Jump to content
Not connected, Your IP: 18.218.171.212

Staff

Staff
  • Content Count

    10935
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1844

Everything posted by Staff

  1. The lack of existence of any court proceeding trying to force Air to disclose something is just another strong clue that this "something" does not exist. We challenge you to find anything in court or not which proves that Air keeps any log, in spite of the fact that Air is much older than PIA and provides technical tools which are just science fiction in PIA infrastructure. Did you know that indiscriminate data retention of users traffic (metadata included) has been judged as an infringements of human rights by the European Union Court of Justice twice, while in the USA, where PIA operates, data retention is not mandatory and not forbidden? The matter deserves many more considerations, because it must be clear that data retention is contrary to the interests of AirVPN, even under a cynical, purely marketing based, point of view. Please read carefully here when you have time: https://airvpn.org/topic/26206-rebuttal-of-article-dont-use-vpn-services/ Kind regards
  2. No, that's not true, so the whole argument falls. No, it's not correct, but at the end of the day you could anyway think of something very convoluted to tell the world that you are an AirVPN customer, and we can't do anything about that. Not that we can do anything even if you do so in a very direct way. Kind regards
  3. Most servers still don't support IPV6 nor tls-crypt. There are only twelve "generation two" servers out of 219 servers that currently support them. That's only 5.47% of the total AirVPN network It will probably take months before the full network updates unless @staff proves me wrong. Hello! The final step of the upgrade in itself is not very time consuming, see the previous message to NaDre, however what we can't foresee is whether unexpected problems will come out now that Gen 2 servers will be massively used, and if they do (of course we are confident they will not), how much time we would need to resolve them. Kind regards
  4. Hello! Exactly. As you may have read in the announcement of the IPv6 experimental phase, such phase could not be closed before the release of some stable release of Eddie 2.14. Now that we have a stable Eddie which fully supports IPv6, the 12 servers will provide us with a massive amount of connections and therefore we will receive meaningful feedbacks is something goes wrong. If nothing goes wrong then the migration will continue as programmed and most of our infrastructure will support IPv6 (not all, because we still have 2 datacenters that do not support IPv6). Note that all servers are already "gen 2" ready (meaning that they have both full IPv6 support from the datacenter AND enough IPv4 addresses to support all the different, new connection modes regardless of IPv6), so the time consuming procedure in this phase is the testing, not the final steps of the migration in themselves, even because the critical ones (including pre-planning, requests to datacenters for IPv6 support, deployment of new configurations) were performed between late 2016 and the beginning of 2018. Kind regards
  5. Hello and thank you! Please see here: https://build.openvpn.net/doxygen/html/group__tls__crypt.html IPv6 is not necessary for tls-crypt. IPv6 and tls-crypt are often cited together by us only because the upgrade to IPv6 of servers also includes upgrade to tls-crypt support, and vice-versa, but that's only an internal method of working. Kind regards
  6. Hello! Yes, this is planned for the near future. We are preparing a new release, with a new ID, which we plan to publish on F-Droid as well. In the meantime, please use the direct link to download the apk from our servers. You can find it in the first post of this thread. Kind regards
  7. Hello! We're glad to inform you that the official AUR packages are those whose maintainer is Eddie.website Currently, Eddie 2.14.5 is the first version that AirVPN distributes directly as an AUR package as well. See also https://airvpn.org/linux Kind regards
  8. Hello! Send a system report pasted into a ticket to the support team, maybe something can be tried. Kind regards
  9. Hello! We're very glad to inform you that a new Eddie Air client version has been released: 2.14.5 Eddie 2.14.5 includes many important bug fixes and changes. You can see them all on the changelog here; https://airvpn.org/services/changelog.php?software=client&format=html. As usual, Eddie is released as free and open source software under GPLv3. New important features have been added. Now Eddie includes a full, seamless and integrated IPv6 support, as well as new features which will let you use our latest service additions (including IPv6 and tls-crypt). Users who have only IPv4 connectivity will be able to access IPv6 services, At the same time users who have only IPv6 (and not IPv4) connectivity, will be able to use our service without limitations. tls-crypt implementation provides a new, interesting way to efficiently bypass blocks and throttling against OpenVPN. This version has been released GNU/Linux, OS X (Mavericks or higher is required), macOS and Windows (Vista or higher is required). 2.14.5 version is compatible with several Linux distributions. For important notes about environments, please read here: https://airvpn.org/topic/27259-status-of-eddie-on-linux-distributions/ Due to the large amount of bug fixes and changes, as well as the addition of new features, upgrade is strongly recommended. Just like previous versions, Eddie implements direct Tor support for OpenVPN over Tor connections. Eddie makes OpenVPN over Tor easily available to Linux, OS X and macOS users: no needs for Virtual Machines, middle boxes or other special configurations. Windows users will find a more friendly approach as well. This mode is specifically designed for Tor and therefore solves multiple issues, especially in Linux and OS X/macOS, including the "infinite routing loop" problem (see for example http://tor.stackexchange.com/questions/1232/me-tor-vpn-how/1235#1235 ) As far as we know, Eddie is the first and currently the only OpenVPN wrapper that natively allows OpenVPN over Tor connections for multiple Operating Systems. https://airvpn.org/tor This is the first stable version which sends a NEWNYM signal to Tor to ensure the use of a new circuit in every connection. We recommend that you upgrade Eddie as soon as possible. Eddie 2.14.5 for GNU/Linux can be downloaded here: https://airvpn.org/linux Eddie 2.14.5 for Windows can be downloaded here: https://airvpn.org/windows Eddie 2.14.5 for OS X Mavericks, Yosemite, El Capitan and macOS Sierra and High Sierra can be downloaded here: https://airvpn.org/macosx PLEASE NOTE: Eddie 2.14 package includes an OpenVPN version re-compiled by us from OpenVPN 2.4 source code with OpenSSL 1.0.2k for security reasons and to fix this bug: https://community.openvpn.net/openvpn/ticket/328 Eddie overview is available here: https://airvpn.org/software Eddie includes a Network Lock feature: https://airvpn.org/faq/software_lock Eddie is free and open source software released under GPLv3. GitHub repository: https://github.com/AirVPN/airvpn-client Kind regards & datalove AirVPN Staff
  10. Hello! In this case your network disrupts SSH. Try also "OpenVPN over SSL" to port 443, it's worth a try. Kind regards
  11. Hello! gksu dependency has been removed on the .deb package of Eddie 2.14.x. Kind regards
  12. Hello! Please see here: https://airvpn.org/ssh Eddie, the AirVPN client software, usage is recommended whenever possible, it will make things simpler. You can change connection mode by selecting an "OpenVPN over SSH" tunnel in "AirVPN" > "Preferences" > "Protocols" window. Kind regards
  13. Hello! We do provide IPv6 traffic leaks prevention in our software. Such feature will be soon redundant because IPv6 full support in our infrastructure will be completed soon. Currently the following servers support IPv6: Algieba Atria Castor Cebalrai Chamaleon Chara Errai Gacrux Gianfar Mesarthim Minkar and full IPv6 deployment is imminent. Kind regards
  14. Hello! In Spain we have two different providers. In general M247 provides us with services in Europe, Singapore and Japan. We rely on M247 for about 23% of our infrastructure in Europe, which is 50% less than our bandwidth redundancy in Europe, so we have no critical point here. About Japan, we have just begun to operate there with a server, so it's too soon to make general considerations. You have no reasons to worry. About "network diversity" mentioned by another user, we are customers of 27 different providers, so nobody should complain about that. Last but not least we have been working with M247 since 2015 and we have never had any critical issue. Kind regards
  15. Hello! Can you please point us to the draft law you mention, in the part where it would force datacenter operators to apply blocks at datacenter level? That would significantly help our legal advisors because just a few months ago we were re-assured that no mandatory filtering tool will exist for transit providers etc., but only for "residential" ISPs. That for the legal part. About the technical part, we faced an identical problem in Singapore some years ago (censorship enforced in datacenters too). You should have never noticed any block to sites from Singapore servers since according to our mission we did our best to bypass any censorship and preserve end to end principle, keeping our infrastructure content agnostic. We are not saying that this will be always technically possible anyway, only that we will do our best to fulfill the mission. https://airvpn.org/mission Kind regards
  16. My greatest problem with this solution is that Network Lock seems not to work then yet. Is it planned for future versions to change this? Hello! Network Lock works with OpenVPN over an HTTP or SOCKS proxy. It does not work with OpenVPN over Tor, because the Tor guard IP address can't be known before the circuit is established, obviously. There are no plans to change this in Eddie 2.14.x, maybe in Eddie 3 future branch. Use Tor over OpenVPN with Network Lock enabled and you have an even safer solution. We have been writing about that since 2012, so we agree and we know that a minority of our customers can't afford to trust us or especially the datacenters personnel. In every case where the threat model prescribes the need of partition of trust and Network Lock, a strong solution is Tor over OpenVPN. Double hopping on different VPN providers is the next weaker solution for different threat models. Double-hopping on servers handled by the same provider should be evaluated carefully because it is the weakest solution of the mentioned set: it is ineffective in every threat model which takes into consideration an adversary with the power to (legally or illegally) wiretap a set (even a small set) of servers operated by the same provider, but it is effective for a threat model in which the adversary has the power to wiretap only one datacenter (think of the datacenter personnel as an adversary, for example). Check this article, it was written 6 years ago: https://airvpn.org/topic/54-using-airvpn-over-tor/?do=findComment&comment=1745 In the informative sections of our service we inform people about the importance of the issue. Our web site does have a dedicated page for AirVPN over Tor and Tor over AirVPN. Kind regards
  17. Hello! Probably the easiest solution is just running a VM attached to the host via NAT. You connect the host to some Air VPN server and the VM to some other VPN server, in this way you have double-hop on the VM. Each account can use up to five connection slots at once, this solution would take two of them. Another solution is using an external proxy and configure Eddie (just a few clicks are needed for that, in "AirVPN" > "Preferences" > ") to have OpenVPN connect over that proxy (OpenVPN over a proxy). This makes more sense for the mentioned reason (you would have two hops controlled by different entities, enforcing a valid "partition of trust": the proxy would not see anyway your traffic content, because it's still encrypted by OpenVPN, while our servers would not see your "real" IP address). A multi-hop solution on the servers side is not planned at the moment (multi-hop is used only for the "micro routing" we use for "geo-routing"). If you run GNU/Linux with a DM supporting Qt you can check Qomui here: https://airvpn.org/topic/26327-alternative-airvpn-client-with-provider-independent-double-hop-support-gnulinux/ keeping into account that this is an open source software released by a community member and tested by AirVPN community, not staff (anyway, community testing may be even more extensive than ours, since our GNU/Linux community is becoming huge, and many persons are very skilled). Kind regards
  18. We do accept a variety of cryptocurrencies including XRP, yes, however what does it have to do with the topic and the problem mentioned by our customer? Please do not hijack threads. Kind regards Sorry that wasn't my intention I was addressing the 60 minute point of the Op. Ok no problems. We use your remark to underline that this is not a problem and no payment will be lost. Kind regards
  19. Hello! We are very near. Now servers supporting IPv6 and tls-crypt are twelve and no specific problems are detected. We call such servers "Generation 2" servers, and you can see them in Eddie or in the Configuration Generator by selecting the proper options. When Eddie 2.14.x reaches the stable release, we will allow some more time to get out of the experimental phase and upgrade (gradually, because it requires disconnection of all clients) every server to Generation 2. Only a tiny amount of servers (less than 7-8) will not support IPv6 because the datacenter does not have an IPv6 infrastructure. They will support anyway tls-crypt Kind regards
  20. Hello! AirVPN (according to some reports) can bypass Fortinet filters using Eddie, even if the administrator enforced the proxy black list which blocks our bootstrap servers. Contact the support team via a ticket if you wish to experiment. Kind regards
  21. Hello! We apologize for the inconvenience, we have fixed it now. The problem was caused by the fact that our rating system found Hyadum as the best server in the Netherlands, in Europe and in the world but in reality it was not working properly. We will investigate to understand why the monitoring system did not detect the problem automatically and caused the escalation (since Hyadum was marked as working, but it had all free bandwidth, it became quickly the "best" server). Can you please try again now? Kind regards
  22. We do accept a variety of cryptocurrencies including XRP, yes, however what does it have to do with the topic and the problem mentioned by our customer? Please do not hijack threads. Kind regards
  23. Hello! It's already allowed, but it needs that you specifically set it up. For example, there is no explicit function in Eddie, the Air client software, but you have the option to connect to one of our VPN servers over a proxy or Tor. Anyway the implementation by yourself is trivial, although multi-hopping on nodes which are all operated by the very same entity is not a good solution for obvious reasons. In the forum this topic has been faced multiple times in the past, give the search engine a chance to help you. An outstanding member of our community wrote a software for GNU/Linux which will let you muti-hop in a very easy way, even between different VPN providers (this makes more sense). Please note that this software has NOT been tested extensively by Air Staff. Have a look here: https://airvpn.org/topic/26327-alternative-airvpn-client-with-provider-independent-double-hop-support-gnulinux/ Kind regards
  24. Hello! About the business ethics, the maintainer of the web site you mention has been caught lying in the past and insisted on the lies and other questionable behavior. See for example https://airvpn.org/topic/19586-a-review-on-another-site/?do=findComment&comment=48945 - where his lies have been publicly revealed as well as hidden corrections to his articles. Compare the lies of the web site maintainer with the facts of the web site and judge yourself whether we have been faithful to our mission or not https://airvpn.org/mission About the "yellow" flag on logging, that's just another proof of the poor competence of this self proclaimed "expert". Compare the Privacy Notice and Terms (linked at the bottom of all of our web site pages, https://airvpn.org/privacy ) and see yourself - let us know if you can find anything that can deserve a "yellow flag" on our complete and total no-logging policy and total lack of personal data collection. It's also worth to mention that, contrarily to what happens with some of our biggest competitors, in 8 years of activity no identity of any Air customer has been revealed, another fact supporting the truth of our no logging and no traffic inspection policy. In general (and NOT related to this case, which we are confident we have exhaustively proved as a blatant set of lies and misconceptions) also stay away from those web sites which publish "VPN reviews" together with "top x VPN services" and all that jazz: many "reviewers" can voluntarily write a surreptitiously bad review, partially or totally detached from reality, when we refuse to pay for the review OR to pay for advertisements in their web site pages. Since we have never paid for reviews (and we will never do) and for ads on such web sites, it may happen that reviews are voluntarily "biased". A flourishing business around VPN reviews has been created in the last years, and is fueled by those companies which are willing to "pay for reviews". Such companies harm the image and reputation of the whole sector and show total disrespect for their potential customers. It's disgusting that such a game can be played when personal freedom and safety are at stake in a sector which was originally born exactly to protect people from all abuses deriving from the infringement of a fundamental right, privacy. Kind regards
  25. Hello! Now download pages act as a proxy for eddie.website. Can you please try again? Kind regards
×
×
  • Create New...