Tag: Engineering

How we implemented traffic routing in Meshnet for increased security

Traffic routing is a significant feature provided by NordVPN’s Meshnet. Essentially, it allows any Meshnet-connected device, called a node, to become a VPN server for other nodes. To do this, the end user needs only to click a few buttons in the NordVPN app. Under the hood, however, we need to handle setup complexities in…
Read more


July 1, 2024 0

Threat Protection Pro: Defending against cloaking techniques

Cloaking is a dangerous technique that scammers use to direct you to phishing websites. How can you know you’re being scammed if both the web page and its URL look legit? As the name suggests, cloaking is designed to be undetectable, so what can you do about it? Let’s go through the main cloaking techniques…
Read more


June 25, 2024 0

Libdrop: File sharing through NordVPN

The Libdrop library allows NordVPN users to share files over Meshnet. In this article, we explain how we developed our file transfer system and the role Libdrop plays in it. What is Libdrop? Libdrop is a cross-platform library developed in the Rust programming language. It is compatible with Windows, MacOS, Linux, iOS, and Android. File…
Read more


April 9, 2024 0

NordLynx 的厲害之處(如果太長不想看:就是網速)

NordLynx 是我們基於 WireGuard 的全新安全協定,給用戶帶來超快的網速和無懈可擊的安全及私隱。此外,我們在推出 NordLynx 前觀察了其實際表現,進行了配置調整和客戶端完善。我們準備把 NordLynx 發佈到 Windows、Mac、iOS 和 Android 等主要平台前,在 Linux 系統進行了測試。 我們相信 NordLynx 得益于 WireGuard® 框架,會比同類中的任何 VPN 協定都要快。然而,我們不能單憑猜測就做出技術決策,因此我們進行了相當多的測試(準確地說是 256,886 次),以了解 Nordlynx 的預期表現。下面的研究結果正好證明 NordLynx 的驚人速度。 首先介紹一下背景。 速度測試:配置 我們先看看測試方法,了解一下這個大型速度測試的配置。 研究旨在了解 VPN 協定對連線速度的影響,因此我們架構了四種涵蓋了大多數用戶使用 VPN 的行為模式場景: 用戶連接到最近的 VPN 伺服器,而且內容伺服器盡可能鄰近 VPN 伺服器; 用戶連接到海外的 VPN 伺服器,但是內容伺服器盡可能鄰近 VPN 伺服器; 用戶連接到最近的伺服器,但是內容伺服器距離 VPN 伺服器很遠; 用戶連接到海外伺服器,同時內容伺服器距離 VPN 伺服器很遠。 為了進行速度測試,我們創建了一個配備了三種 VPN 協定(NordLynx、OpenVPN 和…
Read more


March 27, 2024 0

Shift left: Proactive security, embedded early in development

Sensitive information on your phone, computer, or smartwatch is at risk every time you use an application that isn’t properly secured. To ensure the safety of user data and a robust application, developers and security specialists are increasingly embracing the “shift left” approach. In this blog post, we’ll explore what it means and how shift…
Read more


March 19, 2024 0

Threat Protection: NordVPN’s solution against phishing

With so much online content at your fingertips, it’s easy to click on a random link or a bright ad without thinking twice. But that’s how you might end up on a phishing website and put your privacy at risk. That’s why NordVPN created Threat Protection – a solution that inspects links and websites when…
Read more


February 29, 2024 0

WireGuard kernel module vs. user space: Speed and performance

   The WireGuard kernel module has been enabled in AOSP (Android Open Source Project) since 2020 and should in theory be preferred over user space implementations. The Nord Security team explored this hypothesis by results. Differences between user space and kernel What is the difference between these two approaches? In terms of sending and receiving…
Read more


October 18, 2023 0

How to sync data from MySQL to Google BigQuery using Debezium and Kafka Connect

Syncing data from a MySQL database to Google BigQuery can be a great way to keep your data up to date and easily accessible for analysis. In this article, we will explore the process of setting up Debezium and Kafka Connect to sync data from MySQL to BigQuery, providing you with all the information you…
Read more


September 9, 2023 0

Rendering Storyblok Rich Text in Astro

Rendering Rich Text elements in headless content management systems (CMS) like Storyblok can be challenging. We decided to carry out this process with Astro. Here is what we learned in the process. Using an official integration The Storyblok CMS has many integrations for various frontend frameworks including React, Vue, and Svelte. Luckily for us, they…
Read more


July 28, 2023 0

Binary memory protection measures on Windows OS

Binary memory protection is a core part of cybersecurity, but there are many different options for implementing it. In this article, we explore common mechanisms and protection measures for Windows OS. Why is binary memory protection important? You may remember when the Blaster worm struck the internet, or more recently when WannaCry{‘ ‘} caused global…
Read more


June 27, 2023 0