Search the Community
Showing results for 'china'.
Found 490 results
-
Thank you Staff. I already use 3.3.0 on android and it works flawlessly using wireguard protocol. Never even a flinch its perfect. Since I am not really dealing with country firewalls like China I don't know if amnezia wireguard would add anything to my scenario. I don't need it for now but since I am redoing my setup I figured why not --- however as you quoted using a "beta" might create ongoing issues for me. Community: The real issue is I won't use openvpn because my Wireguard is over twice as fast and is flawless. However; I am stuck with openvpn on my router until I switch it out. It is not a model that openwrt supports at all and the mfg has stated it won't update to wireguard vpn on this router. Boooo! So is there a way to wireguard walking around with my Android and yet somehow use an app to openvpn into my router like I do now using the router certificate? Can't visualize how to quite do this short of manually logging in and out all the time, but I prefer to setup an automatic handshake and keep life simple. Maybe split tunneling where I VPN Android Eddie wireguard for everything (excluding the router app) and then have the router app OFF vpn (split tunnel option). In this fashion I could then manually connect to LAN since the app is outside of the Wireguard VPN tunnel and openvpn would still function well just slower than wireguard ever is. BUT - then how if at all to automate this process when I leave the house and wifi drops going back to data use?
-
Hello! Interesting thread indeed, thank you. Our position is close to the EFF position you can read here: https://www.eff.org/deeplinks/2025/08/no-uks-online-safety-act-doesnt-make-children-safer-online We will keep you informed. So far, you probably know well our approach with similar, lower or higher requests from Russia, China and a few other countries, and there's no plan at the moment to change our position. In general, we think that it is impossible that those persons who advance, propose or defend such dangerous laws in so called democracies are in good faith (except in peculiar cases where they suffer from some mental illness or carry a neurological deficit). They have an hidden agenda developed on the myth of pervasive control but more importantly fueled by monetary reward. Yes, that's a motivational reason, maybe almost as strong as monetary reward and votes. Moreover, there is a real possibility that such laws lead on the short run to an increase in support (and therefore votes) which, net of dissent, is positive, even though by tiny tenths of percentage which are anyway not negligible for an embarrassingly inept ruling class that's incapable of developing serious strategies to improve the life of teenagers and children. Their total failure is proven by the official data (England and Whales police records in this case) that show a dramatic rise of sexual offenses against children in the UK in the last 5 years in spite of (and someone could even argue because of) more and more laws allegedly thought to protect children. Where does this 0.1% come from? If you want to stay real please adjust this quota (since 2025, start multiplying that percentage by 250 to begin with). Furthermore, there's no money involved to use Tor, its usage is totally free and well beyond Ofcom abilities to control it. However, it's true that people may find it boring because it's like 10 times slower than a VPN with a decent infrastructure. It would indeed. However, we seriously doubt that the ramshackle British institutions, always short of funds, can surpass the GFW designers and maintainers in efficiency, competence and grandeur of operation. And note that the GFW is routinely bypassed nowadays by the most and least skilled to connect to a wide range of VPNs. Our aggregate data show that this claim is deeply incorrect, at least for AirVPN, if we consider p2p improper usage quantified by DMCA and other warnings. It's not the majority, on the contrary it is a tiny minority. Where does this assumption come from? We would like to assess official stats to compare them with what we gather on the field. Kind regards
-
Sure, in order to protect kids China / Iran / Russia style enforcement is required. 🙄 Because nothing screams “online safety” like forcing teenagers roam the internet without a VPN. What could possibly go wrong? It’s not like tracking, data harvesting, or privacy breaches are a thing.
-
Hey there, Taiwan is a provincial administrative region of China, an inalienable part of China’s territory. But when I checked my IP on ipleak.net, I saw Taiwan was shown with those outdated flags, which is totally wrong. These flags don’t reflect the fact that Taiwan belongs to China. Using them misrepresents Taiwan’s status and goes against the One - China principle. It’s really important to fix this mistake. Please correct the display and stop using such wrong flags. Let’s make sure the info about Taiwan is right, in line with the One - China principle. Thanks for handling this!
-
Hello! Not anymore, and even less in the near future. HTTP/3 is quickly spreading. Today, HTTP/3 is used by 36.5% of all the websites, including major web sites inside countries that enforce blocks against VPN. Furthemore, blocking UDP as such is no more realistic, not even in China, where UDP has become an instrumental protocol for many companies in any sector (video streaming, video conference, VoIP, marketing, social media marketing, regime propaganda and more), for regime aligned or regime owned activities. In China you have a near 100% success rate and no shaping (apart from the normal shaping for anything outside China) with the current Amnezia "weak obfuscation" (no CPS) implementation, i.e. at the moment you don't even need QUIC mimicking (which is anyway available and very effective). Currently, bypassing blocks via UDP than via TCP is more efficient in China. At the moment there is nothing more effective than mimicking QUIC with the signature / fingerprint of an existing web site that's not blocked, and you have this option right now. We see > 95% success rate, which is better than the success rates of SSH (not exceeding 75%), shadowsocks and XRay, V2Ray etc (but a lot faster!). The success rate is similar to any VPN protocol over HTTP/2, but, again, dramatically faster. We're glad to know it. It is also very flexible. Thanks to CPS, you may mimic any transport layer protocol built on UDP, for example DNS, QUIC, SIP. Kind regards
-
With the AmneziaWG protocol, the obfuscation capability at the UDP layer is greatly improved, but what about at the TCP layer? Other countries may completely block the UDP protocol, making it impossible for AmneziaWG to connect. In that case, they can only connect via the TCP protocol. Currently, AirVPN only has early obfuscation solutions such as SSH and SSL for TCP obfuscation. In China's IPv4 environment, SSH and SSL are fully recognized, rate-limited, and blocked. This means that AirVPN's TCP-level obfuscation performance is relatively poor. I think the next step for AirVPN could be to focus on TCP obfuscation. X-ray, Shadowsocks, and V2Ray are all protocols with high levels of obfuscation. You could choose one of these protocols to make an outer proxy for OpenVPN TCP to enhance the obfuscation capabilities at the TCP layer. I know that AirVPN's strongest shield against TCP is the pluggable bridges developed by the Tor team. However, Tor is blocked in China at a much higher level than SSH and SSL (because the dark web is hidden within the Tor network). The newly developed WebTunnel is unlikely to survive more than three months in China. Blocking Tor isn't about identifying the bridge protocol; it's about blocking Tor-related domains, node IPs, and bridge IPs, making Tor unusable in China. AirVPN might be able to utilize the obfuscated bridge protocols developed by the Tor team without using Tor nodes, using bridge protocols like WebTunnel as an outer proxy for OpenVPN TCP, directly connecting to the AirVPN server network. AirVPN may still rely on Tor for TCP protocol obfuscation in the short term, which is understandable, given that adding a new protocol to all servers would require a significant amount of time and resources. The addition of the AmneziaWG protocol is sufficient for my needs; thank you, AirVPN. However, with increasing global internet censorship and the emergence of new obfuscation protocols, switching to more modern obfuscation protocols is definitely the future trend for VPN vendors, because there will always be people in the dark side of the internet. These are all my personal opinions, thanks.
-
Well, it's the worst ISP in China.They shape everything.I suggest you should switch to other ISP such as China Telecom , China Unicom or China Mobile.You may find some cheap plans on the RedNote.But BE CAREFUL. If you switch your ISP to I mentioned above, you could try these servers. China Telecom: NL , DE , US SJC , US LAX China Unicom: nearly all european servers (except IE , NO , SE) (I recommend NL , DE) , US servers in the west coast. China Mobile: JP , SG servers I recommend using OpenVPN (IP Entry 3 & UDP & Port 443),since WireGuard is too easy to be identified (run a Wireshark and you know what I mean). If you have IPv6 connection,you should use them first (unless it's too slow for you).The GFW is less aggressive on IPv6 compared to IPv4
-
Eddie Android edition 4.0.0 preview available
Staff replied to Staff's topic in News and Announcement
Hello! It could be sufficient and currently it is indeed sufficient from Russia and China, where you bypass blocks with the backward compatible H parameters. The H parameters could become in the future an additional weapon against evolving blocking techniques. Kind regards -
feature request AmneziaWG 1.5 protocol support
Staff replied to Erquint's topic in Eddie - AirVPN Client
Hello! We're glad to inform you that AmneziaWG support has been implemented in Eddie Android edition 4.0.0 beta 1 and it will be progressively implemented in all the other AirVPN software. https://airvpn.org/forums/topic/77633-eddie-android-edition-400-preview-available/ Eddie Android edition public beta testing is going very well and the development team is optimistic about a near future release. This is only partially true. When you use CPS on your side and you connect to a WireGuard based server, demultiplexers will identify the traffic according to the CPS settings (QUIC, DNS...) only initially. They will soon be able to detect the traffic as WireGuard traffic. With DNS mimicking this happens just after the handshake, while with QUIC the inspection tools need much more time. We can confirm the above after several experimental tests we repeatedly performed with deep packet inspection. Anyway QUIC mimicking is effective and actually it can nowadays bypass in about 100% of the cases the blocks in both Russia and China. But we have planned to support Amnezia on the server side too, because the current method is anyway not so strong on the long run. When we have Amnezia on the server side too, no tool is able to ever identify the traffic as WireGuard traffic: it remains indefinitely identified as QUIC. Currently we are still at a testing phase, but the outcome so far is very promising. Stay tuned! Kind regards -
Hello. It seems you are also living under the firewall. Your logs are the same as WireGuard's logs in China now, and they are identified and blocked by the firewall. Please try the advanced obfuscation options. AirVPN offers: OpenVPN over SSH, SSL, TOR and AmneziaWG. The AmneziaWG option is currently in the testing phase. For detailed usage instructions, please find tutorials on the AirVPN website. If you are using the eddie client on your computer, you can uncheck "Automatic" and select a specific obfuscated protocol in Settings - Protocols.
-
Eddie Android edition 4.0.0 preview available
EMULE replied to Staff's topic in News and Announcement
Hello. Today I installed the eddie v4.0.0 beta version on my Android phone and connected to AmneziaWG to perform a speed test. The following file is the log report. I can sense that AmneziaWG seems to have been speed-limited recently; the speed isn't as fast as when I first started using it. With CPS disabled, AmneziaWG was the slowest, with the connection speed limited to about 10KB/s for a short while before rebounding to a maximum of 500KB/s. Enabling CPS and trying QUIC emulation resulted in the fastest speed, reaching approximately 2MB/s. However, the speed was sometimes throttled to 300KB/s and as low as 10KB/s. On my most frequently used servers in Belgium and the United States, Wireguard port 1637 was usually available, whereas previously it was always unavailable on the Belgian server. When attempting DNS emulation, the speed was roughly the same as without CPS enabled. The connection was briefly throttled to 10KB/s, but after waiting, it recovered to 200KB/s, with a maximum speed of about 800KB/s. However, most of the time the speed was slower than AmneziaWG without CPS enabled. The QUIC emulation is currently performing well, and the speed may be even faster once the WireGuard server fully supports AmneziaWG, since it is currently only a test version. I'm confused as to why AmneziaWG is still being throttled. According to AmneziaVPN's advertising, shouldn't the AmneziaWG protocol be unrecognized by DPI? I suspect it's due to ISP generally limiting UDP speeds. Even when I turn off my VPN software and browse websites allowed in China, some content still buffers. However, there is no doubt that the availability of the AmneziaWG protocol is the highest among the protocols currently offered by AirVPN. SSH, SSL and other standard protocols do not perform as well as AmneziaWG in my experience. Although AmneziaWG is speed-limited, I can still browse the web, although download tasks are sometimes fast and sometimes slow. So far, I have not found any issues with AmneziaWG being blocked after the connection is established. After all, this is just a test so far. I'll wait until AmneziaWG is added to the Eddie PC version and then use it for a longer period of time to see how it goes. May everything turn out in a positive direction. Eddie_日志已创建在_14_Dec_2025_07_03_23_UTC_上.txt Eddie_日志已创建在_14_Dec_2025_07_14_52_UTC_上.txt -
Really? It's good news to know that it's not a server issue.😂 It seems the only option left is to try AmneziaWG 1.5. 😡Damn the GFW! The latest GFW has incorporated AI, greatly enhancing its ability to block VPN protocols. Fortunately, China is vigorously promoting IPv6, which allows me to catch my breath for now. The future depends on full support from the AmneziaWG protocol.🙌
-
Hello! It's available right now if you can edit the generated file. An integration with the configuration generator will require time so we suggest that you test by editing your own file (generated by the CG for WireGuard). Integration with Eddie Android edition is already available in the 4.0.0 beta version. ~100% success at the moment comes from reports from Russia and China. It would be good to have an additional report from Uzbekistan. 😋 Kind regards
-
Hello! We have a report that makes us suspect that in Uzbekistan it's the IP addresses of various VPN servers (not only AirVPN, other VPN too), to be blocked "unconditionally". Anyway AmneziaWG is worth a test, with and without QUIC mimicking, toward all the wg ports of our servers. It has an incredibly high rate of success in Russia and China (higher than OpenVPN over SSH and shadowsocks) so it's definitely worth a test. Please keep us posted as we have literally three reports only from Uzbekistan including yours... If you need some parameters to test check here: https://airvpn.org/forums/topic/77633-eddie-android-edition-400-preview-available/?do=findComment&comment=258644 and here: https://airvpn.org/forums/topic/59479-block-vpn-in-russia/?do=findComment&comment=237288 If you need some suggestions for the parameters In in order to mimic QUIC connection to some specific web site known to be not blocked in countries controlled by VPN hostile regimes, please contact our support team in private by opening a ticket. Kind regards
-
Eddie Android edition 4.0.0 preview available
EMULE replied to Staff's topic in News and Announcement
These are the AmneziaWG parameters I use in China. This set of parameters can reliably bypass the GFW. Staff can take a look. Jc = 20; Jmin = 50; Jmax = 1000; S1 = 0; S2 = 0; H1 = 3; H2 = 1; H3 = 4; H4 = 2; -
Eddie Android edition 4.0.0 preview available
EMULE replied to Staff's topic in News and Announcement
Great! Eddie finally supports AmneziaWG, and UDP finally has a masquerade protocol. Another protocol has been added to the list of protocols for bypassing China's Great Firewall. -
@MichelAIR too. Hello! It's the ISO 3166 string extracted by Eddie as usual for any country. You can ask ISO to include ROC on ISO 3166 as a sovereign country, but it will not happen. ISO builds the list according to those countries that are either UN members, parties of the statute of the ICJ or members of a UN agency, but Republic of China can't enter the UN because of the PRC veto. To make things worse, almost all the countries in the world, including the USA and the EU Member States, with the exception of 12 countries with lesser power in the UN such as Belize and Haiti, do not recognize the Republic of China as an independent country because, we guess, they fear too much the economic sanctions PRC will enforce against those countries that would do so. Our solution to list Taiwan as it was in ISO 3166 as a stand alone, recognized and independent country, with its own flag, its own place as a country in the servers list, its own country fully qualified domain name in the infrastructure, far from being funny should have told you everything. Building our own codes and strings by breaking ISO standard may become a bigger problem but we'll evaluate it (after all we already got out of ICANN for specific ICE-related "enforcement" more than a decade ago). The matter was already on the table as already announced in the "News" forum: https://airvpn.org/forums/topic/63201-new-1-gbits-server-available-new-country-tw/?do=findComment&comment=238819 and Eddie's next version will print "Taiwan, Republic of China". On one hand, by abiding to the ISO 3166 but moving ROC to an autonomous country as it has been in practice since decades we can keep using ISO standards (no technical complications, no exception handling and worse) but at the same time we show a clear political position and challenge PRC propaganda & mantra "there's only one China". The obvious strength of this position is the provocation to leave the ISO string and keeping ROC as an autonomous country, therefore claiming there there is NOT one China only and de-structuring the meaning of "Province of China". On the other hand, breaking ISO standards and UN decisions may be very questionable but somehow stronger. Also, to avoid losing the strength of the aforementioned provocation we can find alternative strings such as "Republic of China" directly (claiming Taipei in "Republic of China" can cause again adverse reactions by ignorant people). This is the picked modification for the next Eddie version, at the moment. No problems. The fight of elderly AirVPN members against PRC censorship, propaganda and more is a quarter of century old, so being accused to align with PRC against ROC is obscenely provocative, but the replies are (self or not) moderated. As far as it pertains to the initial reaction, it means that at least the provocation worked, although it was not fully understood in this case, and if it serves the purpose to push people to realize that it's the ISO (and the UN, secondarily) the one putting the string "Province of China" on the ISO 3166 doc, it's a good thing. Not to mention that it can also serve the purpose to make people question how come, how it's possible that one could become victim of PRC propaganda "there's only one China" when one is against PRC propaganda! Kind regards
-
New 1 Gbit/s server available. New country: TW
Staff replied to Staff's topic in News and Announcement
Hello! We confirm the problem and we could determine that both the domain name authoritative DNS and the web site block the Taiwan server. Packets get out regularly from the server and from Taiwan but they are black holed by the final destination datacenters. Furthermore the authoritative DNS does not answer to our DNS server in Taiwan (this is a lesser problem as you could resolve the name through some other public DNS or the hosts file). We don't know the reasons of this behavior. If you query Democracy Now and you receive a reply please let us know. In the meantime we can "micro-route" Democracy Now web site from Sulafat, we will examine how to do it soon. Yes, this is in the official ISO-3166 that Eddie uses to find areas names assigned by the United Nations. According to a previous administrative division, Taiwan is the biggest province of the Republic of China (ROC), not to be confused with People's Republic of China (PRC, mainland China). By using Taiwan as the country's name, "Province of China" is also a definition pushed by PRC at all levels (from UN to NGOs) to shape two ideas: that PRC must "re-unify" with Taiwan and that when you say "China" you don't talk about the Republic of China, but about the PRC (even PRC detractors fall prey of this propaganda as we can see from this thread). In this sense ISO-3166-2:TW entry could be seen as a concession to PRC narrative and the PRC can "play" over the ambiguity of the definition. In the next version we may either stay with this one, according to the United Nations status (but see here for some arguments against this), or censor the ISO document itself. A UN spokesperson’s statement in May 2024, reiterating that Taiwan is a province of China (referring to PRC and not ROC according to directly or indirectly PRC controlled media), guided by the General Assembly resolution of 1971 (Resolution 2758), is important to see how much energy PRC spends to affirm the notion that there is only one China and this only China is PRC and not ROC. On the other hand, we have been fighting and circumventing mainland China (PRC) censorship for 14 years, we recognize China (PRC) as a country enemy of the Internet, controlled by a regime hostile to various human rights, and in reality resolution 2758 interpretation may have been distorted by PRC.. Therefore ISO-3166-2:TW unilateral modification to delete "Province of China" is not unreasonable for us. The matter will be discussed. However, to insinuate that the normal software usage of an ISO document to translate or find a country/area name means that AirVPN endorses PRC (or PRC alleged wet dream to invade Taiwan) or that AirVPN fails its mission after all the sacrifices brought on to circumvent censorship in mainland China is offensive to say the least, or not in good faith in the worst case. The very fact that we list the server in Taiwan with Taiwan as a country tells a lot, as today Taiwan is recognized as a country only by 12 countries in the world. Kind regards -
I'm planning to go to China soon and am wondering how to use AirVPN in China (if possible at all). Thanks for any info given
-
now that western countries are adopting china's vpn policies, sometimes going further than chinese. Michigan is gonna ban vpns soon, maybe most of usa will follow. i was wondering does airvpn have any tools in the arsenal to bypass these bans?? also will airvpn stop servers in effected countries?? source for michigan ban: https://www.webpronews.com/michigans-vpn-crackdown-the-remote-work-killer-hiding-in-plain-sight/
-
Hello! Taiwan is the main and biggest province of the Republic of China (ROC), not to be confused with People's Republic of China (PRC) aka mainland China. Taiwan is also the informal name of the Republic of China. Get informed here first: https://www.taiwan.gov.tw/ Although the Republic of China is officially recognized only by a few countries and not by the UN (due to the veto of the PRC) we list and we will list Republic of China as an independent country, as it is in practice, in real life of citizens and in spite of the imperialist goals of the PRC. Probably you should send your protests to ISO, not to us: please read the next message for more details and check what we have done so far to recognize the Republic of China as an autonomous country and affirm that there is NOT only one China. Anyway ISO compliance break is on the table. Currently, the decision is that the next Eddie Desktop version will print "Taiwan, Republic of China". Eddie Android edition doesn't need modifications. Kind regards
-
Hi, AirVpn may want to consider an add-on service for dedicated / virtual private ip addresses. Although TorGuard Net apparently is from China does offer dedicated ip addresses option. (Edit Nov 14 2025: Florida my mistake. Perhaps Chinese owners) Easier to keep these IPs off of spam filter and blacklists. I know the cost will likely be alot more for obvious reasons.
-
I am guessing that China has blocked all AirVPN IPs. If you connect to any AirVPN server and try to access any China websites (such as baidu.com), you get connection timeouts. Can this be fixed?
-
The implementation tunnels WireGuard UDP traffic through HTTP/3 using the QUIC protocol, making encrypted VPN traffic look identical to regular web browsing.SQUIC started as Google's project to accelerate web traffic and became HTTP/3 in June 2022. The protocol uses UDP instead of TCP, eliminating handshake delays. Mullvad exploits the MASQUE tunneling spec (RFC 9298) to proxy UDP through HTTP servers. State censors (China etc.) see HTTPS web traffic while the VPN tunnel hides inside that envelopetate censors see HTTPS web traffic while the VPN tunnel hides inside that envelope. Can we get this? taken from:
