Jump to content
Not connected, Your IP: 3.230.147.225

Staff

Staff
  • Content Count

    10486
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1747

Reputation Activity

  1. Like
    Staff got a reaction from flat4 in Court Order, seizing the server   ...
    Hello!

    We can disclose only now that we had a server in Toronto seized in 2015, initially without our knowledge. Maybe a court order was served to the datacenter. For about 10 days we did not understand what happened to the server, which did not respond, while the datacenter did not provide information. After 10 days Italian police (and not any magistrate) contacted us. They informed us that Toronto police and FBI (*) asked for our help because they could not find any log in the server. Unfortunately their help request came after the server had been already seized. They did not even make a copy, they took it physically, therefore the server went offline, probably alerting the alleged criminals. It was obvious that forensic analysis could not find any log, simply because there were none. Our VPN servers did not even store the client certificates, go figure (now they also run in RAM disks, but in 2015 they did not). The whole matter was led by informing us without any document from any court or magistrate, but only through informal police communications, and only to ask for help after forensic analysis obviously failed completely.

    We were not asked to keep confidentiality on the matter, but just to stay on the safe side and support the investigation on what it appeared as a serious crime (a whole database with personal information of a commercial service was cracked, stolen and published in public when the web site owners did not pay a "ransom"; while our server was apparently not used for the crack, it was used to upload elsewhere the database) we decided not to disclose the whole matter for at least 7 years. It's one of those cases confirming that our servers do not store log, data or metadata of clients' traffic.

    (*) We may speculate that FBI was involved in a Canadian matter because the stolen database contained US citizens' personal data.

    Kind regards
     
  2. Like
    Staff got a reaction from pHxaq in Inactivity timeout every minute   ...
    @pHxaq

    Hello!

    Please log your account out and in again (in the main Eddie window) to force Eddie to re-download all keys. This procedure is mandatory each time you create a new certificate/key pair ("device"), or you renew a current one. When you re-log in, a combo box must appear under the credential fields listing all the available "devices".

    Kind regards
     
  3. Thanks
    Staff got a reaction from ccp4vpn in VPN companies relationship mesh   ...
    Hello!

    Very interesting analytical and investigative work by Windscribe disclosing ties (even hidden ones) between VPN companies, publishers, review web sites. Click on node icons to read more details. Very sinister situation at a glance. Note for example how Crossrider (now Kape), well known malware company co-founded by a member of israeli Defense Forces Unit 8200, nowadays controls major VPNs and review web sites:
    https://embed.kumu.io/9ced55e897e74fd807be51990b26b415#vpn-company-relationships/control-d

    Kind regards
     
  4. Like
    Staff got a reaction from go558a83nk in Court Order, seizing the server   ...
    @zetterpav

    Hello!

    No official communication was relevant or due to customers because the server did not contain any personal information or general data pertaining to customers or the infrastructure and because we have never been served by any order of any kind or anything else. The whole report is purely based on verbal communications as a courtesy. 7 years is a reasonable time to allow proper investigation time without undue interference, as we already wrote.
     
    None at the moment.
     
    It may depend on court orders. If a competent court order says that something must not be disclosed for a period of time, that period of time must be respected. In this case there are no official documents whatsoever served to us, so it's just a report based on informal communications, which are not necessarily faithful to the truth.
     
    Let's make it clear that our ethics and our mission don't imply that we will actively do something to inflict damage to any investigation. Our ethics and our mission forbid us to inspect secretly traffic or log secretly or build traps, not even if ordered by authorities, but it does not imply and never implied that we should actively do something to harm an investigation. We're glad that this case confirms that we don't keep traffic logs according to the ToS as you rightly expected.

    Kind regards
     
  5. Like
    Staff got a reaction from flat4 in Court Order, seizing the server   ...
    Hello!

    We can disclose only now that we had a server in Toronto seized in 2015, initially without our knowledge. Maybe a court order was served to the datacenter. For about 10 days we did not understand what happened to the server, which did not respond, while the datacenter did not provide information. After 10 days Italian police (and not any magistrate) contacted us. They informed us that Toronto police and FBI (*) asked for our help because they could not find any log in the server. Unfortunately their help request came after the server had been already seized. They did not even make a copy, they took it physically, therefore the server went offline, probably alerting the alleged criminals. It was obvious that forensic analysis could not find any log, simply because there were none. Our VPN servers did not even store the client certificates, go figure (now they also run in RAM disks, but in 2015 they did not). The whole matter was led by informing us without any document from any court or magistrate, but only through informal police communications, and only to ask for help after forensic analysis obviously failed completely.

    We were not asked to keep confidentiality on the matter, but just to stay on the safe side and support the investigation on what it appeared as a serious crime (a whole database with personal information of a commercial service was cracked, stolen and published in public when the web site owners did not pay a "ransom"; while our server was apparently not used for the crack, it was used to upload elsewhere the database) we decided not to disclose the whole matter for at least 7 years. It's one of those cases confirming that our servers do not store log, data or metadata of clients' traffic.

    (*) We may speculate that FBI was involved in a Canadian matter because the stolen database contained US citizens' personal data.

    Kind regards
     
  6. Like
    Staff got a reaction from bluesjunior in Question on AirVPN Servers?   ...
    Hello!

    Thank you, you're indeed a long time customer! The behavior you mention is odd as according to the datacenter all Dutch servers have direct presence on AMS-IX. If you notice this thing again, can you please warn us and send us a traceroute to some service (while you're connected to the VPN server of course)? It might be just a different routing with another transit provider under specific circumstances, but let's see.

    Kind regards
     
  7. Like
    Staff got a reaction from bluesjunior in Question on AirVPN Servers?   ...
    @bluesjunior

    Hello!

    Oh wait, that's just the choice of speedtest routines which are based on your node geo-location and maybe even on their server pool availability. It's not relevant to ascertain the routes and transit providers of the VPN server, so the whole issue is probably nonexistent. Anyway, feel free to verify with traceroute or mtr, those tools don't lie.

    Kind regards
     
  8. Like
    Staff got a reaction from Quallian in Court Order, seizing the server   ...
    Hello!

    You have just given an additional reason NOT to disclose anything. If IP addresses had been identified (which is unlikely, otherwise they would not have asked for our help) through black boxes, disclosure would have had a likelihood to alert the criminals. Once again, you suggest to harm investigations through active actions which are not in our mission, not in the contractual agreement with you, and not in our will. One thing is refusing to co-operate with certain police requests or appeal and reject certain orders, a totally different thing would be active sabotage of police actions when we are informally asked for potential help in a mutual trust relationship. This last thing would be totally unacceptable for us even on ethical considerations.

    Kind regards
     
  9. Like
    Staff got a reaction from flat4 in Court Order, seizing the server   ...
    Hello!

    We can disclose only now that we had a server in Toronto seized in 2015, initially without our knowledge. Maybe a court order was served to the datacenter. For about 10 days we did not understand what happened to the server, which did not respond, while the datacenter did not provide information. After 10 days Italian police (and not any magistrate) contacted us. They informed us that Toronto police and FBI (*) asked for our help because they could not find any log in the server. Unfortunately their help request came after the server had been already seized. They did not even make a copy, they took it physically, therefore the server went offline, probably alerting the alleged criminals. It was obvious that forensic analysis could not find any log, simply because there were none. Our VPN servers did not even store the client certificates, go figure (now they also run in RAM disks, but in 2015 they did not). The whole matter was led by informing us without any document from any court or magistrate, but only through informal police communications, and only to ask for help after forensic analysis obviously failed completely.

    We were not asked to keep confidentiality on the matter, but just to stay on the safe side and support the investigation on what it appeared as a serious crime (a whole database with personal information of a commercial service was cracked, stolen and published in public when the web site owners did not pay a "ransom"; while our server was apparently not used for the crack, it was used to upload elsewhere the database) we decided not to disclose the whole matter for at least 7 years. It's one of those cases confirming that our servers do not store log, data or metadata of clients' traffic.

    (*) We may speculate that FBI was involved in a Canadian matter because the stolen database contained US citizens' personal data.

    Kind regards
     
  10. Thanks
    Staff got a reaction from tatejuan in Oceania - More servers/bandwidth for the region   ...
    Hello!

    We're sorry, we have a delay due to a clause of the contract we are not comfortable with. If the matter can not be resolved, we can anyway rely on our current provider in NZ. Please stay tuned, in one way or another we definitely need to add bandwidth in NZ, and soon.

    Kind regards
     
  11. Like
    Staff got a reaction from go558a83nk in Court Order, seizing the server   ...
    @zetterpav

    Hello!

    No official communication was relevant or due to customers because the server did not contain any personal information or general data pertaining to customers or the infrastructure and because we have never been served by any order of any kind or anything else. The whole report is purely based on verbal communications as a courtesy. 7 years is a reasonable time to allow proper investigation time without undue interference, as we already wrote.
     
    None at the moment.
     
    It may depend on court orders. If a competent court order says that something must not be disclosed for a period of time, that period of time must be respected. In this case there are no official documents whatsoever served to us, so it's just a report based on informal communications, which are not necessarily faithful to the truth.
     
    Let's make it clear that our ethics and our mission don't imply that we will actively do something to inflict damage to any investigation. Our ethics and our mission forbid us to inspect secretly traffic or log secretly or build traps, not even if ordered by authorities, but it does not imply and never implied that we should actively do something to harm an investigation. We're glad that this case confirms that we don't keep traffic logs according to the ToS as you rightly expected.

    Kind regards
     
  12. Like
    Staff got a reaction from Notworking in How to manage client certificate/key pairs   ...
    Hello!

    Multiple keys allow you to:
    selectively pick remotely forwarded inbound ports by device/key connect multiple devices to the same VPN server by using a different key on each device have different, device-specific DNS block lists
    A dedicated panel to manage your client certificates and keys is accessible in our web site.
     
    In order to access the main control panel click Client Area while your account is logged into the AirVPN web site.
     
    The Devices button provides you with access to a panel to administer your client certificate/key pairs. The panel lets you use a multi-certificate/key support from AirVPN, a comfortable and convenient feature. You can have multiple pairs, renew them and issue completely new ones. From each device of yours you will be free to use any pair you like. Therefore you can keep all of your certificates and keys under control, administer them and also connect multiple devices to the same server and port by using a different key on each device. Eddie 2.13.6 or higher version is required.

    In Eddie's Overview window a menu which will let you choose a key before you start a connection will appear automatically when you create a new certificate/key par from your account control panel (note: restart Eddie and log your account out and in again if such menu does not appear). To create a new certificate/key pair click the button labeled Add a new device.
     
    The Configuration Generator has been modified as well, in order to let you generate configuration files with the certificate/key pair you wish.
     
    Let's see in details how to use the "Devices/Keys" options.
     
    Device Name and Description: these are free name and description which you can associate to any pair for your comfort. Click the pencil icon to edit.

    Details opens a window showing various information: Type, Creation date, Last renew date and Last VPN connection. In the same window you can find the following actions: Renew: when you click this action button, the corresponding certificate will be revoked, and a new certificate/key pair will be issued. Delete: this action button will revoke the corresponding certificate, without issuing a new one. DNS: this action button will let you enter the DNS block list panel for that specific certificate/key pair to let you define, activate or de-activate specific DNS block lists, exceptions and additions, which will apply to that pair only.
    View history and View Active will toggle with each other to provide you with any relevant information on the history of your actions about keys and the current active list.   
    Some caution when using the aforementioned features:
    if you revoke or renew a certificate/key pair which is being used by some connected device, that device will soon be disconnected
    in Eddie Desktop edition, you will need to log your account out and then in again to force Eddie to pick a different pair (new or old) (*) - in Eddie Android edition this is not necessary
    to use new pairs, you will need to re-generate and import configuration files if you use them with some third-party software, or if you run OpenVPN or Wireguard directly
    (*) unchecking "Remember me" is necessary in older Eddie versions  
    Kind regards and datalove
    AirVPN Staff
  13. Like
    Staff got a reaction from p9974839 in Google "Unaddressed Abuse Complaints"   ...
    Hello!

    Google Search should never be used for privacy reasons (Google profiling techniques are so advanced that you risk to create a correlation between your real identity and your VPN identity at the tiniest error) and ethical reasons, but you can rely on startpage.com if you really need Google Search. Startpage will proxy your queries to Google Search and serve you back Google reply, therefore an additional protection layer stands between your node and Google and you usually avoid captchas. A very good search engine offering privacy protection commitment is Brave Search:
    https://search.brave.com

    Kind regards
     
  14. Like
    Staff got a reaction from nexsteppe in AirVPN Servers blacklisted   ...
    Hello!

    Please see our previous reply in this thread and also the following one, where we explain more thoroughly our point of view and some facts:
    https://airvpn.org/forums/topic/50724-two-new-1-gbits-servers-available-us/?do=findComment&comment=216468

    Just a brief addition: your above quoted sentence imply that protecting privacy in an agnostic network means supporting net abusers, which is an inadmissible and shameful idea that we strongly reject. This concept is one  of the "moral" or "ethical" justifications to pervasive surveillance in virtually all countries controlled by human rights hostile regimes, and in a few "Western" countries too: since someone somewhere someday might commit  a crime via the Internet, let's enforce blanket data retention and pervasive packet inspection for everyone, so Internet will be a "safe place" for the "law abiding, conforming" citizen. Your consideration has been and is the founding argument for power groups having the hidden agenda to expunge the right to privacy from the list of fundamental rights. Consider that one of the strictly necessary conditions for any dictatorship to survive is the effective suppression of the right to privacy.

    Kind regards
     
  15. Thanks
    Staff got a reaction from nexsteppe in AirVPN Servers blacklisted   ...
    Hello!
     
    The main reason of complaints and black list presence of IP addresses are attacks via HTTP(S) and spam mails. A server with blocked outbound ports 80 and 443 blocked would be avoided by anyone, we think, while we might consider to block outbound ports 465 and 587 (outbound port 25 is already blocked on all servers) and renounce to our fight to defend net neutrality. This will require however a mission as well as Terms of Service modification, as noted by @OpenSourcerer , so it's not a viable solution for the current management administration and the contracts with our current users.
     
    Out there you can already find tons of VPNs which violate net neutrality by inspecting your traffic and blocking (or shaping) applications, protocols and ports. Or you can just use your own ISP. The peculiarity of AirVPN is that it doesn't enforce that rubbish.. If one asks for traffic inspection, ports blocking and so on and so forth to get a "cleaner" IP address, then he/she probably "deserves" a pervasive surveillance and must take into account that his/her personal information and his/her behavior will be sooner or later used against him/her, as it already happened to millions and millions of people around the world in the last years.
     
    Kind regards
  16. Like
    Staff got a reaction from Alexei Sator in Eddie Android edition 3.0 available   ...
    @zsam288

    Hello!

    Yes, it is being developed. Thanks for your feedback and suggestions!

    Kind regards
     
  17. Thanks
    Staff got a reaction from Social_House in Airvpn needs to improve ''related to censorship''   ...
    Hello!

    We're not aware of any security concern as they are layers "on top" of well tested tunnels without known vulnerabilities. Currently Russia and China users can access AirVPN, however should the need arise we strongly recommend Tor with private bridges with various pluggable transports. We have invested a lot on Tor infrastructure (see our mission), including support for an important amount of worldwide Tor exit nodes traffic, and Tor is free for everybody. No matter the obfuscation technique employed, a country or ISP can block any VPN service (and other services operated by small or average sized companies) by harvesting and blocking its servers IP addresses, a task which, on the contrary, becomes quite difficult with Tor, where volunteers all around the world set up private Tor bridges every day.
    https://bridges.torproject.org/

    Kind regards
     
  18. Like
    Staff got a reaction from Hypertext1071 in Will We See More 10 Gigabit Servers in the US Soon?   ...
    Hello!

    Yes, new 10 Gbit/s servers in the USA are planned according to userbase growth. If the current rhythm is maintained (but this is a big big if, in our business) you might see news on November.

    Kind regards
     
  19. Like
    Staff got a reaction from flat4 in Court Order, seizing the server   ...
    Hello!

    We can disclose only now that we had a server in Toronto seized in 2015, initially without our knowledge. Maybe a court order was served to the datacenter. For about 10 days we did not understand what happened to the server, which did not respond, while the datacenter did not provide information. After 10 days Italian police (and not any magistrate) contacted us. They informed us that Toronto police and FBI (*) asked for our help because they could not find any log in the server. Unfortunately their help request came after the server had been already seized. They did not even make a copy, they took it physically, therefore the server went offline, probably alerting the alleged criminals. It was obvious that forensic analysis could not find any log, simply because there were none. Our VPN servers did not even store the client certificates, go figure (now they also run in RAM disks, but in 2015 they did not). The whole matter was led by informing us without any document from any court or magistrate, but only through informal police communications, and only to ask for help after forensic analysis obviously failed completely.

    We were not asked to keep confidentiality on the matter, but just to stay on the safe side and support the investigation on what it appeared as a serious crime (a whole database with personal information of a commercial service was cracked, stolen and published in public when the web site owners did not pay a "ransom"; while our server was apparently not used for the crack, it was used to upload elsewhere the database) we decided not to disclose the whole matter for at least 7 years. It's one of those cases confirming that our servers do not store log, data or metadata of clients' traffic.

    (*) We may speculate that FBI was involved in a Canadian matter because the stolen database contained US citizens' personal data.

    Kind regards
     
  20. Like
    Staff got a reaction from flat4 in [ENDED] Spooky Halloween 2023 deal   ...
    Hello!

    We reluctantly have to announce gloomy news to you all: Spooky Halloween Deals are now available in AirVPN...
     

     
    Save up to 74% on AirVPN longer plans (*)
    (*) When compared to 1 month plan price
     
    Check all plans and discounts here: https://airvpn.org/plans

    If you're already our customer and you wish to jump aboard for a longer period any additional plan will be added on top of already existing subscriptions and you will not lose any day.

    Every plan gives you all the features that made AirVPN a nightmare for snoopers and a scary service for competitors. Just check this frighteningly long list of terrific features if you dare:
    a clear mission without compromises https://airvpn.org/mission WireGuard support exclusive and very flexible, opt-in block lists against malware and other hostile entities. Pick predefined lists, add exceptions or additional blocks, define your own lists, or just use our totally neutral DNS by default improved API functions to let you control and configure VPN features and account settings active OpenVPN 3 AirVPN library open source development IPv6 support, including IPv6 over IPv4 configurable remote port forwarding refined load balancing to squeeze every last bit per second from VPN servers free and open source software for Android, Linux, Mac and Windows easy "Configuration Generator" web interface for access through third party software guaranteed minimum bandwidth allocation GDPR compliance and very high privacy protection standards no log and/or inspection of clients' traffic effective traffic leaks prevention by AirVPN software Tor support via AirVPN software on Linux, Mac and Windows various cryptocurrencies accepted without any intermediary no obligation to use our free and open source software to enter AirVPN infrastructure. Interoperability is an AirVPN priority. perfectly clear and easy to read Privacy Notice and Terms https://airvpn.org/privacy
    No tricks, only treats!

    We witch you a spooktacular Halloween!

    Grim regards & datathrills
    AirVPN Staff
  21. Like
    Staff got a reaction from AdrianMonk in New user: How-to do Wireguard?   ...
    @vOsgZC7

    Hello!

    For Eddie's manual, please type in a terminal "man eddie-ui".

    To switch connection mode, in the "Preferences" > "Protocols" window please uncheck "Automatic", select the connection mode line you prefer (the line will be highlighted) and click "Save". The change will apply at the next connection. Eddie will prevent WireGuard selection if WireGuard is not installed in the system. WireGuard should have been installed during Eddie installation as a dependency, but please check.

    Kind regards
     
  22. Like
    Staff got a reaction from Air4141841 in WireGuard W/Multiple Clients   ...
    Hello!

    You can consider to generate different keys for your account in your AirVPN account "Client Area" > "Devices" panel, so you will get different VPN IP addresses for different profiles based on different keys. Please see here:
    Kind regards
     
  23. Like
    Staff got a reaction from airvpn.italia@maildrop.cc in A few questions from newbie   ...
    Hello!
    Correct. A new Eddie Desktop edition version 3 will get rid of Mono in the UI (Eddie backend already does not need Mono or .NET framework). The UI itself will be refreshed. A roadmap is not currently available, we're sorry. Several variables affect performance of OpenVPN and WireGuard and it is actually difficult to provide an effective and general suggestion on which of the two you should pick. Ignore the "recommended for best performance" at the moment, we might remove it altogether. Test both WireGuard and OpenVPN and pick the one which can provide you with the best performance. On iOS, provided that your ISP does not shape WireGuard or UDP traffic, and therefore on a level playing field, WireGuard is faster according to the majority of reports. You can find detailed instructions for WireGuard in iOS in the dedicated page, direct link: https://airvpn.org/ios/wireguard/appstore/ No, we're sorry, major streaming platforms (e.g. Hulu, Primevideo, Netflix, Disney+) are not accessible from our infrastructure. We would need "residential IP addresses" from USA residential ISPs to make them accessible. We have no plan for that for the near future, we're sorry. Just ask for deletion in a ticket (click "Contact us" on the web site while your account is logged in and send the deletion request) Kind regards
     
  24. Thanks
    Staff reacted to PineappleGoatFarm in [ENDED] Spooky Halloween 2023 deal   ...
    Good timing, I just got the 3 year plan.
  25. Thanks
    Staff reacted to poseidolginko in [ENDED] Spooky Halloween 2023 deal   ...
    Just extended for another 2 years.  Very happy with the service.  Thank you.
×
×
  • Create New...