They even have a non-free option that eliminates the VPN as a proxy feature.
"Hola built a peer to peer overlay network for HTTP, which securely routes the sites you choose through other Hola users' devices and not through expensive servers. Hola never takes up valuable resources from these users, since it only uses a user as a proxy if that users' device is completely idle (meaning device is connected to electric power (not on battery), no mouse or keyboard activity is detected, and device is connected to the local network or Wifi (not on cellular)). This makes Hola the first VPN service without underlying operational costs. Although Hola doesn�t need to pay for bandwidth, we still need to pay the engineers who create, maintain and keep improving the free Hola service. Hola generates revenue by selling a commercial version of the Hola VPN service to businesses (through our Luminati brand). This is what allows us to keep Hola free for our users. Users who want to enjoy the Hola network without contributing their idle resources can do so by joining the Hola premium service for $5 per month (or $45 per year)."
This is basically why you never want to use a proprietary client with any VPN service, you don't know what you're getting into at all. At least with PPtP/L2TP/OpenVPN based services you can use well known clients or OS vendor provided clients that are unlikely to have little goodies like this.
I had also broken down the way this works a long while ago and found they have a lot more proxies than this. In some cases they just have a digitalocean VPS running somewhere to help beef up the network.
It was only recently that they started requiring the user auth for the proxy access, earlier it was a free for all without any auth at all. Now they have the option to track which accounts are causing traffic on their network and potentially put a stop to them (not that is isn't difficult to get around)
This made me laugh--I wonder how many innocent people are going to have the FBI kick their doors down for things that past through their "exit nodes" that they hosted.
I wish it was the other way around, mass-spread sharing of internet access leading to it becoming the norm and people finally getting some privacy from mixing their connections.
Judging by in what context I have read about Hola so far, I guess the biggest use case is to circumvent geo block to access things like Netflix.
But yeah, ever since I learned that I am acting as an exit node for others I have stopped using the service as I do not want to be the one answering for stuff others have done in my name(IP).
What if a node messes with the response and returns fake data? Do they route the request over multiple nodes and compare the results? Then what if someone owns a lot of nodes?
So far as I can tell, there is no way to tell if an IP has the Hola VPN software installed or not: no tell tale open port, no special header from Luminati, and no specific range.
Then, immediately in the next paragraph:
An attacker used the Luminati network to send thousands of legitimate-looking POST requests to 8chan's post.php in 30 seconds, representing a 100x spike over peak traffic and crashing PHP-FPM.
How was that conclusion arrived at? Am I missing something here?
"Ah, the user flooding himself (Bui) spilled the beans and told me how he did it voluntarily in IRC. Otherwise I'd have no clue." -Fredrick Brennan (8chan)
Anyone like to recommend a browser-extension-based VPN tool that's a bit more respectful than Hola and is relatively cheap?
(Of course I run my own VPN server using OpenVPN, but Hola is really convenient when I'm only trying to get an American IP to avoid Australian geoblocking - it's also easy for non-technical friends to use.)
Spin up VPS instances across multiple cities, countries and continents.
Hook them up with Docker and connect them with Swarm.
Label them with an IP/city/country/continent combination.
Use Docker Swarm's affinity labelling to start instances in a particular city when needed. Additionally record the last IPs used and use Swarm to not deploy to those servers.
I doubt that if they sell their users as bots they will do anything about the network being used as a botnet and there is nothing you can do about it, especially considering the users 'responsible' won't even know what they are taking part in.
It's not clear that part of the article is even true.
They appear to just sell VPN server by the GB. I see nothing about a botnet in there, there is no traffic amplification or ability to run programs on the clients.
For technically inclined people, setting up your own SOCKS proxy is the simplest method possible.
1. Get a cheap server (ex: DigitalOcean $5/month) in the city/country you want to connect through.
2. Add these 2 lines to /etc/ssh/sshd_config:
AllowTcpForwarding yes
GatewayPorts yes
3. Restart sshd (service ssh restart), or restart the server.
4. Connect to the server setting a dynamic port forward. On linux or Mac, this is just "ssh -D 8000 [email protected]". On Windows, putty lets you set a dynamic port forward.
5. Personally I use Chrome for my real browsing, and then use Firefox for the proxy since it allows configuring a proxy for the browser only rather than the entire operating system. You just set the SOCKS proxy under advanced networking settings (host 127.0.0.1, port 8000).
6. If you want all internet traffic to go over the proxy rather than just Firefox, this is easy on Mac through the Network Preferences panel. I'm not able to comment on linux/Windows in this regard.
https://www.privateinternetaccess.com/ (PIA) works for me. Of course with any VPN you run the risk of providing all of your information through a (potentially) captured source.
I use NordVPN, which I have no complaints about. But occasionally I'll get a 1 week token from cryptostorm (https://cryptostorm.is/)
They have an interesting model: you buy a token that expires after a certain length of time (1 week, 1 month, 1 year, etc). The clock doesn't start ticking until the first time you log in. Instead of registering a username/password, you're sent the token via email and your login ends up being a sha512 hash of the token for the username. There is no password associated, just the hash of the token is all you need.
I like this because you're able to buy 'disposable' accounts basically. They take bitcoin and some alt coins too, which is nice. Dns protection and access to .onion and .bit domains. It all seems pretty solid. NordVPN tends to be a little bit faster for me, though it may depend on which servers you use.
i've been renting a cheap-as-dirt vps ($15/yr) and just using sshuttle[0] to proxy through it which works great for my circumstances (my school blocks nonstandard ports but is just dandy with 22)
Explain what is wrong with gamergate. I don't game so I don't know. Seems to me reddit is the site you should be hating.
Edit: Actually after thinking it over, it's free speech you should be against.
It really sucks when sites host opinions you don't agree with doesn't it? I googled gamer gate and they seem to be against people exactly like you: People who want to shut down other peoples opinions that they don't agree with.
[+] [-] dchuk|10 years ago|reply
They even have a non-free option that eliminates the VPN as a proxy feature.
"Hola built a peer to peer overlay network for HTTP, which securely routes the sites you choose through other Hola users' devices and not through expensive servers. Hola never takes up valuable resources from these users, since it only uses a user as a proxy if that users' device is completely idle (meaning device is connected to electric power (not on battery), no mouse or keyboard activity is detected, and device is connected to the local network or Wifi (not on cellular)). This makes Hola the first VPN service without underlying operational costs. Although Hola doesn�t need to pay for bandwidth, we still need to pay the engineers who create, maintain and keep improving the free Hola service. Hola generates revenue by selling a commercial version of the Hola VPN service to businesses (through our Luminati brand). This is what allows us to keep Hola free for our users. Users who want to enjoy the Hola network without contributing their idle resources can do so by joining the Hola premium service for $5 per month (or $45 per year)."
[+] [-] 8chan|10 years ago|reply
They changed their FAQ IN RESPONSE to my breaking the story on this.
Proof:
Google cache of Hola FAQ as of 26 May: https://archive.is/tgujS
As you can see, there is no mention of Luminati, or the underlying mechanics at all.
I published hola.html and updated my global announcement just hours before the FAQ change: https://twitter.com/infinitechan/status/603178141650026498
There are millions of users who installed this and do not know how it works. Please do not downplay this issue.
[+] [-] sergiotapia|10 years ago|reply
[+] [-] bruce487|10 years ago|reply
[+] [-] bifrost|10 years ago|reply
[+] [-] webdigi|10 years ago|reply
[+] [-] voltagex_|10 years ago|reply
[+] [-] NeutronBoy|10 years ago|reply
dchuk beat me to it!
[+] [-] tiatia|10 years ago|reply
[+] [-] milankragujevic|10 years ago|reply
[+] [-] prawnsalad|10 years ago|reply
It was only recently that they started requiring the user auth for the proxy access, earlier it was a free for all without any auth at all. Now they have the option to track which accounts are causing traffic on their network and potentially put a stop to them (not that is isn't difficult to get around)
[+] [-] eyeareque|10 years ago|reply
[+] [-] anc84|10 years ago|reply
[+] [-] yaeger|10 years ago|reply
[+] [-] unknown|10 years ago|reply
[deleted]
[+] [-] stefantalpalaru|10 years ago|reply
[+] [-] tombozi|10 years ago|reply
[+] [-] userbinator|10 years ago|reply
Then, immediately in the next paragraph:
An attacker used the Luminati network to send thousands of legitimate-looking POST requests to 8chan's post.php in 30 seconds, representing a 100x spike over peak traffic and crashing PHP-FPM.
How was that conclusion arrived at? Am I missing something here?
[+] [-] darkengine|10 years ago|reply
"The user flooding himself (Bui) spilled the beans and told me how he did it voluntarily in IRC. Otherwise I'd have no clue."
[+] [-] theralphretort|10 years ago|reply
[+] [-] alexbecker|10 years ago|reply
[+] [-] ajdlinux|10 years ago|reply
(Of course I run my own VPN server using OpenVPN, but Hola is really convenient when I'm only trying to get an American IP to avoid Australian geoblocking - it's also easy for non-technical friends to use.)
[+] [-] joelkesler|10 years ago|reply
[+] [-] addandsubtract|10 years ago|reply
[+] [-] hiamnew|10 years ago|reply
[+] [-] batuhanicoz|10 years ago|reply
I thought this thread may be good place to ask for an alternative.
[+] [-] tonyhb|10 years ago|reply
Hook them up with Docker and connect them with Swarm.
Label them with an IP/city/country/continent combination.
Use Docker Swarm's affinity labelling to start instances in a particular city when needed. Additionally record the last IPs used and use Swarm to not deploy to those servers.
[+] [-] Scoundreller|10 years ago|reply
I just looked up the cost and no kidding at $20/GB.
[+] [-] predius|10 years ago|reply
Pricing is a lot less and we only use our own IPs.
[+] [-] imron|10 years ago|reply
Thereby creating the world's largest extortion racket.
Yeah, maybe not such a good idea to encourage that sort of business model.
[+] [-] Gladdyu|10 years ago|reply
[+] [-] ars|10 years ago|reply
They appear to just sell VPN server by the GB. I see nothing about a botnet in there, there is no traffic amplification or ability to run programs on the clients.
[+] [-] albertoleal|10 years ago|reply
[+] [-] developer1|10 years ago|reply
1. Get a cheap server (ex: DigitalOcean $5/month) in the city/country you want to connect through.
2. Add these 2 lines to /etc/ssh/sshd_config:
AllowTcpForwarding yes
GatewayPorts yes
3. Restart sshd (service ssh restart), or restart the server.
4. Connect to the server setting a dynamic port forward. On linux or Mac, this is just "ssh -D 8000 [email protected]". On Windows, putty lets you set a dynamic port forward.
5. Personally I use Chrome for my real browsing, and then use Firefox for the proxy since it allows configuring a proxy for the browser only rather than the entire operating system. You just set the SOCKS proxy under advanced networking settings (host 127.0.0.1, port 8000).
6. If you want all internet traffic to go over the proxy rather than just Firefox, this is easy on Mac through the Network Preferences panel. I'm not able to comment on linux/Windows in this regard.
[+] [-] asquabventured|10 years ago|reply
[+] [-] okbake|10 years ago|reply
They have an interesting model: you buy a token that expires after a certain length of time (1 week, 1 month, 1 year, etc). The clock doesn't start ticking until the first time you log in. Instead of registering a username/password, you're sent the token via email and your login ends up being a sha512 hash of the token for the username. There is no password associated, just the hash of the token is all you need.
I like this because you're able to buy 'disposable' accounts basically. They take bitcoin and some alt coins too, which is nice. Dns protection and access to .onion and .bit domains. It all seems pretty solid. NordVPN tends to be a little bit faster for me, though it may depend on which servers you use.
[+] [-] bifrost|10 years ago|reply
As a former privacy VPN operator I can tell you its extremely hard to operate one securely.
[+] [-] nyolfen|10 years ago|reply
[0] https://github.com/apenwarr/sshuttle
[+] [-] mingabunga|10 years ago|reply
[+] [-] mbubb|10 years ago|reply
I did the trial for 1 day and tried them out. Have no pressing reason to continue for now but have filed them in the mental rolodex.
[+] [-] shawkinaw|10 years ago|reply
[+] [-] CRR1|10 years ago|reply
signup for a new account via this link and you get free premium which means you are off the exit node list
http://hola.org/referral_signup?referrer_uid=basic%2Fg163589...
re-signup each month for a new account and a new month of premium
[+] [-] unknown|10 years ago|reply
[deleted]
[+] [-] CRR1|10 years ago|reply
[deleted]
[+] [-] zodiakzz|10 years ago|reply
[deleted]
[+] [-] chx|10 years ago|reply
[deleted]
[+] [-] dang|10 years ago|reply
[+] [-] zxcvcxz|10 years ago|reply
Edit: Actually after thinking it over, it's free speech you should be against.
It really sucks when sites host opinions you don't agree with doesn't it? I googled gamer gate and they seem to be against people exactly like you: People who want to shut down other peoples opinions that they don't agree with.
[+] [-] MandingoSauce|10 years ago|reply
[deleted]
[+] [-] cekanoni|10 years ago|reply