top | item 9614993

Hola VPN turns 10M users into exit nodes

296 points| ivank | 10 years ago |8ch.net | reply

133 comments

order
[+] dchuk|10 years ago|reply
They explicitly state in their FAQ how this works and why their service is able to be free: http://hola.org/faq#in_how_is_free

They even have a non-free option that eliminates the VPN as a proxy feature.

"Hola built a peer to peer overlay network for HTTP, which securely routes the sites you choose through other Hola users' devices and not through expensive servers. Hola never takes up valuable resources from these users, since it only uses a user as a proxy if that users' device is completely idle (meaning device is connected to electric power (not on battery), no mouse or keyboard activity is detected, and device is connected to the local network or Wifi (not on cellular)). This makes Hola the first VPN service without underlying operational costs. Although Hola doesn�t need to pay for bandwidth, we still need to pay the engineers who create, maintain and keep improving the free Hola service. Hola generates revenue by selling a commercial version of the Hola VPN service to businesses (through our Luminati brand). This is what allows us to keep Hola free for our users. Users who want to enjoy the Hola network without contributing their idle resources can do so by joining the Hola premium service for $5 per month (or $45 per year)."

[+] 8chan|10 years ago|reply
Hello, Fredrick Brennan here (8chan owner).

They changed their FAQ IN RESPONSE to my breaking the story on this.

Proof:

Google cache of Hola FAQ as of 26 May: https://archive.is/tgujS

As you can see, there is no mention of Luminati, or the underlying mechanics at all.

I published hola.html and updated my global announcement just hours before the FAQ change: https://twitter.com/infinitechan/status/603178141650026498

There are millions of users who installed this and do not know how it works. Please do not downplay this issue.

[+] sergiotapia|10 years ago|reply
And that somehow makes what they're doing OK?
[+] bruce487|10 years ago|reply
Out of interest: Do other vpns work the same way? Even if it's clearly stated in the FAQ, not everybody reads them.
[+] bifrost|10 years ago|reply
This is basically why you never want to use a proprietary client with any VPN service, you don't know what you're getting into at all. At least with PPtP/L2TP/OpenVPN based services you can use well known clients or OS vendor provided clients that are unlikely to have little goodies like this.
[+] voltagex_|10 years ago|reply
I'm not sure this will get seen but - is there an OpenVPN client for Windows that doesn't suck?
[+] tiatia|10 years ago|reply
Good luck with that in China mate!
[+] milankragujevic|10 years ago|reply
[+] prawnsalad|10 years ago|reply
I had also broken down the way this works a long while ago and found they have a lot more proxies than this. In some cases they just have a digitalocean VPS running somewhere to help beef up the network.

It was only recently that they started requiring the user auth for the proxy access, earlier it was a free for all without any auth at all. Now they have the option to track which accounts are causing traffic on their network and potentially put a stop to them (not that is isn't difficult to get around)

[+] eyeareque|10 years ago|reply
This made me laugh--I wonder how many innocent people are going to have the FBI kick their doors down for things that past through their "exit nodes" that they hosted.
[+] anc84|10 years ago|reply
I wish it was the other way around, mass-spread sharing of internet access leading to it becoming the norm and people finally getting some privacy from mixing their connections.
[+] yaeger|10 years ago|reply
Judging by in what context I have read about Hola so far, I guess the biggest use case is to circumvent geo block to access things like Netflix. But yeah, ever since I learned that I am acting as an exit node for others I have stopped using the service as I do not want to be the one answering for stuff others have done in my name(IP).
[+] tombozi|10 years ago|reply
What if a node messes with the response and returns fake data? Do they route the request over multiple nodes and compare the results? Then what if someone owns a lot of nodes?
[+] userbinator|10 years ago|reply
So far as I can tell, there is no way to tell if an IP has the Hola VPN software installed or not: no tell tale open port, no special header from Luminati, and no specific range.

Then, immediately in the next paragraph:

An attacker used the Luminati network to send thousands of legitimate-looking POST requests to 8chan's post.php in 30 seconds, representing a 100x spike over peak traffic and crashing PHP-FPM.

How was that conclusion arrived at? Am I missing something here?

[+] theralphretort|10 years ago|reply
"Ah, the user flooding himself (Bui) spilled the beans and told me how he did it voluntarily in IRC. Otherwise I'd have no clue." -Fredrick Brennan (8chan)
[+] alexbecker|10 years ago|reply
One way to find out (not saying this is how it was done) would be to spin up a machine running Hola and see where the traffic goes.
[+] ajdlinux|10 years ago|reply
Anyone like to recommend a browser-extension-based VPN tool that's a bit more respectful than Hola and is relatively cheap?

(Of course I run my own VPN server using OpenVPN, but Hola is really convenient when I'm only trying to get an American IP to avoid Australian geoblocking - it's also easy for non-technical friends to use.)

[+] joelkesler|10 years ago|reply
Tunnelbear recently released a chrome plugin for their VPN service. I hear good things about it. (I personally use the application on my Mac)
[+] hiamnew|10 years ago|reply
Just use Tor Browser, it's "extract and launch".
[+] batuhanicoz|10 years ago|reply
Anyone knows a better alternative to luminati.io? We've been using it in our company but it feels expensive.

I thought this thread may be good place to ask for an alternative.

[+] tonyhb|10 years ago|reply
Spin up VPS instances across multiple cities, countries and continents.

Hook them up with Docker and connect them with Swarm.

Label them with an IP/city/country/continent combination.

Use Docker Swarm's affinity labelling to start instances in a particular city when needed. Additionally record the last IPs used and use Swarm to not deploy to those servers.

[+] Scoundreller|10 years ago|reply
> We've been using it in our company but it feels expensive.

I just looked up the cost and no kidding at $20/GB.

[+] imron|10 years ago|reply
> or allows domains to pay them off for such a rejection.

Thereby creating the world's largest extortion racket.

Yeah, maybe not such a good idea to encourage that sort of business model.

[+] Gladdyu|10 years ago|reply
I doubt that if they sell their users as bots they will do anything about the network being used as a botnet and there is nothing you can do about it, especially considering the users 'responsible' won't even know what they are taking part in.
[+] ars|10 years ago|reply
It's not clear that part of the article is even true.

They appear to just sell VPN server by the GB. I see nothing about a botnet in there, there is no traffic amplification or ability to run programs on the clients.

[+] albertoleal|10 years ago|reply
Anyone have VPN recommendations?
[+] developer1|10 years ago|reply
For technically inclined people, setting up your own SOCKS proxy is the simplest method possible.

1. Get a cheap server (ex: DigitalOcean $5/month) in the city/country you want to connect through.

2. Add these 2 lines to /etc/ssh/sshd_config:

AllowTcpForwarding yes

GatewayPorts yes

3. Restart sshd (service ssh restart), or restart the server.

4. Connect to the server setting a dynamic port forward. On linux or Mac, this is just "ssh -D 8000 [email protected]". On Windows, putty lets you set a dynamic port forward.

5. Personally I use Chrome for my real browsing, and then use Firefox for the proxy since it allows configuring a proxy for the browser only rather than the entire operating system. You just set the SOCKS proxy under advanced networking settings (host 127.0.0.1, port 8000).

6. If you want all internet traffic to go over the proxy rather than just Firefox, this is easy on Mac through the Network Preferences panel. I'm not able to comment on linux/Windows in this regard.

[+] okbake|10 years ago|reply
I use NordVPN, which I have no complaints about. But occasionally I'll get a 1 week token from cryptostorm (https://cryptostorm.is/)

They have an interesting model: you buy a token that expires after a certain length of time (1 week, 1 month, 1 year, etc). The clock doesn't start ticking until the first time you log in. Instead of registering a username/password, you're sent the token via email and your login ends up being a sha512 hash of the token for the username. There is no password associated, just the hash of the token is all you need.

I like this because you're able to buy 'disposable' accounts basically. They take bitcoin and some alt coins too, which is nice. Dns protection and access to .onion and .bit domains. It all seems pretty solid. NordVPN tends to be a little bit faster for me, though it may depend on which servers you use.

[+] nyolfen|10 years ago|reply
i've been renting a cheap-as-dirt vps ($15/yr) and just using sshuttle[0] to proxy through it which works great for my circumstances (my school blocks nonstandard ports but is just dandy with 22)

[0] https://github.com/apenwarr/sshuttle

[+] mbubb|10 years ago|reply
This company looks interesting - https://www.tunnlr.com/ I learned about them from http://devio.us/ (which is great when it works...)

I did the trial for 1 day and tried them out. Have no pressing reason to continue for now but have filed them in the mental rolodex.

[+] chx|10 years ago|reply

[deleted]

[+] zxcvcxz|10 years ago|reply
Explain what is wrong with gamergate. I don't game so I don't know. Seems to me reddit is the site you should be hating.

Edit: Actually after thinking it over, it's free speech you should be against.

It really sucks when sites host opinions you don't agree with doesn't it? I googled gamer gate and they seem to be against people exactly like you: People who want to shut down other peoples opinions that they don't agree with.

[+] cekanoni|10 years ago|reply
that's sneaky and some one needs to point out for this!