Jump to content
Not connected, Your IP: 216.73.216.26

Staff

Staff
  • Content Count

    11673
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2080

Everything posted by Staff

  1. Hello! We're very glad to announce that Eddie Android edition 4.0.0 Beta 1 is now available. UPDATE 2026-01-14: Eddie Android edition 4.0.0 Beta 2 is now available This is a major update: for the first time Eddie Android edition features AmneziaWG complete support. Eddie Android edition is a fully integrated with AirVPN, free and open source client allowing comfortable connections to AirVPN servers and generic VPN servers offering compatible protocols. Eddie 4.0.0 aims primarily at adding, besides the already available OpenVPN and WireGuard, a thorough and comfortable AmneziaWG support. AmneziaWG is a free and open source fork of WireGuard by Amnezia inheriting the architectural simplicity and high performance of the original implementation, but eliminating the identifiable network signatures that make WireGuard easily detectable by Deep Packet Inspection (DPI) systems. It can operate in several different ways, including a fallback, "compatibility mode" with WireGuard featuring anyway various obfuscation techniques. What's new in Eddie 4.0.0 AmneziaWG support Amnezia WireGuard API stronger anti-blocking logic: ability to log in to the service and download AirVPN infrastructure and user data while connected through a profile with a specific option on the left pane ability to read and use local user data when bootstrap servers are unreachable new "Open with..." option on top of the usual "Share" option to manage and export comfortably generated profiles on any Android version with any suitable application updated AmneziaWG parameters allowed ranges updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries bug fixes see the complete changelog below AmneziaWG overview From the official documentation: https://docs.amnezia.org/documentation/amnezia-wg AmneziaWG offers: Dynamic Headers for All Packet Types (compatibility with WireGuard: YES) During tunnel initialization, the library generates a set of random constants applied to each of the four WireGuard packet formats: Init, Response, Data, Under‑Load. These constants: Replace predictable WireGuard packet identifiers; Shift offsets of Version/Type fields; Modify reserved bits. As a result, no two clients have identical headers, making it impossible to write a universal DPI rule. Handshake Length Randomization (compatibility with WireGuard: NO) In WireGuard, the Init packet is exactly 148 bytes, and the Response packet is exactly 92 bytes. AmneziaWG adds pseudorandom prefixes S1 and S2 (0-64 bytes by default): len(init) = 148 + S1 len(resp) = 92 + S2 Offsets of the remaining fields are automatically adjusted, and MAC tags are recalculated accordingly. In order to keep backward compatibility with WireGuard, S1 and S2 must be set to 0. Obfuscation Packets I1-I5 (Signature Chain) & CPS (Custom Protocol Signature) (compatibility with WireGuard: partial, with fallback) Before initiating a "special" handshake (every 120 seconds), the client may send up to five different UDP packets fully described by the user in the CPS format. In this way AmneziaWG can mimic perfectly QUIC, DNS and other protocols adding powerful methods to circumvent blocks. QUIC is particularly interesting as HTTP/3 is built on it and currently, from Chrome and other compatible browsers, 50% of traffic to/from Google is QUIC traffic. Therefore, blocking QUIC may have major disruptions for any ISP. Junk‑train (Jc) (compatibility with WireGuard: YES) Immediately following the sequence of I-packets, a series Jc of pseudorandom packets with lengths varying between Jmin and Jmax is sent. These packets blur the timing and size profile of the session start, significantly complicating handshake detection. Under‑Load Packet (compatibility with WireGuard: YES) In WireGuard, a special keep-alive packet (“Under-Load”) is used to bypass NAT timeouts. AmneziaWG replaces its fixed header with a randomized one, the value of which can be set manually. This prevents DPI from filtering short ping packets, ensuring stable tunnel connections, especially on mobile networks. How to use Eddie with AmneziaWG To enable AmneziaWG mode, just tap the connection mode available in the main and other views. It will rotate between WireGuard, AmneziaWG and OpenVPN. Set it to AmneziaWG. In its default AmneziaWG mode, Eddie will use all the possible obfuscation, except protocol mimicking, that keeps WireGuard compatibility, thus allowing connections to AirVPN servers. The default settings choice was possible thanks to the invaluable support of persons living in countries where VPN blocks are widespread. Such settings have been tested as working and capable to bypass the current blocking methods in various countries. You may consider to modify them if they are ineffective to bypass "your" specific blocks. In Settings > Advanced, you will find, at the bottom of the page, a new "Custom Amnezia WG directives" item. By tapping it you will summon a dialog that will let you customize any possible AmneziaWG parameter. You can maintain backward compatibility with WireGuard in the dialog WireGuard section, or enable the full AmneziaWG support in the Amnezia section, which is not compatible (at the moment) with AirVPN WireGuard servers. This mode will be mostly valuable in a not distant future, when AirVPN servers will start to support AmneziaWG natively. You may also enable QUIC or DNS mimicking for additional obfuscation efficacy. In order to maintain WireGuard backward compatibility, with or without QUIC or DNS mimicking, you must set: S1 = S2 = 0 Hn ∈ {1, 2, 3, 4} H1 ≠ H2 ≠ H3 ≠ H4 Furthermore, do not exceed the valid limit of the J parameters (anyway Eddie will not let you do it). In this preview version, Eddie's formal control of the input data is based on the following document. We strongly recommend you read it if you need to modify manually parameters: https://github.com/amnezia-vpn/amneziawg-linux-kernel-module?tab=readme-ov-file#configuration Please do not modify In parameters if you don't know exactly what you're doing. Eddie implements QUIC and DNS mimicking and random obfuscation packets for each specific "I" parameter (by using the corresponding "Generate" button). You can enable them with a tap on the proper buttons. You may mimic QUIC and DNS even to connect to WireGuard based servers. When you enable QUIC mimicking and you maintain WireGuard backward compatibility, you add a powerful tool against blocks, because the first packets will be actual QUIC packets. AmneziaWG will fall back to WireGuard compatibility very soon. However, when DPI and SPI tools, and demultiplexers in general, identify the initial QUIC flow, most of them will be unable to detect a WireGuard flow for several minutes. This has been tested thoroughly with deep packet inspection on Linux and FreeBSD based machines by AirVPN staff. Therefore, in different blocking scenarios the QUIC mimicking increases likelihood of successful block bypass. NOTE: the same does not happen with DNS mimicking. In this case DPI / SPI tools identify the stream initially as DNS, but are much quicker (just in a few dozens of packets) to identify the stream as WireGuard's, after the initial DNS identification. How to use Eddie in network where the "bootstrap" servers can not be reached Eddie downloads user and infrastructure data, essential to use the service, from special "bootstrap servers" through an encrypted flow inside HTTP. If the bootstrap servers are blocked or the underlying protocol to port 80 is filtered out, Eddie is unable to proceed. Starting from this Eddie 4 version, the ability to retrieve such data locally has been added. Whenever bootstrap servers are unreachable, Eddie can read the latest available local data to connect to a VPN server. Once connected the bootstrap servers are again reachable and the local data are immediately updated for future usage. The local data remain valid as long as you don't need to change user. On top of all of the above, Eddie can now retrieve such data through the login procedure that now can be started even when a connection to a VPN server was previously established via a profile. Therefore, when you are in a restrictive network that blocks access to bootstrap servers, you can connect through a profile generated by AirVPN web site Configuration Generator. After this first connection, log your account in to the service by selecting the specific option on the left pane, enter your AirVPN account credentials as usual and make sure that Remember me checkbox is ticked: Eddie will download all the necessary files and store them locally. This procedure is "once and for all", at least as long as you don't need to change account. After this initial connection, Eddie will be able to log your account in to the infrastructure, retrieve servers data and establish connections without profiles and without bootstrap servers, offering again full AirVPN integration even when bootstrap servers are unreachable. Only If you change account you must repeat the procedure. Download link, checksum and changelog https://eddie.website/repository/Android/4.0.0-Beta2/EddieAndroid-4.0.0-Beta-2.apk This is a build debug package and side load is mandatory. If you decide to test, please report at your convenience any bug and problem in this thread. If possible generate a report from the app in a matter of seconds: by tapping the paper plane icon on the Log view bar rightmost side you will generate a full system report which will include both log and logcat and have it sent to our servers. Then you just need to send us the link the app shows you (open a ticket if you prefer to do it in private). $ sha256sum EddieAndroid-4.0.0-Beta-2.apk 20d4aee7a0544eec2ad379b8ab8126c2f276e4762a0a32109cb808701d2c0bb3 EddieAndroid-4.0.0-Beta-2.apk Changelog 4.0.0 (VC 37) - Release date: 26 November 2025 by ProMIND Beta 2 LogActivity.java [ProMIND] added View log button (open with...) MainActivity.java [ProMIND] method startAirVPNManifestRefresh() renamed to startAirVPNDocumentRefresh() [ProMIND] method stopAirVPNManifestRefresh() renamed to stopAirVPNDocumentRefresh() [ProMIND] member timerAirVPNManifestRefresh renamed to timerAirVPNDocumentRefresh [ProMIND] onCreate(): do exported files cleanup [ProMIND] onDestroy(): do exported files cleanup [ProMIND] drawer: added login item [ProMIND] drawer: changed login and logout icons [ProMIND] navigationViewItemSelected(): added code for AirVPN login [ProMIND] onResume(): show proper drawer's login/logout item QuickConnectFragment.java [ProMIND] onCreate(): removed AirVPN autologin (superseeded by extended "remember me" local login) [ProMIND] onCreate(): in case "remember me" is set, do local login by using locally stored user instance SettingsActivity.java [ProMIND] ameziaSettingsDialog(): fixed formal check for jc [ProMIND] removed AirVPN Autologin option (superseeded by extended "remember me" local login) SettingsManager.java [ProMIND] removed added SYSTEM_AIRVPN_AUTOLOGIN and SYSTEM_AIRVPN_AUTOLOGIN_DEFAULT (superseeded by extended "remember me" local login) [ProMIND] removed methods isAirVPNAutologinEnabled() and setAirVPNAutologin() SupportTools.java [ProMIND] added enum ShareMode [ProMIND] sharePlainText(): added argument share mode [ProMIND] sharePlainText(): the code is now compliant to all supported Android versions [ProMIND] sharePlainText(): exclude "myself" from helper apps [ProMIND] removeShareFile() renamed to removeShareFiles() [ProMIND] sharePlainText(): share/view files are now removed on app exit Beta 1 Native Library [ProMIND] updated to version 4.0.0, API 10 [ProMIND] added Amnezia WireGuard API [ProMIND] updated to OpenVPN-AirVPN 3.12 (20251126) AirVPNUser.java [ProMIND] getWireGuardProfile(): added Amnezia support ConnectAirVPNServerFragment.java [ProMIND] showConnectionInfo(): added AmneziaWG logo display [ProMIND] onCreateContextMenu(): added AmneziaWG items [ProMIND] onContextItemSelected(): added AmneziaWG items [ProMIND] added method loadVPNProfile() ConnectVpnProfileFragment.java [ProMIND] added Amnezia support EddieLibraryResult.java [ProMIND] added Amnezia WireGuard API QuickConnectFragment.java [ProMIND] onCreateView(): added AmneziaWG logo display [ProMIND] updateStatusBox(): added AmneziaWG logo display SettingsActivity.java [ProMIND] added "Custom AmneziaWG directives" setting SettingsManager.java [ProMIND] added Amnezia specific settings and methods SupportTools.java [ProMIND] removed method getVPNProfile() VPN.java [ProMIND] added methods enableAmneziaWireGuard() and isWireGuardAmneziaEnabled() VPNManager.java [ProMIND] added method isWireGuardAmneziaEnabled() VPNProfileDatabase.java [ProMIND] added AMNEZIA type WebViewerActivity.java [ProMIND] EddieWebViewClient.shouldOverrideUrlLoading(): it now properly opens android asset files WireGuardClient.java [ProMIND] added WireGuard tunnel node to constructor [ProMIND] added methods for generating Amnezia's junk settings WireGuardTunnel.java [ProMIND] added support for Amnezia WireGuard [ProMIND] added Mode enum [ProMIND] added tunnel node to constructor EddieLibrary.java [ProMIND] added Amnezia WireGuard API Kind regards & datalove AirVPN Staff
  2. Hello! Can you please try to delete Eddie's configuration file while Eddie is NOT running? At the next run, Eddie will re-create the configuration file with default settings (you will need to re-enter your AirVPN account credentials). In order to locate Eddie's configuration file please see here: https://eddie.website/support/data-path/ If the problem is caused by a corrupt configuration file, the above procedure will solve it. Kind regards
  3. From the ticket, problem solved after a check on Windows Defender and any other tool blocking entirely Eddie's traffic. Kind regards
  4. Hello! Yes, definitely, we have a problem at the custom, 3 powerful servers which will be connected to 10 Gbit/s lines at still at the custom since the 23rd of October. These 3 servers are meant to replace Wurren which is being decomissioned at the end of November. We did not expect that the USA/Canada custom border could be so slow, we're terribly sorry. The final destination is Toronto datacenter, the same one where Kornephoros is working in. Kind regards
  5. Hello! Holy moly whack a moly, from you description the outcome seems correct and expected, apparently (again from your description) you missed entirely to configure and run any listening program, can you clarify? Kind regards
  6. Hello! Thank you for your choice in the past years. The servers are continuously updated and added and the average performance in the last year has either remained the same or improved, notably in the USA and Europe. Currently there's more available bandwidth per user than there was one year ago. In the last 13 months AirVPN added about 230,000 Mbit/s on its infrastructure and also renewed hardware. We're talking about bare metal servers with dedicated ports and full duplex lines, no tricks with multiple addresses, shared lines or virtual machines. The outcome is remarkably good: if you compare the top hundred user speed of now with the table of one year ago, you will see an improvement of the average speed, in spite of the dramatic user base increase. https://airvpn.org/topusers/ It is even more important to note that the average speed of users after the 50th place (51-100) has increased of more than 20% if you compare it with a table of October 2024, This is due to the increase of the available bandwidth, software optimization, and hardware replacements behind the scenes. Therefore, we would focus especially on possible bottlenecks on your side, because while the infrastructure is providing better and better performance, you experience exactly the opposite. The paramount cause of the slow performance is this: Each time you get this error, the packet must be re-transmitted in its entirety. This is the apparent cause, but it must in turn be caused by something underlying, so this conclusion: is dubious, and probably wrong. It may very well be the consequence of the same aforementioned cause. Everything is wrapped in the UDP tunnel, including ICMP with WireGuard, so the continuous need to re-transmit packets severely affects the round trip time too. This hints at a problem affecting your end (either your local network, or some section of your ISP network). It is indeed strange that your 1 Gbit/s line provides only 300 Mbit/s on average without VPN. This is another clue suggesting that a problem unrelated to AirVPN is ongoing. Please repeat the tests with 1280 bytes MTU and check whether the "invalid nonce" packet error quantity disappears, decreases or remains the same. If it remains the same the problem must be investigated carefully as different anomalies can cause it: dirty line, Ethernet cable problems, WiFi interference, router firmware are the most important examples. If you're interested to go deeper in this issue and you are ready to take into consideration the idea that the problem could be on your side, the support team is available 24/7 to support you and provide you with suggestions which could resolve the issue. Or you can continue here too concurrently, so you can get community's help as well Please include more relevant information such as your Operating Systems names and versions (on top of the Windows 11 machine you already mentioned) and the software you run to connect to AirVPN servers on each system. Kind regards
  7. Hello! This last occurrence if confirmed is definitely unexpected and hinting to a corrupt configuration file (easy solution in this case) but first try to re-define the white list once again by deleting Sheratan from it, do not perform any other operation but shut down Eddie, re-start it and check whether Sheratan is again unexpectedly in the allow list or not. If not: the configuration file should be fixed, no further action is required. If the white list is again including Sheratan: by deleting the configuration file while Eddie is not running and re-populating the server list you should resolve the problem. Locations of the configuration files here: https://eddie.website/support/data-path/ Kind regards
  8. @Ptwifty Hello! This is a regrettable attempt to irritate AirVPN customers as retaliation by Eddie for not granting him certain benefits after almost 15 years of service. We will have to suppress these attempts at rebellion with a firm and unyielding hand. Joking aside, it seems that you have defined Sheratan as the only server to which Eddie can connect. From your description, you say that you have defined a blacklist with a single server, but in reality you have defined a whitelist with that single server. Please re-check your lists in the "Servers" window. Kind regards
  9. @ikeu Hello! Can you please make sure that you click on the tray icon, and not on the program launching icon? The tray icon does not include the ability to start a new Eddie instance. In order to ascertain that you are managing the correct icon, please right-click on it, and a contextual menu should appear. Select "Show Main Window" from this menu and check what happens. Kind regards
  10. Hello! You will appear on the Internet with the same IP address if you connect to the same VPN server. In order to prevent this from happening please make sure to connect each device to a different VPN server. Kind regards
  11. You shouldn't, please read the announcement, thanks! 😋 Kind regards
  12. Hello! Let's see what happens in the next stages: since we don't have our HQ in Switzerland, AirVPN re-location wouldn't be so painful. We would need to decommission all the VPN servers in CH and compensate the missing bandwidth with new servers in adjacent EU countries. Kind regards
  13. Hello! We're very glad to inform you that two new 10 Gbit/s full duplex servers located in Amsterdam, the Netherlands, are available: Taiyangshou and Vindemiatrix. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor : https://airvpn.org/servers/Taiyangshou https://airvpn.org/servers/Vindemiatrix Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Staff
  14. Hello! The referral program is active and working as usual. We could not reproduce the problem you mentioned and we leave further investigation to the support team, if you wish to open a ticket, thank you. Kind regards
  15. Hello! This is usually a critical error because 192.18.0.0/16 is not a private network. You need to re-configure. https://en.wikipedia.org/wiki/Private_network#Private_IPv4_addresses Kind regards
  16. Hello! We're very glad to inform you that the Black Friday weeks have started in AirVPN! Save up to 74% when compared to one month plan price Check all plans and discounts here: https://airvpn.org/buy If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. AirVPN is one of the oldest and most experienced consumer VPN on the market, operating since 2010. It never changed ownership and it was never sold out to data harvesting or malware specialized companies as it regrettably happened to several competitors. Ever since 2010 AirVPN has been faithful to its mission. AirVPN does not inspect and/or log client traffic and offers: five simultaneous connections per account (additional connection slots available if needed) state of the art and flexible inbound remote port forwarding active daemons load balancing for unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2000 Mbit/s with WireGuard flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level. powerful API IPv6 full support comfortable management of your client certificates and keys AES-GCM and ChaCha20 OpenVPN ciphers on all servers Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported. free and open source software client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS GPS spoofing on Android application AirVPN is the only VPN provider which is actively developing OpenVPN 3 library with a fork that's currently 330 commits ahead of OpenVPN master and adds key features and bug fixes for a much more comfortable and reliable experience: https://github.com/AirVPN/openvpn3-airvpn AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows. Promotion due to end on 2025-12-03 (UTC). Kind regards & datalove AirVPN Staff
  17. Hello! Yes, it can still happen, especially in the event of flooding. We are well equipped and, in addition to larger trucks, we also have, for some time now, a more effective sewer drainage system, so this problem should be very limited in time and negligible. Kind regards
  18. Hello! This message may help: https://airvpn.org/forums/topic/57512-make-plex-server-available-externally-forever/?do=findComment&comment=253176 Moreover, keep in mind that Plex always listens to port 32400 of the VPN interface, no matter how you configure it: make sure that you can "re-map" the incoming packets. This option is available also in your AirVPN account port panel by filling the "Local" field of the remotely forwarded port. "Connection refused" means that the attempted TCP connection to your node was actively rejected, i.e. reset through a TCP RST. This usually means that your system is configured to actively reject packets (instead of silently dropping them) to non-existing port, or your firewall is configured to reject packets (instead of silently dropping them). In the first case, it's likely that the VPN interface destination port simply doesn't exist, probably because Plex end-point is 32400 and not what you would expect. Try to "re-map", in the first place, your forwarded remote port to "local" 32400. If the VM is attached to the host via NAT and it's the host the one connecting to the VPN, you also have to make sure that the incoming packets (which reach the host only in this scenario, of course) are then properly forwarded (by the host) to the final destination (IP address and port of the VM). Kind regards
  19. Hello! The keys are key here. AirVPN infrastructure knows who you are from your key and knows your VPN IP address according to that key (as WireGuard doesn't support DHCP). Your account remotely forwarded ports are linked to "All devices" or to "Default" device, which is the only key you have, so the problem must lie elsewhere. If your NixOS VM is attached to the host via NAT, please make sure that the incoming packets are properly forwarded by the host to the final VM running qBittorrent. Kind regards
  20. @Pilly Hello! Please start from here: https://airvpn.org/faq/port_forwarding/ Follow this checklist if you experience any problem: https://airvpn.org/forums/topic/66388-port-forwarding/?do=findComment&comment=243305 Kind regards
  21. @StylishSpecter Hello! Not hidden, and anyway you can use them without Eddie. They are available respectively it is in the "Preferences" > "DNS" window and in "Preferences" > "Protocols" window. Eddie sets the DNS you wish, then it's up to you to ensure compatibility with specific protocols you want. Or you can just use the DNS over TLS or HTTPS of the VPN DNS - totally useless of course as the DNS is inside the VPN but anyway available. Eddie does not apply trivial decoys (except the padding offered by wg) you mention (which unfortunately are very or totally ineffective against blocks) but offers the much more effective feature (against blocks and pattern analysis) to encrypt the tunnel inside another tunnel, using OpenVPN abilities. In particular you can tunnel the VPN traffic inside a SOCKS proxy, an HTTPS proxy, an SSH tunnel and a pure TLS tunnel. Such features are more effective but come at a price: performance hit. Trivial, less noble decoys that are not so effective but are surely more performance friendly are anyway under consideration, stay tuned! Kind regards
  22. @StylishSpecter Hello! Both decoy traffic and usage of DNS over TLS (external or internal) have been available in Eddie since several years ago. On the server side you may connect an OpenVPN client over a stunnel or SSH tunnel previously established, you are not forced to run proprietary software. It is proven that currently AIs are able to discern from the pattern which web site you visit when you are connected to AirVPN only in 2% of the cases of real world usage, which is consistent with the paper you linked (see Tor avg. accuracy of 2.96%, negligible). Please note that the accuracy reported in the paper you linked is inferred from a not very realistic usage, where the target visited only 775 URLs in total (they discarded anything else for the analysis from the global proxy traffic). We add, on our side, that a double blind test in real world usage (where you do NOT filter out a selected amount of URLs before starting the guessing analysis) caused failure rates dramatically higher. Kind regards
  23. You don't worry about that, that's our business and we can assure you that we're good at math and that the business model is sustainable, as 15 years of activity show. No, it's not necessary for this use case: you need Tor over VPN and not VPN over Tor to hide your ISP from detecting Tor usage and hide our servers from knowing your actual Internet usage. This solution meets the needs you mentioned and can also be used with WireGuard. Just start the VPN connection and then, when you need it, use the Tor browser for your browsing needs, for example. We understand that it may be good for marketing fluff, but it's a solution that does not deserve much consideration, because it is against the most basic rules of safety. To understand why, just think about how the circuit is built. Furthermore, it does not hide Tor usage from your ISP. Tor over VPN and Tor alone are not a VPN side feature (except in the sense that the VPN infrastructure must not block Tor usage, of course). The fact that it is being advertised as a "premium feature" sadly says a lot about what kind of people is targeted by such ads. Yes, as usual, we were the first to offer specific anti-blocking techniques starting from 2012 and we kept adding new connection modes which are effective (AirVPN bypasses > 80% of the blocks according to a recent paper). We are working to further increase that percentage through new connection modes in the near future, and because it's always a cat and mouse game, stay tuned! However, please do not expect marketing fluff and ads for gullible people, it's not our style. Kind regards
  24. Hello! Can you please check whether Eddie starts minimized? Please look for Eddie's tray icon (a small cloud in a circle) in the system tray. Make sure you can see hidden icons. If you find Eddie's tray icon, double click on it and the main windows should pop up. Then, you can decide whether Eddie must start minimized or not in the "Preferences" > "UI" window. Kind regards
  25. Thank you very much, we have scheduled an investigation on this strange issue. We're glad to know that the new key resolved the problem. If the problem re-appears, this time please do not touch the "problematic" key (just generate and use a new one), maybe it could help the investigation. Kind regards
×
×
  • Create New...