Jump to content
Not connected, Your IP:

Search the Community

Showing results for tags 'tor'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



Website URL







XMPP / Jabber




Found 76 results

  1. It seems someone has been running a Tor exit node on Lich and Rasalas servers. Over the past 24 hours I have been banned from a number of websites where Tor is forbidden. Anybody else having issues?
  2. Hello,As we know no VPNs even the safest VPNs like AirVPN or ProtonVPN? are really safe, in fact there is always the problem that none of us users really know if they keeps logs.My solution would be to host running a VPN on a rented VPS server in order to personally manage it.To do so I do not want to limit at something pre-compiled, such as "digital ocean", infact my plan is to run it in Softether host inside a VPS.The scheme should be so: Within a Windows Server VPS placed in some data center run VMware emulating another operating system, within this guest run Softether host app.Then connect via VPN tunnel from Softether host app to my real domestic PC. I just wonder if the VPS server owner or the VPS internet operator itself could actually trace the source back to my real PC even though ill establish a VPN tunnelling from softether to my actual pc. PS: The idea of ​​running everything inside a VM instead of into just the VPS itself is to make the Softether logs inaccessible to a potential attacker protecting them in a shell, plus mask the imei and the operation system.I look forward to understand if they (NSA or potential attackers) would have some way to track back the encrypted VPN connection from Softether to my current PC
  3. Hi, I know that you can't use network lock in conjunction with the Tor over VPN feature, but I don't want to have to choose between extra anonymity and the scare of a possible leak. Is there anyway to use the Tor over VPN feature, while also using a killswitch? I've looked around the forums here and on other sites, but I haven't found anything useful or that actually worked. So how do other people find a way to use Tor over VPN with a kill switch type fail safe? I use a mac computer along with the eddie application.
  4. This is how I use Tor browser and based of my inspection of real time tcpdump I feel certain that it is Tor over VPN. I.e. My ISP can only see an OpenVPN tunnel and the AirVPN exit server knows the Tor entry node: I run openvpn in a terminal widow using only TLS encrypted AirVPN servers and the ovpn files are modified to include update-resolv-conf (repeatedly successfully tested at https://ipleak.net). I have IPv6 disabled in GRUB. After the OpenVPN tunnel is establish I open Tor Browser. If I run tcpdump monitoring my Ethernet adapter the only IP addresses I see are my local LAN IP and that of the AirVPN server it is connected to. My conclusion: My ISP cannot see the Tor traffic. If run tcpdump monitoring tun0 I can see the Tor traffic between the onion sites and the AirVPN assign public address only. I never see my local LAN IP. I just wanted an objective opinion from someone else: Am I correct in concluding I am running "Tor over VPN"?
  5. hi. as indicated in the topic... i set up auth. via a hashed password in torrc. i'm dead sure i'm copying same hash over to eddie (with the 16:prefix). one output only: Unable to communicate with Tor (515 Authentication failed: Password did not match HashedControlPassword *or* authentication cookie.). Is Tor up and running? Tor is detecting that control connection, but not complaining about auth issues (in the output). [notice] New control connection opened from
  6. Hi! I've been a long-time AirVPN user and I love the service and the fact that it's run by people who truly believe in their mission and not as a commercial venture. I've been wondering if it might be a good thing to do to use a VM with another OS/browser, through another AirVpn server for websites that have access to my personal data. I've set the VM up, but it's not as fast as my host system, perhaps because I'm using an intergrated GPU? I'm not sure if inserting a dedicated GPU could improve performance (I have a good one lying around), but it still would be more hassle anyway to browse the Internet this way. Do you guys think it's worth it? Otherwise, are there any good and convenient methods to obfuscate your identity and avoid fingerprinting? Could using Torbrowser, for example, be a better solution? (I'm already using https://airvpn.org/topic/15769-how-to-harden-firefox-extreme-edition/?hl=fingerprinting this Firefox setup and I'm getting quite a low fingerprinting rating, btw) Thanks!
  7. Hello, I am still a VPN newbie so I thought I would ask these questions on this forum to get a better idea of how the service works. Allow me to ask three of them: 1. Purely theoretically, if a law enforcement agency such as the FBI was suspecting somebody was using one of your servers for illegal purposes (whatever they may be), and sent you an official letter to share information about the usage of the VPN server in question at any given point in time (for example, the VPN server was used to access a Gmail account at a particular time, and the FBI would reach out to you and ask you who used that VPN server exactly at that time), how would AirVPN respond? Do you have, as a service provider, a legal obligation to respond to such requests? As far as I know, you do not keep any logs, so would there be any information that you would even be able to give to the law enforcement agency? I would really appreciate elaboration from you on how this scenario would play out. Not that I want to do anything illegal, it is just a theoretical question. 2. I read somewhere on the internet that if a VPN provider says they do not keep logs, it is often a false statement, and even if they do not keep logs, usually the upstream ISP of the VPN provider (the ISP through which the VPN servers are connected to the Internet) do keep logs. I would like to ask you what you think of this theory and whether it may represent a potential risk of logging. In other words, even if you do not keep any logs at all yourself, can it be a potential security risk that the upstream ISP you use for your servers does keep logs, and, as a result, could potentially give this logging information to potential law enforcement agencies? 3. If I use AirVPN over Tor, meaning I connect from my computer to the Tor network first and from there to the VPN server, will the Tor exit node periodically change in order to make the route more anonymous? Because if the Tor exit node did not change and an attacker was controlling both the guard (entry) Tor node I would be connecting to, as well as the Tor exit node that would be connecting to the VPN server, although the attacker would not be able to see the actual traffic, he would see the amount of bytes flowing through from one end to the other, and if the attacker also got control of, for example, the websites I would be visiting via the AirVPN server, he could correlate the amount of bytes flowing from my real IP to the entry node, then through to the exit node and finally to the destination server of the websites I would be visiting, thereby deanonymizing me. So that is why I am asking if the exit node changes when the traffic is routed through the AirVPN over Tor channel. If it does, I think I can feel safer?
  8. Hi, I am getting several alert entries in my pfsense firewall. There are connections denied to 4 different TOR relays in the US, Switzerland, Germany and the Netherlands. I never had these entries before so I am a bit worried. Example: AirVPN_LAN Source: 192.168.1.xxx:476xx Destination: Any ideas?
  9. Hi, Totally new to doing VPN over TOR. I'm just seeing what its like to set up. I'm using an iMac 27" macOS 10.13.3 & Eddie 2.12.4. I have Tor Browser installed and running fine, its connected to TOR. I followed the instructions on this page: https://airvpn.org/tor/ - In Preferences for Eddie Proxy/Tor>Type>Tor I clicked the test and Eddie indicates there is connectivity to Tor. Am I actually running the VPN through TOR as it is? See images. The Test indicates there is connectivity. But how do I know the VPN traffic is running through TOR? ipleak.net doesn't indicate any tor exit node. Any help or suggestion will be appreciated. Cheers.
  10. According toTails support This is the exact situation since I updated OpenVPN to 2.13.6 Is the fixed Tor entry guard AirVPN sponsored?
  11. I upgraded to 2.13.6 and since then I noticed the Tor entry node remains constant regardless of what I try. Shouldn't the Tor circuit "This browser" to first Tor node change whenever I request a new Tor circuit? Does this mean Tor browser does not go through AirVPN first? How can I fix this?
  12. Hello, maybe I'm too paranoid but nonetheless. I want to establish connection to AirVPN servers over Tor, so I open Eddie, go to preferences -> Proxy/Tor -> Type Tor and click Test button. It says that everything works fine. My question: when I will try to login into my account, will authorization be transmitted through Tor -> AirVPN or authorization request will be transmited directly to AirVPN servers (i.e. my home ip -> AirVPN)?
  13. In the latest version of Tor Browser, traffic analysis resistance has been added, which makes Passive website fingerprinting attacks harder for an attacker. Tor Browser 7.0.6 is released Connections between clients and relays now send a padding cell in each direction every 1.5 to 9.5 seconds (tunable via consensus parameters). This padding will not resist specialized eavesdroppers, but it should be enough to make many ISPs' routine network flow logging less useful in traffic analysis against Tor users. Padding is negotiated using Tor's link protocol, so both relays and clients must upgrade for this to take effect. Clients may still send padding despite the relay's version by setting ConnectionPadding 1 in torrc, and may disable padding by setting ConnectionPadding 0 in torrc. Padding may be minimized for mobile users with the torrc option ReducedConnectionPadding. Implements Proposal 251 and Section 2 of Proposal 254; closes ticket 16861. Relays will publish 24 hour totals of padding and non-padding cell counts to their extra-info descriptors, unless PaddingStatistics 0 is set in torrc. These 24 hour totals are also rounded to multiples of 10000.​tor-0317-now-released
  14. Hi, id like to: vpn -> tor in a vm but, i cant connect to tor, its stucked at: Establishing a tor circuit or: connecting to tor maybe i should allow it in address allowed?
  15. Hi guys! I set up my Windows 7 PC by this instruction: https://airvpn.org/topic/3405-windows-comodo-prevent-leaks/. It's a nice HOW-TO guide and i'm very grateful for it, but is there any similar guide to add TOR before my VPN connection? I tried to find some info on this forum, but I couldn't. So, if anybody knows links to HOW-TO guides please give it to me. Thank you! P.S. - I know about Eddie, but i really want to set up it with OpenVPN.
  16. dear community, I've read through https://airvpn.org/tor/ twice, studied some other materials and one thing is still not clear to me. I hope you can help me out here. I want to do my best to make my desired activity with as much privacy as possible. I don't care if my ISP sees Tor traffic, so I chose VPN over Tor. I've followed the guide here https://airvpn.org/tor/ and set my Tor and AirVPN windows client accordingly. I don't need use network lock, because I run a clean VM just for this. "Test" button in AIrVPN's settings says my Tor config is alright. So what I do: Start Tor, start airVPN, connect VPN. As described in the guide: What I would expect is, that when I use Tor browser to browse sites, my traffic goes through Tor AND through VPN. This doesn't happen, also when I browse with Tor, I don't see the traffic numbers in AirVPN client move. Alright. Question: how do I access the site then, when I want to be covered in a way, that there is: ME -> Tor -> VPN -> site, rather than ME -> Tor -> site and ignore the VPN? I can't just open another Tor browser (it won't allow me). What am I not getting here? When I open firefox/chrome of course I have VPN's public IP, whether the traffic goes through Tor I don't know, I guess it is, but I want to browse the sensitive site with Tor.
  17. Hello, I am not able to use AirVPN when using obfs4 bridges in Tor. I have found these threads on the topic, but none of them seem to give a conclusive solution: TOR (obfs) & AirVPN not workingTor with obfs4 - can't connect to airvpnI am running the latest 64-bit version of Eddie (2.11.10) and Tor 6.0.8 on Windows x64. I have been very careful to check that IP and ports in Tor network settings (Options --> Advanced --> Network --> Settings) match the ones in the "Proxy/Tor" section of Eddie preferences. Eddie log: I 2017.01.14 03:26:55 - Session starting. . 2017.01.14 03:26:55 - IPv6 disabled with packet filtering. I 2017.01.14 03:26:55 - Checking authorization ... . 2017.01.14 03:26:56 - Tor Control authentication method: Cookie, from C:\Users\<username>\Documents\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookie E 2017.01.14 03:26:56 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running? I 2017.01.14 03:26:59 - Cancel requested. . 2017.01.14 03:26:59 - IPv6 restored with packet filtering. . 2017.01.14 03:26:59 - Flushing DNS ! 2017.01.14 03:27:07 - Session terminated. Tor Log: ... 14/01/2017 03:26:56.000 [NOTICE] New control connection opened from ​... As soon as I disable obfs4 bridges, AirVPN and Tor work flawlessly (Using AirVPN with Tor) I actually run out of options and any help would be appreciated. Thanks.
  18. Using Windows 10 here. I'm trying to use VPN over Tor, but it's not working! My exit IP is the Tor one and i don't know what to do, since i already followed this: https://airvpn.org/tor/ I'm already with Tor marked in the connection mode, so i test and it says ok, and then i save it. I do this with the Tor Browser already open. I've also already read the "Tor Control Authentication" section of the link above and checked the Torrc file. And there is already the "ControlPort 9151" and the "CookieAuthentication1" writted. In the article above, it also says that i should run from a terminal some kind of code, but it looks like something for Linux distributions. What should I do?
  19. Hey guys, i'm brand new to Air vpn and vpn's in general, and I can't figure out how to run the vpn through tor. I am trying to figure out how to get the signal chain to look like this (Computer+vpn encription---->tor----->vpn----->internet. I have tried changing the settings in vpn under preferences to the tor connection option, it says connection successful, but then when I look up my ip through tor it shows the tor exit node ip meaning that anybody can see i'm using tor. Any tips would be great.
  20. music5


    hi all, could somebody/anybody tell me how the set up for channeling TOR thru AIRVPN. looked in forums and can't find s............ thanks in advance.
  21. Hey, everyone: I've read some material on Tor on this website, but still not sure if I should be using Tor with AirVPN or not. Does it enhance my security and anonymity if I do? Is it just better to use AirVPN? Seems like just using a VPN is more straightforward and less complicated (which is always a plus for me, since I'm not very knowledgeable regarding networking technologies). What are your thoughts?
  22. Protonmail launched a Tor Hidden Service, any comments or questions? https://protonmail.com/blog/tor-encrypted-email/ onion link https://protonirockerxow.onion Onion server Certificate should be verified before logging in. Sha256 D6:D5:26:07:F9:5F:41:D3:92:AD:EE:59:CE:29:AB:E0:B3:E8:2F:30:EA:1E:6B:8F:9D:12:09:42:F0:35:BB:65
  23. There is a great app allows users to easily anonymously share files using Tor. Comments? https://onionshare.org And it is open source. https://github.com/micahflee/onionshare
  24. Hi, I have searched a lot to achieve this. I am looking for a comprehensive step by step (being a novice in this area) to setup a separate Virtual Access point in a DD-WRT router which uses OpenVPN and TOR (This feature is available in latest version of DD-WRT) at the same time. Also I want to ensure that any traffic goes through this VAP only if OpenVPN is up and running. I want to have OpenVPN on port 443 (TCP) due to aggressive DPI by local ISPs for VoIP. Looking to hear from experts I have gone through some guides (no.1 and no.2) but these aren't completely covered or not most relevant.
  • Create New...