sb-nz logo
Story image

VPN provider Hide My Ass promises no more user logging

11 May 2020

Avast-owned VPN provider HMA (Hide My Ass) is backing increased user privacy by rolling out a new ‘no logging policy (NLP)’, that the company believes will help it to become an advocate for consumer privacy.

HMA took the first step in its customer privacy journey in 2019, after announcing that it would no longer collect its users’ IP addresses. This month’s announcement further expands the company’s commitment.

HMA’s no logging policy will be audited by cybersecurity firm VerSprite, which will verify the disconnection of online usage and transmission data from personally identifiable information (PII) that HMA stores for legal and billing purposes. 

HMA states that this audit process ensures that all online user activity remains private, even from the company itself.

HMA commercial director Andrei Mochola says the VPN industry is struggling with trust problems. 

“Consumers are unknowingly handing over their data to VPN companies with unclear ownership based in jurisdictions with questionable consumer protection laws. There are VPN providers claiming to offer no logging when all they are offering is IP protection.”

Mochola says HMA built its no logging policy on a foundation of transparency. 

“As we enter a new chapter at HMA, our no logging policy is not the ceiling but the floor of our ambition.”

“We will add new privacy features such as advertiser anti-tracking which solves a very real problem for users, but currently goes beyond the scope of a traditional VPN. We see taking such steps as important for us to maintain our fight against censorship and we will continue to innovate to become a champion of privacy in the VPN market.”

HMA’s no logging policy applies to devices running Windows, Mac, Android, Android TV, iOS, and Linux. 

Support for Android TV rolled out in March 2020, to secure and protect internet connections to hide viewing habits from advertisers and internet service providers (ISPs).

“It’s not common knowledge that your viewing habits and your browsing history can be collected via a device like a Smart TV and used by third parties as part of the process to profile you,” explains Mochola. 

“The media box market is growing, and Android is a prominent platform for today’s smart TVs. Security, privacy and open access to online content and information is part of HMA’s DNA, so we built a product and user interface specifically designed for smart TVs to plug an existing gap that will give our customers more freedom and protection online.”

HMA’s security portfolio includes web proxy, an IP Checker, a DNS Leak Test and WebRTC Test. HMA VPN also provides an IP Refresh option to help users overcome blocks by cycling through new IP addresses, a system-wide kill switch, and split-tunnelling to let users choose which apps to secure through the encrypted HMA tunnel.

Link image
Virtual demo: Diagnose network cabling problems with the LinkIQ Cable+Network Tester
If you’re finding it difficult to install access points and cabling, or if you can’t pinpoint an issue with a video camera or end user, the LinkIQ Cable+Network Tester could be exactly what you need. Try a free, fully interactive demo now.More
Story image
Combine endpoint privilege management with these tools for maximum protection
By integrating an EPM solution with additional technologies, teams can manage the entire security tool stack more easily and enhance each component’s effectiveness.More
Story image
Infrastructure-as-code, and how it can secure the cloud
Bridgecrew recognised IaC early on as one of the best ways for modern teams to delegate security ownership to individual contributors while distributing it across existing frameworks within CI/CD pipelines. This attribute meant that IaC was invaluable in securing cloud-native environments.More
Story image
Pandemic sees organisations of all sizes and industries invest in CTI
There is opportunity for organisations to better manage their cyber-threat intelligence for greater security and threat intelligence effectiveness by adopting the right tools and processes.More
Story image
Over half of ransomware victims pay up - but does it work?
"Handing over money doesn’t guarantee the return of data, and only encourages cybercriminals to continue the practice."More
Story image
2020 sees a global shift in financial malware threats
The financial threat landscape experienced a game-changing pandemic year, according to a new report from Kaspersky.More