Jump to content
Not connected, Your IP: 216.73.216.119

EMULE

Members2
  • Content Count

    68
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    3

Reputation Activity

  1. Like
    EMULE got a reaction from Stalinium in AmneziaWG config patcher   ...
    @Stalinium Yes, the packets you obtain yourself are better suited to your network environment. If you find that troublesome, you can also try other people's parameters. Here are my parameters.

    Jc = 8
    Jmin = 86
    Jmax = 892
    S1 = 0
    S2 = 0
    H1 = 2
    H2 = 3
    H3 = 4
    H4 = 1
    I1 = ...
    I2 = ...
    I3 = ...
    I4 = ...
    I5 = ...
    CPS I1-I5(bing.com-initial QUIC).txt
  2. Like
    EMULE got a reaction from IAmFlash in Kornephoros   ...
    That's incredible!

    It seems the server hardware wasn't that bad; perhaps it was just maintained two days ago? Or maybe the hardware was replaced?

    I see that this server only has 280+ users. Could it be a user issue? More users using the Wireguard protocol can indeed bring higher bandwidth usage.

    If the AmneziaWG protocol becomes widespread, it would be incredible if even 10G servers could be fully utilized.😄😄😄
  3. Like
    EMULE got a reaction from IAmFlash in Kornephoros   ...
    I'm also confused.
    Perhaps the hardware isn't powerful enough?
    A 1Gbps server can handle 100+ users with 80% bandwidth utilization.
    This means a 10Gbps server would need 1000+ users to achieve the same 80% bandwidth utilization.
    However, in reality, a 10Gbps server experiences a significant speed drop when handling 300+ users, seemingly unable to keep up.
    It would be better to label it as a 3Gbps or 5Gbps server, as the actual speed difference from the advertised 10Gbps is substantial.
    If that's the case, it would be better to replace one 10Gbps server with ten 1Gbps servers.
    Maybe that's the case?
    I think AirVPN may have leased a 10Gbps network in the data center, but the servers can't handle that 10Gbps network.
    Isn't that a waste of resources?
    I think AirVPN can increase the number of 1Gbps servers as much as possible to make full use of network bandwidth, which would also save on server costs for AirVPN, wouldn't it?
  4. Like
    EMULE got a reaction from IAmFlash in Kornephoros   ...
    Did everyone notice?
    The Kornephoros server achieved astonishing speeds today.
    As a 10Gbps server, it loaded over 5Gbps of bandwidth.
    I've never seen such speeds on any 10Gbps server before.
    What makes this server different from other 10Gbps servers?
    Is it the unprecedentedly powerful hardware, the data center's network environment, or AirVPN's optimization of the server's kernel?
    Staff can take a look and use this information to optimize other 10Gbps servers.
    Kornephoros is truly unexpected.
  5. Like
    EMULE got a reaction from Stalinium in AmneziaWG config patcher   ...
    @Stalinium Yes, the packets you obtain yourself are better suited to your network environment. If you find that troublesome, you can also try other people's parameters. Here are my parameters.

    Jc = 8
    Jmin = 86
    Jmax = 892
    S1 = 0
    S2 = 0
    H1 = 2
    H2 = 3
    H3 = 4
    H4 = 1
    I1 = ...
    I2 = ...
    I3 = ...
    I4 = ...
    I5 = ...
    CPS I1-I5(bing.com-initial QUIC).txt
  6. Like
    EMULE reacted to gundamlord in Kornephoros   ...
    Kornephoros is airvpns better 10gb server in canada. it almost gives me full speeds on my home server(connected via wifi)

    funny enough their now decommissioned wurren was a pretty crappy in my experience. i was never able to get more than 80mbit on wurren even though it was also supposedly a 10gbit server...  even regular 1gbit server outperformed wurren
  7. Like
    EMULE reacted to Staff in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Los Angeles, California, is available: Revati.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Revati supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor , by clicking the server name. Direct link: https://airvpn.org/servers/Revati

    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

     

  8. Like
    EMULE reacted to zimbabwe in Block vpn in Russia?   ...
    If you notice that the connection speed drops down again increase the Jc parameter (I recommend values 10-80) and rearrange the H1, H2, H3, H4 values (they should be the numbers from 1 to 4 but their order can be any). ТСПУ is able to detect and throttle AmneziaWG and I personally had this situation twice, and twice I had to pump up the Jc parameter. Don't set it too high though: too much junk is also abnormal and potentially can become a fingerprint.

    According to the recent news Roskomnadzor has set a budget of 60 billion rubles (655 000 000 USD) to significantly upgrade their wonderboxes in the next 5 years. So I guess even more fun is coming. I've already bought a cheap VPS and installed Xray (VLESS-TCP-XTLS-Vision-REALITY), sing-box (Shadowsocks with 2022-blake3-aes-128-gcm) and Cloak but don't use it much to keep the IP from prematurely getting into the black lists (if they even currently exist in Russia, but in Iran they already do). May be it's all over the top but who knows the future? For now my main method of accessing the larger data world is still the good old AirVPN.
  9. Like
    EMULE reacted to Hypertext1071 in Kornephoros   ...
    Maximum of 7.3 Gb/s on Terebellum. I think most users are probably not using that much bandwidth to push the 10 Gb/s servers to their max.

  10. Like
    EMULE got a reaction from Tech Jedi Alex in Can't connect - Fetch url error:SSL peer certificate or SSH remote key was not OK   ...
    I think so. My VPN functions the same as before, and I'm able to connect to blocked websites.
  11. Like
    EMULE got a reaction from Staff in Eddie Android edition 4.0.0 preview available   ...
    Hello!

    Great news!

    I captured the first QUIC packet accessing bing.com using Wireshark and used that packet to create a complete CPS, with I1-I5 parameters in the following file.

    Using this CPS, I successfully connected to a US server and achieved good speed and stability. In my network environment, this was more effective than random CPS packets.

    Everyone can test this set of parameters (it needs to be accessible without a VPN to bing.com). I welcome any better optimization suggestions from everyone.

    Jc = 8
    Jmin = 86
    Jmax = 892
    S1 = 0
    S2 = 0
    H1 = 2
    H2 = 3
    H3 = 4
    H4 = 1
    I1 = ...
    I2 = ...
    I3 = ...
    I4 = ...
    I5 = ...
    CPS I1-I5(bing.com-initial QUIC).txt
  12. Like
    EMULE reacted to Tech Jedi Alex in After switch Mac from M1 to M4 (same OS 15.7.2) Eddie now doesnt show Up/Down speed anymore   ...
    I must commend the AI here – I wouldn't have thought of asking you whether you installed Eddie from scratch or copied over the profile.
    Most of the times those AIs catch mentions of one or two words in contexts of other words and hallucinate about the rest of the meaning, but this one was a good answer.
  13. Thanks
    EMULE got a reaction from Tech Jedi Alex in Can't connect suddenly   ...
    Okay, I'll listen to you.
    You're more professional than me.😊😊😊
  14. Like
    EMULE got a reaction from Archaon1 in Windows: Wireguard does not start - Unable to run AirVPN   ...
    Hi Archaon1,
    I'm glad I could help you.
    Six months ago, I was just a newbie, but thanks to the community's help, I grew rapidly.
    Now, I can finally help others too.
    That's the meaning of a community.
    Haha, it's really satisfying to help others.
    🎉🎉🎉
  15. Like
    EMULE reacted to Archaon1 in Windows: Wireguard does not start - Unable to run AirVPN   ...
    I'll look into it, thank you
  16. Like
    EMULE reacted to Archaon1 in Windows: Wireguard does not start - Unable to run AirVPN   ...
    Emule,

    I'm glad to see that this side of internet isn't dead!

    Little question if i may : i used unlocker to get rid of the files. Windows was saying that i needed the authorisation of ThrustDLL or something like that.
    How would you have granted yourself a higher authority...on your own pc?
    (The classic windows "I bought you, I assembled you...I OWN YOUUUU")
  17. Like
    EMULE reacted to Archaon1 in Windows: Wireguard does not start - Unable to run AirVPN   ...
    Hi Emule,

    Hard to follow someone with 35 posts but it worked out!
    I was a bit suspicious when you asked about deleting system32's files but my VPN is working fine now ^^

    Thanks a lot, I wouldn't have found it on my own.


    For the data : i did the suppression of all the files and the reboot of the network
  18. Like
    EMULE got a reaction from Archaon1 in Windows: Wireguard does not start - Unable to run AirVPN   ...
    For the sake of so-called security, Windows' system permission design can sometimes be quite annoying.
    When I installed Windows, I configured Huorong Security Software with the highest privileges, locking the core Windows processes from being tampered with.
    For any operations requiring high privileges, I use Huorong Security Software's toolbox, which can solve the problem with a single click, saving me a lot of trouble.
     
  19. Like
    EMULE got a reaction from Archaon1 in Windows: Wireguard does not start - Unable to run AirVPN   ...
    Hi Archaon1,
    I'm glad I could help you.
    Six months ago, I was just a newbie, but thanks to the community's help, I grew rapidly.
    Now, I can finally help others too.
    That's the meaning of a community.
    Haha, it's really satisfying to help others.
    🎉🎉🎉
  20. Like
    EMULE reacted to HUHHII in Review of AirVPN after a year of use   ...
    Hello!

    After a year of using AirVPN I'm very happy with the product. Website has no bloat whatsoever and it's super easy to find what you are looking for. A huge plus goes out for having an active forum available! Much better option compared to social media idiocies. Also port forwarding has been executed greatly - many other VPN services miss that altogether but even those which support it can't match AirVPN's easy-to-use robust system. Config generator is a great plus too since I'm using both WireGuard app and WireSock depending on the situation and needs. Both run just fine and very few VPN's could match this level of usability.

    I sometimes have dissapointing speeds with P2P, but usually a simple server change fixes it.

    Overall very happy customer. Please have a beer AirVPN staff, you've deserved it!
  21. Like
    EMULE got a reaction from Staff in More tunneling options   ...
    Yes, the addition of the AmneziaWG protocol can solve the connection problems for most people at present, and I hope that AmneziaWG can be used for a long time. If in the future, when the existing protocol can no longer connect, I believe that AirVPN will add a new protocol to solve the connection problem. I will always believe in your technology and capabilities, and I believe that you will always let us breathe real internet. I will always love you, AirVPN. Keep it up!😘😘😘
  22. Like
    EMULE reacted to Staff in More tunneling options   ...
    Hello!

    Not anymore, and even less in the near future. HTTP/3 is quickly spreading. Today, HTTP/3 is used by 36.5% of all the websites, including major web sites inside countries that enforce blocks against VPN. Furthemore, blocking UDP as such is no more realistic, not even in China, where UDP has become an instrumental protocol for many companies in any sector (video streaming, video conference, VoIP, marketing, social media marketing, regime propaganda and more), for regime aligned or regime owned activities.
     
    In China you have a near 100% success rate and no shaping (apart from the normal shaping for anything outside China) with the current Amnezia "weak obfuscation" (no CPS) implementation, i.e. at the moment you don't even need QUIC mimicking (which is anyway available and very effective). Currently, bypassing blocks via UDP than via TCP is more efficient in China.
     
    At the moment there is nothing more effective than mimicking QUIC with the signature / fingerprint of an existing web site that's not blocked, and you have this option right now. We see > 95% success rate, which is better than the success rates of SSH (not exceeding 75%), shadowsocks and XRay, V2Ray etc (but a lot faster!). The success rate is similar to any VPN protocol over HTTP/2, but, again, dramatically faster.
     
    We're glad to know it. It is also very flexible. Thanks to CPS, you may mimic any transport layer protocol built on UDP, for example DNS, QUIC, SIP.

    Kind regards
     
  23. Like
    EMULE reacted to alekas in More tunneling options   ...
    Traveling to Uzbekistan. I cannot connect to any AirVpn server anymore. It worked fine in USA.
    Any protocol available in Eddie UI do not work.
    Unfortunately I paid for the whole year of AirVPN service. Looks like the XRay or something similar is the way to go...
  24. Like
    EMULE reacted to zimbabwe in More tunneling options   ...
    Please add more tunneling options! Day by day censorship around the world becomes worse and worse, OpenVPN and Wireguard is already completely blocked in many countries because it is easily detectable using DPI. Since the mid 2010's people out there have been working very hard on much more censorship-resilient solutions rather than simple-to-detect SSH and SSL-wrapping. The days of the games of privacy are over, now VPNs are more and more used by the people around the world to break the information bubbles created by their oppressive governments.

    Here are some examples of the new tunneling methods that you could add to your services:
    https://github.com/erebe/wstunnel
    https://github.com/cbeuw/Cloak
    https://github.com/v2fly/v2ray-core
    https://github.com/XTLS/Xray-core
  25. Like
    EMULE reacted to Staff in Eddie Android edition 4.0.0 preview available   ...
    Hello!
     
    We're very glad to announce that Eddie Android edition 4.0.0 preview is available
    2026-11-28: Eddie Android edition 4.0.0 Beta 1 is available
    2026-01-14: Eddie Android edition 4.0.0 Beta 2 is available
     
    2026-03-04: Eddie Android edition 4.0.0 Beta 3 is available
    This is a major update: for the first time Eddie Android edition features AmneziaWG complete support.

    Eddie Android edition is a fully integrated with AirVPN, free and open source client allowing comfortable connections to AirVPN servers and generic VPN servers offering compatible protocols. Eddie 4.0.0 aims primarily at adding, besides the already available OpenVPN and WireGuard, a thorough and comfortable AmneziaWG support. 

    AmneziaWG is a free and open source fork of WireGuard by Amnezia inheriting the architectural simplicity and high performance of the original implementation, but eliminating the identifiable network signatures that make WireGuard easily detectable by Deep Packet Inspection (DPI) systems. It can operate in several different ways, including a fallback, "compatibility mode" with WireGuard featuring anyway various obfuscation techniques.
     
    What's new in Eddie 4.0.0
      AmneziaWG support Amnezia WireGuard API stronger anti-blocking logic: ability to log in to the service and download AirVPN infrastructure and user data while connected through a profile with a specific option on the left pane ability to read and use local user data when bootstrap servers are unreachable new "Open with..." option on top of the usual "Share" option to manage and export comfortably generated profiles on any Android version with any suitable application updated AmneziaWG parameters allowed ranges  support of latest AmneziaWG padding features vastly improved NetworkMonitor and Tile Service updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries full compatibility from Android 5.1 to Android 16, including Android TV bug fixes see the complete changelog below  
    AmneziaWG overview
      From the official documentation: https://docs.amnezia.org/documentation/amnezia-wg AmneziaWG offers:
    Dynamic Headers for All Packet Types (compatibility with WireGuard: YES)
    During tunnel initialization, the library generates a set of random constants applied to each of the four WireGuard packet formats: Init, Response, Data, Under‑Load. These constants:
    As a result, no two clients have identical headers, making it impossible to write a universal DPI rule.
     
    Replace predictable WireGuard packet identifiers; Shift offsets of Version/Type fields; Modify reserved bits. Handshake Length Randomization and message padding (compatibility with WireGuard: NO)
    In WireGuard, the Init packet is exactly 148 bytes, and the Response packet is exactly 92 bytes. AmneziaWG adds message paddings:
    S1: int - padding of handshake initial message S2: int - padding of handshake response message S3: int - padding of handshake cookie message S4: int - padding of transport messages

    Offsets of the remaining fields are automatically adjusted, and MAC tags are recalculated accordingly. In order to keep backward compatibility with WireGuard, S1, S2, S3 and S4 must be set to 0.    Obfuscation Packets I1-I5 (Signature Chain) & CPS (Custom Protocol Signature) (compatibility with WireGuard: partial, with fallback)
    Before initiating a "special" handshake (every 120 seconds), the client may send up to five different UDP packets fully described by the user in the CPS format. In this way AmneziaWG can mimic perfectly QUIC, DNS and other protocols adding powerful methods to circumvent blocks. QUIC is particularly interesting as HTTP/3 is built on it and currently, from Chrome and other compatible browsers, 50% of traffic to/from Google is QUIC traffic. Therefore, blocking QUIC may have major disruptions for any ISP.
     
    Junk‑train (Jc) (compatibility with WireGuard: YES)
    Immediately following the sequence of I-packets, a series Jc of pseudorandom packets with lengths varying between Jmin and Jmax is sent. These packets blur the timing and size profile of the session start, significantly complicating handshake detection.
     
    Under‑Load Packet (compatibility with WireGuard: YES)
    In WireGuard, a special keep-alive packet (“Under-Load”) is used to bypass NAT timeouts. AmneziaWG replaces its fixed header with a randomized one, the value of which can be set manually. This prevents DPI from filtering short ping packets, ensuring stable tunnel connections, especially on mobile networks.
     
     
    How to use Eddie with AmneziaWG

    To enable AmneziaWG mode, just tap the connection mode available in the main and other views. It will rotate between WireGuard, AmneziaWG and OpenVPN. Set it to AmneziaWG. In its default AmneziaWG mode, Eddie will use all the possible obfuscation, except protocol mimicking, that keeps WireGuard compatibility, thus allowing connections to AirVPN servers. The default settings choice was possible thanks to the invaluable support of persons living in countries where VPN blocks are widespread. Such settings have been tested as working and capable to bypass the current blocking methods in various countries. You may consider to modify them if they are ineffective to bypass "your" specific blocks.
      In Settings > Advanced, you will find, at the bottom of the page, a new "Custom Amnezia WG directives" item. By tapping it you will summon a dialog that will let you customize any possible AmneziaWG parameter.

    You can maintain backward compatibility with WireGuard in the dialog WireGuard section, or enable the full AmneziaWG support in the Amnezia section, which is not compatible (at the moment) with AirVPN WireGuard servers. This mode will be mostly valuable in a not distant future, when AirVPN servers will start to support AmneziaWG natively. You may also enable QUIC or DNS mimicking for additional obfuscation efficacy. 

    In order to maintain WireGuard backward compatibility, with or without QUIC or DNS mimicking, you must set:
    S1 = S2 = S3 = S4 = 0
    Hn ∈ {1, 2, 3, 4}
    H1 ≠ H2 ≠ H3 ≠ H4

    Furthermore, do not exceed the valid limit of the J parameters (anyway Eddie will not let you do it). In this preview version, Eddie's formal control of the input data is based on the following document. We strongly recommend you read it if you need to modify manually parameters:
    https://github.com/amnezia-vpn/amneziawg-linux-kernel-module?tab=readme-ov-file#configuration


    Please do not modify In parameters if you don't know exactly what you're doing. 

    Eddie implements QUIC and DNS mimicking and obfuscation packets for each specific "I" parameter (by using the corresponding "Generate" button). You can enable them with a tap on the proper buttons. You may mimic QUIC and DNS even to connect to WireGuard based servers.

    When you enable QUIC mimicking and you maintain WireGuard backward compatibility, you add a powerful tool against blocks, because the first packets will be actual QUIC packets. AmneziaWG will fall back to WireGuard compatibility very soon. However, when DPI and SPI tools, and demultiplexers in general, identify the initial QUIC flow, most of them will be unable to detect a WireGuard flow for several minutes. This has been tested thoroughly with deep packet inspection on Linux and FreeBSD based machines by AirVPN staff.

    Therefore, in different blocking scenarios the QUIC mimicking increases likelihood of successful block bypass. NOTE: the same does not happen with DNS mimicking. In this case DPI / SPI tools identify the stream initially as DNS, but are much quicker (just in a few dozens of packets) to identify the stream as WireGuard's, after the initial DNS identification.
     
    How to use Eddie in network where the "bootstrap" servers can not be reached
    Eddie downloads user and infrastructure data, essential to use the service, from special "bootstrap servers" through an encrypted flow inside HTTP. If the bootstrap servers are blocked or the underlying protocol to port 80 is filtered out, Eddie is unable to proceed. Starting from this Eddie 4 version, the ability to retrieve such data locally has been added. Whenever bootstrap servers are unreachable, Eddie can read the latest available local data to connect to a VPN server. Once connected the bootstrap servers are again reachable and the local data are immediately updated for future usage. The local data remain valid as long as you don't need to change user.

    On top of all of the above, Eddie can now retrieve such data through the login procedure that now can be started even when a connection to a VPN server was previously established via a profile. Therefore, when you are in a restrictive network that blocks access to bootstrap servers, you can connect through a profile generated by AirVPN web site Configuration Generator. After this first connection, log your account in to the service by selecting the specific option on the left pane, enter your AirVPN account credentials as usual and make sure that Remember me checkbox is ticked: Eddie will download all the necessary files and store them locally.

    This procedure is "once and for all", at least as long as you don't need to change account. After this initial connection, Eddie will be able to log your account in to the infrastructure, retrieve servers data and establish connections without profiles and without bootstrap servers, offering again full AirVPN integration even when bootstrap servers are unreachable. Only If you change account you must repeat the procedure.

    Download link, checksum and changelog
    https://eddie.website/repository/Android/4.0.0-Beta3/EddieAndroid-4.0.0-Beta-3.apk
     
    This is a build debug package and side load is mandatory.

    If you decide to test, please report at your convenience any bug and problem in this thread. If possible generate a report from the app in a matter of seconds: by tapping the paper plane icon on the Log view bar rightmost side you will generate a full system report which will include both log and logcat and have it sent to our servers. Then you just need to send us the link the app shows you (open a ticket if you prefer to do it in private).
    $ sha256sum EddieAndroid-4.0.0-Beta-3.apk 3bec464d23c7e4f208d7428066037a4f360b3e99aa94682cf629300d13e8a223 EddieAndroid-4.0.0-Beta-3.apk
    Changelog 4.0.0 (VC 37)
      Beta 3 (2026-03-04)
    Changelog 4.0.0 beta 3 (VC 37) Release date: 4 March 2026 by ProMIND

    Native Library
    [ProMIND] removed obsoleted Google's breakpad dependency [ProMIND] removed files breakpad.cpp and breakpad.h (bye bye mister!) [ProMIND] api.h: removed LR_BREAKPAD_INITIALIZATION_ERROR from LibResult enum (bye bye mister!) [ProMIND] api.cpp init(): removed calls to breakpad code (bye bye mister!) [ProMIND] api.cpp cleanup(): removed calls to breakpad code (bye bye mister!) [ProMIND] updated to OpenVPN-AirVPN 3.12 (20260206) [ProMIND] updated to OpenSSL version 3.6.1
    amnezia_custom_settings_dialog.xml
    [ProMIND] removed random amnezia values button [ProMIND] added S3 and S4 input fields
    AirVPNManifest.java
    [ProMIND] added method loadStoredManifest()
    AirVPNServerProvider.java
    [ProMIND] added members useServerWhitelists, useCountryWhitelists, useServerBlacklists and useCountryBlacklists [ProMIND] added methods isUsingServerWhitelists(), setUseServerWhitelists(), isUsingServerBlacklists(), setUseServerBlacklists(), isUsingCountryWhitelists(), setUseCountryWhitelists(), isUsingCountryBlacklists() and setUseCountryBlacklists()
    AirVPNTileService.java
    [ProMIND] implemented NetworkMonitorListener [ProMIND] added boolean isBusy member [ProMIND] onClick(): prevent multiple execution in case the service is busy [ProMIND] setTileStatus(): removed network connection case [ProMIND] setTileStatus() renamed to setTileVpnStatus() [ProMIND] added method setTileNetworkStatus()
    ConnectAirVPNServerFragment.java
    [ProMIND] createVpnProfile(): in case of country connection, properly set AirVPNServerProvider's white and black list usage [ProMIND] exportVPNProfile(): protocol and port number is now correctly added to the profile name
    ConnectVpnProfileFragment.java
    [ProMIND] added enum AddVPNProfileResult [ProMIND] addVPNProfile(): now returns AddVPNProfileResult [ProMIND] addVPNProfile(): check profile validity before importing by calling VPNProfileDatabase's checkOpenVPN3Profile() and checkWireGuardProfile() [ProMIND] addVPNProfile(): profile import result is now sent to the logger [ProMIND] selectVPNProfile(): in case of errors or warnings during import, shows a dialog to the user
    BootVPNConnector.java
    [ProMIND] startConnection(): "remember me" is set, do local login and load locally stored manifest
    EddieLibraryResult.java
    [ProMIND] removed BREAKPAD_INITIALIZATION_ERROR
    LogActivity.java
    [ProMIND] added method redactProfile() [ProMIND] createExportLog(): in case the app is using a custom profile, call redactProfile()   MainActivity.java
    [ProMIND] onNetwork* events are now sent to the log
    NetworkMonitor.java
    [ProMIND] added member registeredNetworks [ProMIND] notifyStatusToListener(): updated to the new NetworkMonitorListener.onNetworkNotConnected() interface [ProMIND] getNetworkDescription(): it now takes Network object as argument [ProMIND] added method getActiveNetworkDescription() [ProMIND] subscribeListener(): it now sends a network staus event to the listener upon registration
    NetworkMonitorListener.java
    [ProMIND] Added networkDescription argument to method onNetworkNotConnected()
    QuickConnectFragment.java
    [ProMIND] onCreate(): in case "remember me" is set, after loading the locally stored user instance, call AirVPNManifest.loadStoredManifest()
    SettingsActivity.java
    [ProMIND] selectAirVPNDefaultVPNType(): Added AmneziaWG label to WireGuard VPN type [ProMIND] ameziaSettingsDialog(): added S3 and S4 support and management [ProMIND] ameziaSettingsDialog(): removed member btnGenerateRandomAmneziaWG
    SettingsManager.java
    [ProMIND] added Amnezia S3 and S4 settings and methods
    VPN.java
    [ProMIND] enum Status: added FATAL_ERROR
    VPNManager.java
    [ProMIND] added method isVpnFatalError()
    VPNProfileDatabase.java
    [ProMIND] added methods checkOpenVPN3Profile() and checkWireGuardProfile()
    VPNService.java
    [ProMIND] onNetwork* events are not sent to the log anymore [ProMIND] startForegroundVPNService() is now called in onCreate()
    WireGuardClient.java
    [ProMIND] generateRamdonAmneziaSettings renamed to generateRamdonAmneziaSettingsForWireguard()
     
    Beta 2 (2026-01-14)

    LogActivity.java
    [ProMIND] added View log button (open with...)
    MainActivity.java
    [ProMIND] method startAirVPNManifestRefresh() renamed to startAirVPNDocumentRefresh() [ProMIND] method stopAirVPNManifestRefresh() renamed to stopAirVPNDocumentRefresh() [ProMIND] member timerAirVPNManifestRefresh renamed to timerAirVPNDocumentRefresh [ProMIND] onCreate(): do exported files cleanup [ProMIND] onDestroy(): do exported files cleanup [ProMIND] drawer: added login item [ProMIND] drawer: changed login and logout icons [ProMIND] navigationViewItemSelected(): added code for AirVPN login [ProMIND] onResume(): show proper drawer's login/logout item
    QuickConnectFragment.java
    [ProMIND] onCreate(): removed AirVPN autologin (superseeded by extended "remember me" local login) [ProMIND] onCreate(): in case "remember me" is set, do local login by using locally stored user instance
    SettingsActivity.java
    [ProMIND] ameziaSettingsDialog(): fixed formal check for jc [ProMIND] removed AirVPN Autologin option (superseeded by extended "remember me" local login)
    SettingsManager.java
    [ProMIND] removed added SYSTEM_AIRVPN_AUTOLOGIN and SYSTEM_AIRVPN_AUTOLOGIN_DEFAULT (superseeded by extended "remember me" local login) [ProMIND] removed methods isAirVPNAutologinEnabled() and setAirVPNAutologin()
    SupportTools.java
    [ProMIND] added enum ShareMode [ProMIND] sharePlainText(): added argument share mode [ProMIND] sharePlainText(): the code is now compliant to all supported Android versions [ProMIND] sharePlainText(): exclude "myself" from helper apps [ProMIND] removeShareFile() renamed to removeShareFiles() [ProMIND] sharePlainText(): share/view files are now removed on app exit    
    Beta 1 (2026-11-25)

    Native Library
    [ProMIND] updated to version 4.0.0, API 10 [ProMIND] added Amnezia WireGuard API [ProMIND] updated to OpenVPN-AirVPN 3.12 (20251126)
    AirVPNUser.java
    [ProMIND] getWireGuardProfile(): added Amnezia support

    ConnectAirVPNServerFragment.java
    [ProMIND] showConnectionInfo(): added AmneziaWG logo display [ProMIND] onCreateContextMenu(): added AmneziaWG items [ProMIND] onContextItemSelected(): added AmneziaWG items [ProMIND] added method loadVPNProfile()
    ConnectVpnProfileFragment.java
    [ProMIND] added Amnezia support
    EddieLibraryResult.java
    [ProMIND] added Amnezia WireGuard API
    QuickConnectFragment.java
    [ProMIND] onCreateView(): added AmneziaWG logo display [ProMIND] updateStatusBox(): added AmneziaWG logo display
    SettingsActivity.java
    [ProMIND] added "Custom AmneziaWG directives" setting
    SettingsManager.java
    [ProMIND] added Amnezia specific settings and methods
    SupportTools.java [ProMIND] removed method getVPNProfile()
    VPN.java
    [ProMIND] added methods enableAmneziaWireGuard() and isWireGuardAmneziaEnabled()
    VPNManager.java
    [ProMIND] added method isWireGuardAmneziaEnabled()
    VPNProfileDatabase.java
    [ProMIND] added AMNEZIA type
    WebViewerActivity.java
    [ProMIND] EddieWebViewClient.shouldOverrideUrlLoading(): it now properly opens android asset files
    WireGuardClient.java
    [ProMIND] added WireGuard tunnel node to constructor  [ProMIND] added methods for generating Amnezia's junk settings
    WireGuardTunnel.java
    [ProMIND] added support for Amnezia WireGuard [ProMIND] added Mode enum [ProMIND] added tunnel node to constructor 
    EddieLibrary.java
    [ProMIND] added Amnezia WireGuard API
    Kind regards & datalove
    AirVPN Staff
×
×
  • Create New...