We now have servers in Canada. For now, we don't have servers in the USA. We just lost two suppliers that do not want to relay anonymous traffic in the USA. We hope to remedy this soon. 阅读更多内容
Version 49 is now available for download. It contains a patch against the FREAK vulnerability. Users of our client for Windows and OSX need to upgrade to the new version. Users of our Linux client should get automatically patched through their distribution.Users of plain OpenVPN should download new configuration files and update their OpenVPN client. 阅读更多内容
The recently disclosed vulnerability in OpenSSL named FREAK can be used to attack OpenVPN clients. We have released a new version of the client with a patch, as well as published a blog post explaining the technical details. 阅读更多内容
The default OpenVPN stream cipher in new clients and new configuration files is now AES-256. When encountering certain connection problems the client program will fall back to Blowfish 128. To use nothing but AES, set "cipher = aes256" in Settings -> Advanced. 阅读更多内容
It has come to our attention that the new WebRTC standard can be used to expose the real public IP of people connected through a VPN-service. In short WebRTC allows users to have video and audio communications directly in the browser without any plugins installed, IPs being exposed is an unfortunate side-effect of how this works. 阅读更多内容