Sunday, December 30, 2018

Shadowsocks安卓版客户端(v4.6.5)

@madeye madeye released this 2 hours ago · 1 commit to master since this release

Assets12

Minor bug fixes.

原文:https://github.com/shadowsocks/shadowsocks-android/releases/tag/v4.6.5



via 细节的力量 http://bit.ly/2Sux8jl

Shadowsocks安卓版客户端(v4.6.5)

@madeye madeye released this 2 hours ago · 1 commit to master since this release

Assets12

Minor bug fixes.

原文:https://github.com/shadowsocks/shadowsocks-android/releases/tag/v4.6.5



via 细节的力量 http://bit.ly/2AmDrhT

赛风3(安卓版)-211版

直接下载:https://psiphon.ca/PsiphonAndroid.apk

Google Play商店中的赛风安卓版:https://play.google.com/store/apps/details?id=com.psiphon3

电邮索取:get@psiphon3.com

原文:https://psiphon.ca/zh/download.html



via 细节的力量 http://bit.ly/2Sux5UH

赛风3(windows版)-140版

直接下载:http://bit.ly/1H3gaeR

电邮索取:get@psiphon3.com

原文:http://bit.ly/10PMX98



via 细节的力量 http://bit.ly/2AnbHtH

XX-Net V3.13.1

@xxnet xxnet released this 11 days ago · 6 commits to master since this release

Assets3

What is new:

  • google update the front server yesterday, old version can’t work. so this is a patch version to update for the new policy

technical notice:

  • in google’s new front server policy, only hundrands of ip can work for gae.
    we update the ipv6 list file.
  • fake SNI will no longer work with google front server, no SNI is ok.

新版特性

  • google昨晚更新了服务器策略,旧版本无法工作,这个版本更新了google 的策略。

技术说明:

  • 新的策略下,google只有几百个ip可以作为GAE的前端服务器,我们更新了这个Ip列表。
  • 前端服务器不再支持假的SNI,但空白的SNI仍然能够工作。

原文:https://github.com/XX-net/XX-Net/releases/tag/3.13.1



via 细节的力量 http://bit.ly/2Sux435

vpngate-build-9669

原文:https://www.vpngate.net/cn/download.aspx



via 细节的力量 http://bit.ly/2AontUK

蓝灯5.2.2版下载地址

蓝灯最新版下载地址 Download address for latest version of Lantern

最新版本下载地址(更新版本会使用同样的下载地址)。 请大家收藏本页,方便以后更新。 Bookmark this page to download the latest versions in the future.

若无法使用,请看蓝灯常见问题解决办法 If you have a problem when using Lantern, please refer to Q&A

Windows 版本(要求XP SP3以上) Windows Version (XP SP3 and above) 备用地址Alternative address

安卓版(要求4.1以上) Android(ver4.1 and above 备用地址 Alternative address Google Play 下载 Download

蓝灯iOS版本将在2019年发布

macOS (10.7及以上) 备用地址 Alternative address

Ubuntu 14.04 32位 Ubuntu 14.04 64位

如果不确认蓝灯安装文件是否为官方,请检查双击打开的对话框。如下图所示发行商为Brave New Software Project, Inc的就是官方版本。如果没有如下图所示的发行商,请勿安装。

Lantern is developed by Brave New Software Project, Inc. Please verify before installation in case of any malware or fake Lantern.

image

原文:https://github.com/getlantern/download/wiki



via 细节的力量 http://bit.ly/2Sux1UX

New Release: Tor 0.3.5.6-rc

There’s a new alpha release available for download. If you build Tor from source, you can download the source code for 0.3.5.6-rc from the download page on the website. Packages should be available over the coming weeks, with a new alpha Tor Browser release by early February.

Remember, this is an alpha release: you should only run this if you’d like to find and report more bugs than usual.

Tor 0.3.5.6-rc fixes numerous small bugs in earlier versions of Tor. It is the first release candidate in the 0.3.5.x series; if no further huge bugs are found, our next release may be the stable 0.3.5.x.

Changes In Version 0.3.5.6-Rc – 2018-12-18

  • Minor features (continuous integration, Windows):
    • Always show the configure and test logs, and upload them as build artifacts, when building for Windows using Appveyor CI. Implements 28459.
  • Minor features (fallback directory list):
    • Replace the 150 fallbacks originally introduced in Tor 0.3.3.1-alpha in January 2018 (of which ~115 were still functional), with a list of 157 fallbacks (92 new, 65 existing, 85 removed) generated in December 2018. Closes ticket 24803.
  • Minor features (geoip):
    • Update geoip and geoip6 to the December 5 2018 Maxmind GeoLite2 Country database. Closes ticket 28744.
  • Minor bugfixes (compilation):
    • Add missing dependency on libgdi32.dll for tor-print-ed-signing- cert.exe on Windows. Fixes bug 28485; bugfix on 0.3.5.1-alpha.
  • Minor bugfixes (continuous integration, Windows):
    • Explicitly specify the path to the OpenSSL library and do not download OpenSSL from Pacman, but instead use the library that is already provided by AppVeyor. Fixes bug 28574; bugfix on master.
  • Minor bugfixes (onion service v3):
    • When deleting an ephemeral onion service (DEL_ONION), do not close any rendezvous circuits in order to let the existing client connections finish by themselves or closed by the application. The HS v2 is doing that already so now we have the same behavior for all versions. Fixes bug 28619; bugfix on 0.3.3.1-alpha.
  • Minor bugfixes (restart-in-process, boostrap):
    • Add missing resets of bootstrap tracking state when shutting down (regression caused by ticket 27169). Fixes bug 28524; bugfix on 0.3.5.1-alpha.
  • Minor bugfixes (testing):
    • Use a separate DataDirectory for the test_rebind script. Previously, this script would run using the default DataDirectory, and sometimes fail. Fixes bug 28562; bugfix on 0.3.5.1-alpha. Patch from Taylor R Campbell.
    • Stop leaking memory in an entry guard unit test. Fixes bug 28554; bugfix on 0.3.0.1-alpha.
  • Minor bugfixes (Windows):
    • Correctly identify Windows 8.1, Windows 10, and Windows Server 2008 and later from their NT versions. Fixes bug 28096; bugfix on 0.2.2.34; reported by Keifer Bly.
    • On recent Windows versions, the GetVersionEx() function may report an earlier Windows version than the running OS. To avoid user confusion, add “[or later]” to Tor’s version string on affected versions of Windows. Fixes bug 28096; bugfix on 0.2.2.34; reported by Keifer Bly.
    • Remove Windows versions that were never supported by the GetVersionEx() function. Stop duplicating the latest Windows version in get_uname(). Fixes bug 28096; bugfix on 0.2.2.34; reported by Keifer Bly.
  • Testing:
    • Increase logging and tag all log entries with timestamps in test_rebind.py. Provides diagnostics for issue 28229.
  • Code simplification and refactoring (shared random, dirauth):
    • Change many tor_assert() to use BUG() instead. The idea is to not crash a dirauth but rather scream loudly with a stacktrace and let it continue run. The shared random subsystem is very resilient and if anything wrong happens with it, at worst a non coherent value will be put in the vote and discarded by the other authorities. Closes ticket 19566.
  • Documentation (onion services):
    • Document in the man page that changing ClientOnionAuthDir value or adding a new file in the directory will not work at runtime upon sending a HUP if Sandbox 1. Closes ticket 28128.
    • Note in the man page that the only real way to fully revoke an onion service v3 client authorization is by restarting the tor process. Closes ticket 28275.

原文:https://blog.torproject.org/new-release-tor-0356-rc



via 细节的力量 http://bit.ly/2AkoUU4

New Release: Tor Browser 8.5a6

Tor Browser 8.5a6 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox and updates OpenSSL to 1.0.2q for our desktop platforms.

The most exciting news, however, compared to the alpha release early last week, comes from progress we made on our mobile builds. Tor Browser 8.5a6 is the first version that is built reproducibly for Android devices and is localized in all locales the desktop platforms support.

Moreover, we added an updated donation banner for our year-end donation campaign.

Known Issues:

  1. This release is only supported on armv7 devices (most Android phones and tablets), but x86 devices are notsupported yet (such as Chromebooks), even if the Google Playstore is suggesting different things.
  2. Downloading files on newer Android devices crashes Tor Browser. We are currently reviewing a potential fix.

The full changelog since Tor Browser 8.5a5 is:

  • All Platforms
  • Update Firefox to 60.4.0esr
    • Update Torbutton to 2.1.3
      • Bug 28540: Use new text for 2018 donation banner
      • Bug 27290: Remove WebGL pref for min capability mode
      • Bug 28075: Tone down missing SOCKS credential warning
      • Bug 28747: Remove NoScript (XPCOM) related unused code
      • Translations update
    • Bug 28608: Disable background HTTP response throttling
    • Bug 28695: Set default security.pki.name_matching_mode to enforce (3)
    • Bug 27290: Remove WebGL pref for min capability mode
    • Bug 27919: Backport SSL status API
    • Bug 25794: Disable pointer events
  • Windows
    • Update OpenSSL to 1.0.2q
    • Bug 28740: Adapt Windows navigator.platform value on 64-bit systems
  • OS X
    • Update OpenSSL to 1.0.2q
  • Linux
    • Update OpenSSL to 1.0.2q
  • Android
    • Bug 26843: Multi-locale support for Tor Browser on Android
  • Build System
    • Android
      • Bug 25164: Add .apk to our sha256sums unsigned build file
      • Bug 28696: Make path to Gradle dependencies reproducible
      • Bug 28697: Use pregenerated keystore and fix timestamp issues

原文:https://blog.torproject.org/new-release-tor-browser-85a6



via 细节的力量 http://bit.ly/2SuwZfN

New Release: Tor Browser 8.0.4

Tor Browser 8.0.4 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

Tor Browser 8.0.4 contains updates to Tor (0.3.4.9), OpenSSL (1.0.2q) and other bundle components. Additionally, we backported a number of patches from our alpha series where they got some baking time. The most important ones are

  • a defense against protocol handler enumeration which should enhance our fingerprinting resistance,
  • enabling Stylo for macOS users by bypassing a reproducibility issue caused by Rust compilation and
  • setting back the sandboxing level to 5 on Windows (the Firefox default), after working around some Tor Launcher interference causing a broken Tor Browser experience.

Moreover, we ship an updated donation banner for our year-end donation campaign.

The full changelog since Tor Browser 8.0.3 is:

  • All platforms
    • Update Firefox to 60.4.0esr
    • Update Tor to 0.3.4.9
    • Update OpenSSL to 1.0.2q
    • Update Torbutton to 2.0.9
      • Bug 28540: Use new text for 2018 donation banner
      • Bug 28515: Use en-US for english Torbutton strings
      • Translations update
    • Update HTTPS Everywhere to 2018.10.31
    • Update NoScript to 10.2.0
    • Bug 1623: Block protocol handler enumeration (backport of fix for #680300)
    • Bug 25794: Disable pointer events
    • Bug 28608: Disable background HTTP response throttling
    • Bug 28185: Add smallerRichard to Tor Browser
  • Windows
    • Bug 26381: about:tor page does not load on first start on Windows
    • Bug 28657: Remove broken FTE bridge from Tor Browser
  • OS X
    • Bug 26475: Fix Stylo related reproducibility issue
    • Bug 26263: App icon positioned incorrectly in macOS DMG installer window
  • Linux
    • Bug 26475: Fix Stylo related reproducibility issue
    • Bug 28657: Remove broken FTE bridge from Tor Browser
  • Build System
    • All Platforms
      • Bug 27218: Generate multiple Tor Browser bundles in parallel

原文:https://blog.torproject.org/new-release-tor-browser-804



via 细节的力量 http://bit.ly/2Aoq94v

Wednesday, December 5, 2018

作死的搬瓦工推出了Shadowsocks服务

搬瓦工先杀自家低端试验品牌xvmlab,再斩自家年付3.99/4.99/5.99/9.99低价openvz,进而又下架自家年付19.99刀低价KVM套餐,新购买vps用户后台又移除ss和ssr一键安装,一切倒行逆施貌似都是为其推出Shadowsocks服务铺路。

搬瓦工这般作死后,推出的Shadowsocks服务到底怎么样呢,我们一起来看一下,2.88美元一月8个可用的CN2 (GT和GIA) IP月100G流量,只支持ss 加密方式AES256 密码随机,宣称IP后台检测被墙自动更换。

购买地址http://justmysocks.net/members/aff.php?aff=86

速度测试,百兆宽带几百跑满,IP目前都是他家的洛杉矶DC9和DC8机房的,不知道以后会不会增加他家香港机房的。

总之比起国内ss商家搬瓦工ss优势不大,好在搬瓦工服务一向稳定,速度也很快,对于不想折腾自建ss的用户还是一个可以的选择。

经过最近的搬瓦工的折腾,目前来说拥有10G KVM – PROMO 18.74$和2018-11-11 CN2 Special V3 29.88$年付的洛杉矶DC8机房的用户可一定要保留好你的VPS啊,下一代的搬瓦工传家宝就是他们了。



via iGFW https://ift.tt/2EcVfj7

Tuesday, December 4, 2018

蓝灯5.1版下载地址

https://raw.githubusercontent.com/getlantern/lantern-binaries/master/lantern-installer.exe

原文:https://github.com/getlantern/download/wiki



via 细节的力量 https://ift.tt/2EclxSF

无界浏览18.06正式版 (2018年11月23日)

谢谢大家都测试反馈,请升级到18.06正式版.

执行版:
http://wujieliulan.com/download/u1806.exe
SHA512:ea05cf106fed3bcf9c185030b0ea60962892b106a28babe37965eab65ad8e73e609a8be46290be5a21d74413531e8eb1798ee92c3f4edf6fb8c44495c641cd05

压缩版:
http://wujieliulan.com/download/u1806.zip
SHA512:f5e79b136f2f0a2c82cb22bde88a0f9b86f42239f71f8bfab54cbd0ee2ad23405ead64397de18d0e43865a3254a35384c34f8d08e4ea86d288b83ac9afdc6bbd

原文:http://forums.internetfreedom.org/index.php?topic=23293.0



via 细节的力量 https://ift.tt/2Ee658D

无界安卓手机测试版 1.1.3 (2018年11月28)

http://wujieliulan.com/download/u113.apk
SHA512: eeb996077b57ccd31880dec4b52745ec287e75d90bc639072deee36540affde00a8d50523112ad2d5e1c6c8131ffd3fcec371688ce9891cfee5b48c8dd16ab4d
安装:将下载的apk文件拷贝到手机上, 在手机上点击此文件便可安装。如出现“禁止安装”警告,点“设置”,钩选“未知源”,继续安装。

功能与使用:

1. 只支持安卓4.1以上。
2. 只支持整机VPN模式, 不支持代理模式。
3. 开启后,轻触或滑动开关,显示“正在连接 …”,同时时上面会出现一个小钥匙和闪动的无界图标,表示正在连接。
4. 连接成功后无界图标停止闪动,显示“连接成功“。此时您可以使用任何浏览器或app,都在无界加密保护下。
5. 使用时,只要无界图标和小钥匙都在,就在在无界加密保护下。
6. 如果要停止使用,轻触或滑动开关即可。关闭后,无界图标和小钥匙会消失,这时手机直接联网,不在无界加密保护下。
7. 如果问题,可重启手机再运行无界。

注意事项:
1. 建议使用原装的国外的浏览器,如谷歌的Chrome或火狐等。手机自带浏览器或国内的浏览器可能对敏感网站有监控或封锁。
2. 建议使用浏览器的“隐私模式”浏览敏感网站,这样不会留下历史纪录。
3. 如果浏览器不支持“隐私模式”,请手动清除所有历史纪录,或使用清除所有历史纪录的工具。
4. 为安全起见,建议关闭所有浏览器和其他app,再关闭无界,以免直连敏感网站。也可以直接重启手机, 这样最安全。

请大家测试并反馈, 谢谢.

原文:http://forums.internetfreedom.org/index.php?topic=23308.0



via 细节的力量 https://ift.tt/2Srlnda

无界Linux VPN 测试版 18.07a (2018年11月29日)

应大家的要求,增加了自动打开Chome的功能。如果没有安装Chrome, 就不会打开。

谢谢大家测试并反馈.

http://wujieliulan.com/download/u1807a
SHA512: 13f699fe38881c1656608229ab7d1fa7efce4b22573bf419cc3f1f728a6c07331e2901bce3762f3856b5edf2b6452871a32c2a2e989feaf456cecc2f197f7736

使用方法:
下载后在下载的文件夹右键打开一个终端,在终端执行:chmod +x u1807a,然后执行:./u1807a, 终端出现以下信息:
LISTENING 127.0.0.1:9666 (监听 127.0.0.1:9666 )
0.650 Connecting … (正在连接)
1.569 Connecting … (正在连接)
2.178 CONNECTED (连接成功)
需要手动设置浏览器代理。

./u1807a -help 显示使用方法:
Usage of ./u1807a:
-L string
listen address (default “127.0.0.1:9666”)
-M string
“vpn”: turn on VPN mode
-P string
http or sock proxy, example: 1.2.3.4:8080 or socks://1.2.4.4:1080 or socks5://1.2.3.4:1080 or socks=1.2.3.4:1080
-S string
“safe”: turn on VPN safe mode, when exit, do not restore routing until reboot

如需要监听 0.0.0.0,在终端执行: ./u1807a -L :9666
如需要通过代理, 执行: ./u1807a -P 1.2.3.4:8080 或 ./u1807a -P socks://1.2.3.4:1080

运行VPN模式,需要root或sudo, 执行:sudo ./u1807a -M vpn, 输入密码, 终端出现以下信息 (顺序可能不同):
LISTENING 130.0.0.1:9666 (监听 127.0.0.1:9666 )
VPN MODE (VPN模式)
0.650 Connecting … (正在连接)
1.569 Connecting … (正在连接)
2.178 CONNECTED (连接成功)

如需要在VPN下分享:sudo ./u1807a -M vpn -L :9666
LISTENING 0.0.0.0:9666 (监听 0.0.0.0:9666 )
VPN MODE (VPN模式)
0.650 Connecting … (正在连接)
1.569 Connecting … (正在连接)
2.178 CONNECTED (连接成功)

在VPN模式下不需要设置代理,整机都通过无界加密翻墙,不会出现直连。我们还是建议设置代理以避免退出无界后直连,这样更安全。建议使用浏览器的“隐私模式”,这样不会留下历史纪录。退出无界前,最好关闭所有浏览器,以免退出后直连敏感网站。

VPN 安全模式:
为了确保安全,新增了VPN 安全模式: sudo ./u1807a -M vpn -S safe
终端出现以下信息 (顺序可能不同):
LISTENING 127.0.0.1:9666 (监听 127.0.0.1:9666 )
VPN SAFE MODE (VPN 安全模式)
0.650 Connecting … (正在连接)
1.569 Connecting … (正在连接)
2.178 CONNECTED (连接成功)

一旦运行了 VPN 安全模式,电脑一直处于网络隔离状态,即使关闭了无界,也无法联网。这样消除了所有泄露IP的隐患,以确保安全。不过还是建议设置无界代理,进一步增加安全性,即使恢复到非网络隔离状态也不会泄露IP。也建议使用浏览器的“隐私模式”,最好使用定制版的浏览器,以避免留下历史纪录。

需要重新启动电脑才能恢复到非网络隔离状态

原文:http://forums.internetfreedom.org/index.php?topic=23310.0



via 细节的力量 https://ift.tt/2FVMI5J

无界苹果MAC测试版 18.07a (2018年11月29日)

http://wujieliulan.com/download/u1807a.dmg
SHA512: 56f9630ea182ba047d78ad5aa2cd41044d2184ce9770b0e43d179b496c71ceb6a6b995264d1ad5ddbcd2f3dae9cf34acc26e4a59cf809bd1576e94ac81dc7bc2

使用方法:
需要安装谷歌Chrome浏览器。
下载后将里面的umac存在某处,双击umac后会关闭所有谷歌Chrome浏览器,然后弹出一个终端显示以下信息:
LISTENING 127.0.0.1:9666 (监听 127.0.0.1:9666 )
0.650 Connecting … (正在连接)
1.569 Connecting … (正在连接)
2.178 CONNECTED (连接成功)
连接成功后自动打开的隐私模式谷歌Chrome浏览器(incognito mode)。

关闭终端会关闭所有谷歌Chrome浏览器,然后退出无界。(也可以按ctrl+C).

请大家测试反馈。

原文:http://forums.internetfreedom.org/index.php?topic=23311.0



via 细节的力量 https://ift.tt/2rmGuBL

安卓版: 无界一点通4.6a测试版(2018年11月27日)

无界一点通4.6a测试版, 改善连通能力,请帮忙测试并反馈:

http://wujieliulan.com/download/um4.6a.apk

sha512: d62f0f7376bdbdd7fd0f4e8a5924e4b4a9a5662100a093e3977ed7b39979bc066ea91cecf44c2755554d7acb117633883dc9503ad4341d9db4ee77c864710766
md5: a0e5ad421c57a55de1b48e4121095cf9

谢谢!

—————–
“无界一点通”是安卓版的翻墙软件, 让您看到没有被过滤的真实讯息。适用于安卓手机/安卓机顶盒等安卓平台。
安装”无界一点通”:
1。需要首先对手机进行设置: 按“菜单”键 –> settings(设置)–> Applications(应用程序), 钩选”Unknown sources”(未知源)。
注: 有的版本是: 按“菜单”键 –> settings(设置)–> security (安全) 里面, 钩选”Unknown sources”(未知源)。
2。将下载的um.apk文件拷贝到手机SD卡(或内置SD卡)上。如果下载的为压缩文件, 无须解压, 直接将文件扩展名 .zip 更改为 .apk 。
在安卓手机上点击um.apk文件便可安装。如与已经安装的无界一点通旧版有冲突,请先卸载旧版, 再安装新版。
3。详细说明见网址: 《网址》m.wujieliulan.com/userguide.html 《网址》
4。 注: 如果在VPN模式下使用其他浏览器(而不是无界一点通自带的浏览器),请使用其浏览器的“隐私模式”, 或退出无界一点通之后,请将浏览器的历史记录清除,否则在没有VPN的情况下无意中点击了这些历史记录,会有安全隐患。

原文:http://forums.internetfreedom.org/index.php?topic=23306.0



via 细节的力量 https://ift.tt/2FYZe4I

Thursday, November 29, 2018

VyprVPN 是世界上第一个经过公开审核的无日志VPN服务

自从我们2009年成立以来,Golden Frog一直致力于做正确的事情,坚定不移地投身于互联网 。 我们是一个小团队,致力于为人们提供更好的隐私,安全和互联网自由。

当我们创建Golden Frog并推出 VyprVPN时, 我们认为记录最少量的 VPN服务数据会极大地改善用户在使用VPN时的体验。 我们将这些数据保持在最低限度,并专注于用数据帮助提高速度,性能,可靠性和故障排除。 我为能够谈论VPN行业的问题和在记录日志问题上保持与用户的透明沟通而感到自豪。

我们以前记录并保留30天的内容:

  • 客户的源IP地址(通常是用户ISP分配的IP地址)
  • VyprVPN分配给 用户 的 IP地址
  • 连接开始和结束时间
  • 使用的总字节数

如今,我很高兴地宣布,VyprVPN的现在是零日志(No Log)的VPN服务了 !

为什么我们改为零日志 ?

在过去的一年中,我们收到了来自客户,政策合作伙伴和VPN市场的重要反馈,即VPN提供商记录任何用户活动都会削弱对VPN服务本身的信任。

但是,引爆点是当Wirecutter发布他们对最佳VPN的评选时,我看到我们的一位用户在Twitter上询问为什么VyprVPN被排除在名单之外。

因此,尽管我们是世界上历史最悠久的VPN提供商之一,并且我们觉得我们一直在努力保护人们的隐私,但我们的最小日志记录使我们无法进入他们最佳VPN的名单。 哇。

显然,人们对VPN公司的期待已经发生了变化,我们必须做点什么了。人们要求公司提供更多隐私,这是件好事。我希望这种积极趋势能继续下去。

由于我们的服务在过去十年中已经成熟 , 我们在运行全球VPN网络方面变得更有经验, 以至于最小化日志记录的必要性已经大大减少。 我们已经找到了更好的方法来提高性能并击败欺诈者,而无需用户的连接信息。

这难道不就只是一次单纯的营销活动吗?

一些VPN提供商声称他们的服务是完全匿名的,但是后来又被发现他们其实会把用户数据交给当局,我们对此的批评一直直言不讳。我们对VPN行业的新进入者提出了合理的担忧,这些新进入者承诺提供隐私,但却提供了相反的结果, 同时向用户隐瞒这一事实。 我们担心人们对VPN的信任正在被侵蚀,如果人们不能相信一个VPN能保护隐私,用户就会停止用VPN对数据加密。 我们认为需要采取果断行动。 这就是我们与民主与技术中心(The Center for Democracy & Technology)合作的原因,我们在在过去的一年里创造了 “值得信赖的VPN的信号“(”Signals of Trustworthy VPNs”)的报告, 这样用户可以更好地理解向他们VPN 提供商提出什么问题 。 这是一个良好的开端, 我们鼓励更多的VPN提供商为了消费者的利益回答这些问题。

如何改变话题以及对VPN行业提出挑战?

当我们在今年夏天决定成为零日志VPN时,我们想要做更多的事情来创建信任,而不仅仅是使用零日志的营销语言和更新我们的网站上的隐私政策 。我们希望能够改变话题并进一步挑战VPN行业。

因此,我们决定聘请一个受人尊敬的独立审计团队,以确保当我们说“零日志“(“ No Log “)时, 用户可以信任我们,而不会觉得我们是说一套做一套VPN提供商。经过广泛的研究,我们聘请了利维坦安全(Leviathan Security)进行独立审计,并确保期间没有关于个人身份的信息被收集。你没必要相信我们(虽然我认为你应该),但我们希望你能信任利维坦安全团队,他们证明了我们已经实现了零日志的诺言。

所以,我很自豪地宣布,我们是世界上第一个通过公开审核的零日志 VPN提供商。当然,这听起来像营销语言,但我们的工程师肯定不这么认为!我们的团队与利维坦安全团队的团队密切合作,解决他们在调查过程中出现的所有问题。 我们允许利维坦完全访问我们的服务器,应用程序,程序代码等等 – 我们让他们进行了最仔细的查验。

我们花了很多时间修改并确保我们的服务器系统不会记录与您的连接有关的任何信息。 这包括VPN服务器,身份验证服务器,API服务器等。日常连接日志记录的路径很容易修改,但技术团队更进一步,在整个后端软件套件中进行了大量的日志记录修改,以确保即使是在意外情况下日志记录也不会发生。利维坦验证了我们所有的改动。

我们的应用开发团队也参与进来。他们审核了应用程序并提供了更新版本,以确保应用程序或操作系统记录的设备上的任何日志仅在您明确许可下才能发送给我们。利维坦再次证实了我们的所有承诺。 我们的技术团队花了很多时间确保这一切不仅仅是营销活动。

我为我们的工程团队感到非常自豪,他们与利维坦密切合作以获得这一荣誉。他们都值得我们的认可,我非常感谢他们的努力。感谢你们!

您可以在这里阅读来自利维坦安全的完整报告:VyprVPN 隐私审计

接下来是什么?

首先,我们不仅要做出承诺,我们必须继续履行承诺 。服务器基础架构,桌面应用和移动应用程序是一个有机的,不断变化的系统。我们必须妥善应对改变,并继续履行对用户的承诺。

其次,我向其他VPN提供商提出挑战,希望他们也对如何处理用户数据进行审计,为他们的用户的创造更多的信任 ,这样有助于建立人们对VPN服务的总体信任感。我赞赏 Tunnelbear 的 安全审计, 我希望他们每年继续这样做。我还希望他们对如何处理用户数据进行审计,而不仅仅是服务的安全性。我们也在考虑在不久的将来进行安全性审计。

我仍然相信尽管很多VPN提供商承诺保护用户隐私,但是他们依赖第三方托管公司来运行他们在全球的服务器 – 这样的承诺很难让人完全信服。我们很幸运 – 我们不租赁,我们拥有自己的服务器。 我想看看对其他VPN提供商的审计是否会提到我对第三方托管服务商侵犯用户隐私的担忧。

Facebook在联邦贸易委员会(Federal Trade Commission)的要求下进行了由普华永道(PricewaterhouseCoopers)主导的审计,那次审计并没有发现剑桥分析公司(Cambridge Analytica)的大规模滥用行为。 因此,并非所有的审计都是平等,公正的。但是,如果我们生活在一个世界,那里公司们都在辩论哪家审计供应商更值得信赖,而不是哪种营销语言更值得信赖,那么这就是我宁愿生活的世界。

第三,我希望这次审计能够成为其他处理用户数据的公司的灯塔,而不仅仅是隐私公司。现实情况是,几乎所有公司都在处理用户信息,而且对用户信息的滥用,错用无处不在。被收集的数据量和种类都在增加。Alexa,我没说错吧?因此,消费者比以往任何时候都的值得拥有私密性和透明沟通,展开全方位的审计将会是与消费者建立信任的良好开端。

中国人有句谚语说:“种树的最好时机是二十年前。其次就是现在。” 这句话在隐私审计当中同样适用。所以开始行动就对了。做一些事情,做任何事情,然后与你的用户分享。

来源:https://ift.tt/2Q6dH3t

目前VyprVPN官方促销,优惠力度很大,需要的可以看看,购买地址https://www.goldenfrog.com/zh/vyprvpn/world-cup-special?offer_id=235&aff_id=4579

随着GFW封锁的加剧VyprVPN也不能全服务器IP可连接了,这些天测试都是北美洲及亚洲国家在不断更换被封IP,其他洲不少都很久没有新可用IP了,其实中国大陆用户一般都是翻墙上外网,没有那么多服务器需求,有香港、台湾、新加坡、日本、韩国、美国西部(西雅图、洛杉矶等),最多加个英国德国法国,其他地区的服务器基本是没人用的,希望他们可以推出个确保10几个服务器大陆可连接的特价套餐,降低成本来降低定价!



via iGFW https://ift.tt/2RncUYs

Thursday, November 22, 2018

Windscribe VPN——终身无限流量高级VPN只需35美元

Windscribe VPN是国外一家知名的VPN服务商,Windscribe VPN Pro版官方提供win、mac、ios和安卓客户端,另外还支持生成OpenVPN、 IKEv2 VPN和SOCKS5配置手动设置VPN连接,Pro版拥有台湾、日本、韩国、香港、新加坡、美国、英国、德国等50多个国家100多个城市的VPN服务器,官方客户端还有支持Google chrome和firefox浏览器的插件版,使用简单方便。

Windscribe VPN在StackSocial特卖网站做活动,官网两年要89美元的,现在终身服务稳定速度快无限流量无限设备同时连接VPN只需35美元,价格非常实惠,不容错过。

购买地址https://stacksocial.com/sales/windscribe-vpn-lifetime-pro-subscription?rid=4992791     购买时使用优惠码BFSAVE40

 

Windscribe VPN手动设置http2 proxy的方法参考https://www.igfw.net/archives/13666  (http2代理可以在win、mac、linux上使用Google Chrome+Proxy SwitchyOmega,安卓系统上可以使用Firefox+Proxy SwitchyOmega,另外安卓系统上建议手动设置IKEv2 VPN连接,其官方安卓客户端很久没有更新不好用了)



via iGFW https://ift.tt/2DSluv7

Wednesday, November 14, 2018

流行免费 VPN 被发现大部分来自中国

Metric Labs 的调查发现, Google Play Store 和 Apple Store 里的流行免费 VPN 应用有大约六成由中国开发者开发或中国人所有。这一发现引发了数据隐私方面的担忧。研究人员分析了 Google 和苹果应用商店里的 top 20 free VPN apps,这些应用的下载量多在 100 万以上,结果如图所示,超过一半为中国开发者所有。此外,这些 免费 VPN 基本上不存在隐私保护,用户支持也很少。 通过这些 VPN 的用户数据可能会被记录下来,最糟糕的情况可能是数据会被提供给中国政府。

来源:https://ift.tt/2DFXIT4



via iGFW https://ift.tt/2QKLGe6

Tuesday, November 6, 2018

New release: Tor 0.3.4.9

We have a new stable release today. If you build Tor from source, you can download the source code for Tor 0.3.4.9 from the download page on the website. Packages should be available within the next several weeks, with a new Tor Browser by mid-December.

Tor 0.3.4.9 is the second stable release in its series; it backports numerous fixes, including a fix for a bandwidth management bug that was causing memory exhaustion on relays. Anyone running an earlier version of Tor 0.3.4.9 should upgrade.

Changes In Version 0.3.4.9 – 2018-11-02

  • Major bugfixes (compilation, backport from 0.3.5.3-alpha):
    • Fix compilation on ARM (and other less-used CPUs) when compiling with OpenSSL before 1.1. Fixes bug 27781; bugfix on 0.3.4.1-alpha.
  • Major bugfixes (mainloop, bootstrap, backport from 0.3.5.3-alpha):
    • Make sure Tor bootstraps and works properly if only the ControlPort is set. Prior to this fix, Tor would only bootstrap when a client port was set (Socks, Trans, NATD, DNS or HTTPTunnel port). Fixes bug 27849; bugfix on 0.3.4.1-alpha.
  • Major bugfixes (relay, backport from 0.3.5.3-alpha):
    • When our write bandwidth limit is exhausted, stop writing on the connection. Previously, we had a typo in the code that would make us stop reading instead, leading to relay connections being stuck indefinitely and consuming kernel RAM. Fixes bug 28089; bugfix on 0.3.4.1-alpha.
  • Major bugfixes (restart-in-process, backport from 0.3.5.1-alpha):
    • Fix a use-after-free error that could be caused by passing Tor an impossible set of options that would fail during options_act(). Fixes bug 27708; bugfix on 0.3.3.1-alpha.
  • Minor features (continuous integration, backport from 0.3.5.1-alpha):
    • Don’t do a distcheck with –disable-module-dirauth in Travis. Implements ticket 27252.
    • Only run one online rust build in Travis, to reduce network errors. Skip offline rust builds on Travis for Linux gcc, because they’re redundant. Implements ticket 27252.
    • Skip gcc on OSX in Travis CI, because it’s rarely used. Skip a duplicate hardening-off build in Travis on Tor 0.2.9. Skip gcc on Linux with default settings, because all the non-default builds use gcc on Linux. Implements ticket 27252.
  • Minor features (continuous integration, backport from 0.3.5.3-alpha):
    • Use the Travis Homebrew addon to install packages on macOS during Travis CI. The package list is the same, but the Homebrew addon does not do a `brew update` by default. Implements ticket 27738.
  • Minor features (geoip):
    • Update geoip and geoip6 to the October 9 2018 Maxmind GeoLite2 Country database. Closes ticket 27991.
  • Minor bugfixes (32-bit OSX and iOS, timing, backport from 0.3.5.2-alpha):
    • Fix an integer overflow bug in our optimized 32-bit millisecond- difference algorithm for 32-bit Apple platforms. Previously, it would overflow when calculating the difference between two times more than 47 days apart. Fixes part of bug 27139; bugfix on 0.3.4.1-alpha.
    • Improve the precision of our 32-bit millisecond difference algorithm for 32-bit Apple platforms. Fixes part of bug 27139; bugfix on 0.3.4.1-alpha.
    • Relax the tolerance on the mainloop/update_time_jumps test when running on 32-bit Apple platforms. Fixes part of bug 27139; bugfix on 0.3.4.1-alpha.
  • Minor bugfixes (C correctness, to appear in 0.3.5.4-alpha):
    • Avoid undefined behavior in an end-of-string check when parsing the BEGIN line in a directory object. Fixes bug 28202; bugfix on 0.2.0.3-alpha.
  • Minor bugfixes (CI, appveyor, to appear in 0.3.5.4-alpha):
    • Only install the necessary mingw packages during our appveyor builds. This change makes the build a little faster, and prevents a conflict with a preinstalled mingw openssl that appveyor now ships. Fixes bugs 27943 and 27765; bugfix on 0.3.4.2-alpha.
  • Minor bugfixes (code safety, backport from 0.3.5.3-alpha):
    • Rewrite our assertion macros so that they no longer suppress the compiler’s -Wparentheses warnings. Fixes bug 27709; bugfix
  • Minor bugfixes (continuous integration, backport from 0.3.5.1-alpha):
    • Stop reinstalling identical packages in our Windows CI. Fixes bug 27464; bugfix on 0.3.4.1-alpha.
  • Minor bugfixes (directory authority, to appear in 0.3.5.4-alpha):
    • Log additional info when we get a relay that shares an ed25519 ID with a different relay, instead making a BUG() warning. Fixes bug 27800; bugfix on 0.3.2.1-alpha.
  • Minor bugfixes (directory connection shutdown, backport from 0.3.5.1-alpha):
    • Avoid a double-close when shutting down a stalled directory connection. Fixes bug 26896; bugfix on 0.3.4.1-alpha.
  • Minor bugfixes (HTTP tunnel, backport from 0.3.5.1-alpha):
    • Fix a bug warning when closing an HTTP tunnel connection due to an HTTP request we couldn’t handle. Fixes bug 26470; bugfix on 0.3.2.1-alpha.
  • Minor bugfixes (netflow padding, backport from 0.3.5.1-alpha):
    • Ensure circuitmux queues are empty before scheduling or sending padding. Fixes bug 25505; bugfix on 0.3.1.1-alpha.
  • Minor bugfixes (onion service v3, backport from 0.3.5.1-alpha):
    • When the onion service directory can’t be created or has the wrong permissions, do not log a stack trace. Fixes bug 27335; bugfix on 0.3.2.1-alpha.
  • Minor bugfixes (onion service v3, backport from 0.3.5.2-alpha):
    • Close all SOCKS request (for the same .onion) if the newly fetched descriptor is unusable. Before that, we would close only the first one leaving the other hanging and let to time out by themselves. Fixes bug 27410; bugfix on 0.3.2.1-alpha.
  • Minor bugfixes (onion service v3, backport from 0.3.5.3-alpha):
    • When selecting a v3 rendezvous point, don’t only look at the protover, but also check whether the curve25519 onion key is present. This way we avoid picking a relay that supports the v3 rendezvous but for which we don’t have the microdescriptor. Fixes bug 27797; bugfix on 0.3.2.1-alpha.
  • Minor bugfixes (protover, backport from 0.3.5.3-alpha):
    • Reject protocol names containing bytes other than alphanumeric characters and hyphens ([A-Za-z0-9-]). Fixes bug 27316; bugfix on 0.2.9.4-alpha.
  • Minor bugfixes (rust, backport from 0.3.5.1-alpha):
    • Compute protover votes correctly in the rust version of the protover code. Previously, the protover rewrite in 24031 allowed repeated votes from the same voter for the same protocol version to be counted multiple times in protover_compute_vote(). Fixes bug 27649; bugfix on 0.3.3.5-rc.
    • Reject protover names that contain invalid characters. Fixes bug 27687; bugfix on 0.3.3.1-alpha.
  • Minor bugfixes (rust, backport from 0.3.5.2-alpha):
    • protover_all_supported() would attempt to allocate up to 16GB on some inputs, leading to a potential memory DoS. Fixes bug 27206; bugfix on 0.3.3.5-rc.
  • Minor bugfixes (rust, directory authority, to appear in 0.3.5.4-alpha):
    • Fix an API mismatch in the rust implementation of protover_compute_vote(). This bug could have caused crashes on any directory authorities running Tor with Rust (which we do not yet recommend). Fixes bug 27741; bugfix on 0.3.3.6.
  • Minor bugfixes (rust, to appear in 0.3.5.4-alpha):
    • Fix a potential null dereference in protover_all_supported(). Add a test for it. Fixes bug 27804; bugfix on 0.3.3.1-alpha.
    • Return a string that can be safely freed by C code, not one created by the rust allocator, in protover_all_supported(). Fixes bug 27740; bugfix on 0.3.3.1-alpha.
  • Minor bugfixes (testing, backport from 0.3.5.1-alpha):
    • If a unit test running in a subprocess exits abnormally or with a nonzero status code, treat the test as having failed, even if the test reported success. Without this fix, memory leaks don’t cause the tests to fail, even with LeakSanitizer. Fixes bug 27658; bugfix on 0.2.2.4-alpha.
  • Minor bugfixes (testing, backport from 0.3.5.3-alpha):
    • Make the hs_service tests use the same time source when creating the introduction point and when testing it. Now tests work better on very slow systems like ARM or Travis. Fixes bug 27810; bugfix on 0.3.2.1-alpha.
  • Minor bugfixes (testing, to appear in 0.3.5.4-alpha):
    • Treat backtrace test failures as expected on BSD-derived systems (NetBSD, OpenBSD, and macOS/Darwin) until we solve bug 17808. (FreeBSD failures have been treated as expected since 18204 in 0.2.8.) Fixes bug 27948; bugfix on 0.2.5.2-alpha.

原文:https://blog.torproject.org/new-release-tor-0349



via 细节的力量 https://ift.tt/2QpvGxZ

New Release: Tor Browser for Android 1.0a3

Tor Browser for Android 1.0a3 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

Moreover, we backport a defense against protocol handler enumeration developed by Mozilla engineers.

Unfortunately, in this release we are temporarily introducing a regression due to a potential proxy-bypass bug within some versions of Android. Tor Browser for Android will not download a website’s “favicon” in this release (the small image shown beside the title of the webpage in the list of tabs). From our investigation into this bug, we found Android versions before Android Oreo (Android version 7 and earlier, API level 25 and earlier) leak some information about which webpage the browser is loading. This was corrected in newer versions of Android, however this temporary regression is necessary because it is likely most users have an older version of Android, and there may be other bugs we haven’t discovered yet. One bug in the Android networking code is one bug too many. We are working on a new way of downloading these icons.

The full changelog since Tor Browser for Android 1.0a2 is:

  • Update Firefox to 60.3.0esr
  • Update Torbutton to 2.1.1
  • Update HTTPS Everywhere to 2018.9.19
  • Backport of fixes for bug 1448014, 1458905, 1441345, and 1448305
  • Bug 1623: Block protocol handler enumeration (backport of fix for #680300)
  • Bug 28125: Prevent proxy-bypass bug by Android networking library

原文:https://blog.torproject.org/new-release-tor-browser-android-10a3



via 细节的力量 https://ift.tt/2Phr8x2

New Release: Tor Browser 8.5a4

Tor Browser 8.5a4 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

Highlights in Tor Browser 8.5a4 are a new Tor alpha version, 0.3.5.3-alpha, a fixed layout of our macOS installer window and Stylo (Mozilla’s new CSS engine) being enabled on macOS after fixing a reproducibility issues. Please report any problems you find with those macOS related changes as we think about backporting them for the stable series.

Moreover, we backport a defense against protocol handler enumeration developed by Mozilla engineers and provide Tor Browser on all supported platforms in four additional locales: cs, el, hu, and ka.

Note: It turned out it was a bit premature to ship the new locales as we did not catch bugs in them last minute, so we don’t make them available on our download page. Sorry for the inconvenience.

The full changelog since Tor Browser 8.5a3 is:

  • All Platforms
    • Update Firefox to 60.3.0esr
    • Update Tor to 0.3.5.3-alpha
    • Update Torbutton to 2.1.1
    • Update Tor Launcher to 0.2.17
    • Update HTTPS Everywhere to 2018.9.19
    • Update NoScript to 10.1.9.9
    • Bug 1623: Block protocol handler enumeration (backport of fix for #680300)
    • Bug 27905: Fix many occurrences of “Firefox” in about:preferences
    • Bug 28082: Add locales cs, el, hu, ka
  • Windows
    • Bug 21704: Abort install if CPU is missing SSE2 support
    • Bug 28002: Fix the precomplete file in the en-US installer
  • OS X
    • Bug 26263: App icon positioned incorrectly in macOS DMG installer window
    • Bug 26475: Fix Stylo related reproducibilitiy issue
  • Linux
    • Bug 26475: Fix Stylo related reproducibilitiy issue
    • Bug 28022: Use `/usr/bin/env bash` for bash invocation
  • Android
    • Backport of fixes for bug 1448014, 1458905, 1441345, and 1448305
  • Build System
    • All Platforms
      • Bug 27218: Generate multiple Tor Browser bundles in parallel
    • Windows
    • OS X

原文:https://blog.torproject.org/new-release-tor-browser-85a4



via 细节的力量 https://ift.tt/2Qp72gV

无界浏览18.05正式版 (2018年11月5日)

谢谢大家都测试反馈,请升级到18.05,旧版有时会连接不上或速度慢。

执行版:
http://wujieliulan.com/download/u1805.exe
SHA256:40b1b85a494c25c22a7fe7b7985dfe7a5ecac725f5c06485137cb47e0920ccd7
SHA512:3a172fd962d90c2ac934fba0edc82467d75d64935e78a8a8e1c509c37931ade0dd293349084cd30ac7739db90b028045547ac8c62adf4b4d9679941b5dc7843c
压缩版:
http://wujieliulan.com/download/u1805.zip
SHA256:85d6c3b90a16e85aedfd0aaf3578270bbc5e38358b7c7a26c2da78195d0886e5
SHA512:4d8111d9d8983936405462aeda8b2453f688915238bf34aac8b30dcf652e663ecb95a6cf5216c9fac15eb67cd87a6216e91108832f5bd3c72099ebfa82841c81

原文:http://forums.internetfreedom.org/index.php?topic=23243.0



via 细节的力量 https://ift.tt/2PgFeys

Wednesday, October 17, 2018

VPN 是犯罪工具?

过去两年,在工信部公布规定“未经电信主管部门批准,不得自行建立或租用专线(含虚拟专用网络 VPN)等其他信道开展跨境经营活动”之后,已经有多人因为提供 VPN 软件而被判刑和罚款,这些人受到的指控都是“提供侵入、非法控制计算机信息系统程序、工具罪”。VPN 或全名“虚拟专用网络”,是一种常用的安全工具,此前多被企业用于保护通信安全,防止企业商业机密泄漏,后来因为中国的防火长城越来越高,而 VPN 暂时不会有彻底屏蔽的风险而在有需求的用户中间流行起来,它是一种中立的工具。“提供侵入、非法控制计算机信息系统程序、工具罪”这个罪名意味着使用 VPN 本身也是违法的。中国政法大学教授罗翔认为这一罪名值得商榷。他认为工信部的规定不具有法律效力,“值得警惕的是,刑法中的计算机犯罪(刑法第二百八十五条、二百八十六条)正在慢慢成为一个新的口袋罪,许多无法认定为其他犯罪的行为,只要与计算机有关,常常被论以计算机犯罪,以至理论界将其戏称为‘计算机流氓罪’,罪刑法定原则受到了前所未有的挑战。” ”

来源:https://ift.tt/2QT9Oe7



via iGFW https://ift.tt/2RXpyhy

Sunday, October 14, 2018

Best VPNs for China in 2018 (that still work despite the ban)

Update October 2018: As
many of you know, China has already cracked down on VPNs throughout the first
half of 2018 after doing so multiple times over the past couple years. Not only
that, but the Chinese government threatened to ban
all non-state sanctioned VPNs
. Obviously, that hasn’t happened (I’m
using a VPN to write this). So what’s the deal? Do the best
VPNs for China
 still work? As an expat who has spent
over a decade in China, I’d like to offer my thoughts and
recommendations.

What is the best VPN for China?

Sadly, FarWestChina has been unreliably accessible here
in China since 2009, blocked by the “Great Firewall” (i.e. China’s censorship).
I have no idea why it was blocked – other than the fact that I’m talking about
Xinjiang, one of the most sensitive regions in China – and there’s nothing I can
do to unblock the site. Trust me, I’ve tried everything short
of knocking on a government official’s door.

The only way I’ve been able to work on this site from
my home here in China is through what is known as a VPN,
or a Virtual Private Network
.

Because I have over 8 years of first-hand
experience with over 20 different VPN services, I get more than a few
emails every month from people asking me what I recommend as
the best
VPN for China in 2018
. It’s an obvious need for anybody living in
China but more and more people are realizing that online security is something
netizens in every country should consider.

I’m not trying to hard-sell anybody here…more than
anything I just want to provide some helpful information for those people
who need to get a new VPN. A few of the links here and in the video are
affiliate links which means that at
no additional cost to you I will be compensated if you purchase the
service
. I have continually used each of these services from my home here
in China over the past year, so I’m confident about my
recommendations.

When it comes to the best
VPNs for China
, I’ve given you three ways to hear my thoughts: watch
the video, check out the comparison chart or read my person reviews for each VPN
below.

Best VPNs for China | Video Review

Click below to hear my thoughts and see each of these
best VPNs for China in action.

*Click to watch the video and then subscribe to the
FarWestChina Youtube channel
!

Best VPNs for China | Comparison
Chart

*Recommended VPN* Other Excellent Virtual Private
Networks
ExpressVPN NordVPN VyprVPN PureVPN
ExpressVPN, a recommended VPN for China
NordVPN a recommended VPN for China
VyprVPN Logo
UK Post Box virtual mailbox service
Rating
Rating: 5 stars for ExpressVPN 5 stars for NordVPN 4 stars for VyprVPN 4 stars for PureVPN
Established:
Established: 2009 2012 2009 2007
Torrent?
Torrent? ✔ ✔ ✔ ✔
Phone App?
Phone App? ✔ ✔ ✔ ✔
Simultaneous
Connections?
Simultaneous: 3 6 5 5
Servers
Servers 1500+ 4000+ 700+ 750+
Money Back
Guarantee?
Guarantee ✔* ✔* ✔** ✔**
Learn More
ExpressVPN
Learn More
*Recommended*

*Both ExpressVPN and NordVPN offer generous 30-day
money back guarantees.

**VyprVPN and PureVPN offer 7-day and 14-day money back
guarantees respectively.

As I mentioned in the video above, there are
literally hundreds of
VPNs to choose from on the market and there are quite a few good ones that
didn’t make this list.

These, however, have stood the test of time (they are
all at least 5 years old), have made a specific effort to reach the China
market, all offer hundreds of servers across the globe and they all have
unlimited bandwidth.


ExpressVPN in China (Editor’s Choice + 3 Free
months)

Try ExpressVPN, editor's choice for best VPN in ChinaExpressVPN is
my go-to VPN for China 2018. I’m a huge fan of their overall design – the
website, desktop app and mobile app are all beautiful, quick to install and easy
to use.

I always recommend ExpressVPN to
anybody I know who doesn’t consider themselves tech-savvy for a couple of
reasons.

  1. It’s super
    easy
     to set up!
  2. Their software is some of the best in the
    industry.
  3. They offer a no-hassle, 30-day money back
    guarantee.

For those who desire simplicity and ease, ExpressVPN
has been a solid option here in China for the past few years. You
can check out their pricing here and
if you use this link (which is an affiliate link), they’ll give
you 3
months free on any annual plan
!

Click for 3 months
FREE on ExpressVPN


NordVPN in China (66% off Discount Code!)

Click to get 66% off of NordVPN, a best VPN for ChinaNordVPN has
been a surprise addition to my VPN arsenal over past year. They’ve purposefully
entered the China market and are aggressively tackling the blocking issues that
plague all the best VPNs in China.

There are a number of reasons I’ve come to like the
NordVPN software and service.

  1. The software is well-designed, both on computers &
    mobile devices.
  2. They allow 6 simultaneous connections (most VPNs give
    3-5)
  3. They also offer a no-nonsense, 30-day money back
    guarantee.

In many cases, I often tell people to purchase both
ExpressVPN and NordVPN (I have both) to figure out which one works best in your
China location. Best of all, right now they’re running a special where you can
get 66% off a 2-year plan with NordVPN.

Get up to 66% off
NordVPN!


Using VyprVPN in China (68%
Discount)

VyprVPN special pricingI was turned on
to VyprVPN a
couple years ago and have been incredibly impressed with the transparency of the
company (just compare their about page with any other VPN).

Here’s what I love about VyprVPN:

  • Proprietary “Chameleon” protocol for added
    security
  • Simple-to-use software
  • A 3-day FREE trial (but no 30-day money back
    guarantee)

VyprVPN has been around since 2009 but their parent
company, GoldenFrog, has been around for more than a decade providing online
services. I’ve spoken at length with some of their representatives and really
like their focus on the China market, which is comforting considering how much
the Chinese internet landscape changes.

If all of this sound good to you, they have given me a
special link that will allow you to give them a try for free for 3
days
and then get 68% off their 2-year plan.

Click for 68% off
VyprVPN


Using PureVPN in China

*Note: PureVPN
consistently offers some of the lowest prices. Currently you can
get two years of VPN for the price of one with
PureVPN
, which includes up to 5 devices connected!

PureVPN is another popular option here in
China. They boast over 1 million users world-wide and their market share in
China seems to be growing at a rapid pace.

While I wasn’t a big fan of their software at first,
thankfully they have since updated the design and it functions much better.
Their speeds are excellent and I found them to be the best in terms of streaming
– at least for me out here in western China.

What you might find useful is their “Server Selection
Tool” where you tell the software what you want to do (download, stream US
content, stream UK content, etc) and it will tell you which servers best suit
you needs.

Considering the price – which is often one of the
lowest around – PureVPN is an excellent VPN
option
 for the price conscious buyer.

Click for 73% off
PureVPN


 

A Look at 12VPN in China (10% Discount
Code)

Get 12VPNI’ve been
a 12VPN customer
since 2013 and in many ways it’s been my go-to VPN on my phone.
Why? It’s
simple and it just works…every time
.

The software isn’t flashy and they don’t have a
dedicated iPhone or Android app but setup for both was an easy download of
one file that took me all of 5 minutes.

One of the things I’ve truly appreciated about 12VPN is
their commitment to communication. I get periodic emails informing me of changes
in the VPN and changes in the Great Firewall. For example, last year one of
the submarine cables that connects Asia with North America was severed. Out of
the 10 VPNs I had running at the time, 12VPN was the only one that let me know
what was happening and why I should expect slower speeds on the Los Angeles
servers.

In addition to VPN services, 12VPN is also one of the
few companies that offers SmartDNS as part of their package. I won’t go into
details about what SmartDNS is, but suffice to say I use it
to watch Netflix on my Apple TV in
China
 and it is so
much faster
than connecting on a VPN.

Best of all, I have a 12VPN
Discount Code
 that you can use! Just enter FWC10 to
get 10% off your order.

Click for 10% off
12VPN


 

VPNs to Avoid in China

Here’s the thing about the relationship between China
and VPNs – China is always making changes that affect the landscape of VPN use
within the country. If the VPN you choose doesn’t devote resources to adapt
to these changes, that spells trouble for you.

This rules out most small VPN services such
as Buffered or
all the free services such as Hotspot
Shield
. Neither seem to have the manpower or resources to play the
constant game of cat and mouse with China’s internet censors. I’ve had a
difficult time connecting to their servers from within China.

Finally, despite its popularity in China, I
personally don’t recommend Astrill
VPN
. My biggest problem was their customer support but the deal breaker
was that they require users to provide their phone number for authentication. In
China, that kind of connection between my VPN and my phone number is a big
no-no.

Conclusion | Best VPN for China 2018

So that about covers it! Obviously there are plenty of
VPN services which have been left out of this list, but I stand by the fact that
if you’re coming to Asia, these are the best
VPNs for China in 2018
.

If you’re here in China and using a VPN, leave a
comment below to let me know what you use.

原文:https://www.farwestchina.com/tips/top-5-vpns-for-china/



via 细节的力量 https://ift.tt/2pTyjfO