I think the only real answer is going to be "it depends on too many factors people here can only LARP about really understanding, so ask a lawyer", and even then it still depends on what every individual judge in someone's case thinks.
I assume this is because, in addition to the missing ciphers as referenced in the linked article, OpenVPN, even though it uses TLS, it initially uses a very identifiable handshake before initiating TLS, which is not hard to block. I have personally had problems specifically with OpenVPN being targeted/blocked in this way.
Verify our no-logging policy through code inspection
Couldn't a network appliance, iptables or a bpf program still be logging and we'd have no idea?
Validate that the code running on our servers matches this public repository
Yes but AFAIK it can't validate that the code you verified against is the same code actually powering your VPN session right now (could be a dummy box just used for validation), or that some other external hardware or superuser-level code isn't also listening in. Someone please correct me if I'm wrong.
Canada and the United States have banned or shut down torrenting sites, while Trinidad and Tobago imposes lengthy prison sentences for illicit media streaming.
I assume this is what they're referring to, although you didn't specify your country. Seems accurate to me.
Basically instead of launching completely new processes for each tab, which uses the (now updated/different) binary on disk, it uses a small secondary process that stays running the whole time the browser is open, and new processes are forked from that one, which makes them all use the same in-memory copy of the old process even after the program is updated.
This only works on *nix because you can't overwrite binaries on Windows that are in use... but Linux keeps the old binary in memory the whole time, so it doesn't care if you replace it, as it won't be used until you restart the program.
So it doesn't actually update anything at all while it's running.
It used to be an awesome clone of the famous MS Trackball Explorer (now that the patent has expired), but apparently they have completely changed the design and don't offer it anymore: https://www.trackballmouse.org/ploopy-classic/
Unfortunately I'm not interested in this new design at all.
If anyone is still looking for an explorer clone, I highly recommend Sanwa.
works fine for me /shrug