Jump to content
Not connected, Your IP: 3.236.50.201

Old Fella

Members2
  • Content Count

    24
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1

Reputation Activity

  1. Thanks
    Old Fella got a reaction from Staff in Long time user   ...
    No technical stuff from me else I would be typing all night and day.

    Is enough to say from day one I have been mightily impressed with AirVPN the product, the staff, and the forum. On the few occasions I have looked up and or emailed a few other companies and asked questions they have always fallen short in one way or usually many more ways. Why other VPN providers get much business is beyond me.😍
  2. Like
    Old Fella reacted to OpenSourcerer in Wirecutter Review of VPNs   ...
    For the sake of a good review and a marketing stunt, no, probably not.

    What I noticed: While most of their points they explain are quite right, considering That One Privacy Site as a source and requiring public audits and server/location amount as necessary is questionable. All of Reddit knows by now that That Guy has little knowledge of the stuff he writes about and reviewed all VPN providers solely based on what they wrote on their website at that time. You really can't top that method. I could set up a VPN service promising everything under the sun on its website and for him it'd be the best VPN he'd ever witnessed.
    Also, The Verge. Location amount doesn't really count because faking a server location is a thing and it was proven that NordVPN for example does this. It's even possible to find out who does it for yourself, and it was even mentioned on these forums somewhere. Although, to be fair, they rule NordVPN out because of even more points. They still take warrant canaries into consideration, even though not a must. They're considered a failure, lulling people into a false sense of security and are generally thought of more like a running marketing gag. Some questionable things are their speed tests which really depend on your location and setup, server choice, used config, etc, as they correctly write. It's possible you get a much better result on many occasions, so it shouldn't be a necessity. Minor thing: The possibility to do VPN over Tor wasn't even considered, something only Eddie offers so far. Only Tor over VPN got screen time, but it gets screen time everywhere and isn't even strictly a VPN topic, no idea why it gets two full paragraphs in that article. And... hold on, what the hell is that?
     
    They can't possibly be serious. So the public audit is their one k.o. argument? And they only tested five, FIVE, providers extensively? :DDDDD
  3. Like
    Old Fella reacted to Fredrik Beeman in VPNs - Caught in Lying!?!   ...
    This is the reason i trust in you guys. I've been searching like every one says one thing "no logging". But in the end such as NordVPN, HidemyassVPN has been caught data leakage or selling private info. Not many VPN offers TOR or investing for free speech. They have VPN server in China how cool is that.
  4. Like
    Old Fella reacted to Staff in VPNs - Caught in Lying!?!   ...
    @arteryshelby

    We do not log and/or inspect our customers' traffic. Since 2010 you can't produce any single case, and not even the slightest clue, in which the identity of an AirVPN customer has been disclosed through traffic log and/or inspection and/or any other invasive method.

    It means a lot, given that various younger VPN services have been caught lying (ascertained court cases) and that AirVPN is now the oldest still active VPN service, with the exception of a minor service which anyway changed ownership twice in the last 12 years.

    By the way we have never asked our customers to blindly believe in our words.

    We do not block Tor and we even integrate its usage in our software, so you can be even safer if you can't afford to trust us OR some datacenter. For example you can use Tor over OpenVPN, to hide Tor usage to your country and ISP, and at the same time hide your traffic real origin, destination, protocol etc. to us and the datacenter the server is connected into.

    Last but not least, we invest a lo of money in Tor infrastructure and in 2017, 2018 and 2019 more than 2.5% of global world Tor network traffic transited on Tor exit-nodes paid by AirVPN. It is an important achievement we're proud of, and it hints to good faith.

    Kind regards
     
  5. Like
    Old Fella reacted to Kenwell in VPNs - Caught in Lying!?!   ...
    Regarding the VPN service from the video type the name in the search field above. You will find your answer and the answer from staff. Have a nice one.
  6. Like
    Old Fella reacted to Ariskotos in My POV as a newbie here   ...
    As a long time GNU/Linux enthusiast & evangelist I am very privacy & net neutrality concerned, and care a lot about the software I run.
    Eddie is the very first VPN client I happily run on my Manjaro box.
    Though I still enjoy personally adding & managing VPN configurations thru the Network Connection Manager, I now see why a VPN client might be interesting: Eddie simply works out of the box and does not make a GNU/Linux user feel a 2nd class citizen (eg, network lock feature included by default), & provides detailed info on latency & load.

    What about transparency? Simply astonishing.
    In this world where money is the only religion, transparency is often an abused concept of the past. Not here. When geographic location is not mandatory, I love operating from the currently fastest server available and not overload the others..

    The number of locations seems to be low and the servers number a bit odd, but it works well. A well balanced infrastructure indeed with access points in strategic places all over the world. I love the servers names! As time passes, they become close friends.

    What about sponsorship? The fact that the company cares about some of the most important open source projects & organizations is definitely a plus.

    Not to mention that the community simply looks great.
    Thank you!
  7. Like
    Old Fella reacted to Flx in Lockdown downs and ups   ...
    Oh no....that is reserved to/for government officials and corporate rats only. Covid-19 does not apply to them apparently.
  8. Like
    Old Fella reacted to OpenSourcerer in Lockdown downs and ups   ...
    I live in a city but that whole thing didn't change my habits at all. Only change is that I work from home (so I both go to bed and get up later) and that I don't see some people as much anymore. Grocery shopping is still possible and both delivery services and the internet all work as normal. So I don't die of hunger, and there's tons to do here
    I can imagine living in a more remote area to be somewhat more difficult, especially if one's disabled. May your path lead you to warm sands.
  9. Like
    Old Fella reacted to S.O.A. in What password manager do you recommend if any?   ...
    Bitwarden has been my go to for awhile. I think some others may say Keepass. 
  10. Like
    Old Fella reacted to Staff in Eddie 2.18.9 Desktop released   ...
    Hello!

    We're very glad to inform you that a new stable release of Eddie is now available for Linux, Mac and Windows.

    Eddie is a free and open source (GPLv3) OpenVPN GUI and CLI by AirVPN with many additional features such as:
    traffic leaks prevention via packet filtering rules DNS handling optional connections over Tor or a generic proxy customizable events traffic splitting on a destination IP address or host name basis complete and swift integration with AirVPN infrastructure
    Eddie 2.18.9 has been extensively rewritten to increase speed, stability, security and compatibility with the latest OS versions. It is the outcome of a massive work which took care to meet  very many requests from our community and got rid of some issues affecting Eddie previous stable release when running in latest OS releases.

    Eddie GUI and CLI now run with normal user privileges, while only a "backend" binary, which communicates with the user interface with authentication, gains root/administrator privileges, with important security safeguards in place:
    stricter parsing is enforced before passing a profile to OpenVPN in order to block insecure OpenVPN directives external system binaries which need superuser privileges (examples: openvpn, iptables) will not be launched if they do not belong to a superuser Eddie events are no more run with superuser privileges: instead of trusting blindly user's responsibility and care when dealing with events, now the user is required to explicitly operate to run something with high privileges, if necessary
    Backend binary has been completely rewritten in C++ on all systems (Windows included), making the whole application faster. On top of that various optimizations have been implemented. Now Eddie provides you with higher responsiveness and an improved overall feel and comfort.

    CLI version has been improved as well, featuring numerous glitch and bug fixes.

    Compatibility for macOS Catalina and latest Linux distributions, including DNS handling, has been enhanced.

    Settings, certificates and keys of your account stored on your mass storage can optionally be encrypted on all systems either with a Master Password or a system key-chain if available.

    For Windows systems, wintun support has been added. You can now, if you wish so, replace the driver for OpenVPN virtual network interface with the new wintun for higher throughput (OpenVPN 2.5 tech preview required).

    In Linux and Mac systems, Eddie can also launch Hummingbird, which is very fast and is based on OpenVPN3-AirVPN library, replacing OpenVPN 2.x. In this way you can have at once a GUI for Hummingbird (which lacks it), the usual great amount of features and options Eddie is packed with, and faster connections/disconnections, as OpenVPN3-AirVPN is exceptionally faster than OpenVPN 2 during connection and disconnection phases.

    Eddie 2.18.9 can be downloaded here:
    https://airvpn.org/linux - Linux version
    https://airvpn.org/macos - Mac version
    https://airvpn.org/windows - Windows version

    Eddie 2.18.9 is free and open source software released under GPLv3. Source code is available on GitHub: https://github.com/AirVPN/Eddie

    Eddie 2.18 changelog shows you the massive work behind it and all those implemented changes that remained necessarily not mentioned in this announcement. Complete changelog can be found here.

    Kind regards & datalove
    AirVPN Staff

      Version 2.18.9 (Thu, 02 Apr 2020 12:14:10 +0000)
    [add] - Windows - Added DotNet 4.5 check & install in Installer edition [bugfix] - Linux - Resolved an elevation issue in some Linux distribution (Raspbian mainly) [bugfix] - Fixed a bug that intermittently ignores --connect Version 2.18.8 (Thu, 26 Mar 2020 12:59:48 +0000)
    [bugfix] Windows - Support of OpenVPN2.5 tech-preview (also with new wintun driver) [bugfix] MacOS - -mmacosx-version-min=10.9 on all binary [bugfix] Service reinstalls automatically when version-incompatibility detected [change] Code cleanup for stable release [change] Enforcement of operation allowed by Elevation [change] Enforcement of service checking [change] Windows - Elevated converted from C# to C++ [change] Little score adjustment in UI [change] Better feedback in CLI edition (mainly latency check steps) [new] Linux - enabled CLI-only packages in all editions [change] Minor changes Version 2.18.7 (Wed, 29 Jan 2020 13:54:35 +0000)
    [bugfix] - Update notification for beta versions [bugfix] - Windows - Message when driver installation is denied [bugfix] - macOS - Fix of error "hummingbird not allowed: Not owned by root". [bugfix] - Linux - Fix of error "Client not allowed: [...] parent process (spot mode)", CLI edition with sudo [bugfix] - Fix of error "Failed to connect to ... port 89: Connection refused" when using Hummingbird in SSL/SSH mode [bugfix] - Better exception management to avoid some crash (especially when related to Mono) [bugfix] - Linux - Arch deployment and AUR management [bugfix] - Tor Cookie/Password detection in every supported OS [bugfix] - Updated 'curl' binary in Windows and CA file [change] - macOS - Minor info.plist update in CLI edition [change] - Windows/Linux - OpenVPN Management skip [change] - In 'Latency mode', now load and users have minor impact on score. Version 2.18.6 (Fri, 17 Jan 2020 13:46:48 +0000)
    [change] Bug fixes and code cleanup [change] OpenVPN 2.4.8 [change] Windows - Tap driver (Win7-Win10) upgraded from 9.23.3-i601 to 9.24.2-i601 [new] New option 'Skip promotional messages'. [change] macOS - New menubar icons [bugfix] macOS - 'Rules not loaded' in some environment [change] Hummingbird integration (experimental) Version 2.18.5 (Wed, 30 Oct 2019 15:03:32 +0000)
    [new] Linux - systemd service [change] Code cleanup for stable release [bugfix] Windows - Service installation issue in Windows 7 [bugfix] Windows - SSL connections [bugfix] Suppression of some unwanted elevated log [bugfix] Windows bug 'Do you want to reset Eddie to default settings?' [bugfix] Fix for occasional error on exit, 'Object reference not set to an instance of an object'. Version 2.18.4 (Wed, 02 Oct 2019 18:20:00 +0000)
    [bugfix] OpenVPN > Error: Not supported OpenVPN config [bugfix] Linux - Crash "Unexpected crash of elevated helper:Elevated communication closed" during IPv6 block, if IPv6 not available [bugfix] macOS - Autorestart service if upgraded, avoid error "unknown command" [bugfix] Enforce Elevated compatibility check [change] macOS - KeepAlive in launchd [change] Minor changes [new] New deploy/build scripts Version 2.18.3 (Fri, 27 Sep 2019 11:07:42 +0000)
    [change] Switched 'ping' method in Linux and macOS [change] Code cleanup [change] macOS - Direct invocation with AuthorizationExecuteWithPrivileges for superuser privileges [change] Linux - "Minimize to tray" false by default [change] Linux - Mono, Portable and AppImage editions [change] Minor UI improvements [change] Better log of issues [change] Better log of dns flush actions [bugfix] Linux - Icon and Window glitch in KDE [bugfix] macOS - SSH connection [bugfix] macOS - Show/Hide Main Window issues [bugfix] OS Keyring conflicts with multiple profiles [bugfix] Linux - Raspberry, ARMHF build, fixed issue 'file_getasroot' [bugfix] Linux - Fixed a fatal crash with some UI tray icon issues [bugfix] Linux - Detect and use iptables-legacy (nft transition) [bugfix] Linux - Fixed a SSL connection issue (related to error 'Cannot create pid file') [bugfix] Parser of OpenVPN version [new] Linux - WM_CLASS registration [new] Linux - New IPv6 block [new] Latency test only about servers in whitelist [deprecated] Option "Remove Default Gateway" (routes.remove_default) removed [deprecated] Windows - Option "Switch DHCP to Static" (windows.dhcp_disable) removed Version 2.18.2 (Thu, 12 Sep 2019 15:59:45 +0000)
    [change] Linux - FIxed a Lintian error on some distributions [bugfix] Linux - Netlock issue if IPv6 is disabled via GRUB ('Address family not supported by protocol' error) [bugfix] Linux - Sometimes Eddie doesn't close [bugfix] Linux - Arch issue with elevation, also restored .xz packages [bugfix] Windows - Issues with username with spaces [bugfix] macOS - Dump PF output and file in logs in case of failure [change] macOS - Notifications, better layout with icons [change] Added Boost in Libraries [bugfix] Minor UI changes Version 2.18.1 (Wed, 11 Sep 2019 09:11:31 +0000)
    [change] Core Engine partially rewritten [new] UI doesn't run as root anymore in every OS [new] Profile data encryption in any OS, either through OS keychain if available or "master" password [bugfix] Linux - DNS resolv.conf issue [change] New formula to compute "best server" [bugfix] Windows - Windows10 SSH [new] No log for inconsistent cipher or keysize directives when used with custom Data Channel cipher [bugfix] Linux - Flush DNS with systemd-resolve [change] Linux - Better performance when netlock is activated at application start [change] Windows - Tun driver updated to 9.23.3 [change] OpenVPN 2.4.7 [change] Removed TOS window. [removed] Linux - resolvconf DNS switch method [removed] Insecure OpenVPN directives [new] binaries run with root privileges must belong to superuser Version 2.17.2 (Sun, 23 Sep 2018 11:55:26 +0000)
    [bugfix] macOS/Linux - Crash at boot if Network Lock is active Version 2.17.1 (Sat, 22 Sep 2018 13:19:08 +0000)
    [change] Better Lifebelt Test network report [bugfix] Windows - Recovery issue about routes (slowdown, no security issue) [bugfix] Misc UX fixes [bugfix] IPv6 route check failure with OpenVPN versions older than 2.4 [change] Force usage of .Net Framework >=4 in every Windows OS [bugfix] Improved check of custom directive names [new] New option "netlock.allow_dhcp" true by default [bugfix] Multiple "Bootstrap failed" windows [new] New Eddie version notification [change] Linux - Faster Network lock (build iptables-save format and apply directly) [bugfix] Linux - Flush DNS in some distro [bugfix] Linux - Glitch on black window when minimized in some distro (tested in Ubuntu 18.04) [change] macOS - Better detection of DNS servers in DHCP mode
  11. Thanks
    Old Fella got a reaction from Staff in SARS-CoV-2: precautionary measures taken by AirVPN   ...
    and by quite a lot as we can see, great stuff. I can only add my best wishes to all Air staff and users, families, friends. Please stay safe and healthy and well done to AirVPN for maintaining a such a competant and sturdy company infrastructure. God Bless all.
  12. Thanks
    Old Fella got a reaction from Staff in SARS-CoV-2: precautionary measures taken by AirVPN   ...
    and by quite a lot as we can see, great stuff. I can only add my best wishes to all Air staff and users, families, friends. Please stay safe and healthy and well done to AirVPN for maintaining a such a competant and sturdy company infrastructure. God Bless all.
  13. Like
    Old Fella reacted to unagichan in SARS-CoV-2: precautionary measures taken by AirVPN   ...
    Stay Safe, God bless your great team. 💚
  14. Like
    Old Fella reacted to Staff in SARS-CoV-2: precautionary measures taken by AirVPN   ...
    Hello!

    We would like to inform you that we have made every effort to ensure AirVPN full and efficient operation during the pandemic caused by SARS-CoV-2.
     
    In order to reduce hazard and safeguard health, AirVPN staff and personnel work exclusively from home and worked from home well before the current situation appeared clearly as a pandemic Each member has a landline and one or more mobile lines, when possible in different infrastructures, to maximize likelihood to stay connected to the Internet 24/7 AirVPN system is more efficiently automated and basic functioning requires no manual interventions, even for several months (if kernel upgrades hadn't been necessary, we would have had servers uptime of 4 years or more) AirVPN inner staff members have now overlapping competences. Therefore if a key member, including a founder, is forced to stop working, the other ones can carry out his/her functions Emergency funds already secured in the past in different facilities as well as banks remain unaltered and ensure AirVPN financial health for a very long time even in very harsh scenarios. However, we would like to assure you that they are not needed at all currently, quite the contrary. In the last 10 days we have experienced a substantial increase in the growth of our customer base We have been informed by our most important partners and providers of housing and hosting in Europe, America and Asia they they are, and expect to, remain fully operational
    Kind regards
    AirVPN Staff

     
  15. Like
    Old Fella reacted to arteryshelby in SARS-CoV-2: precautionary measures taken by AirVPN   ...
    Please stay healthy everyone!
  16. Like
    Old Fella got a reaction from Sweden78 in Christmas 2018 special deals   ...
    You guys are simply the best 
  17. Like
    Old Fella reacted to Staff in Christmas 2018 special deals   ...
    Hello!
     
    We're very glad to announce a special promotion on most of our Premium plans.
     
    You can get prices as low as 2.45 €/month with a two years plan, which is a 65% discount when compared to monthly plan price of 7 €.
     
    Special deals involve three and six months plans, as well as one and two years plan.
     
     

     
     
    If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day.
     
    Please check the exact prices of each plan on https://airvpn.org and https://airvpn.org/plans
     
    Kind regards & datalove
    AirVPN Staff
  18. Like
    Old Fella reacted to Staff in Rebuttal of article "Don't use VPN services."   ...
    Hello!
     
    DISCLAIMER: this post has been written by an AirVPN co-founder (Paolo) and merges the information and the points of view elaborated by the Air founders in more than seven years. Other Air VPN staff members might add additional comments in the future.
     
    We have been asked via Twitter to reply to the following post:
    https://gist.github.com/joepie91/5a9909939e6ce7d09e29
     
    We see that the issues raised by the aforementioned article may be of general interest, so we have decided to post a detailed rebuttal here, meant to fix the remarkable amount of technical misunderstandings and errors which have led the writer to astonishingly wrong conclusions and worrying generalizations.
     
    The rebuttal is based on AirVPN only; we can not and we do not want to write in the name of any other service, since most of the considerations you will read here may or may not (and sometimes we know that they will not) apply to other "VPN services". Anyway, it is our right to reply as if the writer were talking about us too, because he/she repeatedly claims that ALL VPN services act in the same way.

     
     
     
    A "VPN in this sense" is NOT a proxy. Our service encrypts and tunnels all of the client system TCP and UDP traffic to and from the VPN server. Moreover, our service, when used with our free and open source software, also makes additional steps to prevent traffic leaks outside the VPN tunnel.
     
    A proxy tunnels (and not necessarily encrypts) only TCP traffic (proxies can not support UDP), and only the traffic of those applications which are configured to connect to a proxy. UDP traffic, system traffic and traffic of applications which may be started by the system and that you failed to configure (or that you can't even configure in Windows, in some cases) are not necessarily tunneled to the proxy. Not even your system DNS queries are necessarily tunneled over the proxy.

     
     
    If we were really interested in logging our clients traffic, we would not allow connections to and from Tor, proxies and other VPNs. We have always made very clear how to bypass the problem of "trust us" when you can't really afford to do that, and our answer has always been "partition of trust".  Please see for example our post dated March 2012 (!) about it:
    https://airvpn.org/topic/54-using-airvpn-over-tor/?do=findComment&comment=1745

     
    There's more. We work under a legal framework where the safe harbors for the mere conduits are very rigidly and clearly defined (specifically, by the 2000/31/EC, the E-Commerce Directive, articles 12, 13, 14 and 15).
    https://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:32000L0031
     
    The liability exemption for the mere conduit status would not exist if we were not mere conduits. If we inspected traffic and/or modified traffic (e.g. through content injection) and/or selected source and destination of the communications, we would not be mere conduits and we would lose the legal protection on liability exemptions.

    We have also two decisions of the Court of Justice of the European Union which clearly define indiscriminate data retention as infringing the fundamental rights of the citizens of the EU:
    https://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054en.pdf
    https://curia.europa.eu/jcms/upload/docs/application/pdf/2016-12/cp160145en.pdf
     
    Therefore:
    under a legal point of view, logging and/or monitoring and/or inspecting and/or modifying the content of our customers traffic without the customers explicit and written consent would be a criminal infringement, also subject to civil prosecution by the customers themselves under a business point of view, that would be simply suicidal (more on this later)  
     
    It is enigmatic how the writer can make such claims.
     
    We charge less than 10 USD per month for our services and we can pay a whole legal firm, 250 servers (physical, bare metal servers), the whole staff, including a tiny team of programmers. We also regularly donate money to organizations and projects whose activities are compatible with AirVPN mission.
    https://airvpn.org/mission
    https://airvpn.org/status
     
    We're not here only for the money, but if the writer wants to talk about money, so be it. He/she may rest assured that we have planned seriously a business model which remains robust if not rock solid.
     
    It is obvious that we must keep our business model solid, because our infrastructure has become large and we have duties toward the people working with us and toward our customers. At the same time we never forget that our customers have transformed into reality the dream to build a rather big project based on and aimed to privacy protection in a time when the whole world was going to the opposite direction. By changing now direction and pointing to a business based on privacy infringements and personal data commerce would not only betray our beliefs and mission and customers, but we would become a goldfish in an ocean of sharks, we could not even think to compete.
     
    After 7 years, we have the right and knowledge to claim that a privacy protection mission is not incompatible with the price the writer mentions and with a strictly agnostic network where no traffic inspection or monitoring is enforced.
     
    We can also claim confidently that any business plan based on data protection and privacy infringements not declared in the terms of service would crash dramatically in the short-term in the EU: remember the legal framework we live in and feel free to do your own research on real cases and incidents in the recent past.
     
    Last but not least, please do your own math and compute the costs to store and "hand a customer traffic data over": they imply costs of losing the mere conduit status, added to the costs of civil lawsuits from that and potentially other tens of thousands customers. Then compare them to the "costs" (in reality benefits) of no monitoring at all added to the peace of mind to strictly act in a legal/lawful way.
     
    Given all of the above, you can easily discern that the quoted assumption is false for AirVPN. The logical, unavoidable conclusion is that AirVPN best interest, even under a purely cynical, business point of view, is to NOT log (in the most extensive sense of the term) customers traffic and not commerce with their data.
     
     
    This is partially, only partially, true. HideMyAss was really risking to go out of serious privacy protection business soon after the incident occurred: check the massive uproar caused by the event. The AVG acquisition, with the disruptive marketing power of AVG, has probably covered the issue, but the old HideMyAss management hurried to sell the whole Privax company. Who knows, maybe just in time, maybe before the value could be hit too seriously by the incident. We can't know for sure, and the writer can't as well. Anyway, if the writer wants to claim that marketing is powerful, we agree (what a discovery!).
     
    The logical jump from HMA incident to the assumption that every service does what HMA did is long. Do not forget that what HMA did would pose a huge amount of legal problems to us, as explained.
     
    HideMyAss targeted the same persons who are happily using the new Facebook VPN. We respect the intelligence of our customers and we don't have the arrogance to think that we can change people mind and competence all over the world in a few years (or ever), and we don't even think that we can oppose the marketing power. More importantly, that's a problem pertaining to HideMyAss. It is not only unfair, but even defamatory to surreptitiously imply that the behavior (good or bad) of certain services is the same behavior of any other service, in the same field or not.
     
    We have been providing AirVPN services since 2011, when we offered the service as a beta version totally free. Now we challenge the writer of the article to provide any single proof that any single user identity has been compromised by us through a betrayal of our terms of service and our mission and/or through traffic logging or inspection and/or by any infringement of the EU legal framework on privacy and personal data protection. 
     
     
    False. We provide our users with any tool to never make their "real" IP address appear to our servers. We have also integrated AirVPN over HTTP proxy, AirVPN over SOCKS proxy, and AirVPN over Tor usage in our free and open source software. We don't even block connections from competitor VPN servers. Finally, we accept not only Bitcoin, but Monero and ZCash as well, which are designed to provide a robust anonymity layer on the transactions.
     
    If you really don't trust us, you can easily make your IP address never visible to our servers.
     
    This is particularly important even if you trust us, but you can't afford (for the sensitivity of the data you need to transmit, for example) to assume that our servers are not monitored by hostile entities, an event that can happen with ANY service, not only VPN services. The fact that we have made every human effort to provide effective and easily usable protections against such occurrences is a proof of our interest in the protection of our customers privacy.

     
     
    This is ambiguous, because we would need the writer to define security scope and context exactly. Is he/she referring to integrity and security of data between your node and our servers? Or security of your system? Surely, our service is not meant as a security tool to protect against virus and spyware, and this is clearly stated at the very beginning of our Terms of Service. AirVPN can't do anything if your system is compromised.
     
    However, the above does not imply in any way that our service is a glorified proxy. See the reasons we mentioned above and verify how a loose security mention does not change anything. Additionally, while OpenVPN is the core of our service, it is complemented by an important series of features aimed to protect privacy and data in all of those cases which OpenVPN alone has not been designed for.
     
    Even if you don't run our free and open source software, we and our community have made any effort to provide guides and insights on how to get the most from our service to integrate it in a comprehensive environment aimed to protect your data and identity. We are very grateful to our community for the invaluable contributions throughout the years.
     
    If we were a "malicious VPN provider", does the writer really think that we would have allowed our forums to become a golden source of information for privacy, identity and data protection? Do you really think that we would have been provided monetary support to TorProject, OpenBSD, European Digital Rights, Tor infrastructure, etc. etc.?

     
     
    A part of this has been widely rebutted in our previous reply. Here it will be sufficient to add that even if you don't use end-to-end encryption, even if you don't use Tor on top of an AirVPN connection, a MITM who sniffs the packets in any point between the VPN server and the final destination (including the final destination itself of course) will see those packets coming from the VPN server exit-IP address, NOT from your real IP address and NOT from the entry-IP address of the VPN server you connect to. This is a paramount point which is incompetently (intentionally?) ignored by the writer. It is so important that in some extreme cases it makes the difference between imprisonment and freedom, or even between life and death.
     
    Imagine the case of a whistleblower giving out relevant information via VoIP or other applications relying on UDP to a self proclaimed journalist who then betrays the confidentiality of the source, or even to a serious journalist who is unaware of the fact that his/her computer is compromised, or that his/her line is wiretapped. The whistleblower can't use a proxy reliably. The journalist, or the wiretapping entity, can trace the source IP address and the identity of the whistleblower can be disclosed (just to make a trivial example which does not require any wiretapping or compromised system, think of Skype exploit, for which any party could discover the IP address of the other party). In most of these cases, end-to-end encryption would have been irrelevant for the whistleblower.
     
    Whenever the source can't trust the destination integrity, whether the recipient is in good faith or not, our service makes a vital difference.

     
     
    True. We have never said or written the contrary. In addition to changing IP address, which is anyway important in spite of the writer claims, further steps are strictly necessary to prevent profiling, from "separation of identities" to script blocking, from browser fingerprint changes to system settings obfuscation. Our community has widely covered this issue and provided precious suggestions.
     
    Here the writer makes a totally irrational shift: first he/she wants to make you think that our service is just a "glorified proxy", then he/she wants to insinuate that our service is useless because it is not some sort of supernatural system capable to protect users from their own behavior and from every possible tracking system which exploits the user system, not the service.


     
     
    The first case is true, and it is very important.
     
    However, it is totally false that you can safely rely on a proxy for the second case purpose. Many applications, including torrent software, can:
    bind to the physical network interface, or do some dangerous UPnP use UDP (not supported by a proxy) send DNS queries out of the proxy include the assigned "real" IP address inside their layer of communications, example: https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea In the aforementioned cases, correct usage of our service will fulfill the purpose to never disclose your real IP address and/or the UDP traffic and/or the DNS queries. A proxy will not and you can be potentially tracked back, either by copyright trolls or any hostile entity.
     
    Additionally, our service has many more use cases:
    tunneling UDP traffic (not available with a proxy or Tor) circumventing censorship based on IP addresses block circumventing censorship based on DNS poisoning preventing injection of forged packets (not necessarily available with a proxy even in TCP, and surely not when you need UDP flow integrity) using Tor anyway when Tor usage is blocked or triggers interest of ISP or any hostile entity about you protecting your identity when the final recipient of your communications is compromised (not available with end-to-end encryption alone, and not available with Tor when you need UDP, imagine if you need to stream a video in real time which requires source identity protection) making your services (web sites, torrent clients, FTP servers for example) reachable from the Internet when your ISP does not allow port forwarding (not available with a proxy), without exposing your IP address having a static exit-IP address bypassing various types of traffic shaping tunneling simultaneously the traffic of all the devices in your local network, even with remote port forwarding, and even those which can't run OpenVPN provided that you have a device acting as a gateway to the VPN (typical examples a pfSense box or a DD-WRT / AsusWRT / Merlin / Tomato etc. router or any computer configured to work as a router) and maybe you can see more use cases which we have missed here.
     
    The fact that the writer omitted all of the above says a lot about his/her competence and/or good faith.

     
     
    This is hilarious, and not only because the whole point of the writer's post ends up into advertising LowEndBox.
     
    We will not insult our readers' intelligence with an explanation of why that is a terrible idea when you seek more privacy and some anonymity layer in your interactions with the Internet.
     
    Draw your own conclusions.
     
    Kind regards and datalove
    Paolo
    AirVPN co-founder
  19. Like
    Old Fella reacted to ghostp in Rebuttal of article "Don't use VPN services."   ...
    God bless Paolo and the whole Air-Team! I've been loyal to you for years and can't imagine using another VPN! You have my respect!
     
    Allora.......Buona notte!
  20. Like
    Old Fella reacted to Staff in Eddie 2.16.3 released   ...
    Hello!

    We're very glad to inform you that a new Eddie Air client version has been released: 2.16.3. As usual, Eddie is released as free and open source software under GPLv3.

    Eddie 2.16.3 includes important bug fixes. Please see the changelog:
    https://airvpn.org/services/changelog.php?software=client&format=html

    Eddie includes a full, seamless and integrated IPv6 support, as well as new features which will let you use our latest service additions including IPv6 and tls-crypt: https://airvpn.org/topic/28153-ipv6-support-and-new-smart-features/

    Users who have only IPv4 connectivity will be able to access IPv6 services, At the same time users who have only IPv6 (and not IPv4) connectivity, will be able to use our service as well.

    tls-crypt implementation provides a new, interesting way to efficiently bypass blocks and throttling against OpenVPN.

    This version has been released for GNU/Linux, OS X (Mavericks or higher is required), macOS and Windows (Vista or higher is required).

    2.16.3 version is compatible with several Linux distributions. For important notes about environments, please read here:
    https://airvpn.org/topic/27259-status-of-eddie-on-linux-distributions/

    Just like previous versions, Eddie implements direct Tor support for OpenVPN over Tor connections. Eddie makes OpenVPN over Tor easily available to Linux, OS X and macOS users: no needs for Virtual Machines, middle boxes or other special configurations. Windows users will find a more friendly approach as well. This mode is specifically designed for Tor and therefore solves multiple issues, especially in Linux and OS X/macOS, including the "infinite routing loop" problem (see for example http://tor.stackexchange.com/questions/1232/me-tor-vpn-how/1235#1235 )

    As far as we know, Eddie is the first and currently the only OpenVPN wrapper that natively allows OpenVPN over Tor connections for multiple Operating Systems. https://airvpn.org/tor Since version 2.14, Eddie sends a NEWNYM signal to Tor to ensure the use of a new circuit in every connection.

    We recommend that you upgrade Eddie as soon as possible.

    Eddie 2.16.3 for GNU/Linux can be downloaded here: https://airvpn.org/linux
    Eddie 2.16.3 for Windows can be downloaded here: https://airvpn.org/windows
    Eddie 2.16.3 for OS X Mavericks, Yosemite, El Capitan and macOS Sierra and High Sierra can be downloaded here: https://airvpn.org/macosx

    PLEASE NOTE: Eddie 2.16.3 package includes an OpenVPN version re-compiled by us from OpenVPN 2.4.6 source code against OpenSSL 1.1.0h for security reasons and to fix this bug: https://community.openvpn.net/openvpn/ticket/328

    Eddie overview is available here: https://airvpn.org/software
    Eddie includes a Network Lock feature: https://airvpn.org/faq/software_lock
    Eddie is free and open source software released under GPLv3. GitHub repository: https://github.com/AirVPN/airvpn-client

    Kind regards & datalove
    AirVPN Staff
  21. Like
    Old Fella reacted to Staff in Eddie Android edition   ...
    Hello!
     
    We're very glad to inform you that a new version of Eddie for Android has been released. The application ID is now org.airvpn.eddie and the released version is 1.0 beta (UPDATE 21-Sep-18: Release Candidate 5 is now available, please see https://airvpn.org/topic/26549-eddie-android-edition/page-7?do=findComment&comment=77774 ). This release replaces the previous one completely and we recommend that you switch to it.
     
    As usual Eddie is free and open source software released under GPLv3. You can participate to the beta testing by joining the beta community in the Google Play Store here https://play.google.com/apps/testing/org.airvpn.eddie
     
    Alternatively, if you don't want to access (or you have no access to) the Google Play Store, the apk ill be available soon in our web site.
     
    We aim to speed up the release cycle from now on and we confirm that Eddie will be more and more integrated with AirVPN with the progressive implementation of several functions and options that you can find in Eddie for other platforms.
     
    In addition to ARM64 support, various bug fixes, improvements and changes have been applied, including changes aimed to make Eddie more consistent with Android design best practices. For a detailed list, please see below the attached changelog. The project has been assigned to a new developer (you can see a credit mention in the changelog) under the supervision and verification, as usual, of Eddie lead programmer Clodo.
     
    Please feel free to write in this thread about this new release, what you like and what you hate, and of course any detected bug.
     
    Kind regards and datalove
    AirVPN Staff
     
    ChangeLog.txt
  22. Like
    Old Fella reacted to corrado in Alternative AirVPN client with provider-independent double-hop support (GNU/Linux)   ...
    I added an additional feature that allows applications to bypass an existing OpenVPN tunnel. This can be useful if you want to use services that block OpenVPN servers such as Netflix without compromising your other internet traffic. You can easily add applications that you don't want to use the OpenVPN tunnel to Qomui and start them from there. If you are interested how this works have a look at https://serverfault.com/questions/669430/how-to-bypass-openvpn-per-application/761780#761780. Essentially, running an application outside the OpenVPN tunnel works by putting it in a network control group. This allows classifying and identifying network packets from processes in this cgroup in order to route them differently.
     
    Have a look at the screenshots to get an idea

  23. Like
    Old Fella reacted to corrado in Alternative AirVPN client with provider-independent double-hop support (GNU/Linux)   ...
    Hi,
     
    I have written an alternative client for AirVPN that I would like to share with you. Just as Eddie, it supports other providers, too, as long as OpenVPN config files are provided. For AirVPN and Mullvad it offers a convenient update function that just requires you to enter your credentials in order to download the latest server configurations. Furthermore, it allows you to choose among the plethora of protocols offered by AirVPN (including OpenVPN over SSL/SSH) except the experimental ones (I might add support for those in the future, once they become available for all servers).
     
    Qomui (Qt OpenVPN management UI) as I have named it, is written in Python and PyQt and should run on any GNU/Linux distribution. It allows you to easily create double-hop connections. In other words, you can route your requests via two OpenVPN servers. This feature works provider-independent. For example, you could choose a Mullvad server for the first hop, and AirVPN for the second (I have successfully tested this with AirVPN, Mullvad and ProtonVPN). Thereby, it avoids a major downside of similar offers by some providers, namely the fact that if one provider controls all "hops" he or she could potentially still see, log or inspect all your traffic. In the latter case, you would gain little in terms of privacy. With the ability to "mix" providers, Qomui does not suffer from the same problem and hence offers some tangible benefits. Obviously, you would still have to sacrifice some speed/bandwith, though.
     
    Depending on your DE (looking at you, Gnome!), Qomui will also display a systray icon that shows the country of the server you are currently connected to. Additional features include protection against DNS leaks and a firewall that optionally blocks all outgoing network connections except for the OpenVPN server you have chosen. Since it is never recommended to run graphical applications as root, which is a major flaw of most OpenVPN clients, all commands that require root privileges are handled by a background service that can be controlled via systemd. The following screenshot gives you an idea of what Qomui looks like (on Arch/Arc Dark Theme).
     

     
    If you are interested, you can download Qomui from github:  https://github.com/corrad1nho/qomui
     
    Of course, I'd be happy for any kind of feedback. If you find bugs or Qomui does not run properly or not at all on your machine, please let me know. I'm happy to help!
     
    At last, a big thank you to AirVPN and its amazing community. The fact that you rely more on explaining technical details than empty promises, has helped me to learn a lot. It is also one of the main reason why I chose AirVPN. Commendably, Eddie is also released as open-source software. Only Mullvad does that, too, to my knowledge. Why doesn't every provider do that? You are selling a service, not software! Why would I trust in proprietary software? Funnily, I have never really used Eddie, though, since I was accustomed to manually adding config files to NetworkManager as my first provider did not offer a GNU/Linux client. My interest in features such as OpenVPN over SSL made me look into more convenient solutions, though. Ultimately I decided to write my own program as I wanted to learn some Python and this provided a perfect practical challenge. I have actually used Qomui daily on multiple machines during the past few months and constantly tried to improve it. So I'd thought it'd be about to time to share it (it's an alpha release, though).
     
    Have a nice weekend!
     
    Corrado
  24. Like
    Old Fella reacted to Staff in Status of Eddie on Linux distributions   ...
    Last update: 16 May 2018 - Related to version: Eddie 2.14.4
    Any Linux distribution has at least:a different graphics server (X11, Wayland) a different desktop environment (GNOME, KDE, LXTE etc.) a package manager with a specific format (deb, rpm, tar.xf etc.) a different packaging signature for trust and security a different method to obtain administrative privileges, required by advanced features of Eddie (also because OpenVPN requires them) a different set of packages used by our client, that sometimes have different names (for example 'stunnel4' under Debian, 'stunnel' for Fedora) maybe a different DNS management. We are working at our best to support every kind of configuration managed by our source code directly, when possible.
     
    Tested without known issues
    Debian (tested 7/8/9) Ubuntu (18.04 GNOME tested) Ubuntu Mate (18.04 tested) Devuan (tested Ascii) Mint Arch (XFCE tested) Fedora (28 tested)

    With minimal issues
    openSUSE (Tumbleweed KDE tested)
    openSUSE (Tumbleweed GNOME tested)
      Works, with no tray icon. Elementary
      Works, but tray icon, web and folder links don't work.

    Fatal issues
     
    None known.


    Tech notes
    Sometimes Tray icon works, but it is not shown because the desktop environment hides it.
    For example, latest GNOME may require a separate shell extension (generally TopIcons). Currently Eddie 2.x under Linux requires root privileges (like GParted or Synaptic Manager).
    Elevation is generally obtained with a polkit policy file (pkexec) if installed, otherwise fallback methods are used when available (gksu, kdesu, beesu etc.).

    When the UI runs as root, there are four -optional- actions that are performed as normal user: tray icon, notifications, open web links and open file folders.
    If it is not possible to act as a normal user, such actions are not performed at all.

    A totally separated UI (as a normal user) vs. root-actions (as root user, service or separate process) is currently under development.

    Needed improvements
    Minimal lintian warnings on .deb edition General info details on .deb edition (for example, reporting Proprietary as License, not true.) General info details on .rpm edition (for example, reporting Proprietary as License, not true.) Create official package for AUR and other distributions. Create packages also for CLI-only edition. Create packages based on direct source compilation. Procedures to include Eddie in official/standard repository
  25. Like
    Old Fella got a reaction from auser17 in Eddie plays dead - Mint Sylvia   ...
    Almost every time I go to shut down or restart Linux Mint 18.3 the Eddie Window is unresponsive; I can display it but I am unable to click anything on it. Initially I just shut the system down regardless but if I don't want to sign out I have to shut down all *vpn processes manually, usually with htop cos its quicker.
     
    Just what might the issue be? It isn't new, I've had this happen for a long time, just not as often.
×
×
  • Create New...