Jump to content
Not connected, Your IP: 18.221.13.173

Staff

Staff
  • Content Count

    10626
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1771

Everything posted by Staff

  1. Hello! Account 99zeros is not on premium status, so you should not be able to connect to VPN servers with that account. Probably you're trying with another account in premium status, but we can't help you properly if we don't know the account name. As a general recommendation, please make sure that no program (check especially firewall, antivirus, PeerGuardian, PeerBlock and Malwarebytes) is blocking incoming packets for torrent clients. Kind regards
  2. Hello! A VPN secures your connection, not your computer or your behavior. When you subscribe you accept the Terms of Service and the Privacy Notice in their entirety. We can't, we don't keep logs that can be used for such purposes. Also we don't process directly credit cards so we don't have any data about credit cards. We do have PayPal info payments but we are not able to correlate them with VPN activity, because we don't monitor connections and we don't keep logs which can be exploited to disclose a customer identity or real IP address, in compliance with relevant EU directives. Kind regards
  3. Staff

    vpn

    Hello! No, there's no connection or relationship between Air and A/I. They have a very good reputation in Europe. Please ask them. Kind regards
  4. Hello! But that's not us. It's just a geo-location mistake made by some service. Kind regards
  5. Hello! Maybe you are trying to connect to the ControlPort instead of the SocksPort. Defaults in Windows are 9050 (SocksPort) and 9051 (ControlPort). OpenVPN must connect to the SocksPort, not the ControlPort. Kind regards
  6. Hello! A very explicative guide (maybe even too much) is here: http://macs.about.com/od/networking/qt/configure-your-macs-dns.htm You might also like to search for 'how to change DNS on Mac OS X" on any search engine, for example: http://www.google.com/search?q=how+to+change+DNS+on+Mac+OS+X Kind regards
  7. Hello! Our business model is based on various important factors, amongst which a guaranteed allocated bandwidth, transparency (see our real time servers monitor) and total absence of overselling. These are the main reasons for which we allow one single connection per account. In order to connect multiple devices simultaneously with one account, you need a gateway which runs OpenVPN (such as a computer with two network cards, a DD-WRT/Tomato router...). All the other devices connected to the "gateway" will use the tunnel transparently. What we want to avoid, in order to provide a premium service, is a variable number of connections from one account from different networks, which would cause several issues to our model. Please consider that the competitor you cited (snipped out by this admin, in order to avoid bad or good advertising to them) provides just 3 servers in 3 countries, no real time servers monitor and no guaranteed allocated bandwidth. Kind regards
  8. Hello! Yes, the test is normal, it shows no leaks. Cygni is in Stockholm, Sweden, if you see Netherlands there's a mistake somewhere, can you please tell us where you see that? Kind regards
  9. Hello! About I2P over AirVPN, please see this old post: https://airvpn.org/index.php?option=com_kunena&func=view&id=23&catid=3&Itemid=142#26 Kind regards
  10. Hello! Once you have subscribed, our configuration generator becomes accessible and will generate certificates, key and configuration files according to your preferences. Please access it (while logged in) at menu "Member Area"-->"Access without our client". Instructions for Mac OS X are available here: https://airvpn/macosx anyway at the subscription you will receive an e-mail (if you entered a valid e-mail address) with instructions and all the relevant links. Kind regards
  11. Hello! Thank you for the information! We'll look into the issue. Kind regards
  12. Hello! Please see previous messages in this thread. Again, if you can't afford to trust us for imparting and/or receiving critical information, we have designed the system so that you can use it as a tool where trust in us is not necessary: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 Kind regards
  13. Hello! Please see here: https://airvpn.org/tor Some of your questions are not fully understood, can you please elaborate? Kind regards
  14. Hello! A sufficiently powerful adversary theoretically can have performed the packet substitution on any point between our servers and you. Using a VPN properly configured is an effective way to defeat replay attacks. If you have noticed no decrease in performance, probably either the attack was short in time or it was not an attack at all, just a momentary network problem. Probably you should not be worried at all (as long as you connect to a VPN or you connect over SSL/TLS), anyway keep an eye on the logs and feel free to report back if the problem persists or gets bigger. Kind regards
  15. Hello! The replay attack (if any) would be against you specifically. Not a big concern, OpenVPN can perfectly handle and defeat such attacks through packet authentication (if enabled, as it is in our system). Did you notice any performance decrease? Kind regards
  16. Hello! Yes, we confirm that. Each server has one static entry-IP and one shared static exit-IP address. Kind regards
  17. Hello! Please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=4821&Itemid=142#4828 We kindly ask you to keep us informed at your convenience if the problem persists. Kind regards
  18. Hello! You can check on the .ovpn configuration file and on your OpenVPN client logs. For your comfort: - data channel: AES-256-CBC (AES 256 bit) - packet authentication: SHA 160 bit - RSA keys size: 2048 bit Kind regards
  19. Hello! It must be determined why you ping 10.4.0.1 and you get a reply from 163.139.126.110 (it suggests that you're not inside the VPN and/or that the OpenVPN server routes and gateway push failed): Can you please send us (even in private if they include sensitive information): - your client connection logs - your routing table after the connection (output of the command "route print") - your network cards information while your computer is connected (output of the command "ipconfig /all") - a route tracing to 10.4.0.1 while your computer is connected (output of the command "tracert 10.4.0.1") Kind regards
  20. Hello! Yes, of course. The showed picture (link removed, no ads allowed) pertains only to OpenVPN, though, and a picture is a picture, it proves nothing unfortunately. Unfortunately, because if a picture could prove that we don't keep logs, it would be so easy to provide such a proof. If you can't afford to trust us because your network activity is highly critical (for example high level whistleblowing, information dissemination about brutality/corruption in a human rights hostile regime etc etc...), you should hide your real IP address to our servers even while connected. An example: https://airvpn.org/tor or you can hide the content of your traffic with the other way round (TOR over AirVPN, for example). When it's a matter of personal freedom (or even of life or death...) the concerns focus not only on logging, but on real-time wiretapping by some hostile entity. Kind regards
  21. Hello! The percentage shows the used bandwidth on the servers. So a 100% shows that a server can't give any more bandwidth, the additional bandwidth required will be divided into all the connected clients, so you might like to prefer servers with lower percentages. Our guaranteed allocated bandwidth requires that you pick servers "cum grano salis", because currently we prefer not to forbid connections on busy servers. Bandwidth redundancy is currently so high that you can always find a server with at least 500 Mbit/s bw free. Kind regards
  22. Hello! They use the very same datacenter where Virginis is located, probably they have the luck that some IP blocks are not blocked by Zattoo. Kind regards
  23. EDIT: problem solved. It was caused by a flood attack which we successfully mitigated. Hello! We're experiencing various issues with the secondary frontend. If you have in your hosts file the line: 85.17.207.151 airvpn.org and you can't access it, please switch to the primary frontend 212.117.180.25: 212.117.180.25 airvpn.org We're investigating. Kind regards
  24. Hello! We have been unable to find any provider in Switzerland which is not blocked by Zattoo, unfortunately. Kind regards
  25. Hello! Yes, fake. Interestingly enough no law is cited. A brief but good overview of the data retention laws in the USA is in the Wikipedia article http://en.wikipedia.org/wiki/Telecommunications_data_retention#United_States On top of that, we can cite Title 18 of the United States Code, Section 2703(f), that states that: "A provider of wire or electronic communications services or a remote computing service, upon the request of a government entity, shall take all necessary steps to preserve records and other records in its possession pending the issuance of a court order or other process." So "a government entity" may oblige a provider to NOT destroy logs (pending an investigation), IF those logs exist, for 90 days (renewable for additional 90 days), without a court order. In order to force a provider to keep recorded logs (again, if they exist) for more than 180 days, a court order is necessary. The requirement for data preservation does not require a service provider to collect data prospectively, nor does it permit the preservation of everything in a service provider’s systems – only the information that related to a specific investigation, IF those information were already available. The United States also does not require ISPs to routinely destroy or retain communications data. ISPs are free to destroy or retain communications data as they each choose, based upon their own assessments, resources, needs and limitation. An up to date situation on data retention laws in the world is kept by the Electronic Frontier Foundation. About the USA, please see here: https://www.eff.org/issues/mandatory-data-retention/us Kind regards
×
×
  • Create New...