<?xml version="1.0"?>
<rss version="2.0"><channel><title>AirVPN Announcements</title><link>https://airvpn.org/rss/1-airvpn-announcements.xml/</link><description>Announcements</description><language>en</language><item><title>Eddie Desktop 2.18beta released</title><link><![CDATA[https://airvpn.org/forums/topic/45326-eddie-desktop-218beta-released/?do=findComment&comment=101133]]></link><description><![CDATA[Hello!
 


	 
 


	We're very glad to inform you that a new Eddie Air client version has been released: 2.18beta. It is ready for public beta testing.
 


	 
 


	How to test our experimental release:
 


		Go to download page of your OS
	
	
		Click on Other versions
		
			 
	
	
		Click on Experimental
		
			 
	
	
		Look at the changelog if you wish
	
	
		Download and install
	
 
Please see the changelog:

	https://eddie.website/changelog/?software=client&amp;format=html
 


	    
	In this release, we changed all source code from the ground up, to separate what needs superuser privileges and what not. 
	 
 


	PLEASE CONSIDER THIS A BETA VERSION. 
	Don't use it for real connection, it's only for those who want to collaborate to the project as beta-tester.



	 
	We hope to raise now the frequency of feedback replies here and Eddie releases.]]></description><pubDate>Wed, 11 Sep 2019 09:30:55 +0000</pubDate></item><item><title>Alkes, Merope, Sabik IP addresses change</title><link><![CDATA[https://airvpn.org/forums/topic/44599-alkes-merope-sabik-ip-addresses-change/?do=findComment&comment=99548]]></link><description>Hello!  
	We inform you that for datacenter needs, IPv4 and IPv6 addresses assigned to Alkes, Merope and Sabik will change on Aug, 12 2019 at 11.00 UTC.  
	If you run Eddie, you don't need any specific procedure, as Eddie will update data automatically and periodically. If you use some OpenVPN profile that's specific to one or more of those servers, please generate a new one through our Configuration Generator.  
	Kind regards 
	AirVPN Staff</description><pubDate>Mon, 12 Aug 2019 09:50:22 +0000</pubDate></item><item><title>New 1 Gbit/s server available (SG)</title><link><![CDATA[https://airvpn.org/forums/topic/44570-new-1-gbits-server-available-sg/?do=findComment&comment=99478]]></link><description><![CDATA[Hello!  
	We're very glad to inform you that a new 1 Gbit/s server located in Singapore (SG) is available: Lacaille.  
	The AirVPN client will show automatically the new server; if you use any other OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator").  
	The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.  
	Just like every other "second generation" Air server, Lacaille supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.  Full IPv6 support is included as well.  
	As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.  
	You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Lacaille
 


	  
	Do not hesitate to contact us for any information or issue.  
	Kind regards and datalove 
	AirVPN Team]]></description><pubDate>Fri, 09 Aug 2019 12:34:45 +0000</pubDate></item><item><title>Six servers withdrawal announcement: Canada</title><link><![CDATA[https://airvpn.org/forums/topic/44412-six-servers-withdrawal-announcement-canada/?do=findComment&comment=99206]]></link><description>Hello!  
	We regret to inform you that we have been unable to contact one of our providers in Canada since 24 hours ago. All of its servers are down as well as its web sites. Affected servers are the following five:  
	Almach 
	Dheneb 
	Grumium 
	Kraz 
	Rana 
	Spica  
	Luckily infrastructure redundancy is so high in Canada that lack of those five servers will not impact quality of service.  
	We will update this thread with future developments, as soon as we receive any kind of information.  
	Kind regards 
	AirVPN Staff</description><pubDate>Thu, 01 Aug 2019 13:37:41 +0000</pubDate></item><item><title>Singapore: Server replacement (Reticulum)</title><link><![CDATA[https://airvpn.org/forums/topic/44375-singapore-server-replacement-reticulum/?do=findComment&comment=99142]]></link><description>Hello!  
We inform you that we will replace very soon server "Reticulum" in Singapore. A new server will take its place, in the very same datacenter. Reticulum is expected to stop working around the 1st of August.  
In the meantime we recommend that you connect to any other Singapore server. We will announce the new server as soon as it is ready. Singapore infrastructure offers a lot of redundancy, therefore we expect no load problems at all before the replacement is completed.  
Kind regards 
AirVPN Staff</description><pubDate>Tue, 30 Jul 2019 10:54:19 +0000</pubDate></item><item><title>Eddie Android Edition 2.4 released - ChaCha20 support</title><link><![CDATA[https://airvpn.org/forums/topic/44201-eddie-android-edition-24-released-chacha20-support/?do=findComment&comment=98783]]></link><description><![CDATA[Hello! 
	  
	AirVPN is very proud to introduce for the first time ever OpenVPN 3 support for ChaCha20-Poly1305 cipher with Eddie Android edition 2.4.  
	The new implementation means remarkably higher performance and longer battery life for your Android device.  
	CPUs that do not support AES New Instructions, typically ARM CPUs mounted on most Android devices, are much faster to encrypt and decrypt a stream of data with ChaCha20 than AES. At the same time, ChaCha20 offers the same security when compared to AES. https://en.wikipedia.org/wiki/Salsa20#ChaCha_variant  You can test right now the new cipher. We have prepared four test servers running OpenVPN 2.5 and supporting ChaCha20 in Canada and the Netherlands. When you pick ChaCha20 as cipher in Settings, Eddie will filter properly Air VPN servers to let you connect to them. 
	  
	The outstanding feature has been made possible by AirVPN implementation on "OpenVPN AirVPN" of new directives, never supported before by OpenVPN 3, as well as a brand new, rationally re-engineered class for AEAD ciphers, which currently includes both AES-GCM and ChaCha20. Development of OpenVPN 3 will go on during the next months. Here's the current status:
 



	 
 


	Eddie Android edition available languages are: Chinese (simplified), Chinese (traditional), Danish, Dutch, English, French, German, Italian, Portuguese, Spanish, Russian, Turkish.  
	Eddie for Android is free and open source software released under GPLv3. We invite you to check from independent 3rd parties lack of trackers code signatures, for example here: https://reports.exodus-privacy.eu.org/en/reports/search/org.airvpn.eddie  
	You can download Eddie Android 2.4 apk directly from our repository: https://eddie.website/repository/eddie/android/2.4/org.airvpn.eddie.apk  
	You can also download it from the Google Play Store: https://play.google.com/store/apps/details?id=org.airvpn.eddie  
	and in Amazon Appstore: https://www.amazon.com/Eddie-AirVPN-official-OpenVPN-GUI/dp/B07KTD6DH9/ref=sr_1_1?keywords=eddie+airvpn 
	 
 


	Source code is available in GitLab: https://gitlab.com/AirVPN/EddieAndroid/ 
	 
 


	How to enable ChaCha20 on the Data Channel
 


	 
	Open "Settings" view, then open "AirVPN". Locate "Encryption Algorithm", tap it and set "CHACHA20-POLY1305", then tap "OK".  
	 
 


	New in version 2.4: 
	 
 


		Updated native library to OpenVPN 3.3 AirVPN
	
	
		ChaCha20-Poly1305 support on both OpenVPN Control and Data channels
	
	
		Support by OpenVPN 3 AirVPN of ncp-disable directive integrated in the app according to the cipher suite picked by the user
	
	
		For new features complete list, please see the changelog at the bottom of this post
	

 


	Main features: 
	 



		Free and open source OpenVPN GUI based on "OpenVPN 3.3 AirVPN"
	
	
		Complete ChaCha20, AES-GCM and AES-CBC support
	
	
		The only Android application officially developed by AirVPN
	
	
		Robust, best effort prevention of traffic leaks outside the VPN tunnel
	
	
		Battery-conscious application
	
	
		Low RAM footprint
	
	
		Ergonomic and friendly interface
	
	
		Ability to start and connect the application at device boot
	
	
		Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list
	
	
		Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish
	
	
		Full integration with AirVPN
	
	
		Enhanced security thanks to locally stored encrypted data through master password
	
	
		Quick one-tap connection and smart, fully automated server selection
	
	
		Smart server selection with custom settings
	
	
		Manual server selection
	
	
		Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over
	
	
		Full Android TV compatibility including D-Pad support. Mouse emulation is not required.
	
	
		Enhancements aimed to increase accessibility and comfort to visually impaired persons
	
	
		AirVPN servers sorting options
	
	
		Customizable "Favorite" and "Forbidden" servers and countries
	
	
		OpenVPN mimetype support to import profiles from external applications
	
	
		Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN profiles
	
	
		Support for custom bootstrap servers
	
	
		Support for favorite and forbidden countries
	
	
		AirVPN broadcast messages support
	
	
		User's subscription expiration date is shown in login/connection information
	
	
		The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources
	
	
		Optional local networks access. In such case, local network devices are exempted from the VPN and can be accessed within the local devices
	
	
		Localization override. User can choose the default language and localization from one of the available ones
	
	
		Favorite and forbidden lists can be emptied with a single tap
	
	
		VPN Lock can now be disabled or enabled from settings
	
	
		VPN reconnection in case of unexpected OpenVPN disconnection. (It requires VPN Lock to be disabled)
	
	
		User can generate an OpenVPN profile for any AirVPN server or country and save it in OpenVPN profile manager
	
	
		Server scoring algorithm implementing the latest AirVPN balancing factors in order to determine the best server for quick connection
	
	
		Network name and extra information are shown along with network type
	
	
		Device network status management
	
 
Kind regards &amp; datalove 
AirVPN Staff  Changelog 2.4 (VC 26) - Release date: 30 July 2019 by ProMIND


		 [ProMIND] Production release
	
 Changelog 2.4 RC 1 (VC 25) - Release date: 26 July 2019 by ProMIND


		[ProMIND] OpenVPN 3.3 AirVPN fork synchronized to master OpenVPN branch
	
	
		[ProMIND] Native library dependencies updated to the latest releases
	
	
		[ProMIND] Minor bug fixes
	
 
ConnectAirVPNServerFragment.java

		[ProMIND] connectServer(): pendingServerConnection is now properly cleared. This prevents a double call from onAirVPNLogin event (user login + user credentials loaded from AirVPN server) in case of a pending server connection going on
	
 Changelog 2.4 beta 1 (VC 24) - Release date: 19 July 2019 by ProMIND


		[ProMIND] Updated native library to "OpenVPN 3.3 AirVPN" supporting CHACHA20-POLY1305 cipher and ncp-disable profile option (forked from OpenVPN:master 3.2 qa:d87f5bbc04)
	
	
		[ProMIND] Updated default manifest to V256
	
  
airvpn_server_listview_item.xml

		[ProMIND] added a new layout for showing server's warning_open field
	
  
AirVPNServerProvider.java

		 [ProMIND] Added cipher filter according to user settings
	
  
AirVPNServerSettingsActivity.java

		[ProMIND] Added encryption algorithm option for AirVPN servers
	
  
AirVPNServer.java

		[ProMIND] Added class members to comply to Manifest V256
	
  
AirVPNServerGroup.java

		[ProMIND] New class for manifest V256 handling
	
  
AirVPNUser.java

		[ProMIND] getOpenVPNProfile(): profile generator uses "cipher" and "ncp-disable" according to the user settings
	
	
		[ProMIND] getPasswordDialog(): soft keyboard is shown by default
	
	
		[ProMIND] loginDialog(): soft keyboard is shown by default
	
  
CipherDatabase.java

		[ProMIND] New class for manifest V256 handling
	
  
ConnectAirVPNServerFragment.java

		[ProMIND] Show a warning in yellow in case server has a warning_open status
	
	
		[ProMIND] Servers are now filtered according to selected encryption
	
	
		[ProMIND] searchDialog(): soft keyboard is shown by default
	
 
ConnectionInfoFragment.java

		[ProMIND] Added cipher name and digest to info box
	
  
OpenVPNTunnel.java

		[ProMIND] Added method getProtocolOptions()
	
  
QuickConnectFragment.java

		[ProMIND] Show user selected encryption in status box
	
  
SettingsActivity.java

		[ProMIND] Added encryption algorithm option for AirVPN servers
	
  
SettingsManager.java

		[ProMIND] Added methods getAirVPNCipher() and setAirVPNCipher()
	
  
SupportTools.java

		[ProMIND] Changed AIRVPN_SERVER_DOCUMENT_VERSION to 256
	
	
		[ProMIND] editOptionDialog(): soft keyboard is shown by default
	
  
VPN.java

		[ProMIND] Added class members cipherName and digest]]></description><pubDate>Fri, 19 Jul 2019 16:42:56 +0000</pubDate></item><item><title>OpenVPN 3 development by AirVPN</title><link><![CDATA[https://airvpn.org/forums/topic/44069-openvpn-3-development-by-airvpn/?do=findComment&comment=98548]]></link><description>Hello!  
	We are very glad to inform you that our OpenVPN 3 development is progressing swiftly. Today we implemented directive ncp-disable which was still unsupported in OpenVPN 3.  https://github.com/AirVPN/openvpn3-airvpn  
	The directive is instrumental to allow clients Data Channel cipher free selection between those available on server, when ncp-ciphers is declared on server side, and keep at the same time total backward compatibility. Since when we implemented ChaCha20-Poly1305 https://airvpn.org/forums/topic/43850-openvpn-3-development/ on OpenVPN 3 Data Channel, "ncp-disable" has become a priority to provide servers and clients with maximum flexibility.  
	We can therefore leave total freedom to clients to pick between AES-GCM, AES-CBC and ChaCha20 while preserving full backward compatibility.  
	Clients with AES-NI supporting processors will prefer AES, while clients running on CPUs without AES-NI, for example most ARM CPUs, will of course tend to prefer ChaCha20.  
	We are working hard to bring you first and foremost a new Eddie Android edition beta version to let you test ChaCha20-Poly1305 on your Android devices as soon as possible. All internal tests both with ChaCha20 and ncp-disable have been fully successful so far. Fingers crossed, maybe you will see a beta release as early as next week.  
	UPDATE: Eddie Android edition with ChaCha20 support on both Data and Control Channel is now available  https://airvpn.org/forums/topic/44201-eddie-android-edition-24-beta-1-released-chacha20-support/  https://github.com/AirVPN/openvpn3-airvpn
 


Changelog 3.3 AirVPN - Release date: 13 July 2019 by ProMIND

- [ProMIND] [2019/06/02] Forked master openvpn3 repository 3.2 (qa:d87f5bbc04)
- [ProMIND] [2019/06/06] Implemented CHACHA20-POLY1305 cipher for both control and data channels
- [ProMIND] {2019/07/10] Implemented ncp-disable profile option
  
Kind regards and datalove 
AirVPN Staff</description><pubDate>Fri, 12 Jul 2019 10:57:37 +0000</pubDate></item><item><title>Several cryptocurrencies accepted directly</title><link><![CDATA[https://airvpn.org/forums/topic/43868-several-cryptocurrencies-accepted-directly/?do=findComment&comment=98098]]></link><description>Hello!  
	On April 2018 we made an important step forward: we began to accept Bitcoin directly, through no intermediaries at all.
 


	 
 


	Today, we're very glad to announce that we are able to accept directly more cryptocurrencies. In alphabetical order: 
	 
 


		Bitcoin
	
	
		Bitcoin Cash
	
	
		Dash
	
	
		Dogecoin
	
	
		Ethereum
	
	
		Ethereum Classic
	
	
		Litecoin
	

	 
	Any intermediary acting as a payment processor is no more required.
 


	 
 


	As we wrote in 2018, we stll feel it as an additional, important step forward in privacy protection. Moreover, cutting out any intermediary is very coherent with cryptocurrencies spirit and unleashes their potential. 
	 
 


	Kind regards and datalove
 


	AirVPN Staff</description><pubDate>Tue, 02 Jul 2019 16:43:07 +0000</pubDate></item><item><title>Eddie Android Edition 2.3 released</title><link><![CDATA[https://airvpn.org/forums/topic/43867-eddie-android-edition-23-released/?do=findComment&comment=98096]]></link><description><![CDATA[Hello! 
	  
	We're glad to inform you that we have released Eddie Android edition 2.3. 
	 
 


	Eddie Android Edition 2.3 is available on the Google Play Store as well as Amazon Appstore. https://play.google.com/store/apps/details?id=org.airvpn.eddie https://www.amazon.com/Eddie-AirVPN-official-OpenVPN-GUI/dp/B07KTD6DH9
 


	﻿ 
	You can also download Eddie Android 2.3 apk directly from our repository: https://eddie.website/repository/eddie/android/2.3/org.airvpn.eddie.apk 
	 
 


	Available languages: Chinese (simplified), Chinese (traditional), Danish, Dutch, English, French, German, Italian, Portuguese, Spanish, Russian, Turkish.  
	Source is code available on GitLab: https://gitlab.com/AirVPN/EddieAndroid/  
	Eddie for Android is free and open source software released under GPLv3. We invite you to check from independent 3rd parties the lack of trackers code signatures, for example here: https://reports.exodus-privacy.eu.org/en/reports/search/org.airvpn.eddie
 


	 
 


	New in version 2.3:
 


		Disabled data backup on uninstall
	
	
		Server statistics shown in Favorite/Forbidden/Countries &amp; Servers groups
	
	
		Logout drops user credentials
	
	
		Native library updated to the latest openvpn3, lz4, mbedtls and asio commits
	
	
		Minor bug fixes
	
	
		See changelog at the end of this post for a complete list ﻿
	
 Main features:


		Free and open source OpenVPN GUI based on OpenVPN 3
	
	
		The only Android application officially developed by AirVPN
	
	
		Robust, best effort prevention of traffic leaks outside the VPN tunnel
	
	
		Battery-conscious application
	
	
		Low RAM footprint
	
	
		Ergonomic and friendly interface
	
	
		Ability to start and connect the application at device boot
	
	
		Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list
	
	
		Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish
	
	
		Full integration with AirVPN
	
	
		Enhanced security thanks to locally stored encrypted data through master password
	
	
		Quick one-tap connection and smart, fully automated server selection
	
	
		Smart server selection with custom settings
	
	
		Manual server selection
	
	
		Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over
	
	
		Full Android TV compatibility including D-Pad support. Mouse emulation is not required.
	
	
		Enhancements aimed to increase accessibility and comfort to visually impaired persons
	
	
		AirVPN servers sorting options
	
	
		Customizable "Favorite" and "Forbidden" servers and countries
	
	
		OpenVPN mimetype support to import profiles from external applications
	
	
		Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN profiles
	
	
		Support for custom bootstrap servers
	
	
		Support for favorite and forbidden countries
	
	
		AirVPN broadcast messages support
	
	
		User's subscription expiration date is shown in login/connection information
	
	
		The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources
	
	
		Optional local networks access. In such case, local network devices are exempted from the VPN and can be accessed within the local devices
	
	
		Localization override. User can choose the default language and localization from one of the available ones
	
	
		Favorite and forbidden lists can be emptied with a single tap
	
	
		VPN Lock can now be disabled or enabled from settings
	
	
		VPN reconnection in case of unexpected OpenVPN disconnection. (It requires VPN Lock to be disabled)
	
	
		User can generate an OpenVPN profile for any AirVPN server or country and save it in OpenVPN profile manager
	
	
		Server scoring algorithm implementing the latest AirVPN balancing factors in order to determine the best server for quick connection
	
	
		Network name and extra information are shown along with network type
	
	
		Device network status management
	
 
Kind regards &amp; datalove 
AirVPN Staff  Complete changelog available here: https://gitlab.com/AirVPN/EddieAndroid/blob/master/ChangeLog.txt  Changelog 2.3 (VC 23) - Release date: 02 July 2019 by ProMIND  
[ProMIND] 
- Updated default manifest 
- Updated native library 
- AES-256-GCM is now the default cipher 
- Language override reported to the log 
- Improved connection error handling 
- Added statistics in server tab 
- Minor bug fixes  Changelog 2.3 beta 2 (VC 22) - Release date: 27 June 2019 by ProMIND  
- [ProMIND] About page and webview function now point to https://airvpn.org 
- [ProMIND] Updated native library with the latest sub-project branches and releases  
AirVPNUser.java 
- [ProMIND] getOpenVPNProfile(): AES-256-GCM is now the default cipher  
MainActivity.java 
- [ProMIND] Language override is reported to the application log  
OpenVPNTunnel.java 
- [ProMIND] improved connection error handling 
- [ProMIND] removed doRun() method. Method's body moved to run()  
VPN.java 
- [ProMIND] Added CONNECTION_ERROR to Status enum  
VPNService.java 
- [ProMIND] Added method handleConnectionError()  Changelog 2.3 beta 1 (VC 21) - Release date: 17 May 2019 by ProMIND  
AndroidManifest.xml 
- [ProMIND] set android:allowBackup and android:fullBackupOnly to false  
airvpn_server_listview_group_item.xml 
- [ProMIND] added server statistics layout  
ConnectAirVPNServerFragment.java 
- [ProMIND] AirVPNServerExpandableListAdapter.GroupListViewHolder: added server statistics items 
- [ProMIND] AirVPNServerExpandableListAdapter.getGroupView(): added server statistics items to HEADER and GROUP types 
- [ProMIND] createGroupList(): compute server statistics for HEADER and GROUP types  
AirVPNUser.java 
- [ProMIND] getUserLocation(): set connection timeout to SupportTools.HTTP_CONNECTION_TIMEOUT 
- [ProMIND] getUserLocation(): set read timeout to SupportTools.HTTP_READ_TIMEOUT 
- [ProMIND] logout(): user name, password and current profile are set to empty and forgetAirVPNCredentials() is called   
native library 
- [ProMIND] updated to the latest openvpn3, lz4, mbedtls and asio commits  
manifest.xml 
- [ProMIND] updated to the latest document]]></description><pubDate>Tue, 02 Jul 2019 15:47:23 +0000</pubDate></item><item><title>OpenVPN 3 development</title><link><![CDATA[https://airvpn.org/forums/topic/43850-openvpn-3-development/?do=findComment&comment=98056]]></link><description>Hello!  
	We're very glad to inform you that AirVPN has begun to actively contribute to OpenVPN 3 development.  
	Our first goal has been adding support for ChaCha20 cipher with Poly1305 as authenticator on OpenVPN 3 Data Channel.  
	ChaCha20 is a stream cipher developed by Daniel J. Bernstein which combines strength and remarkable performance. https://en.wikipedia.org/wiki/Salsa20#ChaCha20_adoption  
	When compared with AES-GCM, ChaCha20 offers significant computational relief to all AES-NI non supporting processors, such as ARM processors.  
	ARM processors, routinely used on very many tablets, smart phones, media centers, smart TVs and routers, will get great benefits from OpenVPN with ChaCha20. Our tests show that CPU load caused by ChaCha20 on recent ARM 64 bit processors is at least 50% less than AES-256-GCM, on equal terms, which translates into dramatic performance boost and longer battery life (if you have ever tested Wireguard on an ARM based device you know what we mean).  
	OpenVPN 3 is a client library. However, OpenVPN 2.5, which is currently in beta testing and includes all the necessary servers features, supports ChaCha20 on the Data Channel. Therefore, making OpenVPN 3 with ChaCha20 available to our users and allowing a real life test will be a matter of days. We will progressively release beta clients for Android, Linux, OpenBSD and FreeBSD, in this order. We are considering a porting to OpenIndiana as well.  
	Internal alpha testing has concluded successfully. We have already pulled a merge request to OpenVPN 3 main branch, to let the whole community take advantages from our code, and let OpenVPN developers merge the new code into the main branch if they wish so. https://github.com/OpenVPN/openvpn3/pull/78  
	Implementation has been designed, developed and programmed for AirVPN by ProMIND, who is also Eddie Android edition developer.  
	Stay tuned, more will come!  UPDATE: https://airvpn.org/forums/topic/44069-openvpn-3-development-by-airvpn/  
	The above linked topic is now the central thread to discuss anything related to OpenVPN 3 development and testing.  
	Kind regards and datalove 
	AirVPN Staff</description><pubDate>Mon, 01 Jul 2019 16:42:40 +0000</pubDate></item><item><title>New 1 Gbit/s server available (BR)</title><link><![CDATA[https://airvpn.org/forums/topic/43819-new-1-gbits-server-available-br/?do=findComment&comment=97980]]></link><description><![CDATA[Hello!  
	We're very glad to inform you that a new 1 Gbit/s server located in São Paulo, BR, is available: Lalande.
 


	 
	The AirVPN client will show automatically the new server. If you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator").  
	The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.  
	Just like every other "second generation" Air server, Lalande supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.  
	Full IPv6 support is included as well.  
	As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.  
	You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/lalande  
	Do not hesitate to contact us for any information or issue.  
	Kind regards and datalove 
	AirVPN Team]]></description><pubDate>Sat, 29 Jun 2019 18:28:49 +0000</pubDate></item><item><title>Eddie Android Edition 2.3 beta 2 released</title><link><![CDATA[https://airvpn.org/forums/topic/43784-eddie-android-edition-23-beta-2-released/?do=findComment&comment=97887]]></link><description><![CDATA[Hello! 
	  
	We're glad to inform you that we are finalizing the beta testing phase of our free and open source software Eddie for Android version 2.3.  
	You can participate to testing by joining the beta community in the Google Play Store here: https://play.google.com/apps/testing/org.airvpn.eddie 
	  
	You can also download the Eddie Android 2.3 beta 2 apk directly from our repository: https://eddie.website/repository/eddie/android/2.3beta2/org.airvpn.eddie.apk 
	  
	The application is fully localized and we look for translators, especially for translations into Japanese, Korean and other languages. If you wish to translate (from English) please contact info@airvpn.org for every detail.
 


	 
 


	Available languages: Chinese (simplified), Chinese (traditional), Danish, Dutch, English, French, German, Italian, Portuguese, Spanish, Russian, Turkish.  
	Eddie for Android is free and open source software released under GPLv3. We invite you to check from independent 3rd parties the lack of trackers code signatures, for example here: https://reports.exodus-privacy.eu.org/en/reports/search/org.airvpn.eddie
 


	 
 


	New in version 2.3:
 


		Disabled data backup on uninstall
	
	
		Server statistics shown in Favorite/Forbidden/Countries &amp; Servers groups
	
	
		Logout drops user credentials
	
	
		Native library updated to the latest openvpn3, lz4, mbedtls and asio commits
	
	
		Minor bug fixes
	
	
		See changelog at the end of this post for a complete list
	
 Main features:


		Free and open source OpenVPN GUI based on OpenVPN 3
	
	
		The only Android application officially developed by AirVPN
	
	
		Robust, best effort prevention of traffic leaks outside the VPN tunnel
	
	
		Battery-conscious application
	
	
		Low RAM footprint
	
	
		Ergonomic and friendly interface
	
	
		Ability to start and connect the application at device boot
	
	
		Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list
	
	
		Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish
	
	
		Full integration with AirVPN
	
	
		Enhanced security thanks to locally stored encrypted data through master password
	
	
		Quick one-tap connection and smart, fully automated server selection
	
	
		Smart server selection with custom settings
	
	
		Manual server selection
	
	
		Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over
	
	
		Full Android TV compatibility including D-Pad support. Mouse emulation is not required.
	
	
		Enhancements aimed to increase accessibility and comfort to visually impaired persons
	
	
		AirVPN servers sorting options
	
	
		Customizable "Favorite" and "Forbidden" servers and countries
	
	
		OpenVPN mimetype support to import profiles from external applications
	
	
		Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN profiles
	
	
		Support for custom bootstrap servers
	
	
		Support for favorite and forbidden countries
	
	
		AirVPN broadcast messages support
	
	
		User's subscription expiration date is shown in login/connection information
	
	
		The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources
	
	
		Optional local networks access. In such case, local network devices are exempted from the VPN and can be accessed within the local devices
	
	
		Localization override. User can choose the default language and localization from one of the available ones
	
	
		Favorite and forbidden lists can be emptied with a single tap
	
	
		VPN Lock can now be disabled or enabled from settings
	
	
		VPN reconnection in case of unexpected OpenVPN disconnection. (It requires VPN Lock to be disabled)
	
	
		User can generate an OpenVPN profile for any AirVPN server or country and save it in OpenVPN profile manager
	
	
		Server scoring algorithm implementing the latest AirVPN balancing factors in order to determine the best server for quick connection
	
	
		Network name and extra information are shown along with network type
	
	
		Device network status management
	
 
Kind regards &amp; datalove 
AirVPN Staff  Changelog 2.3 beta 2 (VC 22) - Release date: 27 June 2019 by ProMIND  
- [ProMIND] About page and webview function now point to https://airvpn.org 
- [ProMIND] Updated native library with the latest sub-project branches and releases  
AirVPNUser.java 
- [ProMIND] getOpenVPNProfile(): AES-256-GCM is now the default cipher  
MainActivity.java 
- [ProMIND] Language override is reported to the application log  
OpenVPNTunnel.java 
- [ProMIND] improved connection error handling 
- [ProMIND] removed doRun() method. Method's body moved to run()  
VPN.java 
- [ProMIND] Added CONNECTION_ERROR to Status enum  
VPNService.java 
- [ProMIND] Added method handleConnectionError()  Changelog 2.3 beta 1 (VC 21) - Release date: 17 May 2019 by ProMIND  
AndroidManifest.xml 
- [ProMIND] set android:allowBackup and android:fullBackupOnly to false  
airvpn_server_listview_group_item.xml 
- [ProMIND] added server statistics layout  
ConnectAirVPNServerFragment.java 
- [ProMIND] AirVPNServerExpandableListAdapter.GroupListViewHolder: added server statistics items 
- [ProMIND] AirVPNServerExpandableListAdapter.getGroupView(): added server statistics items to HEADER and GROUP types 
- [ProMIND] createGroupList(): compute server statistics for HEADER and GROUP types  
AirVPNUser.java 
- [ProMIND] getUserLocation(): set connection timeout to SupportTools.HTTP_CONNECTION_TIMEOUT 
- [ProMIND] getUserLocation(): set read timeout to SupportTools.HTTP_READ_TIMEOUT 
- [ProMIND] logout(): user name, password and current profile are set to empty and forgetAirVPNCredentials() is called   
native library 
- [ProMIND] updated to the latest openvpn3, lz4, mbedtls and asio commits  
manifest.xml 
- [ProMIND] updated to the latest document]]></description><pubDate>Thu, 27 Jun 2019 13:53:46 +0000</pubDate></item><item><title>Transparency reports on AirVPN mission</title><link><![CDATA[https://airvpn.org/forums/topic/42478-transparency-reports-on-airvpn-mission/?do=findComment&comment=95771]]></link><description>Hello!  
	We are starting to publish "transparency mission reports" to add information and clarifications about the reasons of our support to projects, persons and NGOs. While the organic summary, as well as the mission statements, remains in https://airvpn.org/mission page, the reports will provide important explanations and insights.  
	Our first report, covering the first five 2019 months, has just been published here:
 



	  
	Kind regards and datalove 
	AirVPN Staff</description><pubDate>Wed, 29 May 2019 23:50:35 +0000</pubDate></item><item><title>AirVPN 9th birthday celebrations and reflections</title><link><![CDATA[https://airvpn.org/forums/topic/42322-airvpn-9th-birthday-celebrations-and-reflections/?do=findComment&comment=95520]]></link><description>Hello!  
	Today we're starting AirVPN ninth birthday celebrations! 
	  
	From a two servers service located in a single country providing a handful of Mbit/s, the baby has grown up to a wide infrastructure in 22 countries in three continents, providing now 230,000+ Mbit/s to tens of thousands of people around the world.  
	Software related development has also been powered up. Eddie Android edition is now a fully mature application which features an exclusive best effort method to prevent traffic leaks and a complete integration with AirVPN. 
	 
 


	In 2019 AirVPN has also started operating in South America, on top of Asia, Europe and North America, and the infrastructure has grown significantly, counting now on more than 260 bare metal servers, whose traffic is mainly powered by tier1 and tier2 transit providers. AirVPN has also become recently an EFF "Super Major Donor" member.  
	Furthermore, and we're very glad to announce it here publicly for the first time, development for OpenBSD and FreeBSD has started. We are also integrating OpenVPN 3 on new software which will couple Eddie on UNIX-like systems, including Linux, during the second half of 2019.  GDPR compliance was already a de facto standard for AirVPN way before the Regulation entered into force, mainly because we don't collect personal data, period. By the way the compliance is now fully formalized (check details in our Privacy Notice and Terms https://airvpn.org/privacy ). AirVPN provides probably the strongest protection to your data, not only personal data but all data, you can find on any service.   
	If you are an AirVPN customer or user, you are probably aware that our service is radically different than any other VPN service you might have met anywhere. No whistles and bells, no marketing fluff, no fake locations, no advertising on mainstream media, a transparent privacy policy, no trackers on the web site or in mobile applications, no bullshit of any kind in our infrastructure to sell your personal data to any personal data merchant, and above all a clear mission which is the very reason which AirVPN operates for. https://airvpn.org/mission  
	Many of you know that when you buy AirVPN service, you not only support yourself and improve your ability to exercise your fundamental rights, but you also support AirVPN mission.  
	However, while AirVPN in itself has flourished, AirVPN mission aims and values related to fundamental rights have experienced, in 2018 and 2019, a grim time. 
	 
 


		Australia "encryption-busting" monstrous law is fully in force;
	
	
		the European Union has definitively approved the bad Copyright Directive, mandating automated filters, which will unavoidably limit freedom of expression on big boards, and making the first step to undermine the liability exemptions of mere conduits and web publishers alike;
	
	
		new threats to citizens' privacy are becoming real through plans of wide face recognition deployment, indiscriminate DNA databases proposals, more pervasive and efficient profiling (possibly even through AI), and strict cooperation between Internet tech giants and intelligence agencies;
	
	
		the persecution of journalists, publishers and whistleblowers all around the world has reached unprecedented levels, revealing a widespread plan to suppress freedom of the press and freedom of expression even in so called "Western democracies".
	
 
One of the greatest journalists and publishers of all times, Julian Assange, nominated seven times for the Nobel Peace prize and winner of many journalistic prizes and awards, has been and is prosecuted and persecuted for having merely published the truth about war crimes, corruption, torture and more, with a 100% accuracy, and for having protected his sources as any good investigative journalist does.  
He has been detained arbitrarily and illegally, as widely ascertained and recognized by the UN. He has been victim of an abominable smear campaign based on ignominious lies and defamation, a campaign aimed to turn the public opinion against him and distract from WikiLeaks publications content exposing war criminals in governments key positions, warmongers, torture maniacs, systematic illegal surveillance, endemic privacy violations and plots to limit and reduce fundamental rights. He is currently detained in solitary confinement 23 hours a day, with no access to books, maximum two visits per month, forbidden in practice to coordinate a defense with his lawyers, in a tiny cell of a maximum security UK prison which has been designed for dangerous murderers and terrorists, while UK will decide whether to extradite him to the USA to face a potential 175 years imprisonment.  
Whistleblowers like Chelsea Manning, who should be regarded as a hero, as Noam Chomsky, John Pilger, Daniel Ellsberg and other titans of our times pointed out, have been tortured and are still persecuted by the very same criminals whose crimes were exposed.  
Privacy activists and software developers, like Ola Bini in Ecuador, are imprisoned without charges, simply for having showed friendship to Assange or WikiLeaks, or for having developed software aimed to protect privacy through encryption.  
And the list can go on and on and on.  
But make no mistake: the dark times we are living in, the environment of fear and intimidation that various governments are building against the exercise of those fundamental rights which our mission forces us to protect to the best of our abilities, the mounting attacks against "encryption for everyone" and the awareness that enemies of human rights nestle inside government agencies, have not undermined our determination. Quite the opposite: they have convinced us that our service is even more necessary now and we are resolute to do even more. 
 

	Our mission has been and will be empowered by the ongoing support to projects and NGOs which aim to the protection of privacy, personal data and freedom of expression, now more than ever. We have confirmed our support to Tor and we will progressively add support to champions of freedom of expression and privacy in any way our capacities and abilities will allow us. 
	  
	If you're curious to know something about a series of fortunate events which gave birth to AirVPN, have a look here: https://airvpn.org/aboutus  
	To worthily celebrate AirVPN ninth birthday, we're glad to inform you that starting from now we will offer a 20% discount on all long term plans. Hurry up, this special offer will end on June the 11th, 23:59:59 UTC! Check the new prices here.  
	Kind regards and datalove 
	AirVPN Staff</description><pubDate>Mon, 27 May 2019 21:26:29 +0000</pubDate></item><item><title>TLS 1.3 supported on AirVPN web servers</title><link><![CDATA[https://airvpn.org/forums/topic/42309-tls-13-supported-on-airvpn-web-servers/?do=findComment&comment=95497]]></link><description>Hello!  
We're very glad to inform you that TLS 1.3 is now supported on all AirVPN web servers.  
Why TLS 1.3 is better than 1.2: https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3  
TLS 1.0, 1.1 and 1.2 will still be available for backward compatibility.  
Kind regards and datalove 
AirVPN Staff</description><pubDate>Mon, 27 May 2019 16:44:30 +0000</pubDate></item><item><title>Twelve new 1 Gbit/s servers available (NL)</title><link><![CDATA[https://airvpn.org/forums/topic/41679-twelve-new-1-gbits-servers-available-nl/?do=findComment&comment=94727]]></link><description><![CDATA[Hello!  
		We're very glad to inform you that twelve new 1 Gbit/s servers located in Alblasserdam (Netherlands) are available: Aljanah, Alpheratz, Aspidiske, Capella, Eltanin, Larawag, Melnick, Muhlifain, Piscium, Scuti, Suhail, Tiaki.  
		The AirVPN client will show automatically the new servers. If you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator").  
		The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.  
		Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. 
		  Full IPv6 support is included as well.  
		As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.  
		Do not hesitate to contact us for any information or issue.  
		Kind regards and datalove 
		AirVPN Team]]></description><pubDate>Tue, 21 May 2019 21:25:33 +0000</pubDate></item><item><title>Eddie Android Edition 2.3 beta 1 released</title><link><![CDATA[https://airvpn.org/forums/topic/41337-eddie-android-edition-23-beta-1-released/?do=findComment&comment=94312]]></link><description><![CDATA[Hello! 
	  
	We're glad to inform you that we are opening the beta testing phase of our free and open source software Eddie for Android version 2.3.  
	You can participate to the beta testing by joining the beta community in the Google Play Store here: https://play.google.com/apps/testing/org.airvpn.eddie 
	  
	You can also download the Eddie Android 2.2 beta 1 apk directly from our repository: https://eddie.website/repository/eddie/android/2.3beta1/org.airvpn.eddie.apk 
	  
	The application is fully localized and we look for translators, especially for translations into Japanese, Korean and other languages. If you wish to translate (from English) please contact info@airvpn.org for every detail.
 


	 
 


	Available languages: Chinese (simplified), Chinese (traditional), Danish, Dutch, English, French, German, Italian, Portuguese, Spanish, Russian, Turkish.  
	Eddie for Android is free and open source software released under GPLv3. We invite you to check from independent 3rd parties the lack of trackers code signatures, for example here: https://reports.exodus-privacy.eu.org/en/reports/search/org.airvpn.eddie
 


	 
 


	New in version 2.3:
 


		Disabled data backup on uninstall
	
	
		Server statistics shown in Favorite/Forbidden/Countries &amp; Servers groups
	
	
		Logout drops user credentials
	
	
		Native library updated to the latest openvpn3, lz4, mbedtls and asio commits
	
	
		Minor bug fixes
	
 Main features:


		Free and open source OpenVPN GUI based on OpenVPN 3
	
	
		The only Android application officially developed by AirVPN
	
	
		Robust, best effort prevention of traffic leaks outside the VPN tunnel
	
	
		Battery-conscious application
	
	
		Low RAM footprint
	
	
		Ergonomic and friendly interface
	
	
		Ability to start and connect the application at device boot
	
	
		Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list
	
	
		Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish
	
	
		Full integration with AirVPN
	
	
		Enhanced security thanks to locally stored encrypted data through master password
	
	
		Quick one-tap connection and smart, fully automated server selection
	
	
		Smart server selection with custom settings
	
	
		Manual server selection
	
	
		Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over
	
	
		Full Android TV compatibility including D-Pad support. Mouse emulation is not required.
	
	
		Enhancements aimed to increase accessibility and comfort to visually impaired persons
	
	
		AirVPN servers sorting options
	
	
		Customizable "Favorite" and "Forbidden" servers and countries
	
	
		OpenVPN mimetype support to import profiles from external applications
	
	
		Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN profiles
	
	
		Support for custom bootstrap servers
	
	
		Support for favorite and forbidden countries
	
	
		AirVPN broadcast messages support
	
	
		User's subscription expiration date is shown in login/connection information
	
	
		The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources
	
	
		Optional local networks access. In such case, local network devices are exempted from the VPN and can be accessed within the local devices
	
	
		Localization override. User can choose the default language and localization from one of the available ones
	
	
		Favorite and forbidden lists can be emptied with a single tap
	
	
		VPN Lock can now be disabled or enabled from settings
	
	
		VPN reconnection in case of unexpected OpenVPN disconnection. (It requires VPN Lock to be disabled)
	
	
		User can generate an OpenVPN profile for any AirVPN server or country and save it in OpenVPN profile manager
	
	
		Server scoring algorithm implementing the latest AirVPN balancing factors in order to determine the best server for quick connection
	
	
		Network name and extra information are shown along with network type
	
	
		Device network status management
	
  Changelog 2.3 beta 1 (VC 21) - Release date: 17 May 2019 by ProMIND  
AndroidManifest.xml  
- [ProMIND] set android:allowBackup and android:fullBackupOnly to false   
airvpn_server_listview_group_item.xml  
- [ProMIND] added server statistics layout   
ConnectAirVPNServerFragment.java  
- [ProMIND] AirVPNServerExpandableListAdapter.GroupListViewHolder: added server statistics items 
- [ProMIND] AirVPNServerExpandableListAdapter.getGroupView(): added server statistics items to HEADER and GROUP types 
- [ProMIND] createGroupList(): compute server statistics for HEADER and GROUP types   
AirVPNUser.java  
- [ProMIND] getUserLocation(): set connection timeout to SupportTools.HTTP_CONNECTION_TIMEOUT 
- [ProMIND] getUserLocation(): set read timeout to SupportTools.HTTP_READ_TIMEOUT 
- [ProMIND] logout(): user name, password and current profile are set to empty and forgetAirVPNCredentials() is called   
native library  
- [ProMIND] updated to the latest openvpn3, lz4, mbedtls and asio commits   
manifest.xml  
- [ProMIND] updated to the latest document   
Complete changelog for stable release 2.2: https://gitlab.com/AirVPN/EddieAndroid/blob/master/ChangeLog.txt  
Kind regards and datalove 
AirVPN Staff]]></description><pubDate>Sat, 18 May 2019 16:56:55 +0000</pubDate></item><item><title>Five new 1 Gbit/s servers available (DE)</title><link><![CDATA[https://airvpn.org/forums/topic/39758-five-new-1-gbits-servers-available-de/?do=findComment&comment=92687]]></link><description><![CDATA[Hello!  
		We're very glad to inform you that five new 1 Gbit/s servers located in Frankfurt (Germany) are available: Alsephina, Dubhe, Menkalinan, Mirfak, Mirzam.  
		The AirVPN client will show automatically the new servers. If you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator").  
		The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.  
		Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. 
		  Full IPv6 support is included as well.  
		As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.  
		Do not hesitate to contact us for any information or issue.  
		Kind regards and datalove 
		AirVPN Team]]></description><pubDate>Thu, 16 May 2019 21:01:12 +0000</pubDate></item><item><title>New Country: Serbia (RS) - New 1 Gbit/s server available</title><link><![CDATA[https://airvpn.org/forums/topic/37007-new-country-serbia-rs-new-1-gbits-server-available/?do=findComment&comment=89851]]></link><description><![CDATA[Hello!  
	We're very glad to inform you that a new 1 Gbit/s server located in Belgrade (RS) is available: Alnitak.  
	The AirVPN client will show automatically the new server. If you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator").  
	The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.  
	Just like every other "second generation" Air server, Alnitak supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.  
	Full IPv6 support is included as well.  
	As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.  
	You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Alnitak  
	Do not hesitate to contact us for any information or issue.  
	Kind regards and datalove 
	AirVPN Team]]></description><pubDate>Tue, 14 May 2019 15:49:02 +0000</pubDate></item><item><title>Chicago servers will change IP addresses</title><link><![CDATA[https://airvpn.org/forums/topic/34143-chicago-servers-will-change-ip-addresses/?do=findComment&comment=85880]]></link><description>Hello!  
	We inform you that the following Chicago servers need to be re-located to a different section of their Chicago datacenter:
 


		Alkaid
	
	
		Microscopium
	
	
		Pavonis
	
 
A change of IPv4 and IPv6 addresses is necessary. We will use the migration as chance for a complete machines upgrade. Impact will therefore be minimal: we expect to bring up the new machines when we turn off the previous ones almost simultaneously, so just a single disconnection will affect the clients connected to those servers.  Users running Eddie will need to re-download servers information (Eddie does that periodically but you can force it to do it immediately), while users not running Eddie will necessarily need to re-download configuration files.  
Planned disconnection will occur on April the 26th, 2019, 13:00 UTC  
Kind regards and datalove 
AirVPN Staff</description><pubDate>Thu, 25 Apr 2019 13:03:08 +0000</pubDate></item><item><title>AirVPN supports Mastodon</title><link><![CDATA[https://airvpn.org/forums/topic/34087-airvpn-supports-mastodon/?do=findComment&comment=85791]]></link><description>Hello!  
We are glad to inform you that we support Mastodon as "Platinum" donors. Mastodon is an online, self-hosted, federated, community owned and ad-free social media and social networking service https://joinmastodon.org  
Check our mission page: https://airvpn.org/mission  
Kind regards and datalove 
AirVPN Staff</description><pubDate>Thu, 25 Apr 2019 00:22:50 +0000</pubDate></item><item><title>AirVPN supports Johnstone's journalistic work</title><link><![CDATA[https://airvpn.org/forums/topic/34083-airvpn-supports-johnstones-journalistic-work/?do=findComment&comment=85786]]></link><description>Hello!  
	We're glad to inform you that we support the journalistic work of Caitlin Johnstone, "rogue journalist". Her journalistic work is entirely supported by her readers. Her articles are not copyrighted and she gives unconditional permissions to republish them or part of them free of charge.  https://caitlinjohnstone.com  
	Check our mission page: https://airvpn.org/mission  
	Kind regards and datalove 
	AirVPN Staff</description><pubDate>Thu, 25 Apr 2019 00:06:18 +0000</pubDate></item><item><title>AirVPN delivers contributions to Manning's legal fund</title><link><![CDATA[https://airvpn.org/forums/topic/34081-airvpn-delivers-contributions-to-mannings-legal-fund/?do=findComment&comment=85784]]></link><description>Hello!  
	We inform you that we have started contributions to Chelsea Manning's legal fund. We are proud to contribute to it but not "glad", meaning that in a really democratic and free country Chelsea Manning would not be detained indefinitely for her refusal to testify before a grand-jury (*) in matters that she exhaustively treated before a court martial, and would not need a legal fund at all by now.  
	(*) A grand jury means that the public is not allowed entry: the hearings are held in secret   
	She disclosed nearly 750,000 military and diplomatic documents to WikiLeaks revealing, amongst many other things, war crimes.  I will not participate in a secret process that I morally object to, particularly one that has been used to entrap and persecute activists for protected political speech. 
	                                                                                                                                                                                                      Chelsea Manning  Manning should be regarded as a hero. [...] doing what an honest, decent citizen should be doing: letting your population know what the government, the people who rule you are doing. They want to keep it secret of course. 
	                                                                                                                                                                                                      Noam Chomsky
 


	 Action Network page for Manning's legal fund donations:
 


	https://actionnetwork.org/fundraising/chelsea-manning-needs-legal-funds-to-resist-a-grand-jury-subpoena
 


	 
 


	 
	Check our mission page: https://airvpn.org/mission    
	Kind regards and datalove 
	AirVPN Staff</description><pubDate>Wed, 24 Apr 2019 23:58:33 +0000</pubDate></item><item><title>AirVPN becomes an EFF Super Major Donor</title><link><![CDATA[https://airvpn.org/forums/topic/34080-airvpn-becomes-an-eff-super-major-donor/?do=findComment&comment=85783]]></link><description>Hello!  
We proudly announce that today AirVPN has become an Electronic Frontier Foundation "Super Major Donor".  The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows. https://www.eff.org  
Check our mission page: https://airvpn.org/mission  
Kind regards and datalove 
AirVPN Staff</description><pubDate>Wed, 24 Apr 2019 23:42:45 +0000</pubDate></item><item><title>New 1 Gbit/s server available (UK)</title><link><![CDATA[https://airvpn.org/forums/topic/33384-new-1-gbits-server-available-uk/?do=findComment&comment=84676]]></link><description><![CDATA[Hello!  
	We're very glad to inform you that a new 1 Gbit/s server located in London, UK, is available: Geminorum.  
	The AirVPN client will show automatically the new server. If you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"-&gt;"Config generator").  
	The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.  
	Just like every other "second generation" Air server, Geminorum supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.  
	Full IPv6 support is included as well.  
	As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.  
	You can check the server status as usual in our real time servers monitor:
 


	https://airvpn.org/servers/geminorum
 


	 
 


	Geminorum replaces Bellatrix.  
	Do not hesitate to contact us for any information or issue.  
	Kind regards and datalove 
	AirVPN Team]]></description><pubDate>Thu, 18 Apr 2019 13:16:14 +0000</pubDate></item></channel></rss>
