Jump to content
Not connected, Your IP: 3.141.202.54

Staff

Staff
  • Content Count

    10610
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1764

Everything posted by Staff

  1. Hello! Yes, a generic message, there are no unaddressed complaints in AirVPN. Kind regards
  2. Hello! The screenshot you published shows that it's not a block but a verification that the user is human through the usual Public Turing test. It may happen when there are numerous, concurrent connections from the same IP address, it's not a case of a black listed IP address. Google should never be used, VPN or not, anyway you can also rely on https://startpage.com which will act as a proxy to Google Search, therefore adding some additional privacy layer between you and Google Search. Kind regards
  3. @ms2738 On AirVPN, ads blocking features and much more were implemented in 2021, go figure what level of corruption and inaccuracy these infamous "reviews" sites have reached... https://airvpn.org/forums/topic/49876-new-feature-dns-block-lists/ Avoid to link them here, it's just advertising them and the usual VPN they get money and bribes from. Also consider that many "review" sites belong to editorial groups which in turn belong to Kape, which in turn owns Express, PIA, Cyberghost and ZenMate: https://embed.kumu.io/9ced55e897e74fd807be51990b26b415#vpn-company-relationships/kape-vpns In particular, that's exactly the case of what you linked: the web site you linked belongs to Kape. AirVPN is one of the very very few independent VPNs which still experience periods of explosive growth, so it's obvious that we are targeted and defamed. Add on top of this that we refuse to pay ransoms to lift or delete bad reviews, or to pay for reviews altogether, and you have the picture. By the way, in the face of scullions, corrupt scoundrels and the mentioned picture, AirVPN thrives. Kind regards
  4. Hello! We're glad to inform you that we have an agreement and we are going to configure the new server. When the configuration is complete, we just need a day or two to test and then the server will be available. Kind regards
  5. EDIT: the promotion has been re-activated to honor the 1st declaration in the original message. Hello! We apologize for any inconvenience; due to a misunderstanding and a typo the promotion ended almost 24 hours earlier than announced here. Please open a ticket to get the discount. Any other reader still wanting the discount can open a ticket and obtain it. Kind regards
  6. @mackerel Hello! Is the problem solved? If not, please make sure to open a ticket. We have just checked and we don't see any ticket coming from your account. Kind regards
  7. @evelynne Hello! Please open a ticket and list the blocked URLs and the VPN servers you experience the problem from, with the exception of banks, e-commerce sites, government institutional sites, and sites streaming copyrighted content. These sites block any connection coming from a shared IP address or from non-residential IP addresses by policy. For banks, government identification sites and e-commerce sites it's an attempt to mitigate frauds, attacks or scams, with the idea that frauds and attacks could be more likely on connections coming from VPN, Tor, anonymous proxy etc. For providers of copyrighted content it's an almost-mandatory policy because when a connection is behind a VPN or Tor, then the originating country is dubious, however due to granular country licensing of content to maximize profit, that can not be tolerated by copyright holders. Another reason of blocking is the fact that VPN usage harms any business based on personal data harvesting and reselling as well as detailed profiling. This is a typical case for social networks. Many of them by ToS forbid you from connecting from VPN or behind any anonymous layer, but there are many other sites basing their business on personal data and profiling, therefore a VPN (or Tor) is a threat to their own business and they try to discourage usage. In several cases you must make a choice between access and privacy as some services will do all they can to convince you to connect renouncing to your privacy. This is not the case for some service, e.g. your bank or your government services based on your identity, which already know your personal data and/or your identity obviously. For the readers, many years ago @LZ1 wrote this article, which we remind everyone to read: https://airvpn.org/forums/topic/18555-is-a-website-blocked-then-check-this-guide-first-feedback-appreciated/ Kind regards
  8. Hello! For the readers: customer @Sara Mize resolved the problem which was caused by a concurrent third party VPN connection already running before Eddie was launched. Kind regards
  9. Staff

    Google Authenticator

    Hello! Definitely, that reference to Google Authenticator was an old remnant of board's scrambled text. Please verify that everything has been fixed properly now. Thank you for the head-up. Kind regards
  10. Staff

    Google Authenticator

    Hello! Google Authenticator has become closed source software (proprietary freeware) recently. It was open source software for a decade or so, and then it was closed, bad decision in our opinion. So you might (should?) prefer anyway an open source alternative. See also: https://en.wikipedia.org/wiki/Comparison_of_OTP_applications The potential correlation you talk about, which can happen with any TOTP based application, could come from the unlikely comparison between your secret shared key if you have your device stolen/seized and decrypted/cracked, and all the secret shared keys stored in AirVPN, if they are at the same time stolen or seized. But then this would only prove that you are an AirVPN customer, not how you used AirVPN. Also remember that you don't need a mobile platform and/or an Android system to use an OTP based application. Kind regards
  11. Staff

    Google Authenticator

    In your fantasy world only. In AirVPN 2FA is based on TOTP https://en.wikipedia.org/wiki/Time-based_one-time_password which does not require any Google app and does not require any phone number. TOTP is an open protocol described by IETF in RFC 6238
  12. Hello! The alien VPN interface causes a critical error to OpenVPN. Please see here for a quick and effective solution: https://airvpn.org/forums/topic/56643-stuck-in-a-broken-route-never-connects/?do=findComment&comment=225323 Kind regards
  13. Hello! You will receive a reply soon, unfortunately no solution was found in these 11 days to the problem you mentioned in the ticket so the support guys were still trying something else. We we swiftly proceed to your 2nd request according to your instructions. Kind regards
  14. Hello! Please open a ticket to have support in French. Veuillez ouvrir un ticket, vous obtiendrez de l'aide en français, merci. Ce forum est uniquement en anglais afin d'éviter toute confusion causée par des langues différentes. Kind regards
  15. Please open a ticket to have support in French. Veuillez ouvrir un ticket, vous obtiendrez de l'aide en français, merci. Ce forum est uniquement en anglais afin d'éviter toute confusion causée par des langues différentes. Kind regards
  16. @Koalaman Hello! The command to disconnect a session is valid if no other Goldcrest process is already running. By Suite's default D-Bus policy only one client can talk to Bluetit at a time, the "primary owner" according to D-Bus terminology. Goldcrest's disconnect option is originally meant to disconnect a session started by Bluetit autonomously, i.e. when Bluetit is configured to connect at startup. If you need to terminate a current connection established via Goldcrest, you just have to send a SIGTERM or SIGINT to Goldcrest. For example, press CTRL-C on the terminal from which you launched Goldcrest, or send Goldcrest the signal, for example sudo killall goldcrest Kind regards
  17. Hello! Thank you for your tests! If the WireGuard kernel module is missing, the Suite will not work in WireGuard mode. Kind regards
  18. @kdirh3381 Hello! The amount of connections per server is highly accurate. Within the limit of the update, taking place every minute, it's 100% precise because it is the arithmetic sum of all OpenVPN and WireGuard connections as counted by the servers themselves. The dashboard says "users" but in reality they are connections, so if a user connects five devices to the same server, they will be counted as five connections/"users", so the accuracy remains 100% precise. Kind regards
  19. Hello! Thank you very much for your choice! We're very sorry, paying the same plan partially in LTC or other crypto, and partially with another payment processor, is not supported at the checkout. You should have bought first credit for your account (either with PayPal or LTC). During the checkout it's possible to pay a part with any payment method and a part with the account credit. Don't worry, now you can open a ticket (click "Contact us", or write to support@airvpn.org) and the sales guys will guide you to a solution. Kind regards
  20. Hello! Do you have Eddie crashing only when Open Snitch is running? In other words, if OpenSnitch is completely shut down, does Eddie run properly or not? Can you also confirm that the OpenSnitch software you mention is the following one: https://github.com/evilsocket/opensnitch Kind regards
  21. @P.Bear Hello! It's actually not easy to maintain 100 MB/s = 800 Mbit/s (1.6 Gbit/s on the server) in our infrastructure. Try to prefer Europe (or Netherlands) 20 Gbit/s servers to beat the 560 Mbit/s limit you currently experience, which is anyway a good performance in AirVPN if you consult the top user tables. Also open a ticket, as some optimization could help you gain some more performance especially when dealing with torrenting, where external (not depending on the VPN server itself) variables enter into play. Kind regards
  22. Hello! Try to switch to WireGuard and check whether performance improves or not. Also test various, different servers around your location: from Eddie's main window select "Preferences" > " Protocols" uncheck "Automatic" select a line with some WireGuard connection. When selected the line will be highlighted click "Save" re-start a connection to apply the change Kind regards
  23. Hello! Yes, it's possible. On Eddie Android edition go to the "AIRVPN SERVER" tab. By long tapping a country or a server you can add it to the favorite list, to the forbidden list, or to the default list, in case you need that last list for connections during the device bootstrap. You may also generate profiles and export configuration files, both for WIreGuard and OpenVPN, like you do with the web site Configuration Generator for a specific server or country. On Eddie Desktop edition "white" and "black" lists (favorites and forbidden servers or countries) can be configured in the "Servers" window and in the "Countries" window. Kind regards
  24. Hello, is the problem solved? If not, please see here to force Eddie not to use the "alien" Kaspersky interface which causes a critical error to OpenVPN: https://airvpn.org/forums/topic/56643-stuck-in-a-broken-route-never-connects/?do=findComment&comment=225323 Also, you don't need to remove Kaspersky VPN, but just make sure you don't use two different VPN at the same time. Kind regards
  25. Hello! In 2019 we pushed a commit with a major new feature for OpenVPN3 library but it was refused by the maintainer (Arne Schwabe) for stylistic reasons. In the opinion of some of us it's their (OpenVPN3 maintainers) style to be ugly, but OK it's a matter of personal tastes so the text format and spacing was changed accordingly and a new commit was ready. The new commit was again refused, this time because the source code included tags mentioning the source code author "ProMIND". We couldn't fully understand why the author should not be mentioned in the source code itself, moreover the tags were useful for another purpose, but fine, all tags were removed and a new commit was ready. The new commit was again refused, this time because the identity of the source code author ProMIND was not certified. In general we do not disclose the identity of our employees and collaborators, much less force them to certify it with any third party, and leave to them the choice to disclose real identity and certify it. The request was strange and we asked for some clarification. It came out, even from other OpenVPN community members, that the requirement was related to a specific contractual agreement mentioned here: https://github.com/OpenVPN/openvpn3/blob/master/CLA.rst At that point we did not like the situation: please note that a new problem was mentioned only after each new commit was proposed, while it would have been fair that all problems were mentioned at the same time, obviously, since the very beginning. And we did not like anymore to allow OpenVPN Inc. to re-license under any new license our or ProMIND's code, which is under GPLv3, according to the mentioned contributor's agreement, specifically part II, (e) clause: "(e) I understand that OpenVPN Inc. may relicense this project, this contribution, and any modification to it under any license. [...]". Therefore we did not waste additional time on the matter and we went on with our fork without further ado. At this very moment we have no merging/commit plans. On a lighter tone, this thread dated 2019 is funny in the last part: https://airvpn.org/forums/topic/43850-openvpn-3-development/ because one of the AirVPN community moderators defended OpenVPN style and Schwabe refusals, and wrote: "If you had contributed to the Linux kernel like that, Linus would tear you to tiny bits." Ironically, after that message was written, Linus Torvalds examined OpenVPN code and he was horrified. Kind regards
×
×
  • Create New...