Jump to content
Not connected, Your IP: 216.73.216.54

Staff

Staff
  • Content Count

    11543
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2042

Everything posted by Staff

  1. Hello! Can you please check whether Eddie starts minimized? Please look for Eddie's tray icon (a small cloud in a circle) in the system tray. Make sure you can see hidden icons. If you find Eddie's tray icon, double click on it and the main windows should pop up. Then, you can decide whether Eddie must start minimized or not in the "Preferences" > "UI" window. Kind regards
  2. Thank you very much, we have scheduled an investigation on this strange issue. We're glad to know that the new key resolved the problem. If the problem re-appears, this time please do not touch the "problematic" key (just generate and use a new one), maybe it could help the investigation. Kind regards
  3. Hello! Actually what you say is plausible, although puzzling. Please try to generate a new key in your AirVPN account "Devices" panel, adjust the "device" linked to the forwarded port accordingly and connect with the new key. Check whether the problem gets resolved or not. The new key will give you a different VPN IP address and this test could provide some clue. Kind regards
  4. @tranquivox69 Hello! This timing is mainly up to the system that decides at its own discretion when to broadcast "BOOT_COMPLETED" and any other system signal and up to the actual time required to have the network up. Eddie waits for the network before trying connections, while other apps (wg included) don't and just tell you that the connection to the VPN is established even when the device is not connected to any network. Anyway we ask for a log (Log -> Paper plane icon), just in case. Thanks in advance. Kind regards
  5. Hello! Thank you very much. Yes, we ask again for a log (Log -> Paper plane icon), thanks! Kind regards
  6. Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Singapore is available: Azelfafage. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Azelfafage supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Azelfafage Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team 
  7. Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Auckland (NZ) is available: Mothallah. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Mothallah supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Mothallah Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team 
  8. @meatloafmondays Hello! Yes, please, the Bluetit log may help understand the cause of the problem indeed. You can extract it from the systemd journal if your system is based on systemd: sudo journalctl | grep bluetit > bluetit.log or from syslog (typically in /var/log) in other systems not based on systemd. Kind regards
  9. It's the Cochran's formula. When you want a 95% confidence with an error margin of 5%, you need 383 samples out of 322 millions or infinite population. With 1009 samples you get a confidence of 95% with an error of +/-3.1%, which is accurate and acceptable for our business and for this conversation to show that your claim must be incorrect. However the Cochran's formula assumes that there's no bias in picking the sample and the above is based on an optimistic estimate of p=0.5 variability. Therefore, let's compare other surveys. An important source is GWI as it covers 2.7 billion Internet users through various tools. You must pay for their reports and insights but we found that Meltwater / We Are Social / Kepios published for free some GWI data here: https://learn.meltwater.com/rs/814-WJU-189/images/2025_Kepios_Digital_Global_Overview_Report.pdf Another source (using different tools) such as Anlyzify / Shopify publishes a few data here: https://analyzify.com/statsup/vpn You may notice that all of the above show consistent data within the confidence and error margins and they all agree to compute the amount of Internet users connecting to VPNs to 1.7 billion persons globally. There are even more surveys confirming this. They are reserved to paying companies but you can trust us, they show the same within a 5% error margin. Your estimate of 10-15% therefore lacks credibility as it is outside the error margin of many other reputable surveys which are consistent with each other. You may have a problem in how you picked your sample, it could have been unintentionally biased. On the other hand, if your sample amount is n0=40 with a high variability then you have a confidence level of 90% on an error margin of 13%, which would explain the discrepancy with no need to assume a bias. Thus VPN usage is indeed mainstream, if we agree to consider "mainstream" the usage of something with an agreed frequency by 1.7 billion people out of 6.4 billion people (26.5%). It's a design choice based on community feedback and a few considerations. The main consideration is preventing lock out from remotely administered machines, whereas community considered a permanent system modification too invasive for a program that has the responsibility to run with admin privileges. Anyway, it's true that the the previous considerations have been partially ignored by the new "persistent network lock" implemented in the AirVPN Suite for Linux daemon (Bluetit). The daemon, when this option is enabled (anyway it's off by default), sets network lock as soon as the machine has a default gateway, emulating therefore your request (as long as the daemon is allowed to start during the system bootstrap), but avoiding at the same time to set permanent changes to the system. It must also be said that implementing permanent "block all outgoing Internet traffic" rules by default on a system is a trivial task. Then, when the Network Lock comes in, the traffic towards VPN servers is re-allowed, permitting VPN connections... thus the matter does not seem relevant at all: the idea behind the whole matter is that if you know how to use a firewall, you need 30 seconds or so to set proper permanent rules; if you don't know, it's preferable that a software does not modify permanently your system in a way that you might not be able to roll back on your own. The type of double hop you suggest is a client side feature that you can easily achieve by yourself (feel free to open a ticket if in doubt). It may be integrated on our software, no rocket science here, but remember that double hopping on servers administered by the same entity is not an optimal solution and could potentially provide a false sense of security. As suggested, running Tor over a VPN connection is a much, much more robust solution for privacy purposes. The VPN hides Tor usage to your ISP and snoopers, while at the same time helps build a circuit outside a potential cage you might have been put inside by your country regime. At the same time Tor hides from the VPN servers any information related to your Internet usage. With that said, double hop for marketing reasons and for specific needs tied to jurisdictional monitoring could make sense, so we will re-consider its integration in the future. Kind regards
  10. Hello! You polluted both commands with syntax errors (note the spurious spaces). Please re-check. If you enter the correct commands and you still get the other errors you reported then your device is probably customized in a way that doesn't allow this operation, unfortunately. Kind regards
  11. It's a weird urban legend that the VPN clientele is a niche one, at least since 2015 (maybe even earlier). According to security.org and other sources 1.75 billion people "commonly" use a consumer VPN in 2025,. Usage in the USA has declined significantly to 32% (we had a 50% peak in 2022-2023), yes, but it's not a niche obviously. The decline is driven mainly by the shift of companies dropping VPN to replace it with zero-trust solutions (corporate VPN now account for just 5% of usage, 8% in the USA, so it's less meaningful). Worldwide, if 2024 survey of a specialized company we bought is correct, roughly 1/3 of the whole Internet population used a VPN at least "once per week". Unfortunately (for them too) of this 1/3, more than 30% used a "free" VPN (this implies that free VPNs are used commonly by more than half a billion persons in the world). Some more data showing usage from USA perspective: https://www.security.org/resources/vpn-consumer-report-annual Kind regards
  12. Hello! It is because you have "brianz@tuta.io" as e-mail address linked to an account (whose linked e-mail address is different) and as username of another account. Only one of them has a valid plan. You can easily resolve this confusion but we have already done this for you. Please try again now. Kind regards
  13. Hello! We have asked twice Wurren's datacenter support for investigations and interventions on intermittent Wurren malfunctions. Techies always claimed they found nothing, but we could clearly observe repeatedly a specific bandwidth choke on various (not all) IP addresses. Although the problem seems resolved and did not re-appear in the last week, we are waiting for delivery of 3 new servers in the same Kornephoros' datacenter to power up our presence in Toronto. They are currently at Canada custom, so it's likely that we will have them connected before the end of November. They feature powerful hardware and they will be connected to 10 Gbit/s full duplex lines. We are considering to decommission Wurren after the three new servers are operational. Kind regards
  14. Hello! Thanks. It's strange because Eddie has the very same ability. Given this new information, it looks like an Eddie bug rather than a limitation enforced by your device manufacturer. However, we are unable to reproduce this problem on any of our Android TV devices and emulators. Can you explain the failure with adb and send us a complete report generated by Eddie in your machine to give us more clues (after the problem has occurred, in the "Logs" view tap the paper plane icon and send us the link that the app will give you back)? Kind regards
  15. Hello! Thank you for the information. It is perfectly possible, and has been observed, that manufacturers restrict or block automatic startup of VPN apps (and other app categories) in their Android TV customized ("non-stock") versions. If that's the case, you could try to enable "Always on VPN", if it wasn't removed as well. On stock Android TV "Always on VPN" is available, and sometimes it is available even in non-stock Android TV versions, because it is removed only from the user interface. Link Always on VPN to Eddie in the following way: https://airvpn.org/forums/topic/65815-android-tv-vpn-connection-at-startup-why-openvpn-for-android-can-do-it-and-eddie-not/?do=findComment&comment=255925 and check whether it resolves the situation. It is possible that the settings are wiped out by the firmware or manufacturer's supervision programs so this solution will not work in any case (even when "Always on VPN" is successfully enabled and not removed completely) but it's worth a test. Please keep us informed. Kind regards
  16. On July 2023 and only for new accounts, it was not retro-active. An official announcement was published well in advance. https://airvpn.org/forums/topic/56405-port-forwarding-availability-change/ FAQ and home page features were modified accordingly. On September 2024 a more powerful system was announced https://airvpn.org/forums/topic/63545-update-remote-port-forwarding-system-expansion/ We don't see the point: even if you can't read the news, the home page or the FAQ, you still have your old account, so you can cut it out with the gratuitous arguments. Kind regards
  17. Hello! A couple of clarifications or additions. Multiple devices with the same key can connect to multiple servers and have the linked port(s) forwarded on all of those servers. You may also specify "All devices" for each port. Such port(s) is/are forwarded to all the connected devices, no matter through which key, on all servers. The limit is 5 ports per account but additional ports can be purchased (for this purpose you can open a ticket). Kind regards
  18. Hello! PPPoE adds some overhead https://en.wikipedia.org/wiki/Point-to-Point_Protocol_over_Ethernet#Protocol_overhead therefore WireGuard interface 1280 bytes MTU is recommended. Kind regards
  19. Hello! Everything looks fine, please re-check your "Client Area". Anyway, to stay on the safe side, please browse ipleak.net. Make sure that your "real" IP address doesn't appear anywhere, so you can be 100% positive that your connection works as expected. If you see any issue, please do not hesitate to update this thread and above all open a ticket for pro support. Kind regards
  20. Hello! You should enable IPv6 to resolve the problem at the moment. Yes, WireGuard works only over UDP. The author of the thread uses AirVPN Suite - pay attention not to hijack the thread or mix different problems, if in doubt feel free to open your own thread. Kind regards
  21. Hello! We're very glad to inform you that Eddie Android edition 3.3.0 has been released. Eddie Android edition is a fully integrated with AirVPN, free and open source WireGuard and OpenVPN GUI client. It is based on official WireGuard library and latest OpenVPN3-AirVPN library (free and open source software library by AirVPN), allowing comfortable connections to both OpenVPN and WireGuard servers. Source code is available on GitLab: https://gitlab.com/AirVPN/EddieAndroid Eddie Android edition 3.3.0 is linked against updated libraries. It is compatible with Android 5.1 and higher versions, up to Android 16, and features revamped ergonomics and important new features. What's new full compatibility with Android 15 and 16 compatible with Android 5.1 and higher versions new, remarkably improved NetworkMonitor improvements in ergonomics for faster and more comfortable use updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries ability to start and connect during the device bootstrap on all supported Android TV and Android versions, with or without "Always on VPN" opt in ability to auto connect when the app is launched through the new option Settings > AirVPN > Start quick VPN connection at application startup. It requires an account that had logged in with "Remember me" checked updated code, SDK 16 100% compliant see the complete changelog here: https://gitlab.com/AirVPN/EddieAndroid/-/blob/master/ChangeLog.txt Main features WireGuard and OpenVPN support Battery-conscious application, with low RAM footprint Ergonomic and friendly interface Ability to start and connect the application at device bootstrap and/or at app launch, with or without "Always on VPN" GPS spoofing Traffic splitting and reverse traffic splitting on an application basis. You can define which apps must have traffic inside or outside the VPN tunnel through white and black list Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish Full integration with AirVPN Quick tile button Enhanced security thanks to locally stored encrypted data through optional master password (warning: this option prevents the app from automatically connecting during the startup) Quick one-tap connection and smart, fully automated server selection Smart server selection with custom settings  Manual server selection  Full Android TV compatibility including D-Pad support. Mouse emulation is not required.  Ability to generate configuration files based on the user settings for both OpenVPN and WireGuard Increased accessibility for visually impaired persons  Download link Eddie Android edition 3.3.0 APK can be downloaded here: https://airvpn.org/android/eddie A quick start guide is available at the same above linked page. Quick link to the APK: https://airvpn.org/tv Eddie Android edition is also available on the Google Play Store: https://play.google.com/store/apps/details?id=org.airvpn.eddie and on the Amazon App Store: https://www.amazon.com/Eddie-AirVPN-official-OpenVPN-GUI/dp/B07KTD6DH9 Eddie Android edition is the only VPN application developed by AirVPN for Android. Beware of imitations on the Play Store with very similar names that conceal potential scams. How to sideload Eddie Android edition on Android TV and FireOS devices https://airvpn.org/android/eddie/apk/tv/ Kind regards & datalove AirVPN Staff
  22. Hello! This option has been always available, you can find it in "Preferences" > "UI". Check "Skip promotional messages" and click "Save". In Eddie Android edition just tap "Do not show anymore" option, located at the bottom of the promotional picture. You can configure Eddie to connect when it is launched. Kind regards
  23. @Emergency9 Hello! OK. Please keep us posted after you have disabled "Fast startup". In order to address the port problem please start with this checklist: https://airvpn.org/forums/topic/66388-port-forwarding/?do=findComment&comment=243305 Kind regards
  24. Hello! Apparently it is related to OpenVPN 2.6.x that pushes IPv6 no matter what. We will probably need to patch internally if this is indeed a necessity (nowadays you can safely keep IPv6 enabled, moreover you can disable it by yourself with WireGuard that does not support any DHCP-push). We will keep you posted in the near future. @jdelliott Please consider to upgrade to AirVPN Suite 2.0.0. You will have complete WireGuard support, very many additional features, new libraries, improved systemd and firewall support, important bug fixes. Kind regards
  25. This way I can't use port forwarding right? Hello! Wrong: of course you can. It's a server side feature that's not affected by the client software and protocol you run. Please see also: https://airvpn.org/faq/port_forwarding/ The problem you mention is unexpected. Can you tell us whether you have "Fast startup" enabled? If so, can you please disable it and check whether the problem gets resolved or not? How to disable it: https://www.elevenforum.com/t/turn-on-or-off-fast-startup-in-windows-11.1212/ Kind regards
×
×
  • Create New...