Jump to content
Not connected, Your IP: 216.73.216.171

Search the Community

Showing results for 'china'.


Didn't find what you were looking for? Try searching for:


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 466 results

  1. Please refer me to a few of those publically known occurences. You mean these largely uncategorized numbers? How do you know it's downright abuse? The number of orders contested was 6% and 7% for 2024 and 2023, respectively. The concerns are rather speculative and highly dependent on your specific location, aren't they? In Germany and Switzerland, you may criticize your governmental bodies to your heart's content and the most you may get is a slap on the wrist from other people (figuratively). The fact that right-oriented troupes can talk shit to the government (and not much is done unless it goes into the realm of death threats and more) is proof that a certain level of freedom is practiced. That's what it means to live in a constitutional state: You are not being repressed there. But of course, the concerns get very real very fast if you do live in a country with authoritative tendencies such as Iran, China or even Hungary or the US (maybe Poland shortly). One can and probably must make sure they're safe. Or better yet, just don't talk shit to the governmental bodies there, period. There's a limit for everything, and Freedom of Speech does not mean Freedom of Insults.
  2. Hello, I am a user from mainland China. During my usage, I've noticed that many servers with low load bandwidth usage are actually slower, such as those in Taiwan and Japan. I’d like to offer a suggestion to AirVPN. Personally, I believe the evaluation criteria for server quality should be based on CPU usage over a certain period, such as the average CPU usage over half an hour, rather than load bandwidth. I’ve frequently encountered handshake timeouts when connecting to "sulafat," even though the displayed load bandwidth isn’t high. I suspect this is most likely related to high CPU usage on the server, which causes key resolution timeouts. If I could connect to a server with relatively idle CPU resources, I think the connection quality would be much better. After all, speed is closely tied to protocol overhead. For example, if a 1 Gbit/s server is connected to 100 users using the WireGuard protocol, the server’s load bandwidth might reach up to 900 Mbit/s. However, if it’s connected to 100 users using SSL + OpenVPN TCP protocol, the load bandwidth might only be 400 Mbit/s. Clearly, the latter scenario places a higher burden on the server, yet the load bandwidth appears lower. Therefore, I believe servers with lower CPU usage offer better quality, rather than those with lower load bandwidth. Using average CPU usage as a metric seems more scientific to me. Does my point make sense? Does anyone agree with what I’m saying? Thanks.
  3. Version 2.24.6 (Wed, 08 Jan 2025 16:23:32 +0000) [change] [all] ISO 3166 break, changing "Taiwan, Province of China" into "Taiwan, Republic of China" [change] [all] New bootstrap endpoint [bugfix] [all] Bootstrap emergency urls fix [bugfix] [macOS] WireGuard issue [bugfix] [all] Minor fixes If no other serious issues arise, this version will be released as stable within a few days. The remaining minor issues (IP Exit, Speed Chart, etc.) are under investigation and will be fixed in the next version. Thank you.
  4. Hello I would like to give my personal recommendations to help with network censorship in Russia. I may not have time to write a authoritative, proper guide, but wanted to share this. Everything "clicked" once I read a comment how the DPI works to determine a new connection. Preface IP and subnet blocks came first. They completely blackhole all traffic to blocked IP addresses. The only thing you can try is IPv6 in place of IPv4. Some Air servers are blocked by IP. The Deep Packet Inspection (DPI) is a required installation for residential ISPs and (as of late) industrial networks like data centers. It works to dynamically block known protocol traffic, anything "forbidden" that's not yet in IP blocklists from above. This system was put in law many years ago. Nevertheless, the networks across the country are at various stages of rollout and their capabilities will differ. Real example: residential ISP did not block OpenVPN->Air, yet the mobile carrier did. Yet in 2024 the residential ISP upgraded their DPI system and started blocking OpenVPN too. Common methods of circumvention Mangle traffic locally to fool the DPI systems. It will allow you to connect to servers not blocked by IP (TLS SNI name detection). Proxy/VPN server: A prerequisite is an outside server, it must not have been blocked by IP. If it's a private server and OpenVPN or Wireguard work - you're lucky. However be prepared to still get blocked by DPI any day for using a VPN protocol. There are many proxy tools, especially developed to combat the Great Firewall of China. They don't run directly on Air, so this is something for self-hosting or other services to provide. We're talking about Air, so let's get that VPN working. Everything below requires you to find a reachable Air server (no direct IP blocks). The configuration server used by Eddie is IP blocked, so it won't work at all. I suggest you to generate all server configs in advance and see which are reachable from Russian networks. Airvpn.org seems to be reachable though. OpenVPN over SSH to Air It is possible to set this up on mobile, however the connection is reset after 10-30 seconds due to a lot of traffic being pushed. I used ConnectBot and it didn't restart the SSH connection properly, anyhow OpenVPN and ConnectBot had to be reconnected manually each time --> unusable. Since both apps are easily downloadable from app stores/F-Droid, this can be enough to generate and download configs from AirVPN's website in a dire situation. This connection type works like this: SSH connects to Air server, forwards a local port -> Air (internal_ip:internal_port) OpenVPN connects to local_ip:local_port and SSH sends the packets to Air's OpenVPN endpoint inside this tunnel Once the connection is established, it works like a regular OpenVPN on your system OpenVPN over stunnel to Air I haven't tried, desktop only? OpenVPN (TCP) over Tor to Air While connecting to Tor will be another adventure, do you really need a VPN if you get Tor working for browsing? If yes, I suppose it could work. I haven't tried. OpenVPN (TCP) to Air May start working after hours on Android, if the connection was established initially. Until then you'll see a lot of outgoing traffic but almost zero incoming traffic (NOT ZERO though!) It is unclear to me whether this is because Android keeps reconnecting after sleeping or sometimes it pushes so little traffic over the established connection that DPI forgets or clears the block for this connection only. OpenVPN (UDP) to Air Doesn't work. Wireguard to Air Doesn't work, it's always UDP and very easily detected. AmneziaWG client to connect to standard Wireguard Air servers This worked for me almost flawlessly. The trick of AmneziaWG is to send random trash packets before starting the connection sequence. This is what the new parameters are and some of them are compatible with standard Wireguard servers. The DPI only checks traffic within the initial traffic size window of the connection. If it doesn't find VPN connection signatures (and it doesn't due to random data) then it whitelists the connection. Wireguard then sends its connection packets and connects to Air. Full speed ahead, no throttling. The VPN connection works! What's the catch? The AmneziaWG packet configuration must be right. This worked for me across all networks I encountered: MTU: 1320 (safe value, higher MTU will give better bandwidth, if it works at all and doesn't begin to fragment packets) Junk Packet count (Jc): 31 Junk Packet minimum size (Jmin): 20 Junk Packet maximum size (Jmax): 40 Init packet junk size (S1): none (afaik only with AmneziaWG server; delete from config or try to set 0) Response packet junk size (S2): none (afaik only with AmneziaWG server; delete from config or try to set 0) Magic header settings changeable afaik only with AmneziaWG server: Init packet magic header (H1): 1 Response packet magic header (H2): 2 Underload packet magic header (H3): 3 Transport packet magic header (H4): 4 Example: [Interface] ... other default values, including MTU ... Jc=31 Jmin=20 Jmax=40 H1=1 H2=2 H3=3 H4=4 And how would you know what numbers to set? This single insight: This means flooding small random UDP packets at the beginning is the winning strategy. That's how I optimized someone's config from "sometimes it works, sometimes it doesn't" to "works 100% of the time, everywhere". You actually don't want to blast big packets and be blocked because of it. Smaller random packets are good for mobile traffic too. How would you setup AmneziaWG to connect to Air (Android)? Generate and download AirVPN Wireguard configs, for each individual server, try different entry IPs too. DO NOT USE THE DEFAULT (OFFICIAL) WIREGUARD PORT. We don't want long-term logging to highlight the working servers for the next round of IP blocks. Download AmneziaWG-Android VPN client (the Android edition is actually a fork of the official Wireguard app aka "AmneziaWG". Don't download their regular all-in-one client aka "AmneziaVPN"!): amnezia.org or https:// storage.googleapis .com/kldscp/amnezia.org or https://github.com/amnezia-vpn/amneziawg-android/releases Import Air's configs in the app Apply "Junk Packet" settings from above Try to connect Try different entry IPs and servers if the connection doesn't work. See if the server IP is completely blocked either with: ping "<entry IP>" nc -zv -w 10 "<entry IP>" "<port 80 or 2018 for OpenVPN TCP>" This is GNU netcat Keep in mind: on Android the safest way to avoid any traffic leaks is to go to system settings, Connection & sharing > VPN, or search for "VPN", click on (i) for advanced settings, Enable: "Stay Connected to VPN" & "Block All Connections not Using VPN". If you ever disconnect from VPN by using Android's system notification, you'll need to re-enable these settings. If you switch between VPN apps (like Eddie -> AmneziaWG), I suggest to make sure these settings are always enabled like this: Turn off Wi-Fi (or mobile data) For previous VPN app disable: "Stay Connected to VPN" & "Block All Connections not Using VPN" For next VPN app enable: "Stay Connected to VPN" & "Block All Connections not Using VPN" Turn on Wi-Fi / connect using next VPN app Android battery optimization: Finally, go to app's settings (or Settings-Battery then app list somewhere) and make sure the AmneziaWG app is "not optimized" for battery. This way it will not be interrupted in the background and potentially drop connection until the screen is awake. -- https://dontkillmyapp.com/ for guides and more info Thanks for reading. Big politicians are not your friends, stay strong and propagate what you truly believe in.
  5. Hello! It could. The current decision is that next [EDIT: now current 2.24.6] Eddie Desktop edition version will print "Taiwan, Republic of China", by breaking ISO compliance and at the same time not leaving any doubt to PRC propaganda brainwashed people. This definition should be strong enough to satisfy everyone except mainland China and supporters of standards, of course. Kind regards
  6. @MichelAIR too. Hello! It's the ISO 3166 string extracted by Eddie as usual for any country. You can ask ISO to include ROC on ISO 3166 as a sovereign country, but it will not happen. ISO builds the list according to those countries that are either UN members, parties of the statute of the ICJ or members of a UN agency, but Republic of China can't enter the UN because of the PRC veto. To make things worse, almost all the countries in the world, including the USA and the EU Member States, with the exception of 12 countries with lesser power in the UN such as Belize and Haiti, do not recognize the Republic of China as an independent country because, we guess, they fear too much the economic sanctions PRC will enforce against those countries that would do so. Our solution to list Taiwan as it was in ISO 3166 as a stand alone, recognized and independent country, with its own flag, its own place as a country in the servers list, its own country fully qualified domain name in the infrastructure, far from being funny should have told you everything. Building our own codes and strings by breaking ISO standard may become a bigger problem but we'll evaluate it (after all we already got out of ICANN for specific ICE-related "enforcement" more than a decade ago). The matter was already on the table as already announced in the "News" forum: https://airvpn.org/forums/topic/63201-new-1-gbits-server-available-new-country-tw/?do=findComment&comment=238819 and Eddie's next version will print "Taiwan, Republic of China". On one hand, by abiding to the ISO 3166 but moving ROC to an autonomous country as it has been in practice since decades we can keep using ISO standards (no technical complications, no exception handling and worse) but at the same time we show a clear political position and challenge PRC propaganda & mantra "there's only one China". The obvious strength of this position is the provocation to leave the ISO string and keeping ROC as an autonomous country, therefore claiming there there is NOT one China only and de-structuring the meaning of "Province of China". On the other hand, breaking ISO standards and UN decisions may be very questionable but somehow stronger. Also, to avoid losing the strength of the aforementioned provocation we can find alternative strings such as "Republic of China" directly (claiming Taipei in "Republic of China" can cause again adverse reactions by ignorant people). This is the picked modification for the next Eddie version, at the moment. No problems. The fight of elderly AirVPN members against PRC censorship, propaganda and more is a quarter of century old, so being accused to align with PRC against ROC is obscenely provocative, but the replies are (self or not) moderated. As far as it pertains to the initial reaction, it means that at least the provocation worked, although it was not fully understood in this case, and if it serves the purpose to push people to realize that it's the ISO (and the UN, secondarily) the one putting the string "Province of China" on the ISO 3166 doc, it's a good thing. Not to mention that it can also serve the purpose to make people question how come, how it's possible that one could become victim of PRC propaganda "there's only one China" when one is against PRC propaganda! Kind regards
  7. Maybe you both should calm down? The official wording on the very website linked by Staff is actually Republic of China (Taiwan). You see it in the logo, you see it on the very first image on the About page. I'd like to inquire as to where Staff got the funny idea that it was Province of China, which is easily interpreted as "Taiwan, a province of People's Republic of China", which is the actual propaganda. Of course, Taiwan the country has got a Taiwan Provice itself. But since we're looking at a list of countries, it makes no sense naming it "Taiwan, Provice of China". It's a very subtle way of devaluing the ROC – the country's name is Republic of China (Taiwan). Therefore I suggest changing the wording to what the website calls it.
  8. Hello! Taiwan is the main and biggest province of the Republic of China (ROC), not to be confused with People's Republic of China (PRC) aka mainland China. Taiwan is also the informal name of the Republic of China. Get informed here first: https://www.taiwan.gov.tw/ Although the Republic of China is officially recognized only by a few countries and not by the UN (due to the veto of the PRC) we list and we will list Republic of China as an independent country, as it is in practice, in real life of citizens and in spite of the imperialist goals of the PRC. Probably you should send your protests to ISO, not to us: please read the next message for more details and check what we have done so far to recognize the Republic of China as an autonomous country and affirm that there is NOT only one China. Anyway ISO compliance break is on the table. Currently, the decision is that the next Eddie Desktop version will print "Taiwan, Republic of China". Eddie Android edition doesn't need modifications. Kind regards
  9. Hello. In the eddie's list of countries, Taïwan is presented as "Province of China". It is NOT. It is an independent democracy. Please remove this piece of totalitarian propaganda. Thanks in advance.
  10. Hello, I use ArchLinux, and I try to build and install the eddie-ui-git 2.24.5 package from the AUR. I use the aurutils tools for the build process, and the build process is executed in a clean chroot (see logs below). When I try to lauch the built and installed package, I have the error message : "The file /usr/lib/mscorlib.dll is an invalid CIL image". I looked at the following thread, and it seems to be a mono dependency issue ? But I think I am using the latest version of each dependency. Thank you in advance for your support. The build logs : :: Synchronizing package databases... core downloading... extra downloading... multilib downloading... aur downloading... :: Starting full system upgrade... there is nothing to do ==> Making package: eddie-ui-git 2.24.5-1 (Fri Dec 13 14:24:16 2024) ==> Retrieving sources... -> Updating Eddie git repo... ==> Validating source files with sha1sums... Eddie ... Skipped ==> Making package: eddie-ui-git 2.24.5-1 (Fri Dec 13 14:24:19 2024) ==> Checking runtime dependencies... ==> Installing missing dependencies... resolving dependencies... looking for conflicting packages... warning: dependency cycle detected: warning: harfbuzz will be installed before its freetype2 dependency warning: dependency cycle detected: warning: mesa will be installed before its libglvnd dependency Package (97) New Version Net Change extra/adobe-source-code-pro-fonts 2.042u+1.062i+1.026vf-2 1.86 MiB extra/adwaita-cursors 47.0-1 10.02 MiB extra/adwaita-icon-theme 47.0-1 1.17 MiB extra/adwaita-icon-theme-legacy 46.2-3 2.23 MiB extra/at-spi2-core 2.54.0-2 3.92 MiB extra/avahi 1:0.8+r194+g3f79789-2 1.88 MiB extra/ayatana-ido 0.10.4-1 0.28 MiB extra/cairo 1.18.2-2 1.57 MiB extra/cantarell-fonts 1:0.303.1-2 0.19 MiB extra/dav1d 1.5.0-1 1.74 MiB extra/dconf 0.40.0-3 0.45 MiB extra/default-cursors 3-1 0.00 MiB extra/desktop-file-utils 0.28-1 0.18 MiB extra/duktape 2.7.0-7 0.78 MiB extra/fontconfig 2:2.15.0-2 1.10 MiB extra/freetype2 2.13.3-1 1.62 MiB extra/fribidi 1.0.16-1 0.24 MiB extra/gdk-pixbuf2 2.42.12-2 2.99 MiB extra/giflib 5.2.2-1 0.27 MiB extra/glib-networking 1:2.80.0-3 0.62 MiB extra/graphite 1:1.3.14-4 0.20 MiB extra/gsettings-desktop-schemas 47.1-1 5.34 MiB extra/gsettings-system-schemas 47.1-1 0.01 MiB extra/gtk-update-icon-cache 1:4.16.7-1 0.04 MiB extra/gtk3 1:3.24.43-4 52.14 MiB extra/harfbuzz 10.1.0-1 4.11 MiB extra/hicolor-icon-theme 0.18-1 0.05 MiB extra/iso-codes 4.17.0-1 20.25 MiB extra/jbigkit 2.1-8 0.16 MiB extra/json-glib 1.10.6-1 1.01 MiB extra/lcms2 2.16-1 0.67 MiB extra/libayatana-indicator 0.9.4-1 0.11 MiB extra/libcloudproviders 0.3.6-1 0.48 MiB extra/libcolord 1.4.7-2 1.24 MiB extra/libcups 2:2.4.11-1 0.77 MiB extra/libdaemon 0.14-6 0.06 MiB extra/libdatrie 0.2.13-4 0.48 MiB extra/libdbusmenu-glib 16.04.0.r498-2 0.68 MiB extra/libdbusmenu-gtk3 16.04.0.r498-2 0.23 MiB extra/libdrm 2.4.124-1 1.23 MiB core/libedit 20240517_3.1-1 0.27 MiB extra/libepoxy 1.5.10-3 2.64 MiB extra/libexif 0.6.24-3 2.64 MiB extra/libgdiplus 6.1-2 0.52 MiB extra/libglvnd 1.7.0-1 3.70 MiB extra/libjpeg-turbo 3.0.4-1 2.31 MiB core/libnl 3.11.0-1 2.08 MiB extra/libpciaccess 0.18.1-2 0.06 MiB extra/libpng 1.6.44-1 0.57 MiB extra/libproxy 0.5.9-1 0.10 MiB extra/librsvg 2:2.59.2-1 11.29 MiB extra/libsoup3 3.6.1-1 1.94 MiB extra/libstemmer 2.2.0-2 0.79 MiB extra/libthai 0.1.29-3 1.22 MiB extra/libtiff 4.7.0-1 1.78 MiB extra/libx11 1.8.10-1 9.78 MiB extra/libxau 1.0.11-3 0.02 MiB extra/libxcb 1.17.0-1 3.87 MiB extra/libxcomposite 0.4.6-2 0.02 MiB extra/libxcursor 1.2.3-1 0.07 MiB extra/libxdamage 1.1.6-2 0.02 MiB extra/libxdmcp 1.1.5-1 0.13 MiB extra/libxext 1.3.6-1 0.30 MiB extra/libxfixes 6.0.1-2 0.04 MiB extra/libxft 2.3.8-2 0.13 MiB extra/libxi 1.8.2-1 0.48 MiB extra/libxinerama 1.1.5-2 0.02 MiB extra/libxkbcommon 1.7.0-2 0.79 MiB extra/libxrandr 1.5.4-1 0.07 MiB extra/libxrender 0.9.11-2 0.09 MiB extra/libxshmfence 1.3.2-2 0.02 MiB extra/libxtst 1.2.5-1 0.11 MiB extra/libxxf86vm 1.1.5-2 0.03 MiB extra/llvm-libs 18.1.8-4 128.31 MiB extra/lm_sensors 1:3.6.0.r41.g31d1f125-3 0.46 MiB core/lzo 2.10-5 0.38 MiB extra/mesa 1:24.3.1-3 96.81 MiB core/mpdecimal 4.0.0-2 0.32 MiB core/nspr 4.36-1 0.71 MiB core/nss 3.107-1 5.10 MiB extra/pango 1:1.54.0-1 2.29 MiB extra/pixman 0.44.2-1 0.70 MiB extra/pkcs11-helper 1.30.0-1 0.31 MiB core/python 3.12.7-1 70.07 MiB extra/shared-mime-info 2.4-1 4.55 MiB extra/spirv-tools 2024.4.rc1-1 6.67 MiB extra/tinysparql 3.8.1-1 3.80 MiB extra/wayland 1.23.1-1 0.80 MiB extra/xcb-proto 1.17.0-2 1.02 MiB extra/xkeyboard-config 2.43-1 6.55 MiB extra/xorg-xprop 1.2.8-1 0.05 MiB extra/xorgproto 2024.1-2 1.46 MiB extra/libayatana-appindicator 0.5.93-1 0.32 MiB extra/libnotify 0.8.3-1 0.14 MiB extra/mono 6.12.0.206-1 252.29 MiB extra/openvpn 2.6.12-1 1.69 MiB extra/polkit 125-1 1.88 MiB Total Installed Size: 756.95 MiB :: Proceed with installation? [Y/n] checking keyring... checking package integrity... loading package files... checking for file conflicts... :: Processing package changes... installing libpng... installing graphite... Optional dependencies for graphite graphite-docs: Documentation installing harfbuzz... Optional dependencies for harfbuzz harfbuzz-utils: utilities installing freetype2... installing fontconfig... Creating fontconfig configuration... Rebuilding fontconfig cache... installing xcb-proto... installing xorgproto... installing libxdmcp... installing libxau... installing libxcb... installing libx11... installing libxext... installing libxrender... installing lzo... installing pixman... installing cairo... installing libexif... installing libjpeg-turbo... Optional dependencies for libjpeg-turbo java-runtime>11: for TurboJPEG Java wrapper installing jbigkit... installing libtiff... Optional dependencies for libtiff freeglut: for using tiffgt installing fribidi... installing libdatrie... installing libthai... installing libxft... installing pango... installing giflib... installing libgdiplus... installing mpdecimal... installing python... Optional dependencies for python python-setuptools: for building Python packages using tooling that is usually bundled with Python python-pip: for installing Python packages using tooling that is usually bundled with Python python-pipx: for installing Python software not packaged on Arch Linux sqlite: for a default database integration [installed] xz: for lzma [installed] tk: for tkinter installing mono... Mono Certificate Store Sync - version 6.12.0.0 Populate Mono certificate store from a concatenated list of certificates. Copyright 2002, 2003 Motus Technologies. Copyright 2004-2008 Novell. BSD licensed. Importing into legacy system store: I already trust 0, your new list has 149 Certificate added: CN=ACCVRAIZ1, OU=PKIACCV, O=ACCV, C=ES Certificate added: C=ES, O=FNMT-RCM, OU=AC RAIZ FNMT-RCM Certificate added: C=ES, O=FNMT-RCM, OU=Ceres, OID.2.5.4.97=VATES-Q2826004J, CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS Certificate added: SERIALNUMBER=G63287510, C=ES, O=ANF Autoridad de Certificacion, OU=ANF CA Raiz, CN=ANF Secure Server Root CA Certificate added: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Commercial Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Networking Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium ECC Certificate added: C=US, O=Amazon, CN=Amazon Root CA 1 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 2 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 3 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 4 Certificate added: CN=Atos TrustedRoot 2011, O=Atos, C=DE Certificate added: CN=Atos TrustedRoot Root CA ECC TLS 2021, O=Atos, C=DE Certificate added: CN=Atos TrustedRoot Root CA RSA TLS 2021, O=Atos, C=DE Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Certificate added: C=CN, O=BEIJING CERTIFICATE AUTHORITY, CN=BJCA Global Root CA1 Certificate added: C=CN, O=BEIJING CERTIFICATE AUTHORITY, CN=BJCA Global Root CA2 Certificate added: C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 Root CA Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 Root CA Certificate added: C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R2 Certificate added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO Certification Authority Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Certification Authority Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority Certificate added: C=US, O=Certainly, CN=Certainly Root E1 Certificate added: C=US, O=Certainly, CN=Certainly Root R1 Certificate added: C=FR, O=Dhimyotis, CN=Certigna Certificate added: C=FR, O=Dhimyotis, OU=0002 48146308100036, CN=Certigna Root CA Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 2 Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum Trusted Root CA Certificate added: C=US, O=CommScope, CN=CommScope Public Trust ECC Root-01 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust ECC Root-02 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust RSA Root-01 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust RSA Root-02 Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST BR Root CA 1 2020 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST EV Root CA 1 2020 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 2009 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 EV 2009 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G2 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G3 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G3 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS ECC P384 Root G5 Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS RSA4096 Root G5 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Trusted Root G4 Certificate added: O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048) Certificate added: C=US, O="Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, OU="(c) 2006 Entrust, Inc.", CN=Entrust Root Certification Authority Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2012 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - EC1 Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2009 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G2 Certificate added: C=ES, O=Firmaprofesional SA, OID.2.5.4.97=VATES-A62634068, CN=FIRMAPROFESIONAL CA ROOT-A WEB Certificate added: C=CN, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", CN=GDCA TrustAUTH R5 ROOT Certificate added: C=AT, O=e-commerce monitoring GmbH, CN=GLOBALTRUST 2020 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R1 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R2 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R3 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R4 Certificate added: OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign Certificate added: OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign Certificate added: C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA Certificate added: OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign Certificate added: OU=GlobalSign Root CA - R6, O=GlobalSign, CN=GlobalSign Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root E46 Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root R46 Certificate added: C=US, O="The Go Daddy Group, Inc.", OU=Go Daddy Class 2 Certification Authority Certificate added: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", CN=Go Daddy Root Certificate Authority - G2 Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS ECC Root CA 2021 Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS RSA Root CA 2021 Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions ECC RootCA 2015 Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions RootCA 2015 Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", CN=HiPKI Root CA - G1 Certificate added: C=HK, S=Hong Kong, L=Hong Kong, O=Hongkong Post, CN=Hongkong Post Root CA 3 Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X1 Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X2 Certificate added: C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1 Certificate added: C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1 Certificate added: C=ES, O=IZENPE S.A., CN=Izenpe.com Certificate added: C=HU, L=Budapest, O=Microsec Ltd., CN=Microsec e-Szigno Root CA 2009, E=info@e-szigno.hu Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft ECC Root Certificate Authority 2017 Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft RSA Root Certificate Authority 2017 Certificate added: C=KR, O=NAVER BUSINESS PLATFORM Corp., CN=NAVER Global Root Certification Authority Certificate added: C=HU, L=Budapest, O=NetLock Kft., OU=Tanúsítványkiadók (Certification Services), CN=NetLock Arany (Class Gold) Főtanúsítvány Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GB CA Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GC CA Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 1 G3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 G3 Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority ECC Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority RSA R2 Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority ECC Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority RSA Certificate added: C=US, O=SSL Corporation, CN=SSL.com TLS ECC Root CA 2022 Certificate added: C=US, O=SSL Corporation, CN=SSL.com TLS RSA Root CA 2022 Certificate added: C=PL, O=Krajowa Izba Rozliczeniowa S.A., CN=SZAFIR ROOT CA2 Certificate added: C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root E46 Certificate added: C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root R46 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA12 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA14 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA15 Certificate added: C=US, O=SecureTrust Corporation, CN=SecureTrust CA Certificate added: C=US, O=SecureTrust Corporation, CN=Secure Global CA Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication ECC RootCA1 Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", OU=Security Communication RootCA2 Certificate added: C=US, O="Starfield Technologies, Inc.", OU=Starfield Class 2 Certification Authority Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Root Certificate Authority - G2 Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Services Root Certificate Authority - G2 Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Gold CA - G2 Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Silver CA - G2 Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2 Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 3 Certificate added: C=TR, L=Gebze - Kocaeli, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, OU=Kamu Sertifikasyon Merkezi - Kamu SM, CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA CYBER Root CA Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Global Root CA Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority Certificate added: C=DE, O=Deutsche Telekom Security GmbH, CN=Telekom Security TLS ECC Root 2020 Certificate added: C=DE, O=Deutsche Telekom Security GmbH, CN=Telekom Security TLS RSA Root 2023 Certificate added: O=TeliaSonera, CN=TeliaSonera Root CA v1 Certificate added: C=FI, O=Telia Finland Oyj, CN=Telia Root CA v2 Certificate added: C=CN, O="TrustAsia Technologies, Inc.", CN=TrustAsia Global Root CA G3 Certificate added: C=CN, O="TrustAsia Technologies, Inc.", CN=TrustAsia Global Root CA G4 Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global Certification Authority Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P256 Certification Authority Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P384 Certification Authority Certificate added: C=TN, O=Agence Nationale de Certification Electronique, CN=TunTrust Root CA Certificate added: C=CN, O=UniTrust, CN=UCA Extended Validation Root Certificate added: C=CN, O=UniTrust, CN=UCA Global G2 Root Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority Certificate added: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certification Authority Certificate added: C=RO, O=certSIGN, OU=certSIGN ROOT CA Certificate added: C=RO, O=CERTSIGN SA, OU=certSIGN ROOT CA G2 Certificate added: C=HU, L=Budapest, O=Microsec Ltd., OID.2.5.4.97=VATHU-23584497, CN=e-Szigno Root CA 2017 Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", OU=ePKI Root Certification Authority Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign ECC Root CA - C3 Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign ECC Root CA - G3 Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign Root CA - C1 Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign Root CA - G1 Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus ECC Root CA Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus Root CA 149 new root certificates were added to your trust store. Import process completed. Importing into BTLS system store: I already trust 0, your new list has 149 Certificate added: CN=ACCVRAIZ1, OU=PKIACCV, O=ACCV, C=ES Certificate added: C=ES, O=FNMT-RCM, OU=AC RAIZ FNMT-RCM Certificate added: C=ES, O=FNMT-RCM, OU=Ceres, OID.2.5.4.97=VATES-Q2826004J, CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS Certificate added: SERIALNUMBER=G63287510, C=ES, O=ANF Autoridad de Certificacion, OU=ANF CA Raiz, CN=ANF Secure Server Root CA Certificate added: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Commercial Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Networking Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium ECC Certificate added: C=US, O=Amazon, CN=Amazon Root CA 1 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 2 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 3 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 4 Certificate added: CN=Atos TrustedRoot 2011, O=Atos, C=DE Certificate added: CN=Atos TrustedRoot Root CA ECC TLS 2021, O=Atos, C=DE Certificate added: CN=Atos TrustedRoot Root CA RSA TLS 2021, O=Atos, C=DE Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Certificate added: C=CN, O=BEIJING CERTIFICATE AUTHORITY, CN=BJCA Global Root CA1 Certificate added: C=CN, O=BEIJING CERTIFICATE AUTHORITY, CN=BJCA Global Root CA2 Certificate added: C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 Root CA Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 Root CA Certificate added: C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R2 Certificate added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO Certification Authority Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Certification Authority Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority Certificate added: C=US, O=Certainly, CN=Certainly Root E1 Certificate added: C=US, O=Certainly, CN=Certainly Root R1 Certificate added: C=FR, O=Dhimyotis, CN=Certigna Certificate added: C=FR, O=Dhimyotis, OU=0002 48146308100036, CN=Certigna Root CA Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 2 Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum Trusted Root CA Certificate added: C=US, O=CommScope, CN=CommScope Public Trust ECC Root-01 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust ECC Root-02 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust RSA Root-01 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust RSA Root-02 Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST BR Root CA 1 2020 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST EV Root CA 1 2020 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 2009 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 EV 2009 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G2 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G3 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G3 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS ECC P384 Root G5 Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS RSA4096 Root G5 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Trusted Root G4 Certificate added: O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048) Certificate added: C=US, O="Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, OU="(c) 2006 Entrust, Inc.", CN=Entrust Root Certification Authority Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2012 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - EC1 Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2009 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G2 Certificate added: C=ES, O=Firmaprofesional SA, OID.2.5.4.97=VATES-A62634068, CN=FIRMAPROFESIONAL CA ROOT-A WEB Certificate added: C=CN, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", CN=GDCA TrustAUTH R5 ROOT Certificate added: C=AT, O=e-commerce monitoring GmbH, CN=GLOBALTRUST 2020 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R1 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R2 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R3 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R4 Certificate added: OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign Certificate added: OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign Certificate added: C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA Certificate added: OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign Certificate added: OU=GlobalSign Root CA - R6, O=GlobalSign, CN=GlobalSign Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root E46 Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root R46 Certificate added: C=US, O="The Go Daddy Group, Inc.", OU=Go Daddy Class 2 Certification Authority Certificate added: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", CN=Go Daddy Root Certificate Authority - G2 Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS ECC Root CA 2021 Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS RSA Root CA 2021 Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions ECC RootCA 2015 Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions RootCA 2015 Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", CN=HiPKI Root CA - G1 Certificate added: C=HK, S=Hong Kong, L=Hong Kong, O=Hongkong Post, CN=Hongkong Post Root CA 3 Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X1 Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X2 Certificate added: C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1 Certificate added: C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1 Certificate added: C=ES, O=IZENPE S.A., CN=Izenpe.com Certificate added: C=HU, L=Budapest, O=Microsec Ltd., CN=Microsec e-Szigno Root CA 2009, E=info@e-szigno.hu Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft ECC Root Certificate Authority 2017 Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft RSA Root Certificate Authority 2017 Certificate added: C=KR, O=NAVER BUSINESS PLATFORM Corp., CN=NAVER Global Root Certification Authority Certificate added: C=HU, L=Budapest, O=NetLock Kft., OU=Tanúsítványkiadók (Certification Services), CN=NetLock Arany (Class Gold) Főtanúsítvány Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GB CA Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GC CA Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 1 G3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 G3 Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority ECC Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority RSA R2 Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority ECC Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority RSA Certificate added: C=US, O=SSL Corporation, CN=SSL.com TLS ECC Root CA 2022 Certificate added: C=US, O=SSL Corporation, CN=SSL.com TLS RSA Root CA 2022 Certificate added: C=PL, O=Krajowa Izba Rozliczeniowa S.A., CN=SZAFIR ROOT CA2 Certificate added: C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root E46 Certificate added: C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root R46 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA12 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA14 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA15 Certificate added: C=US, O=SecureTrust Corporation, CN=SecureTrust CA Certificate added: C=US, O=SecureTrust Corporation, CN=Secure Global CA Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication ECC RootCA1 Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", OU=Security Communication RootCA2 Certificate added: C=US, O="Starfield Technologies, Inc.", OU=Starfield Class 2 Certification Authority Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Root Certificate Authority - G2 Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Services Root Certificate Authority - G2 Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Gold CA - G2 Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Silver CA - G2 Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2 Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 3 Certificate added: C=TR, L=Gebze - Kocaeli, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, OU=Kamu Sertifikasyon Merkezi - Kamu SM, CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA CYBER Root CA Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Global Root CA Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority Certificate added: C=DE, O=Deutsche Telekom Security GmbH, CN=Telekom Security TLS ECC Root 2020 Certificate added: C=DE, O=Deutsche Telekom Security GmbH, CN=Telekom Security TLS RSA Root 2023 Certificate added: O=TeliaSonera, CN=TeliaSonera Root CA v1 Certificate added: C=FI, O=Telia Finland Oyj, CN=Telia Root CA v2 Certificate added: C=CN, O="TrustAsia Technologies, Inc.", CN=TrustAsia Global Root CA G3 Certificate added: C=CN, O="TrustAsia Technologies, Inc.", CN=TrustAsia Global Root CA G4 Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global Certification Authority Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P256 Certification Authority Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P384 Certification Authority Certificate added: C=TN, O=Agence Nationale de Certification Electronique, CN=TunTrust Root CA Certificate added: C=CN, O=UniTrust, CN=UCA Extended Validation Root Certificate added: C=CN, O=UniTrust, CN=UCA Global G2 Root Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority Certificate added: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certification Authority Certificate added: C=RO, O=certSIGN, OU=certSIGN ROOT CA Certificate added: C=RO, O=CERTSIGN SA, OU=certSIGN ROOT CA G2 Certificate added: C=HU, L=Budapest, O=Microsec Ltd., OID.2.5.4.97=VATHU-23584497, CN=e-Szigno Root CA 2017 Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", OU=ePKI Root Certification Authority Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign ECC Root CA - C3 Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign ECC Root CA - G3 Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign Root CA - C1 Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign Root CA - G1 Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus ECC Root CA Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus Root CA 149 new root certificates were added to your trust store. Import process completed. installing libnl... installing nspr... installing nss... installing pkcs11-helper... installing openvpn... Optional dependencies for openvpn easy-rsa: easy CA and certificate handling pam: authenticate via PAM [installed] installing duktape... installing polkit... installing shared-mime-info... installing gdk-pixbuf2... Optional dependencies for gdk-pixbuf2 libwmf: Load .wmf and .apm libopenraw: Load .dng, .cr2, .crw, .nef, .orf, .pef, .arw, .erf, .mrw, and .raf libavif: Load .avif libheif: Load .heif, .heic, and .avif libjxl: Load .jxl librsvg: Load .svg, .svgz, and .svg.gz [pending] webp-pixbuf-loader: Load .webp installing libnotify... installing hicolor-icon-theme... installing adwaita-icon-theme-legacy... installing adwaita-cursors... installing adwaita-icon-theme... installing dconf... installing gsettings-system-schemas... installing adobe-source-code-pro-fonts... installing cantarell-fonts... installing gsettings-desktop-schemas... installing libxfixes... installing libxi... installing libxtst... installing xorg-xprop... installing at-spi2-core... installing desktop-file-utils... installing iso-codes... installing libcloudproviders... installing lcms2... installing libcolord... installing libdaemon... installing avahi... Optional dependencies for avahi gtk3: avahi-discover, avahi-discover-standalone, bshell, bssh, bvnc [pending] libevent: libevent bindings [installed] nss-mdns: NSS support for mDNS python-dbus: avahi-bookmarks, avahi-discover python-gobject: avahi-bookmarks, avahi-discover python-twisted: avahi-bookmarks qt5-base: qt5 bindings installing libcups... installing libpciaccess... installing libdrm... Optional dependencies for libdrm cairo: needed for modetest tool [installed] installing libxshmfence... installing libxxf86vm... installing libedit... installing llvm-libs... installing lm_sensors... Optional dependencies for lm_sensors rrdtool: for logging with sensord perl: for sensor detection and configuration convert [installed] installing spirv-tools... installing default-cursors... Optional dependencies for default-cursors adwaita-cursors: default cursor theme [installed] installing wayland... installing mesa... Optional dependencies for mesa opengl-man-pages: for the OpenGL API man pages installing libglvnd... installing libepoxy... installing dav1d... Optional dependencies for dav1d dav1d-doc: HTML documentation installing librsvg... installing libxcomposite... installing libxcursor... installing libxdamage... installing libxinerama... installing xkeyboard-config... installing libxkbcommon... Optional dependencies for libxkbcommon libxkbcommon-x11: xkbcli interactive-x11 wayland: xkbcli interactive-wayland [installed] installing libxrandr... installing json-glib... installing libproxy... installing glib-networking... installing libsoup3... Optional dependencies for libsoup3 samba: Windows Domain SSO installing libstemmer... installing tinysparql... installing gtk-update-icon-cache... installing gtk3... Optional dependencies for gtk3 evince: Default print preview command installing ayatana-ido... installing libayatana-indicator... installing libdbusmenu-glib... installing libdbusmenu-gtk3... installing libayatana-appindicator... :: Running post-transaction hooks... ( 1/16) Creating system user accounts... Creating group 'avahi' with GID 972. Creating user 'avahi' (Avahi mDNS/DNS-SD daemon) with UID 972 and GID 972. Creating group 'openvpn' with GID 971. Creating user 'openvpn' (OpenVPN) with UID 971 and GID 971. Creating group 'polkitd' with GID 102. Creating user 'polkitd' (User for polkitd) with UID 102 and GID 102. ( 2/16) Registering binary formats... Skipped: Current root is not booted. ( 3/16) Reloading system manager configuration... Skipped: Current root is not booted. ( 4/16) Reloading user manager configuration... Skipped: Current root is not booted. ( 5/16) Creating temporary files... ( 6/16) Arming ConditionNeedsUpdate... ( 7/16) Updating the MIME type database... ( 8/16) Updating fontconfig configuration... ( 9/16) Reloading system bus configuration... Skipped: Current root is not booted. (10/16) Updating fontconfig cache... (11/16) Probing GDK-Pixbuf loader modules... (12/16) Updating GIO module cache... (13/16) Compiling GSettings XML schema files... (14/16) Probing GTK3 input method modules... (15/16) Updating icon theme caches... (16/16) Updating the desktop file MIME type cache... ==> Checking buildtime dependencies... ==> Installing missing dependencies... resolving dependencies... looking for conflicting packages... Package (17) New Version Net Change extra/cppdap 1.58.0-2 1.55 MiB extra/dotnet-host 8.0.10.sdk110-1 0.44 MiB extra/dotnet-runtime 8.0.10.sdk110-1 66.28 MiB extra/dotnet-targeting-pack 8.0.10.sdk110-1 45.49 MiB extra/jsoncpp 1.9.6-3 0.77 MiB extra/libunwind 1.8.1-3 0.29 MiB extra/libuv 1.49.2-1 0.61 MiB extra/netstandard-targeting-pack 8.0.10.sdk110-1 17.87 MiB extra/perl-error 0.17029-7 0.04 MiB extra/perl-mailtools 2.21-9 0.10 MiB extra/perl-timedate 2.33-7 0.08 MiB extra/rhash 1.4.4-1 0.32 MiB extra/cmake 3.31.2-1 77.90 MiB extra/dotnet-sdk 8.0.10.sdk110-1 299.56 MiB extra/git 2.47.1-1 28.29 MiB extra/mono-msbuild 16.10.1.xamarinxplat.2021.05.26.14.00-5 44.41 MiB extra/patchelf 0.18.0-3 0.24 MiB Total Installed Size: 584.24 MiB :: Proceed with installation? [Y/n] checking keyring... checking package integrity... loading package files... checking for file conflicts... :: Processing package changes... installing perl-error... installing perl-timedate... installing perl-mailtools... installing git... Optional dependencies for git tk: gitk and git gui openssh: ssh transport and crypto perl-libwww: git svn perl-term-readkey: git svn and interactive.singlekey setting perl-io-socket-ssl: git send-email TLS support perl-authen-sasl: git send-email TLS support perl-mediawiki-api: git mediawiki support perl-datetime-format-iso8601: git mediawiki support perl-lwp-protocol-https: git mediawiki https support perl-cgi: gitweb (web interface) support python: git svn & git p4 [installed] subversion: git svn org.freedesktop.secrets: keyring credential helper libsecret: libsecret credential helper [installed] installing cppdap... installing jsoncpp... Optional dependencies for jsoncpp jsoncpp-doc: documentation installing libuv... installing rhash... installing cmake... Optional dependencies for cmake make: for unix Makefile generator [installed] ninja: for ninja generator qt6-base: cmake-gui installing patchelf... installing dotnet-host... Optional dependencies for dotnet-host bash-completion: Bash completion support installing libunwind... installing dotnet-runtime... Optional dependencies for dotnet-runtime lttng-ust2.12: CoreCLR tracing installing netstandard-targeting-pack... Optional dependencies for netstandard-targeting-pack bash-completion: Bash completion support installing dotnet-targeting-pack... Optional dependencies for dotnet-targeting-pack bash-completion: Bash completion support installing dotnet-sdk... Optional dependencies for dotnet-sdk aspnet-targeting-pack: Build ASP.NET Core applications installing mono-msbuild... :: Running post-transaction hooks... (1/7) Creating system user accounts... Creating group 'git' with GID 970. Creating user 'git' (git daemon user) with UID 970 and GID 970. (2/7) Reloading system manager configuration... Skipped: Current root is not booted. (3/7) Arming ConditionNeedsUpdate... (4/7) Updating the MIME type database... (5/7) Warn about old perl modules (6/7) Updating icon theme caches... (7/7) Updating the desktop file MIME type cache... ==> Retrieving sources... ==> WARNING: Skipping all source file integrity checks. ==> Extracting sources... -> Creating working copy of Eddie git repo... Cloning into 'Eddie'... done. ==> Starting build()... Welcome to .NET 8.0! --------------------- SDK Version: 8.0.110 ---------------- Installed an ASP.NET Core HTTPS development certificate. To trust the certificate, view the instructions: https://aka.ms/dotnet-https-linux ---------------- Write your first app: https://aka.ms/dotnet-hello-world Find out what's new: https://aka.ms/dotnet-whats-new Explore documentation: https://aka.ms/dotnet-docs Report issues and find source on GitHub: https://github.com/dotnet/core Use 'dotnet --help' to see available commands or visit: https://aka.ms/dotnet-cli -------------------------------------------------------------------------------------- An issue was encountered verifying workloads. For more information, run "dotnet workload update". MSBuild version 17.8.5+b5265ef37 for .NET Determining projects to restore... Restored /build/eddie-ui-git/src/Eddie/src/App.CLI.Linux/App.CLI.Linux.net8.csproj (in 3.13 sec). Restored /build/eddie-ui-git/src/Eddie/src/Lib.Platform.Linux/Lib.Platform.Linux.net8.csproj (in 3.13 sec). Restored /build/eddie-ui-git/src/Eddie/src/Lib.Core/Lib.Core.net8.csproj (in 3.13 sec). Lib.Core.net8 -> /build/eddie-ui-git/src/Eddie/src/Lib.Core/bin/Release/net8.0/Lib.Core.dll Lib.Platform.Linux.net8 -> /build/eddie-ui-git/src/Eddie/src/Lib.Platform.Linux/bin/Release/net8.0/Lib.Platform.Linux.dll App.CLI.Linux.net8 -> /build/eddie-ui-git/src/Eddie/src/App.CLI.Linux/bin/Release/net8.0/linux-x64/eddie-cli.dll BasePath: /build/eddie-ui-git/src/Eddie/src/App.CLI.Linux TargetDir: /build/eddie-ui-git/src/Eddie/src/App.CLI.Linux/bin/Release/net8.0/linux-x64/ Arch: x64 Config: Release Building eddie-cli-elevated - Config: Release, Shared: yes Building eddie-cli-elevated - Done Building eddie-cli-elevated-service - Config: Release Building eddie-cli-elevated-service - Done Building libLib.Platform.Linux.Native.so - Config: Release Building libLib.Platform.Linux.Native.so - Done Optimizing assemblies for size. This process might take a while. App.CLI.Linux.net8 -> /build/eddie-ui-git/src/Eddie/src/App.CLI.Linux/bin/Release/net8.0/linux-x64/publish/ Microsoft (R) Build Engine version 16.10.1 for Mono Copyright (C) Microsoft Corporation. All rights reserved. Lib.Core -> /build/eddie-ui-git/src/Eddie/src/Lib.Core/bin/x64/Release/Lib.Core.dll Lib.Forms.Skin -> /build/eddie-ui-git/src/Eddie/src/Lib.Forms.Skin/bin/x64/Release/Lib.Forms.Skin.dll Lib.Forms -> /build/eddie-ui-git/src/Eddie/src/Lib.Forms/bin/x64/Release/Lib.Forms.dll Lib.Platform.Linux -> /build/eddie-ui-git/src/Eddie/src/Lib.Platform.Linux/bin/x64/Release/Lib.Platform.Linux.dll App.Forms.Linux -> /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/App.Forms.Linux.exe BasePath: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux TargetDir: src/App.Forms.Linux/bin/x64/Release/ Arch: x64 Config: Release Building eddie-cli-elevated - Config: Release, Shared: yes Building eddie-cli-elevated - Done Building eddie-cli-elevated-service - Config: Release Building eddie-cli-elevated-service - Done Building libLib.Platform.Linux.Native.so - Config: Release Building libLib.Platform.Linux.Native.so - Done Building eddie-tray - Config: Release Building eddie-tray - If compilation errors occur, remember libayatana-appindicator3-dev package is required. Building eddie-tray - Done Download mkbundle target. If break here, check with mkbundle --list-targets and fix build.sh MKBUNDLECROSSTARGET From: /build/.mono/targets/mono-6.8.0-debian-10-x64 Using runtime: /build/.mono/targets/mono-6.8.0-debian-10-x64/bin/mono Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/App.Forms.Linux.exe Config: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/App.Forms.Linux.exe.config Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/mscorlib.dll Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/Lib.Forms.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Drawing.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/Mono.Security.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Configuration.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Xml.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Security.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Core.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Numerics.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Windows.Forms.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Runtime.Serialization.Formatters.Soap.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/Accessibility.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/Mono.WebBrowser.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/Mono.Posix.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Data.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Transactions.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.EnterpriseServices.dll Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/Lib.Core.dll Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/Lib.Forms.Skin.dll Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/Lib.Platform.Linux.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.CJK.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.MidEast.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.Other.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.Rare.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.West.dll systemconfig: mkbundle.config machineconfig: /build/.mono/targets/mono-6.8.0-debian-10-x64/etc/mono/4.5/machine.config Library: ../../../../../repository/linux_portable/mkbundle/x64/libMonoPosixHelper.so Library: ../../../../../repository/linux_portable/mkbundle/x64/libgdiplus.so.0 Library: /usr/lib/libmono-native.so Generated eddie-ui % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 61556 0 61556 0 0 103k 0 --:--:-- --:--:-- --:--:-- 103k ==> Entering fakeroot environment... ==> Starting package()... -> Installing desktop file... ==> Tidying install... -> Removing libtool files... -> Purging unwanted files... -> Removing static library files... -> Copying source files needed for debug symbols... -> Compressing man and info pages... ==> Checking for packaging issues... ==> WARNING: Package contains reference to $srcdir usr/lib/eddie-ui/eddie-cli usr/lib/eddie-ui/libLib.Platform.Linux.Native.so usr/lib/eddie-ui/eddie-ui usr/lib/eddie-ui/eddie-cli-elevated usr/lib/eddie-ui/eddie-cli-elevated-service ==> Creating package "eddie-ui-git"... -> Generating .PKGINFO file... -> Generating .BUILDINFO file... -> Adding install file... -> Generating .MTREE file... -> Compressing package... ==> Leaving fakeroot environment. ==> Finished making: eddie-ui-git 2.24.5-1 (Fri Dec 13 14:25:25 2024)
  11. From northern Europe the performance is so similar to SG servers, not bad. Wouldn't that be caving in to PRC's narrative? REPUBLIC OF CHINA is written on Taiwan's citizen's passports and on the official government website https://www.taiwan.gov.tw/ . It is the official name freely chosen by Taiwan citizens and democratically elected government. Though I'm afraid that the ambiguity mentioned by Wikipedia is nowadays instrumental to PRC and its omnipresent propaganda. BTW kudos to AirVPN for operating a server in Taiwan and for including Taiwan as a country in the server list, every small action counts. How strange that a self proclaimed PRC critic shares PRC propaganda and doesn't admit ROC existence, while acting as an indignant Taiwan defender. Unless you're an undercover Beijing tramp?
  12. Hello! We confirm the problem and we could determine that both the domain name authoritative DNS and the web site block the Taiwan server. Packets get out regularly from the server and from Taiwan but they are black holed by the final destination datacenters. Furthermore the authoritative DNS does not answer to our DNS server in Taiwan (this is a lesser problem as you could resolve the name through some other public DNS or the hosts file). We don't know the reasons of this behavior. If you query Democracy Now and you receive a reply please let us know. In the meantime we can "micro-route" Democracy Now web site from Sulafat, we will examine how to do it soon. Yes, this is in the official ISO-3166 that Eddie uses to find areas names assigned by the United Nations. According to a previous administrative division, Taiwan is the biggest province of the Republic of China (ROC), not to be confused with People's Republic of China (PRC, mainland China). By using Taiwan as the country's name, "Province of China" is also a definition pushed by PRC at all levels (from UN to NGOs) to shape two ideas: that PRC must "re-unify" with Taiwan and that when you say "China" you don't talk about the Republic of China, but about the PRC (even PRC detractors fall prey of this propaganda as we can see from this thread). In this sense ISO-3166-2:TW entry could be seen as a concession to PRC narrative and the PRC can "play" over the ambiguity of the definition. In the next version we may either stay with this one, according to the United Nations status (but see here for some arguments against this), or censor the ISO document itself. A UN spokesperson’s statement in May 2024, reiterating that Taiwan is a province of China (referring to PRC and not ROC according to directly or indirectly PRC controlled media), guided by the General Assembly resolution of 1971 (Resolution 2758), is important to see how much energy PRC spends to affirm the notion that there is only one China and this only China is PRC and not ROC. On the other hand, we have been fighting and circumventing mainland China (PRC) censorship for 14 years, we recognize China (PRC) as a country enemy of the Internet, controlled by a regime hostile to various human rights, and in reality resolution 2758 interpretation may have been distorted by PRC.. Therefore ISO-3166-2:TW unilateral modification to delete "Province of China" is not unreasonable for us. The matter will be discussed. However, to insinuate that the normal software usage of an ISO document to translate or find a country/area name means that AirVPN endorses PRC (or PRC alleged wet dream to invade Taiwan) or that AirVPN fails its mission after all the sacrifices brought on to circumvent censorship in mainland China is offensive to say the least, or not in good faith in the worst case. The very fact that we list the server in Taiwan with Taiwan as a country tells a lot, as today Taiwan is recognized as a country only by 12 countries in the world. Kind regards
  13. Nope, this is the correct designation. Taiwan province is part of The People's Republic Of China and will be peacefully reunited one day.
  14. Disappointed this is called "province of China" in Eddie, hope this is an oversight.
  15. I love seeing new servers in new countries, thank you! However, I connected to the Taiwan ("province of China", really?) server today and tried to watch my daily news from Democracynow [dot] org and it wouldn't load the page. I then switched to one of the new USA servers in San Jose and it loaded the page just fine. I wonder who or what is preventing the Democracynow page from loading? I also wonder if any other pages with "democracy" in them will be blocked on that server or if it's the web site, are they blocking it because it's a Chinese-named server? As a non-tech savvy user I'm guessing it's the web page that's blocking it but that's only a guess although I imagine Democracynow would want "province of China" people to watch their show.
  16. You know, it's sort of sad to think that you must fall into the darkness just because you are not belonging to the "overwhelming majority of the world". China, Russia, Belarus, Venezuela, Turkmenistan, Egypt, Turkey. Who's next? I know we are all the "third world" but we are people and want the information! If no one will lend us a hand from the greater world, where life is still okay, we won't ever make it out of the darkness.
  17. Look, this is something you can easily look up yourself by searching for a single word: china. https://airvpn.org/search/?&q=china&search_and_or=or You find things like: .
  18. I'm planning to go to China soon and am wondering how to use AirVPN in China (if possible at all). Thanks for any info given
  19. Yes, direct OpenVPN, Wireguard and even Tor is now blocked at the TLS handshake stage, because any traffic containing no recognizable data is now rejected by default (just like in China). Currently this may be circumvented by using SSH or SSL wrapping. More on how to set up an SSH tunnel is here, and the same about SSL is here. The method is this: you first start an SSL or an SSH client in proxy mode, it connects to a remote AirVPN server, then you start a normal OpenVPN client but specifying it to connect to 127.0.0.1:proxy_port instead of a remote AirVPN server. All the needed settings are already in the config files generated by the Config Generator. The connection will still be slow and possibly unreliable. I guess DPI is trying to analyze all traffic going to the foreign servers (besides YouTube, Google, etc.) and throttles it if some statistical patterns are detected. The solution for Tor is to use a webtunnel bridge - those were recently implemented and use the same "fake HTTPS traffic" approach.
  20. I am guessing that China has blocked all AirVPN IPs. If you connect to any AirVPN server and try to access any China websites (such as baidu.com), you get connection timeouts. Can this be fixed?
  21. According to this definition there is no censorship at all anywhere enforced by governments, not in North Korea, not in France, not in China... Please note that your definition is pure fantasy, if not insulting. Censorship is exactly suppression of speech, public communication, or other information subversive of the "common good", or against a given narrative, by law or other means of enforcement. The fact that censorship is enforced by law or by a government body does not make it less censorship. Furthermore, historically censorship was an exclusive matter of some central authority (the first well documented case is maybe the censorship rules to preserve the Athenian youth, infringed by Socrates, for which he was put to death, although the etymology comes from the Roman Office of Censor which had the duty to regulate on citizens' moral practices) and today censorship by governments is predominant. Even In modern times censorship through laws has been and is predominant and pervasive according to Britannica and many academic researches. Then you can discuss ad nauseam whether censorship by law is "right" or "wrong", whether France's censorship is "better" than China's censorship, but you can't change the definition of censorship, otherwise this discussion will become delirious. Kind regards
  22. Let's be clear. French web isn't closed, we can consult foreign websites unlike in North Corea, Russia or China. Name me any propagandized country who allows his people to consult other medias. Telling we wouldn't see anything is insulting our intelligence. Why don't we talk about US government who wants to ban TikTok, like Huawei and many others ? The difference between Rumble in France and Tiktok in US is pretty simple. Tiktok didn't boke US laws so the government had to find excuses related to "national security". Rumble hosts prohibit contents according french and european laws. France asked to Rumble to remove these contents (accounts belonging to russian medias doing disinformation (these medias are not only banned in France but also in whole Europe), to far right ppl, etc...). In France you're not allowed to publish anti-semitic speech in front of a nazi flag and that's normal. Sorry to tell you but it's the only truth, there's no conspiracy theory in this affair.
  23. Correlation != Causation. What if the service was set up by a desperate party because Russia banned VPN usage? Don't you think it makes sense? If you are a Russian in Russia and you cannot pay for the VPN services around the world because of sanctions (those services would give you a less restricted internet, after all), wouldn't you try to find a service which accepts whatever payment processors are available to you? Exactly – learn Russian or ask someone like me to translate for you. Don't go through the world, fingers pointing in crude directions, and voicing mere suspicions. No, it doesn't. Yandex is what Google is to US, or Tencent to China – a provider of various internet services tailored to a specific ethnic group's market. Yandex has got its own networks, which includes targeted advertising and analytics. Why shouldn't Yandex be allowed to offer their services to Russian diasporas across the world? Betteridge's law of headlines states that "any headline that ends in a question mark can be answered by the word no".
  24. I'm curious to know if @Lao8 could fix their issue. I'm looking to use it in China.
  25. There are increasing reports about AirVPN not working with cellular networks in Russia. I've been contacted more frequently by other Russians about this recently but so far there are no definitive solutions. Try the following configuration that works in China:-- Люди рассказывают всё больше и больше о проблемах с соединением к AirVPN через российские мобильные сети. Мне в последнее время многие россиане лично пишут, но пока решении нету. Попробуйте верхнюю конфигурацию, работающюю в Китае.
×
×
  • Create New...