• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / Uninstall Hola ASAP

Uninstall Hola ASAP

2015-06-02 by Jason

Hola previously billed itself as a VPN to browse anonymously and access media unavailable in your region, such as Netflix or streaming live sports. In the past week, security researchers have accused Hola of being harmful to the Internet as a whole. As a VPN or “unblocker”, it may have allowed you access to different media but it was also increasing your vulnerability. The security researchers summarized the problem at adios-hola.org as Hola “operates like a poorly secured botnet”.

hola

Hola has since clarified its service as a peer-to-peer service, meaning your Internet traffic can exit through somebody else’s connection and their traffic can exit your connection. Access to the Hola network is then sold to businesses through Hola’s sister company of “Hola for Business” as Luminati (Really?! You chose almost the classic, evil name of all conspiracies.). Companies supposedly use the VPN service to check the prices of their product, check how the site appears from different countries, or audit their site and ad integrity. Despite the legitimate claims for business, a spammer was able to use the service by posing as a business and their negative actions would have been tied to your IP address. Hola sells access to the network from $1.45 to $20 per GB. The security researchers also discussed with the company to find that they have no interest in how the network is being used.

The security researchers created for a self-test on adios-hola.org that indicated if you were vulnerable to being an exit node, being tracked, code execution, and root code execution. It initially worked but Hola has updated their code, which incidentally fixed the tracking issue but also broke the vulnerability checker.

Initial announcement:

hola_initial

Updated site:

hola_current

The security researchers make their case for why you should immediately stop using and uninstall Hola:

1. They allow for you to be tracked across the internet, no matter what you do
2. They send traffic of strangers through your internet connection
3. They sell access to third parties, and don’t care what it’s used for
4. They let anybody execute programs on your computer
5. They’re trying to rewrite history

The Chrome extension for Hola has been unpublished from the Chrome Web Store. Unfortunately, people might still be “infected” with this software. You can follow the uninstall steps to ensure you remove Hola correctly and completely. Alternatives to use include the well-known Tor, for anonymity, or a legitimate VPN for geo-locked content, though we primarily recommend staying within compliance with the Terms of Use agreement.

Filed Under: Security and Privacy, Software

Trending

  • Product Review: Amazon Fire TV Stick
    In Hardware, Gadgets, and Products, Reviews
  • Latest Global Phishing Survey released from Anti-Phishing Working Group
    In Security and Privacy
  • Simple Tip: Make Ping ‘Ping!’
    In Network, Software, Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • Configure Outlook to recurring appointments for the last weekday of the month Configure Outlook to recurring appointments for the last weekday of the month
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business
  • Benefits of End-To-End Testing That Will Match Company Expectations Benefits of End-To-End Testing That Will Match Company Expectations
  • 3 Key Features of Pets Health Monitoring Systems 3 Key Features of Pets Health Monitoring Systems
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in