Search the Community
Showing results for tags 'Logging'.
Found 6 results
-
Hello, I am still a VPN newbie so I thought I would ask these questions on this forum to get a better idea of how the service works. Allow me to ask three of them: 1. Purely theoretically, if a law enforcement agency such as the FBI was suspecting somebody was using one of your servers for illegal purposes (whatever they may be), and sent you an official letter to share information about the usage of the VPN server in question at any given point in time (for example, the VPN server was used to access a Gmail account at a particular time, and the FBI would reach out to you and ask you who used that VPN server exactly at that time), how would AirVPN respond? Do you have, as a service provider, a legal obligation to respond to such requests? As far as I know, you do not keep any logs, so would there be any information that you would even be able to give to the law enforcement agency? I would really appreciate elaboration from you on how this scenario would play out. Not that I want to do anything illegal, it is just a theoretical question. 2. I read somewhere on the internet that if a VPN provider says they do not keep logs, it is often a false statement, and even if they do not keep logs, usually the upstream ISP of the VPN provider (the ISP through which the VPN servers are connected to the Internet) do keep logs. I would like to ask you what you think of this theory and whether it may represent a potential risk of logging. In other words, even if you do not keep any logs at all yourself, can it be a potential security risk that the upstream ISP you use for your servers does keep logs, and, as a result, could potentially give this logging information to potential law enforcement agencies? 3. If I use AirVPN over Tor, meaning I connect from my computer to the Tor network first and from there to the VPN server, will the Tor exit node periodically change in order to make the route more anonymous? Because if the Tor exit node did not change and an attacker was controlling both the guard (entry) Tor node I would be connecting to, as well as the Tor exit node that would be connecting to the VPN server, although the attacker would not be able to see the actual traffic, he would see the amount of bytes flowing through from one end to the other, and if the attacker also got control of, for example, the websites I would be visiting via the AirVPN server, he could correlate the amount of bytes flowing from my real IP to the entry node, then through to the exit node and finally to the destination server of the websites I would be visiting, thereby deanonymizing me. So that is why I am asking if the exit node changes when the traffic is routed through the AirVPN over Tor channel. If it does, I think I can feel safer?
-
Hi all, I saw this slightly old TF article and I was wondering if any of the AirVPN had any comments on it? Canadian ISPs and VPNs Now Have to Alert Pirating Customers Not being Canadian, I am not aware of the background, but as a lot of AirVPNs servers are based in Canada is anyone worried about this? I could select other countries I guess, but Eddie seems to love connecting to Canada for latency reasons. Many thanks,
-
Hi all, I have the Linux AirVPN Eddie Client 2.8.8 running on Lubuntu. When I try to "Save As" the log files from the GUI it defaults to a "Desktop" directory. As you can see on the attached screenshot, I saved a log file called AirVPN_log.txt. However, it seems that this is not really my desktop. The saved file doesn't show up on my desktop and other files that are on my desktop don't show up in the "Save As" Desktop folder... From the "Save As" dialog I can not navigate to any folder that is familiar to me. There is also no way to open, delete or move files already saved (like the AirVPN_log.txt file). My question is: where does AirVPN save these log files? I can not find the AirVPN_log.txt anywhere on my system, still the Eddie Client seems to have saved it somewhere. Thanks in advance
-
[Copied from https://torrentfreak.com/canada-wants-vpns-to-log-and-warn-pirating-customers-131011/] It looks a lot like this is going to have an impact on AirVPN's canadian servers...
-
So I saw a post about this incident a while ago, except it was based on a message board discussion that was in Dutch making hard for non-Dutch-speakers to follow. However, now a post in English has been written about it here: http://www.wipeyourdata.com/other-data-erasing/no-logs-earthvpn-user-arrested-after-police-finds-logs/ Basically a user of EarthVPN - which claims to be non-logging - was presented with logged evidence that he had made bomb threats against his school. EarthVPN claimed that this was because the datacenter had decided to start logging without them knowing. The author of this article suggests that a multi-hop VPN setup would make this IP transfer logging much less of a privacy concern. I posted a thread with related questions here but got no response: https://airvpn.org/topic/10638-entryexit-ip-addresses/ Is it possible that AirVPN servers could be vulnerable to this kind of datacenter logging, and if so does a multihop setup mitigate that risk? Is such a multihop setup already in place and to what extent?
-
Hi, I'm a bit surprised to see that you are able to have top 10 stats on your site. That make me feel you are keeping some kind of logs for this. I wonder how this works out with your "no logs" policy ? Thanx for your Reply