Yes but in a different lawsuit. "Private Internet Access and TorGuard were recently added to previously filed lawsuits against Quadranet and LiquidVPN respectively."
Because they advertised their services specifically for piracy, they 'poked the bear'.
Other VPN providers won't (hopefully) suffer the same fate as they have the sense to make it clear that their services are not to be used for illegal purposes.
LiquidVPN made a stupid/arrogant mistake. Having said that, if the lawsuit is successful it could have serious implications for the rest of the VPN providers.
I just got private internet access last night because LiquidVPN were being fucking assholes with their customer support when their service was crapping out. It's great so far. It hasn't dropped once, and it actually stays connected on my phone, unlike liquidVPN's OpenVPN servers.
I suppose that is always going to be an issue although PIA have near 800 IPs so that is quite a few to get through.
Most people prefer less IPs that are shared due to the added security it brings but for your purpose you might want a provider with more IPs.
Providers with claims of over 5000 IPs available :-
A small (around 1000 customers) but good provider is LiquidVPN who claim to have about 800 IPs, so while matching that of PIA in terms of amount of IPs they also have an estimated 99% less customers so are unlikely to have had so many IPs blocked at various forums.
"We patched" is not transparent. Is there a detailed post somewhere I have missed?
Edit: I mistook smrdave for a representative from another company. LiquidVPN has taken the correct steps to resolve the issue with full transparency.
You are missing quite a few. Off the top of my head, the following should be added: BlackVPN, VikingVPN, LiquidVPN, Mullvad, and CyberGhost. I am sure there are more though. I do realize that this is a top ten list, but some of the ones that you have chosen are guaranteed to not be in any top 10 list (HMA). I think for a little while, you should have all of the available VPN services listed, so you can narrow it down to the real top ten.
No security is absolute, but the only thing I can think of is using another VPN that you trust to multi-hop so that the outgoing VPN is unable to see your real IP address. This at least makes them work harder trying to track you down. You can keep linking VPNs together until your internet hits a million ping and hope that whatever your transgression is, they give up because it's not worth their time anymore. LiquidVPN uses IP modulation so that each new connection to a website goes through a different IP address making tracking harder, and VikingVPN's servers are constantly sending out false data packets in order to make this kind of attack vector more difficult. I've always wanted to link the two together whenever I get some extra funds available. Then if you are ultra-paranoid you can try running this entire setup through the TOR network to give law enforcement an even bigger challenge.
Not LiquidVPN, but I may be able to answer your last question about blocking Tor. Probably to block spam/fraud? They probably get a lot of fraud orders made with stolen CCs or PayPals due to the nature of their business, so I'm sure blocking Tor is just another measure in place to prevent that.
For me it was a paper letter once in the mail stating that a copyright claim has been made against your IP and another time they simply shut us off and we had to call and play ignorant (oh, password protect our router? Oh, OK thanks!)..
Private trackers these days and a VPN service (LiquidVPN, surprisingly fast) for the occasional KAT/TPB file. And I buy more things legit-style, like to support artists. :)
I agree with most of your sentiments with regards to accurately verifying the information on the OP's list, but I sure hope you own LiquidVPN otherwise this isn't how you should represent your employer.
Why do you want your ip to change every time you login? Pretty much any VPN provider will do that. LiquidVPN has something called "IP Modulation" that will change your IP address everytime you connect to a different site.
Honestly, any vpn provider will be better then Hide my ass aka Snitch on your ass.
You can use the scripts vom LiquidVPN when I get home. Then you'd just have to edit
Everything should be explained in that post I linked
This is basically why I believe in the decentralized VPN space. Mysterium is p2p and open source, the product is built to NOT store data logs and does not even possess the ability to do so. If they were instructed by a government to share data, it would be impossible... there is none other than the publicly available blockchain data.
LiquidVPN just got sued for $10m for promoting torrenting of films. They also claim to be "no logs" but when a centralised entity is attacked they could easily throw their users under the bus to save their ass.
This is a topic that really bothers me because people hold flames to the feet of services that spell out what they do and do not have. Plus /r/ThatOnePrivacyGuy took our disclosure as being persistent logs instead of volatile. So seeing LiquidVPN get docked for that and not seeing other services that clearly do the same thing get docked was the straw so to speak.
I think most VPNs are static IP, dynamic IPs aren't very common in a server environment even with VPNs. I'm not sure if you need a dedicated IP or if a shared IP works for you when running a FTP server over a VPN.
All the ones you named other than Mullvad are American. Mullvad being based in Sweden and the EU's data retention laws being inapplicable to VPNs in Sweden you may find them more private. They have far less servers though than PIA or TORGuard. LiquidVPN has a warrant canary but I don't think you care about that since you aren't even paying anonymously.
Not sure how many VPNs have port forward but most VPNs have all needed ports open.
I mistook you for a representative from another company that is not handling this well. Hence the disconnect in our conversation. I apologize.
I am confident that LiquidVPN took the correct steps to mitigate the issue after reading these posts.
BlackVPN I hope you are just a sales rep and NOT the technical mastermind behind your service. I read your replies to TF and when you said you have no tools in place to monitor your network I groaned. How do you for instance know when you need to add servers in a location because it is becoming popular or when a OpenVPN service hangs or begins to flap?
In any case to answer your question
DMCA complaints come with a port number and IP address the file was served under. What PIA, ProxySH and LiquidVPN does is they go to their servers firewall and add an entry to block the port. Stoping all connections on that port for everyone on the server.
Did you really just come in here like the other guy and start spouting the same crap? Why don't I have my own thread on PIA yet? Are you proud of being part of a VPN community that posts other VPN provider's personal information and address trying to scare and intimidate then?
Edit: now I'm just irritated having looked at those threads. You have a guy in there posting personal pictures and supposed nudes of LiquidVPN's owner's wife.
links removed because of horrible content
If you are as worried about security as your post leads me to believe then several of the services on your list fail off the jump.
You have no encryption requirements? Are countries with terrible privacy violations acceptable to have nodes in? Lots of services randomly throw up servers to have more flags.
AirVPN is the only one on your list that I would use.
Some others that are really good are Bolehvpn, Cryptohippy (at least they were when I used them before starting LiquidVPN) and Mullvad
I personally like out of the three. All companies have a code of ethics. At least you know where they stand and what they will and will not do when violations happen. I liked their model so much that I took LiquidVPN in that direction. but you should go with your gut.
A TOS is all a lot of providers even publish. If you feel PIA's TOS is over reaching then look elsewhere.
I can tell you this though. You said your friend is being arrested and it sounded like you may be involved in the same type of activities. If you plan on doing illegal shit where people end up hurt (directly or indirectly) none of those VPNs will save you from getting caught. The internet doesn't work like that.
I would suggest LiquidVPN. The VPN client is super simple. Just install it and choose an SSL PPTP or L2TP server to connect to. It will stay up to date with the latest VPN servers on the network as well as software updates.
I would suggest you look at liquidvpn. Ultra fast VPN servers; PPTP users report speeds of up to 80Mbps. A custom version of Viscosity VPN client is included. You are entitled to two copies of the software. 1 for Mac and 1 for PC. Viscosity is hands down the best SSL VPN software on the planet and LiquidVPN's version supports PPTP-L2TP and SSL. There is a node in Montreal so there will be no problem streaming Canada content.
Provided a link for you. This is the case I was referring to, they PROMOTED copyright violation - which is very different than WARNING NOT TO.
> LiquidVPN, however, was found to have "intentionally induced and encouraged direct [copyright] infringement"
You are spreading MISINFORMATION. Get your facts straight.
> The LiquidVPN Defendants describe their VPN service as a tool to "Watch Popcorn Time without being detected by your ISP and P2P tracking software” and promote it as a tool that can be used to pirate copyright protected content “without the risk of getting caught by your ISP or anyone else.” See SAC at ¶¶225-226.
It appears that LiquidVPN advertised their service as able to break the law, with no consequence. That was a very silly thing to do.
There may be others using the software and tech on their own, completely outside of Orchid. That's one of the cool things about permissionless and open source systems. :)
Boleh, PIA, LiquidVPN, and VPNsecure are the current providers. Yes, we're looking to onboard more as official partners in the near future. When the software is more stable and can be easily rolled out by anyone, all the documentation will be fully released and anyone can participate using their own curated lists and such.
This is a much more nuanced case then just suing a VPN provider. The VPN provider, LiquidVPN, is/was actively promoted using their services to protect you from legal ramifications when using Popcorn time. Popcorn time is an app/service that is specifically designed to download and stream pirated content.
In the United States, it's illegal to advertise your services as being able to assist your customers to conduct illegal activities.
Thanks for having an interest in being a bandwidth provider. The node software is still in active development and testing with the first set of partners (PIA, Boleh, LiquidVPN, etc.).
They're actively providing feedback on the software, and working with us to make it ready for general availability. Right now the focus is on the iOS and macOS apps, but the teams attention can turn back to the node software after those launch.
In the meantime, you can poke around the node software on GitHub, but we can't offer any documentation or support at this time since things are still changing so quickly. You are welcome to try installing it on your own machine but we can’t provide support at this time.
You could also take a look at the partnership with Bloq and explore participating in their node.
Login to your account in LiquidVPN and check if you make any changes to your password. Maybe you can update or change your login credentials. BTW, what is your user credentials? Userid/password or PKI certs?
Check out LiquidVPN, I get all of my 60/20 with them, not sure if it will hit 100 though. Close to £5, £5.57 for 2 devices, there was a half price offer but I think it's ended, you could try indy4 as a code for 30% off for life.
I use Tixati and LiquidVPN client. I used Windows task scheduler so that when the VPN network connection is connected to it will open Tixati and then when the connection is closed it will close Tixati. That way unless I manually open Tixati it will only auto open when the VPN is active. Additionally I'm thinking of using a proxy server setup inside Tixati settings for a little more anonymity. Additionally, I also have the kill switch engaged just in case something fails to operate correctly.
Depending where you are PIA is popular, I like LiquidVPN, neither are expensive. Avoid free VPN's as they have to make money somehow - tnstasafl
Some seedbox providers accept public torrent sites, you can rent a seedbox or VPS for $10-$15 or less depending on your space and speed requirements.
Check out /r/seedboxes /r/torrents and /r/trackers
Dude what are you talking about! You suspected who I was? LOL its not like I tried to hide who I am, I have had discussions with you in private messages about LiquidVPN before.
> To be fair, the user had previously identified himself as being affiliated with the company when you messaged him the previous month with questions regarding said company.
/u/ThatOnePrivacyGuy, SMR Dave (The SMR is for the hosting company he runs) is a verified poster in /r/vpn. Verified meaning I have confirmed that he is involved in both SMR and LiquidVPN. Search the /r/vpn/wiki if you need more information on LiquidVPN
This post is the very reason we set up manual approval of VPN topics in /r/privacy. We do not need the drama that comes with VPNs, their users and providers in here and people taking pot shots at each other. Thread locked.
The 1st problem is Linux is like 1/3rd logs by design. Because I represent LiquidVPN I do not really feel comfortable putting other services business out there. I reluctantly used AirVPN as an example because they clearly were doing the same logging Liquid does. I thought /r/ThatOnePrivacyGuy knew who I was because I told him in a PM that I represent LiquidVPN a couple weeks before that started.
Your table is grossly misleading. How can you say PIA does not comply with DMCA but or LiquidVPN does? PIA is a USA based company they comply with DMCA. They do the same thing LiquidVPN does. Kindly tell the datacenter that they are protected under the copyright act as a safehaven.
Quite frankly if your not going to represent companies truthfully then you shouldn't post this stuff.
You're blurring two lines.
The response was in reply to a fishing expedition by law enforcement, or even by someone pretending to be law enforcement, there was no court order (subpoena) and as such any VPN should of responded in the same way.
What happened at LiquidVPN was service affecting. They are two separate types of incident.
Well like gstuartj says VPN chains are only a marginal improvement. I don't usually wear tinfoil hats. I connect to LiquidVPN and that is all. I have no reason for chaining VPNs or using networks like tor. If you have legitimate reasons for needing anonymity I think the only way to go is get a server on the russian black market and pay with bitcoins.
Use that server as your first hop.
use a VPN like LiquidVPN or airvpn they both have a enhanced streaming service that will allow you to stream USA media from EU servers. Meaning less buffering because your taking advantage of geocast/anycast
Many times that type of abuse would be coming from a customer. We only give away the IP addresses to the routers not to the servers. The attack today was on a router but we have had them on internal servers as well.
While they do display their paid sponsors first they also tell people that some providers are paid sponsors. Of course paid sponsors would be higher on the list. The only way I would not expect it to be that way is if they said here is the list in order from best to worst.
They added LiquidVPN and are not affiliates with them and Liquid never paid to be on the list. I can assure you that.
The formatting is all messed up on that page. I get the same messed up result in Chrome and Firefox.
edit: works better is I go here: and navigate the side menu.
How does LiquidVPN handle port forwarding with PfSense?
I did have a reply but it isn't important.
What is important is yours and everyone else's opinion on what should happen. If you agree or disagree with what LiquidVPN did on this occasion is immaterial, a provider is only as good as their last resolution to an incident.
If you're against what they did then how would you suggest they resolve future issues? If close and open elsewhere is your solution then what do you suggest when the problem follows to the new DC, and the next, and the next.
The solution to this can't just be close, open, close, open, its disruptive.
It's the reason why many providers log "session" details, to weed out troublemakers, it seems that because LiquidVPN don't do this then you're punishing them, but if they did in the first instance and it was included in their TOS then this news would never have made reddit and no one would be any the wiser.
Seems they are damned if they do and damned if they don't.
So then we can assume that the people behind these attacks were allowed to stay on the VPNs in question? Because if you cannot trace a username to an IP and timestamp you cannot remove the user behind the violations and they will continue to happen.
I have sent out an email to all of our subscribers asking if they would like LiquidVPN to remain a 100% log free VPN and only enable username, IP and timestamp logging when someone is abusing our service or If they would rather we enable username, IP and timestamp logging so that when it happens we can get rid of the abuser.
As far as I know that is the only two options. Someone committing crimes cannot be allowed to stay on a VPN network or eventually that network is going to end up is HUGE legal trouble and if you are an offshore service and cannot be held responsible do not think the countries filing these claims are going to let you maintain networks in their country.
LiquidVPN just installed 3 gigabit servers on the east coast USA. The datacenter uses multiple T1 providers. For instance from Romania I have seen ping times as low as 115ms which is really good for a connection to the USA.
Well it depends on what type of connection you want. LiquidVPN provides shared IP addresses, and Dynamically assigned public IP addresses. If you choose a publically assigned dynamic IP address then all ports are forwarded to your firewall directly 99% of the time. The only time this will change is if say SMTP gets shut down on a location because of SPAM.
You can also get a static IP in some locations (you have to open a ticket to find out where statics are available) if you get a static IP then you can assign the ports you want forwarded via the VPN admin area.
If you intend to hook up PFSense on a dynamically assigned public IP address then I would urge you to take advantage of the free IPS firewall option on the road warrior and family plan unless you know how to setup a firewall on your own. The reason being is all traffic is forwarded to you on these connections.
Signed up a few days ago for LiquidVPN because they said they didn't log then today I find out that they will begin to. I typically only support companies that value privacy. I am emailing them and asking for a refund. This is very disappointing for me as they have great support.
Most Of the VPNs on the list will admit to statistical analysis to watch for abuse including some of my favorites. Don't think that's possible with the log daemon turned off. Some (like LiquidVPN) have reported major attacks against banks using their servers. They warned the entire community that if they didn't stop he would have to turn on logging to identify and disconnect the user, but their datacenter disconnected them first. Companies like PIA say that they have proprietary ways of fighting abuse...
We might as well rename this subreddit to PIA-VPN as if anyone mentions something that is better and doing more then PIA to keep their users safe people flip out and down vote the shit out of it. The simple facts are this company is doing more to help their users then PIA. PIA waited till the NSA scare to finally update their outdated encryption. The simple fact remains that you're still forced to use their outdated encryption if you don't want to use their program. If you're looking to go with a US based provider then checked out LiquidVPN and don't pay attention to all this sheep on this subreddit. LiquidVPN is looking to be a better provider then PIA and they are a rather new provider and are talking about moving their company out of the US.
Quite honestly I would go with a provider that provides you with a free copy of viscosity like LiquidVPN their version of viscosity is better than the paid version because it can be used for PPTP and L2TP connections as well as SSL connections. Viscosity is the defacto Mac VPN client... Windows too.
LiquidVPN have been working to improve their IP modulation '2.0' speeds. I did some tests on them yesterday, and they are now much more usable, although not as fast as most regular VPN connections. You can see my results at