Jump to content
Not connected, Your IP:


Popular Content

Showing content with the highest reputation since 09/17/20 in Posts

  1. 1 point

    VPN Common Myths - Let's discuss this

    To everyone, I'd like to remind that AirVPN did lose one or two servers because of government intervention in the past. One very delicate example was Ukraine somewhere in 2015 during a politically even more delicate time: Euromaidan. The server was seized, but no one lost his or her head for it; AirVPN held its word back then. I can also vouch for this a bit – I read some of the code of the AirVPN library and Eddie for PC, even if, in case of Eddie, it's C# which I don't usually work with. Nothing suspicious was seen so far, but truth be told, I was not reading it like a novel. About the whole 5-eyes and 14-eyes thing: I think it's marketing slang. Somehow people get the notion that not being in 14-eyes is a plus while the horrible truth can be as simple as the company deliberately moving their HQ outside 14-eyes while the overlords are still chinese or NSA agents or something.
  2. 1 point

    VPN Common Myths - Let's discuss this

    @curhen57 Hello! Combining Tor over OpenVPN provides you with remarkable benefits. Some examples: you tunnel efficiently UDP, which Tor alone can't handle you tunnel at least over the VPN any system process with high privileges binding without your knowledge you hide your Tor traffic to your ISP and government (really relevant but only in some countries) you exit from the VPN server to enter a Tor circuit (Tor circuits are re-built normally, the fixed circuit problem is relevant in OpenVPN over Tor) you can split traffic to balance load, aggregate bandwidth etc. you can use protocols which are not welcome, not recommended, not usable or too sluggish on Tor network (one example on the next point) you can use BitTorrent (and any other software which behaves similarly or relies on STUN) without risking your real IP address is revealed, as it may happen (and it happened) with Tor alone https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea?page=0 This is false with Tor over OpenVPN for very obvious reasons (speaking of which, if it was true then the correlation would be absolutely identical and successful with your ISP IP address!). With OpenVPN over Tor of course you have a fixed circuit because Tor does not change circuit for the same TCP stream and that's an issue to seriously consider. Therefore OpenVPN over Tor may be a starting point to use Tor over itself and establish "dynamic" circuits (a new one for each stream) over a VPN tunnel over a fixed Tor circuit. In this way you have all the advantages given by Tor while our VPN servers do not come to know neither your real IP address nor your real traffic origin and destination (the price to pay is another performance hit). Anyway use it only if you understand perfectly what you are doing, otherwise rely on Tor over OpenVPN and forget about OpenVPN over Tor. That's the most astonishing thing since sliced bread. 😱 Anyway it is exactly what would happen after a Tor exit node, or after your ISP nearest DSLAM, just to say, if you hadn't end-to-end encryption. The external, first encryption layer of Tor or OpenVPN or your router MUST be wiped out, otherwise how would the final recipient understand your data? By the way HTTP is disappearing so it does not apply much to web traffic. We think that nowadays lack of end-to-end encryption should not be tolerated, and actually we see important steps toward that. That said, we strongly support Tor (during 2018 and 2019, more than 2.5% of the global worldwide Tor traffic transited through exit-nodes financed by us) and we recommend to use it with and without VPN. Tor network access remains totally free for anyone especially thanks to those people who run at their expenses (money, time, legal issues) Tor exit nodes, just like AirVPN staff does. Kind regards
  3. 1 point

    VPNs - Caught in Lying!?!

    @arteryshelby We do not log and/or inspect our customers' traffic. Since 2010 you can't produce any single case, and not even the slightest clue, in which the identity of an AirVPN customer has been disclosed through traffic log and/or inspection and/or any other invasive method. It means a lot, given that various younger VPN services have been caught lying (ascertained court cases) and that AirVPN is now the oldest still active VPN service, with the exception of a minor service which anyway changed ownership twice in the last 12 years. By the way we have never asked our customers to blindly believe in our words. We do not block Tor and we even integrate its usage in our software, so you can be even safer if you can't afford to trust us OR some datacenter. For example you can use Tor over OpenVPN, to hide Tor usage to your country and ISP, and at the same time hide your traffic real origin, destination, protocol etc. to us and the datacenter the server is connected into. Last but not least, we invest a lo of money in Tor infrastructure and in 2017, 2018 and 2019 more than 2.5% of global world Tor network traffic transited on Tor exit-nodes paid by AirVPN. It is an important achievement we're proud of, and it hints to good faith. Kind regards
  4. 1 point
    Hello! It sounds related to a notorious Office 365 bug which Microsoft refuses to patch so far. Please see here: https://www.macwheeler.com/windows-10-office-365-cannot-connect-over-openvpn-fixed/ Verify whether that's really the source of the problem or not. Kind regards
  • Create New...