Jump to content
Not connected, Your IP: 216.73.216.205

Staff

Staff
  • Content Count

    11395
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1982

Everything posted by Staff

  1. How much if I want one? In general you have the same price of a plan to add five slots (i.e you can add multiples of five). Please contact the sales department for details (open a ticket by clicking "Contact us" from the upper menu while your account is logged in to the web site.)- Kind regards
  2. @FezzyWig Hello! If Eddie 2.22.0 or some other version resolves the blank/black window problem, use it and fix the problem with client certificates. See here how to solve it very quickly: https://airvpn.org/forums/topic/53004-openssl-error-restart-every-3-secondes/?do=findComment&comment=187787 ... and thank you very much, you're another long time customer! Kind regards
  3. Hello! You have, since recently, a grace period for the amount of connection slots, so even if the VPN server did not free automatically the dead connection slot within the router reboot time, the new connection will not be rejected. You can also add more connection slots to a single account for a fee (contact the sales department) if necessary. Kind regards
  4. Hello! All the lists are updated daily if a an update is available. We see that only porn lists are sporadically maintained, all the other lists have been updated very recently. Remember, you can suggest new lists in the dedicated forum. Kind regards
  5. Yes, a very nice one. Apparently it is perfectly formulated, because it's 100% true and accurate, and it's not formulated here, but there. It's mentioned because Crossrider/Kape was founded by a member of Unit 8200, a cyber spy agency, and its (Crossrider's) primary business was facilitating malware and computer infections. Recently it acquired major VPNs (such as Private Internet Access, Express VPN and CyberGhost) as well as review web sites. In reality in the FT article you mention you can read the interview to Lempert (chairman of the Unit 8200 alumni association and CEO of MER mobile comms group) who claims that 8200 is focusing (the article is 7 years old) on huge data mining, which is exactly extensive surveillance of the Internet, and we could also mention the documents leaked by Snowden, which revealed how Unit 8200, referred to as ISNU, receives raw, unfiltered data of U.S. citizens, as part of a secret agreement with the NSA. https://en.wikipedia.org/wiki/File:Israel_Memorandum_of_Understanding_SIGINT.pdf Are US citizens "bad neighbors" too? Anyway. It's irrelevant whether the purposes of Kape match those of Unit 8200. Kape could be or not a puppet of 8200, you don't know and we don't know, and perhaps it's not, and still that's not the point. The relevance of a member of 8200 founding a company spreading malware and now controlling VPN is the relationships and competence acquired by that member during his/her previous job, used against citizens unconditionally, since Kape operated essentially in browser hijacking, ad injectors and other remunerative computer infections worldwide. Remember for example Gericke ("strangely", he is also ExpressVPN CIO), Adams and Baier: they used their great competence acquired while they worked for US intelligence agencies to assist UAE regime to crack journalists, activists, monarchy political opponents phones and computers, to help UAE suppress or control any possible dissident or uncomfortable journalist. Officially it was not CIA or USIC interest to do that (and actually all three of them have been charged by DoJ for that "job") but anyway they greatly succeeded in their UAE job because they were trained by and had the knowledge of and access to certain technology from their former employers. https://www.justice.gov/opa/pr/three-former-us-intelligence-community-and-military-personnel-agree-pay-more-168-million Kind regards
  6. Hello! It's not you, the message "DNS Detect feature under maintenance" means that the DNS detection feature is under maintenance (i.e you can interpret it literally). Please see here for some additional complications which arose recently: https://airvpn.org/forums/topic/53074-ipleaknet-not-working/?do=findComment&comment=189566 Kind regards
  7. Hello! It mainly depends on WireGuard and OpenVPN after all. QUIC looks very promising and is widely used by Chrome for HTTPS/2 (mainly with Google sites) so we guess it's quite robust after 9 years of tests and no critical problems found. However we frankly don't know how it would speed up OpenVPN or WireGuard, because it includes some error correction and packet re-ordering routines working on packets on the userspace which are, apparently, quite unwelcome by WireGuard (and OpenVPN too, due to its efficiency in packet re-ordering in UDP), exactly because they tend to waste a lot of time. Kind regards
  8. Hello! Very interesting analytical and investigative work by Windscribe disclosing ties (even hidden ones) between VPN companies, publishers, review web sites. Click on node icons to read more details. Very sinister situation at a glance. Note for example how Crossrider (now Kape), well known malware company co-founded by a member of israeli Defense Forces Unit 8200, nowadays controls major VPNs and review web sites: https://embed.kumu.io/9ced55e897e74fd807be51990b26b415#vpn-company-relationships/control-d Kind regards
  9. Hello! An exception could be attempted, as "opt-in" and not part of the main service, in order to avoid contract violation with our customers. We need a legal advice first, however under a practical point of view we really don't know who would connect to a server where you can't do HTTP(S). As a second option we could run servers which only block outbound ports 22, 25, 465 and 587 (to prevent many SSH attacks, and spam mails), but again we would be subjected to black listing due to HTTP(S) based attacks (malicious forms, injections etc. etc.). Frankly it seems that the pervasive monitoring and logging required to punish those who allegedly perform attacks based on HTTP(S) would impact legit users remarkably, and it would make our service more or less the same as using directly your ISP (or worse in some circumstances), as it already happens with most VPNs out there. Kind regards
  10. Hello! The main reason of complaints and black list presence of IP addresses are attacks via HTTP(S) and spam mails. A server with blocked outbound ports 80 and 443 blocked would be avoided by anyone, we think, while we might consider to block outbound ports 465 and 587 (outbound port 25 is already blocked on all servers) and renounce to our fight to defend net neutrality. This will require however a mission as well as Terms of Service modification, as noted by @OpenSourcerer , so it's not a viable solution for the current management administration and the contracts with our current users. Out there you can already find tons of VPNs which violate net neutrality by inspecting your traffic and blocking (or shaping) applications, protocols and ports. Or you can just use your own ISP. The peculiarity of AirVPN is that it doesn't enforce that rubbish.. If one asks for traffic inspection, ports blocking and so on and so forth to get a "cleaner" IP address, then he/she probably "deserves" a pervasive surveillance and must take into account that his/her personal information and his/her behavior will be sooner or later used against him/her, as it already happened to millions and millions of people around the world in the last years. Kind regards
  11. Hello! Interestingly, a sharp flood attack hindering the DNS detection feature has overlapped the maintenance. It will be used by the maintainer as an opportunity to update the server, rewrite the firewall rules, perform a deep maintenance and check whether the new setup will be able to neutralize the attack. In the meantime all the functions are working except the DNS detection related routines, which are most vulnerable to the type of ongoing attack, according to the web site maintainer. The web site is totally split from AirVPN infrastructure, so there's no time pressure as AirVPN service is completely unaffected, of course. Kind regards
  12. Hello and thank you for your tests! Can you please generate and send us a report after the problem has occurred (the log will be wiped out, but the logcat will still be available)? In the "Log" view please tap the "send" arrow, it will create and send to our servers a full report, and you will be given the link to it. Note down the link or the code and send it to us a in a private ticket, or via e-mail to support@airvpn.org. Thank you! Kind regards
  13. Hello! Also remember to reply, at your convenience, to the support team request for info in your own ticket. Kind regards
  14. @harold.lewis Hello! No malfunctions detected, the behavior is expected, because the device is not connected to any network and correctly Eddie can not initiate a new connection. It's a very different case from the one reported by @183aTr78f9o - in his case the network is up and Eddie tries to reconnect, then an error occurs and an exception is thrown. We would like to cross-check with the logcat the network status. Please follow our previous instructions to send us a report. Do not send us only the log but a whole report (by tapping the "send" icon, i.e. the arrow-like, rightmost icon) and preferably do not publish it here if you don't edit your real IP address beforehand, for you own privacy protection! Send to us, in private via a ticket or an e-mail to support@airvpn.org, only the link. Kind regards
  15. Question for @harold.lewis too: what is in your case an extended period of time? @harold.lewis Can you please send us a report from Eddie via the dedicated option in "Log" view (tap the "send" arrow and note down the code)? You can send us the link to it in a ticket. Kind regards
  16. Hello! We suspect that you have improperly cut the log and therefore the problem is completely different. Just in case, please read here: https://airvpn.org/forums/topic/53004-openssl-error-restart-every-3-secondes/?do=findComment&comment=187787 You will need to renew your client certificate when you use OpenSSL 3 so it's not wasted time in any case. Kind regards
  17. @moejoe Hello! Please read here, it will probably help you: https://eddie.website/support/data-path/ Kind regards
  18. @harold.lewis Hello! With VPN Lock enabled Eddie can not reconnect by itself: the operator intervention is mandatory to manually disconnect and re-connect. When you have enabled Always on VPN and Block traffic if VPN is inactive Android settings you can safely disable VPN Lock which is an obsolete option in Android 8 and higher versions. VPN Lock is still available to prevent leaks on older versions. Can you please test whether the problem you confirmed still occurs with VPN Lock disabled? Kind regards
  19. @moejoe Hello! For comparison purposes which may help us discern whether the problem is OpenVPN, tun interface or Eddie specific, what happens if you use WIreGuard (which only works in UDP)? Kind regards
  20. Hello! We're very glad to inform you that Eddie Android edition 3.0 alpha 3 is now available. The original post has been updated accordingly. New in Alpha 3: bugfix related to WireGuard default MTU size (please test again by setting "0" as MTU size in settings) bugfix related to WireGuard re-connection failure bugfix related to WireGuard profiles parsing some events handling rewrite NEW: (re)connection ability implementation, fixing specific WireGuard failures, for example when switching networks in Android 12 Find full description, download link and SHA256 signature in the first post of this very thread. Thank you very much for your tests and please report and describe any bug you find! Kind regards
  21. Hello! You connect to entry-IP addresses. Such addresses never sends out clients packets to the Internet, so they will never be seen by any destination service. Your outgoing packets are sent out by exit-IP addresses. Therefore it's just the very usual MB nonsense; they tend to include entire IP addresses ranges when one single IP address in the range is reported by someone as a source of malicious activity. For example in 2012 MB blocked hundreds and hundreds of web sites in a Luxembourg datacenter (including our web site) because in the /21 range of those web servers ONE web site was suspected to host a virus. So they blocked 2048 addresses because of ONE single dubious address.. Enough said... Kind regards
  22. @cheapsheep Hello! Bugs were found and fixed. Can you please try again and check whether the problem is resolved? Also, to clarify: speed_read (read bytes per second from client to server, upload for client) speed_write (written bytes per second from server to client, download for client) Last but not least, Eddie reports amounts in (multiples of) bit/s while the API in B/s. Kind regards
  23. @HeyWAZZab33 Hello! Please test Eddie 2.22.0 version, available in the download page by clicking "Other versions" and selecting "Experimental", and feel free to keep us posted. Kind regards
  24. Hello! France servers are not planned at the moment, we're sorry (usual problem of mandatory data retention for hosting providers). We have a "geo-routing" server in France, we may try to "geo-route" services which restrict access to IP addresses geo-located in France: please open a ticket and give the support team the URLs of the services. Kind regards
  25. Hello! Thank you, you're a very long time customer! Please check the following message to resolve the issue quickly: Kind regards
×
×
  • Create New...