Leaderboard
Popular Content
Showing content with the highest reputation since 11/15/24 in all areas
-
4 points
2024 Black Friday Sale
B3NJAMIN and 3 others reacted to Staff for a post in a topic
Hello! We're very glad to inform you that the Black Friday weeks have started in AirVPN! Save up to 74% when compared to one month plan price Check all plans and discounts here: https://airvpn.org/buy If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. AirVPN is one of the oldest and most experienced consumer VPN on the market, operating since 2010. It never changed ownership and it was never sold out to data harvesting or malware specialized companies as it regrettably happened to several competitors. Ever since 2010 AirVPN has been faithful to its mission. AirVPN does not inspect and/or log client traffic and offers: five simultaneous connections per account (additional connection slots available if needed) inbound remote port forwarding with multiple pools active daemons load balancing for unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2000 Mbit/s with WireGuard flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level. powerful API IPv6 full support comfortable management of your client certificates and keys AES-GCM and ChaCha20 OpenVPN ciphers on all servers Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported. free and open source software client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS GPS spoofing on Android application AirVPN is the only VPN provider which is actively developing OpenVPN 3 library with a fork that's currently 245 commits ahead of OpenVPN master and adds key features and bug fixes for a much more comfortable and reliable experience: https://github.com/AirVPN/openvpn3-airvpn AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows. Promotion due to end on 2024-12-03 (UTC). Kind regards & datalove AirVPN Staff -
4 points
[CH] Server replacement
go558a83nk and 3 others reacted to Staff for a post in a topic
Hello! We inform you that due to a few problems we are forced to replace the server Kitalpha in Switzerland. A much more powerful server will replace Kitalpha in the next days and it will be connected to a 10 Gbit/s full duplex port and line. As usual, the new server will be announced in this "News" forum in due time. The new server will not only replace Kitalpha but will also provide the additional bandwidth that several users require in Switzerland. We roughly estimate that the server will be available to you by November the 25th. Kind regards & datalove AirVPN Staff -
2 pointsProvide sub-regions for US region, perhaps useast.airvpn.org, uscentral.airvpn.org, and uspacific.airvpn.org? This will minimize latency on games that try to connect you to the closest server by having your exit ip to be in the same area. Manually managing the different local region servers is a pain when some are offline while others have high packet loss. It would be nice to be connected to the best performing local region server and not the one across the country.
-
2 points
I like AirVPN
H12345h12345 and one other reacted to mp92 for a post in a topic
Hi, I just wanted to say I appreciate the simple, easy 3 day trial. I have one more thing I want to try tonight, but I really like this website, I like the ease of the app and connection, and from looking around the forum, it appears the community is competent and very friendly. I unfortunately do not have the budget to purchase a 3 year plan at the present moment, so I will wait for the next sale and make sure I purchase 3 years. Thank you all! -
1 pointI'll take another year, easiest purchase of the season. Thanks for the awesome service!
-
1 point
-
1 point
-
1 pointHello! No issues at the moment. You can check on https://airvpn.org/status - the packet loss and round trip times are measured from very many servers around the world. Click a server name to see all the details including problem history (even a moderate packet loss will be recorded in the history). Kind regards
-
1 pointHello! Eddie 2.21.8 (and some other older version) "latency tests" are bugged. A race condition can be triggered causing the app to remain stuck during the tests. The bug was fixed in any version later than 2.21.8. If you haven't already done so please test 2.24.4 beta: https://airvpn.org/forums/topic/57401-eddie-desktop-224-beta-released/ Kind regards
-
1 pointI would like to sub regions as well. While I think dividing the country into 3 or 4 section would be great I would prefer it be by state or state and city.
-
1 point
Eddie Desktop 2.24 beta released
spinmaster reacted to Clodo for a post in a topic
Please wait the next release, in some days. -
1 point
Offer Bitcoin payments over lightning network
Carlitos1974 reacted to Staff for a post in a topic
Hello! Please note that the article you linked proposes the usage of "valves" to lower LN's payment rate failure rates and optimize flow, problems that we did not mention and that are loosely related to liquidity centralization. So your conclusion that the mathematical proof we mentioned is falsified should be rejected. Please note that the proof pertains to decentralized LN implementation: the scalability problem gets solved in a highly centralized environment which we vehemently reject though. In spite of the huge pressures for centralization brought on by big actors (including banks) the menace of such a centralization has been disclosed and denounced numerous times, starting probably from the seminal "Lightning Network: How the Banks bought Bitcoin", by "Decentralized Thought". As we wrote repeatedly on this thread we will keep a conservative and cautious approach as long as the problems we mention are not resolved and even because too many shady actors push for LN. On chain transaction fees are also a non-secondary pressure to LN adoption: when they increase, LN adoption is encouraged, and vice-versa. On the other hand, since it has been proved that a completely decentralized LN is unworkable, the challenge is not trivial. We are also aware that if more and more small companies like AirVPN become LN hubs, the path to pseudo-centralization, which could be a mitigation against centralization, can be easier. The future will tell whether a pseudo-centralized LN can offer an effective scalable and at the same time robust solution that will not fall prey of sinister actors. After all it's "only" a layer 2 protocol so it should be possible to drop it in case of emergency when you close channel and settle all on-chain. 😅 We hope that other readers will write on this thread contributions and thoughts on the matter, please don't be shy. Kind regards -
1 point
ANSWERED Eddie won't connect to a server
Dani21fe reacted to OpenSourcerer for a post in a topic
. -
1 point
2024 Black Friday Sale
Staff reacted to the fl00f next door for a post in a topic
Ohh, this time I did not miss the sale as at Halloween ... -
1 pointHello! Black Friday deal is now live. End date: 2024-12-03. Kind regards
-
1 point
-
1 pointI gave it a like, because that'd be great to have! Also per-state regions and "city" or "locality" regions would be amazing. I know where my ISP has the best peering, lowest latency, etc so I might want to use a DNS for some city so have a bit of redundancy, if there're multiple servers, and to connect to the least loaded server at the moment. The best would be user-defined public DNS entry where I could mix and match countries, servers and these sub-regions. This would provide somewhat similar functionality to Eddie, but on any device. However I'm not very happy about privacy implications since this DNS would often be resolved through unencrypted DNS.
-
1 point
Plex (Remote) with AirVPN Guide
Carlitos1974 reacted to Mister85 for a post in a topic
hello, thats is possible I do it tonight in dutch. greetz -
1 point
Road to OpenVPN 2.6 and DCO
oassQ9w4cbl4AySZhhth%p36x reacted to Staff for a post in a topic
Hi! Please see here: https://airvpn.org/forums/topic/56430-road-to-openvpn-26-and-dco/?do=findComment&comment=226017 On https://github.com/OpenVPN/ovpn-dco: As we wrote, we are not inclined to deploy something under heavy development that can change radically. Furthermore DCO development has been very slow in the last three years and the interest around OpenVPN DCO is fading away with at least one major VPN provider dropping OpenVPN completely in 2026 (not DCO, OpenVPN in its entirety). We'll see whether the DCO can reach a stable release and if/when the developers release something stable we will re-evaluate the matter for sure. Please check before writing the "road to OpenVPN 2.6" here: https://airvpn.org/road_to_openvpn26/ where you can read that the beta testing phase will be ongoing "Until openvpn-dco stable version is released". After a stable version is released we would start the migration phase. Kind regards -
1 point
ANSWERED Having kill switch with pf on OpenBSD?
theradgrad reacted to OpenSourcerer for a post in a topic
Silly to apologize for not doing a thing you're not obligated to do. Take your time. -
1 point
Four new 10 Gbit/s servers available (US)
knighthawk reacted to Staff for a post in a topic
Hello! We're very glad to inform you that four new 10 Gbit/s full duplex servers located in New York City are available: Muliphein, Paikauhale, Terebellum, Unukalhai. They have replaced Haedus, Iklil and Lich with more powerful hardware and higher overall bandwidth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 UDP for WireGuard. Haedus and Iklil support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor by clicking the names of the servers. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team -
1 point
Four new 10 Gbit/s servers available (US)
knighthawk reacted to cccthats3cs for a post in a topic
This is fine. Thanks for the info. This is what was confusing me and I suppose the timing was just coincidental, rather than M247 having for instance better DDoS mitigation. -
1 point
Four new 10 Gbit/s servers available (US)
knighthawk reacted to copykitty for a post in a topic
I understand this may be out of your hands but from my perspective I miss Haedus dearly at the moment 😥 -
1 point
Four new 10 Gbit/s servers available (US)
knighthawk reacted to cccthats3cs for a post in a topic
@Staff - Is there a specific reason for why these attacks are only impacting the Tzulo New York servers, for example, if it is a DDoS, someone chose to only DDoS those? What is confusing me is the possible motive behind this attack and reasons for it to occur. I see two possibilities, either: (a) an attacker for some reason, now exactly when the servers were changed over, is targeting the new infrastructure, and no other servers that I am aware of, or (b) the same attacks were ongoing to target the old M247 New York servers but were unsuccessful. I would appreciate more transparency into what is going on given these issues. I have especially noticed there is usually at least 1 working server out of the 4, but which one is working seems to change, so I am unsure if that is staff temporarily mitigating the issue, or the attacker (in the case of DDoS) having limited resources and switching around the targets. If these attacks remain ongoing I may switch to another datacenter/city server entirely but am trying to avoid that for now because I would incur a latency and perhaps bandwidth penalty compared to the New York servers, when those are at normal performance. I understand the option to use country/continent configs (currently I use ones set to a specific server), but that does not fix the issue if a server goes down due to an attack for an extended period of time, and would require still manual intervention on my part. EDIT: Of course just a few minutes after posting this the only working server now has high packet loss, and operations that were going on on one of my clients connected to it have now failed. The point still remains: the ongoing attacks make the servers unusable. -
1 pointDoing an update from 2.24.2 > 2.24.3, eddie crashes and the network lock turns off and can't be turned on again. F 2024.11.09 17:16:35 - Exception: ip6tables-restore v1.8.10 (legacy): multiple -d flags not allowed F 2024.11.09 17:16:35 - Error occurred at line: 30 F 2024.11.09 17:16:35 - Try `ip6tables-restore -h' or 'ip6tables-restore --help' for more information Tried rebooting, and same thing happens.
-
1 point
Four new 10 Gbit/s servers available (US)
knighthawk reacted to Upheaval3379 for a post in a topic
Same - capacity in the northeast US is currently in really bad shape. Seems like all servers in new york are showing reoccurring hours-long outage and PA has one server that is taking a huge bandwidth hit. I'm not sure there is any diversity in providers in this region or what that looks like as a whole. The PA server is a different upstream company than the new york servers, i do know that. -
1 point
Four new 10 Gbit/s servers available (US)
knighthawk reacted to Whipshock for a post in a topic
It shows these 4 servers are having High packet Loss right now. Is there another thread on resolution for these or an ETA? I used to use Lich which was solid but i've been noticing problems on these 4. Only Paikauhale and Unukalhai were resolving DNS yesterday while the other two weren't. Today all 4 are having issues. Not sure if this is a step up or step down. -
1 point
Four new 10 Gbit/s servers available (US)
knighthawk reacted to cccthats3cs for a post in a topic
I am noticing the same performance issues. As a quick real-world test, I set up a torrent between a torrent client connected to 1 of the 4 servers and another torrent client connected to one of the other 4 servers. The speeds as indicated in the screenshot below (this is from the uploading client) barely got above 3 MB/s. In previous tests that I did following this same methodology using the M247 servers when they were active, I was able to see speeds of usually 8-10 MB/s. I also downloaded an Ubuntu ISO via BitTorrent on one of the clients. Using this as a test I was able to see download speeds above 25 MB/s for the torrent as a whole, and for a single peer, up to 13 MB/s. Possibly as @ScanFarer stated, this could be worse routing from my ISP to Tzulo, whereas the route from Tzulo to my ISP seems to be fine based on the download speed observed for the Ubuntu torrent. -
1 point
Four new 10 Gbit/s servers available (US)
knighthawk reacted to Raider67 for a post in a topic
Looking for the same in CHICAGO area always busy! around 70-90% nowadays! -
1 point
Four new 10 Gbit/s servers available (US)
knighthawk reacted to ersatzzz for a post in a topic
These replacement servers are extremely slow and only appear to have only 20% the speed of the previous NYC servers (Haeduis, Ikill, etc). What gives???? -
1 point
Three new 10 Gbit/s servers available (US)
knighthawk reacted to Staff for a post in a topic
Hello! We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Los Angeles, California, are available: Maia, Sarin, Xamidimura. They have replaced Groombridge, Saclateni and Teegarden with more powerful hardware and higher overall bandwidth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 UDP for WireGuard. Haedus and Iklil support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor by clicking the names of the servers. Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Team -
1 point
Port shadow attacks fail against AirVPN
Antti Simola reacted to Staff for a post in a topic
Hello! Some customers have contacted the support team asking for a comment on the port shadow attack described in CVE-2021-3773 and brought into the spotlight for the umpteenth time during the Privacy Enhancing Technologies Symposium 2024: https://citizenlab.ca/2024/07/vulnerabilities-in-vpns-paper-presented-at-the-privacy-enhancing-technologies-symposium-2024/ To explain why, unlike many other VPN services, AirVPN is not vulnerable to various attacks under the generic port shadow umbrella, please download the new paper and read below while watching table 2 on page 121: in our infrastructure public entry-IP addresses and public exit-IP addresses are not the same (M6). This is an absolute protection against ATIP, connection inference, and port forwarding overwrite and also makes port scan impossible (another reason for which port scan is impossible is given by additional isolation, see the end of the message) per-host connection limit is enforced (M3) making eviction re-route extremely difficult if not impossible static private IP address is implemented (M2) with WireGuard (it can be changed by explicit key renewal user's action) and highly likely with OpenVPN as long as the user connects to the same server with the same key, another (redundant) protection against port scan In our infrastructure additional protections are in place. We prefer not to disclose them all at the moment, we will just mention the block of any communication between nodes in the same virtual network either through private or public addresses. That's why, unlike any corporate VPN with shared resources, you can't contact any service inside the VPN (except the DNS), not even your own, from a machine connected to the same VPN in our infrastructure. Decapsulation as described on the paper is doomed to fail for this isolation/compartmentalization and this is also another reason for which port scans are not possible. TL;DR AirVPN infrastructure, according to the current state of the art in remediation and mitigation by security researchers as well as paper authors, is not vulnerable to the attacks described under the port shadow umbrella in this new paper. Kind regards & datalove AirVPN Staff -
1 point@OpenSourcerer is right, operating a server in Russia is detrimental and risky for the users. Since 2023 (and for specific cases since June 2024), datacenters / hosting providers are forced to connect their servers and routers to SORM-2 software and hardware equipment, so you have 100% certainty that any server in Russia is closely monitored and wiretapped through advanced Deep Packet Inspection, that all data and metadata are stored and correlated by the surveillance system in Russia, and such data and metadata can be accessed by many entities in Russia without a court order (a court order can be obtained pro-forma ex-post...). We do not agree with Proton decision (and we do not even understand it), even with SecureCore (a multi hop system) option. Moreover, SecureCore is opt-in, so a naive customer could connect to Russian servers directly. We firmly believe that not running servers in Russia is a correct decision preserving our customers' privacy and personal safety. Kind regards
-
1 pointCurrently breaking the record on Xuange, I’m using WireGuard and I have a 2 Gbit/s line, which means that I have 0% bandwidth loss with the VPN. @Staff <3
-
1 point
ANSWERED Multiple Handshake Timeouts Daily
thisisnemo reacted to Staff for a post in a topic
Hello! The most common causes are a "dirty" line and an MTU related problem. Please try to get a stronger WiFi signal, change WiFi channel, test a different Ethernet cable, make sure that network interface driver and router firmware are both up to date. Also set WireGuard's virtual network interface MTU down to 1280 bytes. You will need Eddie 2.24.x to do it, as older versions do not offer an option to modify MTU (so WireGuard default value is enforced). In Eddie 2.24.x please select Preferences > WireGuard, set MTU to 1280 bytes, click Save and test connections to various servers. Kind regards -
1 point
speedtest comparison
Staff reacted to bluesjunior for a post in a topic
Recently moved from Virgin Media to Zen Broadband here in the UK. With VM's 1G Volt package the most I ever got while on AirVPN was around 450Bpms but a huge jump with Zen Broadband. -
1 point
AEAD Decrypt Error
theradgrad reacted to OpenSourcerer for a post in a topic
I've had this with DOCSIS on Vodafone Kabel Deutschland, too. Yes, this is the principal reason why it's slowing down. Packets are too far out of order, so OpenVPN assumes this might be a replay attack and drops those packets. One can calibrate the replay window to suit the connection better. The default is a window of 64 packets in 15 seconds which works for most but not all connection technologies. To calibrate this window, the verbosity can temporarily be increased to 4 (In Eddie, one can enter this in Preferences > OVPN directives): verb 4 When you connect and let it run for a bit while using the connection, you will see replay window backtrack occured [x] kind of messages when such an AEAD Decrypt error occurs. x indicates how far out of order a received packet is. Look at what its max value is over time, then set the replay window to that max plus maybe 5 or 10 (or round it to the next 10, or base 2, or whatever; basically, make it slightly higher than the max): replay-window x . -
1 point
ANSWERED Stuck in a broken route, never connects
David Biggs reacted to Staff for a post in a topic
Hello! The Express VPN interface causes a critical error to OpenVPN: Tell Eddie to ignore any alien interface: Select from Eddie's main window Preferences > Networking, write eddie in the "VPN interface name" field click Save. You may also consider to switch to WireGuard to bypass the alien interface. You can do it in Preferences > Protocols window. Uncheck Automatic, select a WireGuard connection mode and click Save. Kind regards -
1 pointHead up for the community, This table: https://docs.google.com/spreadsheets/d/1ijfqfLrJWLUVBfJZ_YalVpstWsjw-JGzkvMd6u2jqEk/edit#gid=231869418 is full of errors against AirVPN, Windscribe and other autonomous VPN services. AirVPN offers the best ad and tracker blocking service I have ever seen and the table reports a "0" rating (fucking worst) for ad blockers. The table reports 0 for RAM servers too, but we know and staff confirmed that AirVPN runs everything in RAM after the minimal boot. Although me and a friend of mine warned the maintainer a month ago about several errors about AirVPN, Windscribe and more, and we received thanks for that, our messages were deleted after a while and the author of the table did not fix the errors. So the table rates higher the VPN services that offer the higher payments for fake reviews and higher referral rewards. I start to suspect that the maintainer is just another filthy whore spreading lies for money. Total jokes and solemn shenanigans like HideMyAss, that handed over a customer to police, and the former malware Kape group VPNs (Express, CyberGhost and all that shit) rate higher than rock solid AirVPN, Mullvad, Windscribe. I am disgustingly disgusted and I invite the whole community to report everywhere the lies they can see in this table. If the author is not what I suspect, the errors will be fixed, otherwise we'll know for sure what a filthy grubby scumbag whore it is.
-
1 pointHello, I'm sorry I post this message with a guest account, but I have a good reason, I do not want to correlate my real AirVPN account with my Reddit account. I would like to clarify about this: This is a strict policy, you can't name VPN services, and only the infamous VPN comparison table can do it. The policy says: However, you find the VPN comparison table, which is horribly biased, as many of you have found out, pinned in the subreddit in the 2nd highest position, which names all the major VPN service vendors. So I suppose, for huge monetary interests into play I guess, you can't rely anymore on those subreddits and you necessarily have to open your own blog or web sites. I see AirVPN was an early supporter of Mastodon. That's another good tool to spread information you care to spread. Of course this forum too, as someone before me said it is indexed by search engines. As soon as I have time I am publishing here a "fixed" VPN rating using the same parameters of the VPN comparison table, to make you see how the AirVPN score changes greatly when objective ratings are more fairly assigned. I wish you a good Sunday, will be back early next week.
-
1 pointHow I spend my time is none of your business. I don't give a *about your morbid obsession for this thread but I do care when an AirVPN moderator tries to shut down a thread that contains factual reports complete of quoted sources suddenly and without explanations. The factual reports protect airvpn business and reputation while they reveal a network of lies against independent vpn services, so to me your position is inexplicable. Your statement that the table is "not hurting anyone" is disproved by yourself, see yourself what you then write: Holy *, then it's clear to you too that the table may bring damage to AirVPN! but just to write something against me and other posters here your mind derails (you even defined my factual reports as "rants", bravo! congrats! that's a really ethical moderator, wow) and you support two antithetical thoughts on the same day. "Sure you can do that" my a*. If it were for you or some moderator, the thread would be locked, someone from staff or support had to re-open it. Fair enough, I will behave and it couldn't be otherwise as I have total respect for AirVPN mission, the AirVPN founder and for what he did when I was a teen (send him all my datalove), but I expect the same from you all. What about explaining why one of your moderators locked a thread without explanations and you had to overrule the decision, to begin with? Thank you a lot, it's important to receive confirmations of similar occurrences, they help define a pattern.
-
1 pointI am happy to see a response to the sheet, even if I never knew it existed. Thanks airvpn for your always fast responses to such things and able to clear the "air" for future users(and existing).
-
1 point
Full of lies VPN comparison table
jonda reacted to nutcracker for a post in a topic
Hi folks, for what it matters I'm gonna test AirVPN after I read this thread. I picked Nord several months ago and I based my decision mainly on the Reddit VPN comparison table and I always have been disappointed by the poor performance on Nord servers. Now that I have checked that the table really is biased on many features with plain wrong data I will ask for an AirVPN free trial on this weekend. I feel deceived by this comparison table and by looking closer I noticed that so many messages have been deleted on the Reddit thread of the VPN comparison table. Now that stinks! I read that the policy of that subreddit forbids to mention any VPN, so how can you point out a specific error on that public thread if it's forbidden to mention VPN names? It's ridiculous, we have a thread to compare VPN with a table mentioning VPN names where it's forbidden to name VPN. It could be a cherry-picked policy to prevent constructive criticism and corrections. I am unsure on what to do to report this table false data apart from writing to the author, though, I will think about it. If you guys decide to build up your own comparison table please inform us here too. All the best -- nutcracker -
1 pointCome on spare me your lessons, i just felt right to let airvpn users know that i had a very similar experience to OP's, only the truth. This forum is well indexed by search engines, everything counts when the truth is written and maybe this thread will be read more and more. Why are you hostile to the users of the forum you moderate who write on this thread? Why do you try to shut down this thread, I had to open a ticket only to give my tiny testimony and the support did not even know that the thread was locked? Start yourself to follow your own lessons, investigate this matter and write about it on your blog, social network and whatever, I will do the same.
-
1 pointThanks support / staff for re-opening and the help to recover access to my account, I don't like writing long messages on forums and subreddits and I asked to reopen for I wanted to give my quick 2 cents to the thread but I found a lock. Last year, around christmas holidays, I stumbled on the comparison table linked by OP and saw lots of errors for another vpn i use and for airvpn that i use with another account, and I wrote a personal message from a reddit account to the author telling only to check some data. I spent quite some time to send links to make him verify conveniently but i received no replies and the errors are not corrected, so i decided to stop wasting time with it, however when i saw this thread... I felt angry and i wanted to confirm the bad experience and make more people aware of the problems of this table, very misleading and injurious for some vpn like airvpn. Keep up the good work and good luck for everything.
-
1 point@OpenSourcerer Re-opening the thread upon various users request... at least for a while. We did not expect we could acquire information we were unaware of thanks to this thread but it happened, plus some community member was happy to be informed about this whole matter so let's see where the thread goes, it doesn't deserve to be locked right now. Let the community members decide by themselves what to do, of course always within the bounds of the netiquette (right, @fsy ?).
-
1 point"It" had a year and more to fix the errors - sounds enough time to me - but "it" didn't. Instead "it" wrote that the 2023 update was done on March 23, 2023, and then "it" deleted messages documenting the data to check and fix. Yes I received a thank you and as soon as my message was getting upvoted it was deleted. Same thing happened to a friend of mine and now I wonder to how many more. Sure it can happen. Who knows, if "it" did not delete my message and other messages they could have been reminders for this forgetful reviewer. Sounds great to me. Hope you're right that "it" is not a malicious reviewer "per se" really, but too easy to fix only when you see that the shit is going to hit the fan, after years of damages vs. independent VPN, so I want to see a consistent honesty and accuracy in the following years. I honestly hope, believe me, that "this one" is not like "that one" guy, who played the part of the goody-goody while secretly arranging a sale to get money from the usual commercial reviewers paid for bogus reviews. While I am writing this message, the table still contains all the errors boosting Kape conglomerate and the Nord VPN, and penalizing the independent VPN. Time passes, tick-tock, tick-tock.
-
1 pointHi there, you guessed it, it's here on Reddit: https://www.reddit.com/r/vpnreviews/comments/so9w1v/vpn_comparison_table The author writes "Table last updated: Mar 21, 2023". I don't want to advertise here other VPN services but it's too strange that the only independent VPN like Windscribe, TorGuard and AirVPN are the most penalized with false data. Everything looks shady, as if pre-computed to put the large majority of VPN below all the Kape conglomerate ones and the Nord, in other words the VPNs that pay you if you publish a table somewhere with a channel/formu/blog etc. with at least 10k followers or a minimum amount of views and you rate at least two of the conglomerate in the top positions. I stress once more that this author "paperplans5" is informed on the errors damaging scores of Windscribe, AirVPN etc. in multiple sectors, from Ads blocker to protocols, from servers on RAM to owned servers, but so far I see no fix.
-
1 point
eMule and AirVPN on Windows 10
Carlitos1974 reacted to snelephant for a post in a topic
I discovered a simple quirk of setting up eMule (P2P) on Windows 10 that causes port forwarding to fail with AirVPN. This tip that may save others a lot of time. During setup eMule creates an inbound rule in Windows firewall that applies to private networks in scope. This makes sense if using eMule without a VPN. However, Windows treats the AirVPN as a public network. Consequently port forwarding with eMule and AirVPN will not work using the default inbound rule created during eMule setup. The solution is to edit the scope of the eMule inbound rule in Windows firewall to apply to both private and public profiles. The latter is the important one. This is simple to do: In Windows Firewall, right click on the inbound rule for eMule, select Properties, Advanced. Under Profiles check both Private and Public. I am not a security expert so feel free to chime in if this setting raises any concerns. This may also apply to earlier versions of Windows. -
1 point
Most Common Problems & Their Suggested Solutions
Carlitos1974 reacted to LZ1 for a post in a topic
Hello! I thought it was time to try and collect some of the wisdom floating around and see if we can't create a single thread for solving some of the most common and annoying repeat-issues. So how about it ! I define "common problems" as: if I'm getting a deja-vu every third time I post . Staff will have broken the Matrix by this point. Each problem will have its own headline and then with any number of solution-oriented links appended underneath. For this reason, this grand list isn't final and is meant to be updated continually. Naturally, the higher the link number for a solution, the more obscure the solutions are probably getting. Warning: solutions aren't guaranteed. As with anything technical, trial and error is a core skill Problem: Bootstrap Failed.Solutions:https://airvpn.org/topic/30824-bootstrap-failed-since-a-week/Problem: No Internet connection after shutting down AirVPN and/or can only use Internet while AirVPN is on.Solutions:https://airvpn.org/topic/14829-can-only-connect-to-the-internet-browser-through-airvpn/?do=findComment&comment=30509 Windows only: https://airvpn.org/topic/13584-connection-problem-when-not-using-airvpn/?p=38800 MacOS only: https://airvpn.org/topic/27993-cant-connect-to-internet-without-using-airvpn/ https://airvpn.org/topic/21194-virtualbox-is-this-air-vpn-also-cant-connect-internet-unless-signed-in/Problem: Cannot connect to any AirVPN server.Solutions:https://airvpn.org/topic/22140-cannot-connect-to-german-servers-anymore/ https://airvpn.org/topic/22066-cant-seem-to-connect-to-any-servers/ https://airvpn.org/topic/21418-new-to-airvpn-installed-avpn-on-surface-wwindows-10-cannot-connect-at-school-can-connect-fine-at-most-other-locations/?p=55515Problem: Issues with Curl.Solutions:https://airvpn.org/topic/27369-cannot-login-curl-is-required/Problem: Bad packet ID (may be a replay)Solutions:https://airvpn.org/topic/14094-weird-log-entries/Problem: Being censored and/or speeds being throttled/shaped by ISP or Government.Solutions:https://airvpn.org/topic/28847-connections-from-china/ Problem: MacOS client can't connect.Solutions:https://airvpn.org/topic/18251-airvpn-mac-client-problems/ Problem: Checking route IPv6 Failed.Solutions:https://airvpn.org/topic/29401-checking-route-ipv6-failed-cannot-connect-to-vpn-server-using-eddie/ Problem: Waiting for TUN/TAP to come up.Solutions:https://airvpn.org/topic/26072-route-gateway-is-not-reachable-on-any-active-network-adapters-10401/?do=findComment&comment=70761 Windows only: https://airvpn.org/topic/17440-guide-fix-for-tap-adapter-in-windows/ Windows only: https://airvpn.org/topic/30043-taptun-interface-wont-come-up/ Problem: Experiencing slow and/or fluctuating speeds in general.Solutions:https://airvpn.org/topic/30739-every-vpn-is-slow-for-me-despite-the-well-reviewed-vpns-im-trying-is-it-possible-my-isp-is-causing-this-i-feel-like-someones-playing-a-joke-on-me/?p=80014 https://airvpn.org/topic/18635-looking-for-fast-server-eu-that-goes-beyond-30-40mbit/?p=44998 For online gaming: https://airvpn.org/topic/30135-frequent-spikes-lag-on-videogames/?p=79046 https://airvpn.org/topic/1947-for-those-wondering-about-speed-performance/?p=1967 https://airvpn.org/topic/26157-airvpn-slowing-down-other-machines-in-network/ https://airvpn.org/topic/26117-slow-speed-sort-of/?p=70906 https://airvpn.org/topic/20812-very-very-slow-dns-lookup/ https://airvpn.org/topic/23743-download-speeds-dropping-to-zero-and-going-up-and-down/ Problem: Slow torrent speeds and/or disconnects.Solutions:https://airvpn.org/topic/28082-torrent-on-airvpn-speed-is-very-poor/ https://airvpn.org/topic/26218-slow-torrent-speeds/ https://airvpn.org/topic/23936-repeatedly-getting-disconnects-while-torrenting/ https://airvpn.org/topic/23499-slow-torrenting-speed/ https://airvpn.org/topic/23070-solved-p2p-slow-over-udp-and-fast-over-tcp/ https://airvpn.org/topic/22716-poor-torrenting-connection/Solutions are in link form without any explanatory text - at least not yet - so that the thread OP stays looking simple and uncluttered, where it's easy to find out what your problem is . Feel free to contribute with your own helpful links. The more feedback this thread gets, the quicker it can be improved and hopefully made useful.