. AirVPN refuses to resolve "seized" domain names to the IP address designated by USA authorities, allowing normal access to the original servers' websites / legitimate Ip addresses. In order to fulfil the objective, we have put in place an experimental service which is already working fine. If you find anomalies, please let us know, the system will surely improve in time. Kind regards AirVPN admins
  46. 1 point
    LZ1

    A review on another site

    So despite not wanting to answer Staffs recent replies, will you nonetheless link to or otherwise openly acknowledge the exchanges made in this thread, on your website and/or in your original review? I think it's healthy for visitors to be able to get both sides "versions", if you will. Thank you for joining up and being willing to explain your position .
  47. 1 point
    Staff

    A review on another site

    @ThatOnePrivacyGuy Thank you for your extensive reply. Unfortunately, we think that it does not address our corrections at all. First of all, this is not the original sentence of your article, The original sentence is: "Do a search for “AirVPN review” and just try to find one that isn’t written by someone paid to do so." which clearly suggests that an overwhelming majority of reviews are paid by us. This is false and defamatory because we don't pay for any review. Additionally, at the moment of this writing and at the moment of the publication of your article, most of the reviews did/do not even contain a referral link. Tom's Hardware, Torrentfreak, vpnMentor, your own and even other reviews you can find on the first Google Search page are all reviews which not only have not been paid, but do not even include a referral link. Therefore, if the aim of this thread is having a fair exchange of opinions to improve both sides, we would recommend that you do not apply old rhetoric tricks (admitting that a sentence is wrong to replace it with a different but equally false sentence) to twist your sentences in the mind of the readers, according to your own requirements of trust and transparency and your calls for "ethical" behaviors. This is your opinion. We can respect it but we can't share it. The requirement of a disclaimer for a review including a referral link is in our opinion correct and we already ask for it to our few, major referrals (who have of course the right to refuse if the applicable law for their web site does not require that). Of course we can't check all the referrals, it's humanly impossible, but we check all the referrals that refer to us more than 5-6 users per week. The referrals who don't refer any user to us can be checked randomly, but of course have a lower priority since they don't harm anybody. About copyright enforcement we are in total disagreement. In the first place we are not copyright enforcers. It is not our duty, not our competence and not our will. Under this respect, your requirement is in our opinion unreasonable and legally unsustainable . And since you stress a lot on "ethics" throughout your whole message, we think that your requirement is contradictory. Copyright is one sector of the wide set of different laws and international trade agreements pertaining to intellectual monopolies, which in the last century have been severely damaging innovation, harming and limiting freedom of expression, imposing barriers to seek and impart information and access to culture, science and art, and above all have been causing and are causing millions of deaths and dreadful suffering to hundreds of millions of people. We can discuss endlessly about the horrors and the good of intellectual monopolies, but asking us to act as a copyright enforcer against some third-party web site is not only unreasonable under a legal point of view, but also unethical, because we would become a small part of that huge "machinery" that promotes one of the set of laws and one of those "mind attitudes" which are one of the causes (and not a negligible one, for what you can see in the last decades) of humankind pain especially in developing countries. Let's leave this task to the "competent authorities". That's correct. If you have time, please feel free to inform us if some review containing a referral link infringes the legal framework of the European Union on this subject. While we check all the referrals which bring to us customers, it's impossible for us to check all of those that don't send referred persons, so we leave the task to the public authorities who have the competence and duty to do so. Last but not least, feel free to cite the reviews that in your opinion talk about our service with undeserved terms. We ask because we usually see that the reviews, even those that contain referral links, miss the strong points of our service, in our opinion - but of course we underline that it's impossible to read them all. Kind regards
  48. 1 point
    m3d1a@dm1n

    Denkark Server Request

    I just wanted to request a server in Denmark
  49. 1 point
    Valerian

    Denkark Server Request

    That may be true, but a Swedish server doesn't help you access geo-blocked services in Denmark.
  50. 1 point
    dd79

    Danish server for DR?

    http://www.dr.dk/tv/live
×
×
  • Create New...