Jump to content
Not connected, Your IP: 52.55.214.236

Staff

Staff
  • Content Count

    10486
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1747

Posts posted by Staff


  1. @bluesjunior

    Hello!

    Oh wait, that's just the choice of speedtest routines which are based on your node geo-location and maybe even on their server pool availability. It's not relevant to ascertain the routes and transit providers of the VPN server, so the whole issue is probably nonexistent. Anyway, feel free to verify with traceroute or mtr, those tools don't lie. :)

    Kind regards

     

  2. 5 hours ago, DogeX said:
    @Staff

    I agree with @legitacc1234. Greater transparency in situations like this would be appreciated. Even though I wasn't a customer seven years ago, prompt disclosure would have been preferable—ideally, on the same day you discovered the server seizure. This is particularly relevant if you weren't instructed to keep the matter confidential. Regardless of the server's log policy, there's a possibility that the FBI could have identified the IPs communicating with the server at the time of the seizure. Although this is purely speculative, one should always prepare for the worst-case scenario.

    Hello!

    You have just given an additional reason NOT to disclose anything. If IP addresses had been identified (which is unlikely, otherwise they would not have asked for our help) through black boxes, disclosure would have had a likelihood to alert the criminals. Once again, you suggest to harm investigations through active actions which are not in our mission, not in the contractual agreement with you, and not in our will. One thing is refusing to co-operate with certain police requests or appeal and reject certain orders, a totally different thing would be active sabotage of police actions when we are informally asked for potential help in a mutual trust relationship. This last thing would be totally unacceptable for us even on ethical considerations.

    Kind regards
     

  3. Hello!

    Thank you, you're indeed a long time customer! The behavior you mention is odd as according to the datacenter all Dutch servers have direct presence on AMS-IX. If you notice this thing again, can you please warn us and send us a traceroute to some service (while you're connected to the VPN server of course)? It might be just a different routing with another transit provider under specific circumstances, but let's see.

    Kind regards
     


  4. 7 hours ago, tatejuan said:

    Any updates in regards to this new server?


    Hello!

    We're sorry, we have a delay due to a clause of the contract we are not comfortable with. If the matter can not be resolved, we can anyway rely on our current provider in NZ. Please stay tuned, in one way or another we definitely need to add bandwidth in NZ, and soon.

    Kind regards
     

  5. @zetterpav

    Hello!

    No official communication was relevant or due to customers because the server did not contain any personal information or general data pertaining to customers or the infrastructure and because we have never been served by any order of any kind or anything else. The whole report is purely based on verbal communications as a courtesy. 7 years is a reasonable time to allow proper investigation time without undue interference, as we already wrote.
     
    Quote

    How many other non disclosed issues are there currently? 


    None at the moment.
     
    Quote

    Is waiting to disclose an issue for 7 years an official policy?


    It may depend on court orders. If a competent court order says that something must not be disclosed for a period of time, that period of time must be respected. In this case there are no official documents whatsoever served to us, so it's just a report based on informal communications, which are not necessarily faithful to the truth.
     
    Quote

    I selected your services 10 years ago based on what I believed to be your ethics 'model' coupled with not saving logs. I came here today as I do annually to inquire on any Black Friday deals as that is when I generally re-up and now I'm having second thoughts. 


    Let's make it clear that our ethics and our mission don't imply that we will actively do something to inflict damage to any investigation. Our ethics and our mission forbid us to inspect secretly traffic or log secretly or build traps, not even if ordered by authorities, but it does not imply and never implied that we should actively do something to harm an investigation. We're glad that this case confirms that we don't keep traffic logs according to the ToS as you rightly expected.

    Kind regards
     

  6. 1 hour ago, the1lemming said:

    May I ask what and how I would know if ads are in the main Video Stream please?

    At the moment I am still getting ads at the start and end, with a five second delay before I can click out and back to what I'm watching. I'm getting less ads, I think however this may just be wishful thinking.

    Is this the sort of thing that I just have to accept as the normal or can these be blocked some how?


    Hello!

    How to mitigate or block YouTube ads is a matter of hot debates on various forums. It's outside the scope of AirVPN, though, we're sorry. You might like to research on your own.
     
    1 hour ago, the1lemming said:

    have also gone into API. I don't really know what to do so I just hit an API key and made it active. I've no idea what its doing.


    Please see here, just in case you'll need API features in the future:
    https://airvpn.org/faq/api/

    Kind regards
     

  7. Hello!

    The features you ask for are included in any plan.

    The system is very flexible and offers some exclusive features never seen before in other VPN services:

    • You can activate or de-activate, anytime, any combination of lists.
    • You can add customized exceptions and/or additional blocks.
    • Any specified domain which must be blocked includes all of its subdomains too.
    • Lists which can return custom A,AAAA,CNAME,TXT records are supported.
    • You can define any combination of block lists and/or exceptions and/or additions for your whole account or only for specific certificate/key pairs of your account (Client Area ⇨ Devices ⇨ Details ⇨ DNS)
    • Different matching methods are available for your additions and exceptions: Exact (exact FQDN), Domain (domain and its subdomains), Wildcard (with * and ? as wildcards), Contain, Start with, End with.
    • An API to fetch every and each list in different formats (see Client Area API dns_lists service) is active
    • Any change in your selected list(s), any added exception and any added block is enforced very quickly, within few tens of seconds. You don't need to disconnect and re-connect your account.
    • You can define your own lists and discuss lists and anything related in the community forum here
    Essential requisite to enjoy the service is, of course, querying AirVPN DNS while your system is connected to some VPN server, which is by the way a default setup if you run any of our software. Please see also:
    https://airvpn.org/forums/topic/49876-new-feature-dns-block-lists/

    Please note that YouTube may include ads in the main video stream, therefore no DNS based ad blocker is totally effective against YouTube ads.

    Kind regards
     

  8. Hello!

    Google Search should never be used for privacy reasons (Google profiling techniques are so advanced that you risk to create a correlation between your real identity and your VPN identity at the tiniest error) and ethical reasons, but you can rely on startpage.com if you really need Google Search. Startpage will proxy your queries to Google Search and serve you back Google reply, therefore an additional protection layer stands between your node and Google and you usually avoid captchas. A very good search engine offering privacy protection commitment is Brave Search:
    https://search.brave.com

    Kind regards
     


  9. Hello!

    You have renewed your key in the last hours and maybe you forgot to force Eddie to update. Please try to uncheck "Remember me", log your account out, log your account in again. This procedure is necessary each time you renew your key(s) or create new ones, because Eddie does not download the new keys automatically, but only at each login.

    Kind regards
     


  10. 4 hours ago, hdavis83 said:
    On 11/3/2023 at 5:35 PM, Staff said:
    Im unfortunately unable to use the Eddie client, I only have the .ovpn available to me. Is it not possible with your service to OpenVPN over Tor without Eddie?

    Hello!

    It's explained in our previous message, the one you quoted, to let you see all the required steps.

    Kind regards
     

  11. @hdavis83

    Hello!

    Caveat: this answer isn't written by an Eddie developer. If you need more details or information please tell us so and someone more competent on the matter will be queried for a reply in the next days.

    The guide you linked features an apparently different connection mode. To establish OpenVPN over Tor connection and route all the system traffic (except the traffic directly going to Tor) over OpenVPN over Tor, Eddie talks to Tor Control (that's why Tor must be already running: Eddie will not run it by itself), obtains the IP address of the Tor entry guard, routes it outside the VPN tunnel to prevent infinite routing loop, and establishes the VPN connection to the final VPN server over Tor SOCKS proxy:
    https://github.com/AirVPN/Eddie/blob/a9ebf22515133616811b630caee762b3ef970149/src/Lib.Core/TorControl.cs#L25

    Observe the routing table, consult the configuration file (dynamically generated by Eddie) and read Eddie log when you connect over OpenVPN over Tor with Eddie (use some testing system with a DE for example). In order to simplify communications with Tor Control, you may consider something like the following CLI tool:
    https://github.com/adrelanos/tor-ctrl

    Kind regards

     

  12. Hello!

    Please click Activate and then "mouse over" the link to see the whole URI scheme including the URN, or right-click (with most browsers) the magnet link and select "Copy link" to store it in your system's clipboard and process it comfortably.

    Kind regards
     


  13. Hello!

    The option you ask for is already implemented. You can change connection mode by selecting "Preferences" > "Protocols" from Eddie's main window. Uncheck "Automatic", select a line with WireGuard connection and click "Save". Eddie does not change connection mode by itself, the "Automatic" option in reality is just fixed at the moment to OpenVPN, UDP, port 443.

    Kind regards
     


  14. Hello!

    When you get the error, can you please check whether an instance of Eddie is really running or not? Open the Task Manager and check whether some eddie* process is running or not. If so, check whether Eddie started minimized. Search for Eddie's tray icon (a small cloud in a circle) in the system tray. Make sure to see hidden tray icons too by clicking the "up" arrow which will show hidden icons. If you find the tray icon double click on it to bring Eddie's main window up.

    Kind regards
     


  15. Hello!

    Please feel free to open a ticket for support and in the meantime you can retrieve Eddie 2.20.0 by clicking "Other versions" on the usual Windows download page:
    https://airvpn.org/windows
    Select "2.20.0" and you will be brought back to the download page, pointing this time to Eddie 2.20.0. Download as usual.

    In the ticket please include a system report generated by Eddie after the problem has occurred. Please see here to do so:
    https://airvpn.org/forums/topic/50663-youve-been-asked-for-a-support-filesystem-report-–-heres-what-to-do/

    You might also like to test Eddie 2.23.2 and check whether the problem gets resolved or not. To download Eddie 2.23.2 please see here:
    https://airvpn.org/forums/topic/56428-eddie-desktop-223-beta-released/


    Kind regards


  16. Hello!

    As @overbuilt985 noted, this is a WireGuard problem (except for the crash reported by OP, which is under investigation). We and some of our customers managed to reproduce the issue even by using stand alone WireGuard "official" Android app.

    @pandabearresurrection if the problem gets unbearable please consider to switch to OpenVPN at the moment. You can switch between WireGuard and OpenVPN by tapping the "VPN type" icon in the main view before you start a connection. Also make sure that "VPN Lock" is NOT enabled and that "Always on VPN" and "Block connections without VPN" system settings are on, please see https://airvpn.org/android/eddie/#step6

    Kind regards
     


  17. Hello!

    Maybe you have "VPN Lock" enabled in Eddie's settings, please check. "VPN Lock" would prevent any possible re-connection, but it's disabled by default as it is useful to prevent leaks in Android 7 and older versions, and in Android TV, where "Always on VPN" and "Block connections without VPN" are not available. Also feel free to send a log in a ticket. In the "Settings" view tap the paper plane icon, take note of the URL that Eddie gives you back (you can copy it in the clipboard) and send the link to the support team.

    Kind regards
     


  18. Hello!

    From here:
    E 2023.10.28 03:48:40 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached
    . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065)
    . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065)
    . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065)
    . 2023.10.28 03:48:40 - Above log line repeated 77 times more

    it's plausible that UDP is blocked. Please make sure that no packet filtering tool in the router blocks UDP.

    If the problem persists, please try a connection in TCP (OpenVPN, protocol TCP, entry-IP addtress 3, port 443) and check what happens. You can change connection mode in Eddie's "Preferences" > "Protocols" window. Uncheck "Automatic", select the line with the mentioned connection mode (the line will be highlighted), click "Save" and test again connections.

    Kind regards
     


  19. 4 hours ago, esjalistas said:

    Hm. More then five months later, Sucuri is still blocking Linuxmint.com and quite a few other sites I regularly visit. Is action really being taken, staff?

    Hello!

    Not really, i.e. the black list compiled by Sucuri according to what they find in 10 other black lists and other evaluations (if any) is not modified by any of our actions apparently. Check here:
    https://docs.sucuri.net/malware-removal/delisting-blacklisted-sites/how-to-get-off-a-blacklist/
    https://docs.sucuri.net/malware-removal/delisting-blacklisted-sites/

    Kind regards
     

  20. Hello!

    1. Correct. A new Eddie Desktop edition version 3 will get rid of Mono in the UI (Eddie backend already does not need Mono or .NET framework). The UI itself will be refreshed. A roadmap is not currently available, we're sorry.
    2. Several variables affect performance of OpenVPN and WireGuard and it is actually difficult to provide an effective and general suggestion on which of the two you should pick. Ignore the "recommended for best performance" at the moment, we might remove it altogether. Test both WireGuard and OpenVPN and pick the one which can provide you with the best performance. On iOS, provided that your ISP does not shape WireGuard or UDP traffic, and therefore on a level playing field, WireGuard is faster according to the majority of reports.
    3. You can find detailed instructions for WireGuard in iOS in the dedicated page, direct link: https://airvpn.org/ios/wireguard/appstore/
    4. No, we're sorry, major streaming platforms (e.g. Hulu, Primevideo, Netflix, Disney+) are not accessible from our infrastructure. We would need "residential IP addresses" from USA residential ISPs to make them accessible. We have no plan for that for the near future, we're sorry.
    5. Just ask for deletion in a ticket (click "Contact us" on the web site while your account is logged in and send the deletion request)
    Kind regards
     
×
×
  • Create New...