Jump to content
Not connected, Your IP: 216.73.216.49

Staff

Staff
  • Content Count

    11688
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2083

Posts posted by Staff


  1. 10 hours ago, doepfer said:

    Hello!

    Let's see what happens in the next stages: since we don't have our HQ in Switzerland, AirVPN re-location wouldn't be so painful. We would need to decommission all the VPN servers in CH and compensate the missing bandwidth with new servers in adjacent EU countries. 

    Kind regards
     

  2. Hello!


    We're very glad to inform you that two new 10 Gbit/s full duplex servers located in Amsterdam, the Netherlands, are available: Taiyangshou and Vindemiatrix. 

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor :
    https://airvpn.org/servers/Taiyangshou
    https://airvpn.org/servers/Vindemiatrix
     

    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

    amsterdam.thumb.jpg.7c9b6c85ca802c407ce0fb4774917590.jpg


  3. 15 hours ago, vhorfurz said:

    could you clarify the situation


    Hello!

    The referral program is active and working as usual. We could not reproduce the problem you mentioned and we leave further investigation to the support team, if you wish to open a ticket, thank you.

    Kind regards
     

  4. Hello!

    We're very glad to inform you that the Black Friday weeks have started in AirVPN!

    black_friday_airvpn.gif.901120bdf2b0f3f3c7a3388c16f0fe8d.gif

    Save up to 74%

    when compared to one month plan price

     

    Check all plans and discounts here: https://airvpn.org/buy

     

    If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day.


    AirVPN is one of the oldest and most experienced consumer VPN on the market, operating since 2010. It never changed ownership and it was never sold out to data harvesting or malware specialized companies as it regrettably happened to several competitors. Ever since 2010 AirVPN has been faithful to its mission.

    AirVPN does not inspect and/or log client traffic and offers:

    • five simultaneous connections per account (additional connection slots available if needed)
    • state of the art and flexible inbound remote port forwarding
    • active daemons load balancing for unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2000 Mbit/s with WireGuard
    • flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level.
    • powerful API
    • IPv6 full support
    • comfortable management of your client certificates and keys
    • AES-GCM and ChaCha20 OpenVPN ciphers on all servers
    • Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys
    • internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported.
    • free and open source software
    • client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS
    • GPS spoofing on Android application


    AirVPN is the only VPN provider which is actively developing OpenVPN 3 library with a fork that's currently 330 commits ahead of OpenVPN master and adds key features and bug fixes for a much more comfortable and reliable experience:
    https://github.com/AirVPN/openvpn3-airvpn

    AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows.
    Promotion due to end on 2025-12-03 (UTC).

    Kind regards & datalove
    AirVPN Staff


  5. 2 hours ago, nekodesew said:

    I have a proxmox server that has a linux vm. That linux vm is hosting both my torrenting and plex services. When I tried to use airvpn, to open a port only the UDP options are open, the TCP isnt. TCP version says Connection refused (111). What do I need to do so I can open a port and assign it to plex? Since I'm renting I don't have control over my router settings, so I thought this would be a good alternate solution.


    Hello!

    This message may help:
    https://airvpn.org/forums/topic/57512-make-plex-server-available-externally-forever/?do=findComment&comment=253176

    Moreover, keep in mind that Plex always listens to port 32400 of the VPN interface, no matter how you configure it: make sure that you can "re-map" the incoming packets. This option is available also in your AirVPN account port panel by filling the "Local" field of the remotely forwarded port.

    "Connection refused" means that the attempted TCP connection to your node was actively rejected, i.e. reset through a TCP RST. This usually means that your system is configured to actively reject packets (instead of silently dropping them) to non-existing port, or your firewall is configured to reject packets (instead of silently dropping them). In the first case, it's likely that the VPN interface destination port simply doesn't exist, probably because Plex end-point is 32400 and not what you would expect. Try to "re-map", in the first place, your forwarded remote port to "local" 32400.

    If the VM is attached to the host via NAT and it's the host the one connecting to the VPN, you also have to make sure that the incoming packets (which reach the host only in this scenario, of course) are then properly forwarded (by the host) to the final destination (IP address and port of the VM).

    Kind regards
     

  6. 1 hour ago, Pilly said:

    UniFi’s built-in WireGuard client connects using only the raw keypair and doesn’t provide AirVPN with any device certificate or account identifier


    Hello!

    The keys are key here. :D AirVPN infrastructure knows who you are from your key and knows your VPN IP address according to that key (as WireGuard doesn't support DHCP). Your account remotely forwarded ports are linked to "All devices" or to "Default" device, which is the only key you have, so the problem must lie elsewhere. If your NixOS VM is attached to the host via NAT, please make sure that the incoming packets are properly forwarded by the host to the final VM running qBittorrent.

    Kind regards

     

  7. @StylishSpecter

    Hello!

    Not hidden, and anyway you can use them without Eddie. They are available respectively it is in the "Preferences" > "DNS" window and in "Preferences" > "Protocols" window. Eddie sets the DNS you wish, then it's up to you to ensure compatibility with specific protocols you want. Or you can just use the DNS over TLS or HTTPS of the VPN DNS - totally useless of course as the DNS is inside the VPN but anyway available.

    Eddie does not apply trivial decoys (except the padding offered by wg) you mention (which unfortunately are very or totally ineffective against blocks) but offers the much more effective feature (against blocks and pattern analysis) to encrypt the tunnel inside another tunnel, using OpenVPN abilities. In particular you can tunnel the VPN traffic inside a SOCKS proxy, an HTTPS proxy, an SSH tunnel and a pure TLS tunnel. Such features are more effective but come at a price: performance hit. Trivial, less noble decoys that are not so effective but are surely more performance friendly are anyway under consideration, stay tuned!

    Kind regards
     

  8. @StylishSpecter

    Hello!

    Both decoy traffic and usage of DNS over TLS (external or internal) have been available in Eddie since several years ago. On the server side you may connect an OpenVPN client over a stunnel or SSH tunnel previously established, you are not forced to run proprietary software.

    It is proven that currently AIs are able to discern from the pattern which web site you visit when you are connected to AirVPN only in 2% of the cases of real world usage, which is consistent with the paper you linked (see Tor avg. accuracy of 2.96%, negligible). 

    Please note that the accuracy reported in the paper you linked is inferred from a not very realistic usage, where the target visited only 775 URLs in total (they discarded anything else for the analysis from the global proxy traffic). We add, on our side, that a double blind test in real world usage (where you do NOT filter out a selected amount of URLs before starting the guessing analysis) caused failure rates dramatically higher.

    Kind regards

     

  9. On 11/9/2025 at 4:37 PM, StylishSpecter said:

    I wonder how you can stay in business and establish yourself for 15 years with offers like that.


    You don't worry about that, that's our business and we can assure you that we're good at math and that the business model is sustainable, as 15 years of activity show.
     
    On 11/9/2025 at 4:37 PM, StylishSpecter said:

    the problem is that I have to start Tor first so that I can then switch to Eddie Tor as a gateway.


    No, it's not necessary for this use case: you need Tor over VPN and not VPN over Tor to hide your ISP from detecting Tor usage and hide our servers from knowing your actual Internet usage. This solution meets the needs you mentioned and can also be used with WireGuard. Just start the VPN connection and then, when you need it, use the Tor browser for your browsing needs, for example. 
     
    Quote

    ProtonVPN has the option of using Tor as a gateway and everything runs through the client,


    :D 

    We understand that it may be good for marketing fluff, but it's a solution that does not deserve much consideration, because it is against the most basic rules of safety. To understand why, just think about how the circuit is built. Furthermore, it does not hide Tor usage from your ISP.

    Tor over VPN and Tor alone are not a VPN side feature (except in the sense that the VPN infrastructure must not block Tor usage, of course). The fact that it is being advertised as a "premium feature" sadly says a lot about what kind of people is targeted by such ads.
     
    On 11/9/2025 at 4:37 PM, StylishSpecter said:

    does AIRVPN have any plans to combat network analysis or deep packet inspection?


    Yes, as usual, we were the first to offer specific anti-blocking techniques starting from 2012 and we kept adding new connection modes which are effective (AirVPN bypasses > 80% of the blocks according to a recent paper). We are working to further increase that percentage through new connection modes in the near future, and because it's always a cat and mouse game, stay tuned! However, please do not expect marketing fluff and ads for gullible people, it's not our style.

    Kind regards
     

  10. 8 hours ago, ikeu said:

    I am on Windows 10.
    My AirVPN has suddenly stopped opening. I tried reinstalling it but I keep experiencing the same problem. Whenever I try to open it, it'll say it's ready but won't open the menu.
    If I try to open it again, it tells me an instance of Eddie is already running. I've tried forcibly closing it through Task Manager and re-opening it, but the same problem occurs. 
    Does anyone know how to solve this?


    Hello!

    Can you please check whether Eddie starts minimized? Please look for Eddie's tray icon (a small cloud in a circle) in the system tray. Make sure you can see hidden icons. If you find Eddie's tray icon, double click on it and the main windows should pop up. Then, you can decide whether Eddie must start minimized or not in the "Preferences" > "UI" window.

    Kind regards
     

  11. 44 minutes ago, anwnymos said:

    Problem solved!

    There might be some misconfiguration of the device private key because after successfully testing with the second key I edited/reviewed the connection details of the first key (on my side) and that worked too.
    Now the Test shows: Open

    Thank you for the help!


    Thank you very much, we have scheduled an investigation on this strange issue. We're glad to know that the new key resolved the problem. If the problem re-appears, this time please do not touch the "problematic" key (just generate and use a new one), maybe it could help the investigation.

    Kind regards
     

  12. 2 hours ago, anwnymos said:

    I think this error message hasn't anything to do with my setup specifics (open ports, firewall rules etc) but with the fact that the VPN peer I connect to cannot route traffic to the internal allocated address 10.x.x.x.


    Hello!

    Actually what you say is plausible, although puzzling. Please try to generate a new key in your AirVPN account "Devices" panel, adjust the "device" linked to the forwarded port accordingly and connect with the new key. Check whether the problem gets resolved or not. The new key will give you a different VPN IP address and this test could provide some clue.

    Kind regards
     

  13. @tranquivox69

    Hello!
     
    On 11/7/2025 at 6:26 PM, tranquivox69 said:

    could have tripped me in thinking it wasn't working is the incredibly long time before the connection happens


    This timing is mainly up to the system that decides at its own discretion when to broadcast "BOOT_COMPLETED" and any other system signal and up to the actual time required to have the network up. Eddie waits for the network before trying connections, while other apps (wg included) don't and just tell you that the connection to the VPN is established even when the device is not connected to any network.

    Anyway we ask for a log (Log -> Paper plane icon), just in case. Thanks in advance.

    Kind regards
     

  14. Hello!


    We're very glad to inform you that a new 1 Gbit/s full duplex server located in Singapore is available: Azelfafage.

    The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820.

    Just like every other Air server, Azelfafage supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard.
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the server status as usual in our real time servers monitor:
    https://airvpn.org/servers/Azelfafage


    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team 
     

    singapore_skyscr_1280.thumb.jpg.2be580d58c0b4217032570e57b1a159c.jpg


  15. Hello!


    We're very glad to inform you that a new 1 Gbit/s full duplex server located in Auckland (NZ) is available: Mothallah.

    The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820.

    Just like every other Air server, Mothallah supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard.
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the server status as usual in our real time servers monitor:
    https://airvpn.org/servers/Mothallah


    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team 

    Auckland by night


  16. On 11/6/2025 at 8:21 PM, Tech Jedi Alex said:

    n = 1009. I'm getting hard Selection Bias vibes from this. How can a thousand samples be representative of 322 million internet users in the US?


    It's the Cochran's formula. When you want a 95% confidence with an error margin of 5%, you need 383 samples out of 322 millions or infinite population. With 1009 samples you get a confidence of 95% with an error of +/-3.1%, which is accurate and acceptable for our business and for this conversation to show that your claim must be incorrect.

    However the Cochran's formula assumes that there's no bias in picking the sample and the above is based on an optimistic estimate of p=0.5 variability. Therefore, let's compare other surveys. An important source is GWI as it covers 2.7 billion Internet users through various tools. You must pay for their reports and insights but we found that Meltwater / We Are Social / Kepios published for free some GWI data here:
    https://learn.meltwater.com/rs/814-WJU-189/images/2025_Kepios_Digital_Global_Overview_Report.pdf

    Another source (using different tools) such as Anlyzify / Shopify publishes a few data here:
    https://analyzify.com/statsup/vpn

    You may notice that all of the above show consistent data within the confidence and error margins and they all agree to compute the amount of Internet users connecting to VPNs to 1.7 billion persons globally. There are even more surveys confirming this. They are reserved to paying companies but you can trust us, they show the same within a 5% error margin.

    Your estimate of 10-15% therefore lacks credibility as it is outside the error margin of many other reputable surveys which are consistent with each other. You may have a problem in how you picked your sample, it could have been unintentionally biased. On the other hand, if your sample amount is n0=40 with a high variability then you have a confidence level of 90% on an error margin of 13%, which would explain the discrepancy with no need to assume a bias.

    Thus VPN usage is indeed mainstream, if we agree to consider "mainstream" the usage of something with an agreed frequency by 1.7 billion people out of 6.4 billion people (26.5%).
     
    On 11/2/2025 at 8:01 PM, StylishSpecter said:

    Why can't Eddie, like other VPNs, keep it that way if desired so that the Internet only works with Eddie [...] it's a shame to see that AIRVPN considers these methods "unnecessary"


    It's a design choice based on community feedback and a few considerations. The main consideration is preventing lock out from remotely administered machines, whereas community considered a permanent system modification too invasive for a program that has the responsibility to run with admin privileges.

    Anyway, it's true that the the previous considerations have been partially ignored by the new "persistent network lock" implemented in the AirVPN Suite for Linux daemon (Bluetit). The daemon, when this option is enabled (anyway it's off by default), sets network lock as soon as the machine has a default gateway, emulating therefore your request (as long as the daemon is allowed to start during the system bootstrap), but avoiding at the same time to set permanent changes to the system. 

    It must also be said that implementing permanent "block all outgoing Internet traffic" rules by default on a system is a trivial task. Then, when the Network Lock comes in, the traffic towards VPN servers is re-allowed, permitting VPN connections... thus the matter does not seem relevant at all: the idea behind the whole matter is that if you know how to use a firewall, you need 30 seconds or so to set proper permanent rules; if you don't know, it's preferable that a software does not modify permanently your system in a way that you might not be able to roll back on your own.
     
    Quote

    I ask myself why airvpn doesn't have a double hop


    The type of double hop you suggest is a client side feature that you can easily achieve by yourself (feel free to open a ticket if in doubt). It may be integrated on our software, no rocket science here, but remember that double hopping on servers administered by the same entity is not an optimal solution and could potentially provide a false sense of security. As suggested, running Tor over a VPN connection is a much, much more robust solution for privacy purposes. The VPN hides Tor usage to your ISP and snoopers, while at the same time helps build a circuit outside a potential cage you might have been put inside by your country regime. At the same time Tor hides from the VPN servers any information related to your Internet usage.

    With that said, double hop for marketing reasons and for specific needs tied to jurisdictional monitoring could make sense, so we will re-consider its integration in the future.

    Kind regards
     

  17. 1 hour ago, tranquivox69 said:

    adb shell settings put secure always_on_ vpn_app org.airvpn.eddie
    adb shell settings put secure alw ays_on_vpn_ lockdown 1


    Hello!

    You polluted both commands with syntax errors (note the spurious spaces). Please re-check. If you enter the correct commands and you still get the other errors you reported then your device is probably customized in a way that doesn't allow this operation, unfortunately.

    Kind regards
     

  18. On 11/2/2025 at 11:43 PM, Tech Jedi Alex said:

    VPNs are used by a very specific, niche clientele.


    It's a weird urban legend that the VPN clientele is a niche one, at least since 2015 (maybe even earlier).

    According to security.org and other sources 1.75 billion people "commonly" use a consumer VPN in 2025,. Usage in the USA has declined significantly to 32% (we had a 50% peak in 2022-2023), yes, but it's not a niche obviously. The decline is driven mainly by the shift of companies dropping VPN to replace it with zero-trust solutions (corporate VPN now account for just 5% of usage, 8% in the USA, so it's less meaningful).

    Worldwide, if 2024 survey of a specialized company we bought is correct, roughly 1/3 of the whole Internet population used a VPN at least "once per week". Unfortunately (for them too) of this 1/3, more than 30% used a "free" VPN (this implies that free VPNs are used commonly by more than half a billion persons in the world).

    Some more data showing usage from USA perspective:
    https://www.security.org/resources/vpn-consumer-report-annual

    Kind regards
     

  19. 4 hours ago, brianz@tuta.io said:

    When trying to connect to Eddie I get a message that subscription is required despite my subscription being up to date.


    Hello!

    It is because you have "brianz@tuta.io" as e-mail address linked to an account (whose linked e-mail address is different) and as username of another accountOnly one of them has a valid plan. You can easily resolve this confusion but we have already done this for you. Please try again now.

    Kind regards
     
×
×
  • Create New...