🆕 Software Suggestion | Consider adding AzireVPN after consult about issues #1436
Labels
No Label
🔍🤖 Search Engines
approved
dependencies
duplicate
feedback wanted
high priority
I2P
iOS
low priority
OS
Self-contained networks
Social media
stale
streaming
todo
Tor
WIP
wontfix
XMPP
[m]
₿ cryptocurrency
ℹ️ help wanted
↔️ file sharing
⚙️ web extensions
✨ enhancement
❌ software removal
💬 discussion
🤖 Android
🐛 bug
💢 conflicting
📝 correction
🆘 critical
📧 email
🔒 file encryption
📁 file storage
🦊 Firefox
💻 hardware
🌐 hosting
🏠 housekeeping
🔐 password managers
🧰 productivity tools
🔎 research required
🌐 Social News Aggregators
🆕 software suggestion
👥 team chat
🔒 VPN
🌐 website issue
🚫 Windows
👁️ browsers
🖊️ digital notebooks
🗄️ DNS
🗨️ instant messaging (im)
🇦🇶 translations
No Milestone
No Assignees
1 Participants
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: privacyguides/privacytools.io#1436
Loading…
Reference in New Issue
No description provided.
Delete Branch "%!s(<nil>)"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Description
From discussion in Matrix with Linda, We could consider adding AzireVPN but the following issues would need to be solved:
Based on https://git.zx2c4.com/blind-operator-mode/about/ it seems rather irresponsible to use that module. It also seems like it would be rather easy to work around it. If you have root access you could unload it, if you operate a server further up the network you'd be able to use tcpdump anyway.
well it does, its just not strong anonymity but yes I think they should take out the word "anything" otherwise it is false marketing
And remove that, because a person like that will have state actors that will employ fingerprinting etc, a VPN should not be recommended where life longevity/imprisonment is an issue
Agreed, system logs usually don't have anything too sensitive in them anyway
It could very well be the image they run is fairly "generic" and the configuration is pushed by something like ansible/saltstack, in that case they support "templating" from a vault of secrets.
Ie configs have things like
{{ sensitive_value }}
and during run time the operator must open an encrypted volume, where the contents of{{ sensitive_value }}
is to have it substituted inThat means if a server goes "offline" it needs operator access to bring it back up, but the assumption is customers will move to another working server if all operators are busy.
Okay so after doing a bit more research it's not easy to unload. Also reading their security page that seems evident. I wouldn't depend on it to protect me. It's not part of our criteria so if they want to run that on their servers it's really not going to mean much to us. Many providers probably do not as they are concerned about breaking things.
The source seems available to me. We do trust that the source that is there is the source they are running. That trust is implicit when you use any VPN service.
We would give them the not-audited badge as they haven't been externally audited. They would get the IPv6 badge along with Mullvad https://github.com/privacytoolsIO/privacytools.io/issues/1435
I would like to know specifically what part is not GDPR compliant as This is not my area
I would be sure this is in the context of torrents and general P2P related materials. Realistically it's not the most sinful thing they could say. As you said:
Looking at their website they do say "and trackers" without being really clear what trackers.
To be honest I'm only opposed to marketing which makes a VPN sound like a "silver bullet" that can "perform miracles" and should be "used to avoid the NSA and state level agencies". I do not get that vibe from AzireVPN.
We all know the ones that do that...
This one bothers me more than the previous ones. I guess it's because a whistle blower should be very careful about "who knew what they are blowing the whistle on", and whether it would lead back to them. I would bet that is how they would get apprehended, not through technical means unless they were consistently releasing some kind of data. That doesn't generally seem to be the case, usually it's a dump of documents to the media. Then in that case something like SecureDrop (which requires Tor) makes more sense.
Possibly if it said "Help protect your identity as as a...." would sound better. Incidentally that's what is said on their "About Us" page:
It may very well have been a slip of the tongue. Their about us page sounds a lot less grand and down to earth.
This once again is not part of our criteria. In fact we do warn to not rely on a "no logging policy".
I asked about this in irc://irc.freenode.net/#AzireVPN and got the answer I suspected:
In regard to:
Looks like it has been published here: https://www.azirevpn.com/privacy
1-From what I see they have stopped informing users through their social media
2-There are a lot of change compared to the latest privacy policy (where's matomo ??)
https://webcache.googleusercontent.com/search?q=cache:Mdah6pk3GiEJ:https://www.azirevpn.com/sv/privacy+&cd=1&hl=sv&ct=clnk&gl=se&client=ubuntu
If we're talking ease of use, Mullvad already implements WireGuard in their open-source Rust app. Someone looking for an easy-to-use WireGuard VPN for Linux can just use Mullvad's Rust app.
I don't think that guide is unclear on openresolv vs resolvconf. It says on the site that Debian users "may want to install openresolv rather than Debian's broken resolvconf" and they also link to a more detailed explanation (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860564)
It is mentioned there. Also if you're going to use cache use https://web.archive.org or https://archive.today
Closing as addressed in https://github.com/privacytoolsIO/privacytools.io/pull/1539