DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home DeFi Protocol

NordVPN releases Linux client source code

Reading Time: 2 mins read
in News

 

Nord Security has taken steps to increase transparency and boost user confidence in its Linux NordVPN client by releasing its source code and associated networking libraries.

The company made the move in response to growing concerns over user privacy and security. Additionally, Nord announced that its NordVPN MeshNet private tunneling feature, which allows users to create private tunnels with other NordVPN users to access the internet or internal devices, is now free for all users who install their software, whether or not they have a paid subscription.

Nord has shared all three of the released projects on their GitHub page, along with instructions on compiling the NordVPN Linux and libraries. The LibDrop library, which is part of Nord’s MeshNet feature, enables users to send and receive files over the private tunnel.

On the other hand, the LibTelio networking library is responsible for creating encrypted networks over the MeshNet feature and is heavily used across all NordVPN applications on all operating systems.

The VPN hopes the move will encourage coders and developers from the open-source community to scrutinize their code and make their service better.

The company believes that open-sourcing LibTelio is particularly important since it forms the backbone of all NordVPN applications and not just the Linux client.

They encourage users to modify the complete source code for the NordVPN Linux application to suit their needs and report any bugs they find to Nord Security’s HackerOne bug bounty program.

Additionally, they promise that any security vulnerabilities in the Linux client reported through the program will receive bounties ranging from $10,000 to $50,000, depending on their severity.

Overall, the move towards transparency is a welcome change in the cybersecurity industry.

By releasing their source code, Nord Security is providing users with a way to validate the security of their NordVPN service, building confidence in their product.

It also provides an opportunity for the developer community to review the code and suggest changes, which could ultimately improve the product’s overall security and effectiveness.

Read More

Tags: Cyber AttacksCyber securityencrypted networksGitHub repositoriesLinuxMarch 2023NewsNews 2023NordVPNVPNVPN Reports
ADVERTISEMENT

Related Posts

Russian cyberwarfare leak exposes Vulkan

Russian cyberwarfare leak exposes Vulkan

March 31, 2023
US aids Costa Rica for cyberattack recovery

US aids Costa Rica for cyberattack recovery

March 31, 2023
Microsoft enhances Windows 11 features

Microsoft enhances Windows 11 features

March 31, 2023
Steam Ends Support for Old Windows

Steam Ends Support for Old Windows

March 30, 2023

More Articles

Alerts

Microsoft Edge security advisory (AV22-213)

April 19, 2022
Cyber Review

Cyber Review – Adversarial Tradecraft in Cybersecurity by Dan Borges

July 13, 2021
Quotes

“Using internal phishing exercises…”

January 18, 2021
Alerts

Two flaws in Samsung Galaxy Store can allow to install Apps and execute JS code

January 24, 2023
Alerts

Google Releases Security Updates for Chrome

June 22, 2021

Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence…

March 16, 2021
Book

Software Quality Assurance (Internal Audit and IT Audit)

June 24, 2022

Agent-based vulnerability Scanners

November 24, 2021
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.