Nord Security
   HOME

TheInfoList



OR:

NordVPN is a Lithuanian
VPN service A virtual private network (VPN) service is a proxy server marketed to help users bypass Internet censorship such as geo-blocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks. ...
founded in 2012. NordVPN is developed by Nord Security (formerly Nordsec Ltd), a
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
software company that was initially supported by
Tesonet Tesonet is a Lithuanian startup venture builder and investor founded in 2008 by Tomas Okmanas and Eimantas Sabaliauskas. The company’s main focuses today are cybersecurity, AI, EdTech, SportTech, and digital solutions. Businesses kick-started o ...
, a Lithuanian
startup accelerator Startup accelerators, also known as seed accelerators, are fixed-term, cohort-based programs, that include mentorship and educational components, and (sometimes) culminate in a public pitch event or demo day. While traditional business incubato ...
and
business incubator A business incubator is an organization that helps startup companies and individual entrepreneurs to develop their businesses by providing a fullscale range of services, starting with management training and office space, and ending with venture ...
. NordVPN states it operates in Panama, but Nord Security is incorporated in Amsterdam, the Netherlands. Its offices are located in
Lithuania Lithuania, officially the Republic of Lithuania, is a country in the Baltic region of Europe. It is one of three Baltic states and lies on the eastern shore of the Baltic Sea, bordered by Latvia to the north, Belarus to the east and south, P ...
, the
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
,
Panama Panama, officially the Republic of Panama, is a country in Latin America at the southern end of Central America, bordering South America. It is bordered by Costa Rica to the west, Colombia to the southeast, the Caribbean Sea to the north, and ...
, and the
Netherlands , Terminology of the Low Countries, informally Holland, is a country in Northwestern Europe, with Caribbean Netherlands, overseas territories in the Caribbean. It is the largest of the four constituent countries of the Kingdom of the Nether ...
. The service has applications for
Microsoft Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
,
macOS macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
,
Linux Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
,
Android Android most commonly refers to: *Android (robot), a humanoid robot or synthetic organism designed to imitate a human * Android (operating system), a mobile operating system primarily developed by Google * Android TV, a operating system developed ...
,
iOS Ios, Io or Nio (, ; ; locally Nios, Νιός) is a Greek island in the Cyclades group in the Aegean Sea. Ios is a hilly island with cliffs down to the sea on most sides. It is situated halfway between Naxos and Santorini. It is about long an ...
,
Android TV Android TV is an operating system that runs on smart TVs and related entertainment devices including soundbars, set-top boxes, and digital media players. Developed by Google, it is a closed-source Android distribution. Android TV features a u ...
, and
tvOS tvOS (formerly Apple TV Software) is an operating system developed by Apple for the Apple TV, a digital media player. In the first-generation Apple TV, Apple TV Software was based on Mac OS X. The software for the second-generation and later ...
. Manual setup is available for
wireless router A wireless router or Wi-Fi router is a device that performs the functions of a router and also includes the functions of a wireless access point. It is used to provide access to the Internet or a private computer network. Depending on the m ...
s,
NAS Nas (born 1973) is the stage name of American rapper Nasir Jones. Nas, NaS, or NAS may also refer to: Aviation * Nasair, a low-cost airline carrier and subsidiary based in Eritrea * National Air Services, an airline in Saudi Arabia ** Nas Air (S ...
devices, and other platforms.


History

NordVPN was established in 2012 by a group of childhood friends, with Eimantas Sabaliauskas and
Tomas Okmanas Tomas Okmanas (born November 5, 1987) is a Lithuanian tech entrepreneur, investor, and co-founder of several global startups. He is best known as the co-founder and co-CEO of Nord Security, a global cybersecurity company that provides a popula ...
at the helm. It presented an
Android Android most commonly refers to: *Android (robot), a humanoid robot or synthetic organism designed to imitate a human * Android (operating system), a mobile operating system primarily developed by Google * Android TV, a operating system developed ...
app in late May 2016, followed by an
iOS Ios, Io or Nio (, ; ; locally Nios, Νιός) is a Greek island in the Cyclades group in the Aegean Sea. Ios is a hilly island with cliffs down to the sea on most sides. It is situated halfway between Naxos and Santorini. It is about long an ...
app in June of same year. In October 2017, it launched a
browser extension A browser extension is a software module for customizing a web browser. Browsers typically allow users to install a variety of extensions, including user interface modifications, cookie management, ad blocking, and the custom scripting and st ...
for
Google Chrome Google Chrome is a web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS, iOS, iPadOS, an ...
. The service launched applications for
Android TV Android TV is an operating system that runs on smart TVs and related entertainment devices including soundbars, set-top boxes, and digital media players. Developed by Google, it is a closed-source Android distribution. Android TV features a u ...
in 2018 and
tvOS tvOS (formerly Apple TV Software) is an operating system developed by Apple for the Apple TV, a digital media player. In the first-generation Apple TV, Apple TV Software was based on Mac OS X. The software for the second-generation and later ...
in 2023. As of February 2025, NordVPN operates 7,300 servers covering 118 countries. In March 2019, it was reported that NordVPN received a directive from
Russian authorities The Russian Government () or fully titled the Government of the Russian Federation () is the highest federal executive governmental body of the Russian Federation. It is accountable to the president of the Russian Federation and controlled by t ...
to join a state-sponsored registry of banned websites, which would prevent
Russia Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
n NordVPN users from circumventing state censorship. NordVPN was reportedly given one month to comply, or face blocking by
Russian authorities The Russian Government () or fully titled the Government of the Russian Federation () is the highest federal executive governmental body of the Russian Federation. It is accountable to the president of the Russian Federation and controlled by t ...
. The provider declined to comply with the request and shut down its Russian servers on . In September 2019, NordVPN announced NordVPN Teams, a
VPN Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not c ...
solution aimed at small and medium businesses, remote teams, and freelancers who need secure access to work resources. Two years later, NordVPN Teams rebranded as
NordLayer NordLayer, formerly known as NordVPN Teams, is a network access security service with applications for Microsoft Windows, macOS, Linux, Android and iOS and Browser extension. The software is marketed as a privacy and security tool that enables t ...
and moved toward SASE business solutions. The press sources quoted the market rise in SASE technology as one of the key factors in the rebrand. On October 29, 2019, NordVPN announced additional audits and a public
bug bounty program A bug bounty program is a deal offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security vulnerabilities. If no fin ...
. The bug bounty was launched in December 2019, offering researchers monetary rewards for reporting critical flaws in the service. In December 2019, NordVPN became one of the five founding members of the newly formed VPN Trust Initiative, promising to promote online security as well as more self-regulation and transparency in the industry. In 2020, the initiative announced five key areas of focus: security, privacy, advertising practices, disclosure and transparency, and social responsibility. In August 2020,
Troy Hunt Troy Adam Hunt is an Australian web security consultant known for public education and outreach on security topics. He created and operates Have I Been Pwned?, a data breach search website that allows users to see if their personal informati ...
, an Australian
web security Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules an ...
expert and founder of
Have I Been Pwned? Have I Been Pwned? (HIBP; stylized in all lowercase as "‘;--have i been pwned?") is a website that allows Internet users to check whether their personal data has been compromised by data breaches. The site has been widely touted as a valuabl ...
, announced a partnership with NordVPN as a strategic advisor. On his blog, Hunt described this role as "work with NordVPN on their tools and messaging with a view to helping them make a great product even better." In 2022, NordVPN closed its physical servers in India in response to the CERT-In's order for VPN companies to store consumers' personal data for a period of five years. In April 2022, NordVPN's parent company Nord Security raised $100 million in a round of funding led by Novator. The company's valuation reached $1.6 billion. In September 2023, the company grew and raised more funding, making it valued at $3 billion. In 2022, Surfshark and Nord Security merged under one holding company.


Technology

NordVPN has desktop applications for
Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
,
macOS macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
, and
Linux Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
, as well as mobile apps for
Android Android most commonly refers to: *Android (robot), a humanoid robot or synthetic organism designed to imitate a human * Android (operating system), a mobile operating system primarily developed by Google * Android TV, a operating system developed ...
and
iOS Ios, Io or Nio (, ; ; locally Nios, Νιός) is a Greek island in the Cyclades group in the Aegean Sea. Ios is a hilly island with cliffs down to the sea on most sides. It is situated halfway between Naxos and Santorini. It is about long an ...
and
Android TV Android TV is an operating system that runs on smart TVs and related entertainment devices including soundbars, set-top boxes, and digital media players. Developed by Google, it is a closed-source Android distribution. Android TV features a u ...
app. Subscribers also get access to encrypted proxy extensions for Chrome,
Edge Edge or EDGE may refer to: Technology Computing * Edge computing, a network load-balancing system * Edge device, an entry point to a computer network * Adobe Edge, a graphical development application * Microsoft Edge, a web browser developed by ...
and
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements curr ...
browsers. Subscribers can connect up to six devices simultaneously. NordVPN has released their Linux client under the terms of the GPLv3 only. In November 2018, NordVPN claimed that its no-log policy was verified through an audit by
PricewaterhouseCoopers PricewaterhouseCoopers, also known as PwC, is a multinational professional services network based in London, United Kingdom. It is the second-largest professional services network in the world and is one of the Big Four accounting firms, alon ...
AG. In 2021, NordVPN completed an application security audit, carried out by a security research group VerSprite. VerSprite performed
penetration test A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is perform ...
ing and, according to the company, found no critical vulnerabilities. One flaw and a few bugs that were found in the audit have since been patched. In October 2020, NordVPN started rolling out its first colocated servers in
Finland Finland, officially the Republic of Finland, is a Nordic country in Northern Europe. It borders Sweden to the northwest, Norway to the north, and Russia to the east, with the Gulf of Bothnia to the west and the Gulf of Finland to the south, ...
to secure the hardware perimeter. The RAM-based servers are fully owned and operated by NordVPN in an attempt to keep full control. In December 2020, NordVPN initiated a network-wide rollout of 10
Gbit/s In telecommunications, data transfer rate is the average number of bits ( bitrate), characters or symbols ( baudrate), or data blocks per unit time passing through a communication link in a data-transmission system. Common data rate units are mu ...
servers, upgrading from the earlier 1 Gbit/s standard. The company's servers in
Amsterdam Amsterdam ( , ; ; ) is the capital of the Netherlands, capital and Municipalities of the Netherlands, largest city of the Kingdom of the Netherlands. It has a population of 933,680 in June 2024 within the city proper, 1,457,018 in the City Re ...
and
Tokyo Tokyo, officially the Tokyo Metropolis, is the capital of Japan, capital and List of cities in Japan, most populous city in Japan. With a population of over 14 million in the city proper in 2023, it is List of largest cities, one of the most ...
were the first to support 10 
Gbit/s In telecommunications, data transfer rate is the average number of bits ( bitrate), characters or symbols ( baudrate), or data blocks per unit time passing through a communication link in a data-transmission system. Common data rate units are mu ...
, and by December 21, 2020, over 20% of the company's network had been upgraded. In January 2022, NordVPN released an open-source VPN speed testing tool, available for download from
GitHub GitHub () is a Proprietary software, proprietary developer platform that allows developers to create, store, manage, and share their code. It uses Git to provide distributed version control and GitHub itself provides access control, bug trackin ...
. In late 2023, NordVPN unveiled a dedicated app for tvOS immediately after Apple started supporting third-party VPN applications with the release of tvOS 17. Soon after, at the beginning of March 2024, NordVPN announced virtual server support in 50 new locations where physical servers were limited. In September 2024, NordVPN launched post-quantum encryption support for its Linux app.


Anti-malware tools

In February 2022, NordVPN introduced an
antivirus Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
functionality available as part of the regular VPN license. The opt-in Threat Protection feature blocks web trackers, warns users about malicious websites, and blocks downloaded files that contain
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
. As of March 2022, the feature is available on the Windows and
macOS macOS, previously OS X and originally Mac OS X, is a Unix, Unix-based operating system developed and marketed by Apple Inc., Apple since 2001. It is the current operating system for Apple's Mac (computer), Mac computers. With ...
apps and works without connecting to a VPN server.


Protocols

For encryption, NordVPN has been using the
OpenVPN OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It implements both client and server appl ...
and Internet Key Exchange v2/ IPsec technologies in its applications and also introduced its proprietary NordLynx technology in 2019. NordLynx is a VPN tool based on the WireGuard protocol, which aims for better performance than the IPsec and
OpenVPN OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It implements both client and server appl ...
tunneling protocols In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another. They can, for example, allow private network communications to be sent across a public network (such as the I ...
. According to tests performed by
Wired UK ''Wired UK'' is a bimonthly magazine that reports on the effects of science and technology. It covers a broad range of topics including design, architecture, culture, the economy, politics and philosophy. Owned by Condé Nast Publications, it is ...
, NordLynx produces "speed boosts of hundreds of MB/s under some conditions." In April 2020, NordVPN announced the gradual roll-out of the WireGuard-based NordLynx protocol on all its platforms. The wider implementation was preceded by a total of 256,886 tests, which included 47 virtual machines on nine different providers, in 19 cities, and eight countries. The tests showed higher average download and upload speeds than both
OpenVPN OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It implements both client and server appl ...
and
IKEv2 In computing, Internet Key Exchange (IKE, versioned as IKEv1 and IKEv2) is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP.The Internet Key Exchange (IKE), RFC 2 ...
. NordVPN once used L2TP/IPSec and
Point-to-Point Tunneling Protocol The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks. PPTP has many well known security issues. PPTP uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate ...
(PPTP) connections for routers, but these were later removed, as they were largely outdated and insecure. In 2025, NordVPN launched a new VPN protocol called NordWhisper. It was introduced as a way to get around networks that limit traditional VPN traffic. NordWhisper is meant to mimic regular web traffic, blend in, and make it more difficult for network filters to identify and block it.


Additional features

Besides general-use VPN servers, the provider offers servers for specific purposes, including P2P sharing, double encryption, and connection to the
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
anonymity network. NordVPN offers three subscription plans: monthly, yearly and bi-yearly. In November 2020, NordVPN launched a feature that scans the
dark web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
to determine if a user's personal credentials have been exposed. When the Dark Web Monitor feature finds any leaked credentials, it sends a real-time alert, prompting the user to change the affected passwords. In June 2022, NordVPN launched the Meshnet feature that allows users to create their own
private network In Internet networking, a private network is a computer network that uses a private address space of IP addresses. These addresses are commonly used for local area networks (LANs) in residential, office, and enterprise environments. Both the IPv ...
by linking up to 60 devices. Some of the promoted use cases include
file sharing File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include ...
between different devices,
multiplayer gaming A game is a structured type of play usually undertaken for entertainment or fun, and sometimes used as an educational tool. Many games are also considered to be work (such as professional players of spectator sports or video games) or art ( ...
, and virtual routing.


No-logs claims

To verify its no-logs claims, NordVPN has undergone multiple independent audits. The first audit was conducted in November 2018 when NordVPN's no-log policy was verified by PricewaterhouseCoopers AG. In 2020, NordVPN underwent a second security audit by PwC, PricewaterhouseCoopers AG. The testing focused on NordVPN's Standard VPN, Double VPN, Obfuscated (XOR) VPN, P2P servers, and the product's central infrastructure. The audit confirmed that the company's privacy policy was upheld and the no-logging policy was followed. Subsequent no-logs audits were performed by
Deloitte Deloitte is a multinational professional services network based in London, United Kingdom. It is the largest professional services network in the world by revenue and number of employees, and is one of the Big Four accounting firms, along wi ...
in 2022, 2023, and 2024. In addition to the no-logs policy audit, NordVPN underwent independent security audits of its applications and server infrastructure.


Reception

Several publications, including ''
Tom's Guide ''Tom's Hardware'' is an online publication owned by Future plc and focused on technology. It was founded in 1996 by Thomas Pabst. It provides articles, news, price comparisons, videos and reviews on computer hardware and high technology. The s ...
'', ''
PC Magazine ''PC Magazine'' (shortened as ''PCMag'') is an American computer magazine published by Ziff Davis. A print edition was published from 1982 to January 2009. Publication of online editions started in late 1994 and continues . Overview ''PC Mag ...
'', CNET, and ''
TechRadar ''TechRadar'' is an online technology publication owned by Future plc. It has editorial teams in the United States, United Kingdom, and Australia that provide news and reviews of tech products and gadgets. It was launched in 2008 and expanded t ...
'' have reviewed NordVPN. Most noted that NordVPN's features such as choosing server location, and speed are good. They also noted the service's high price compared to others in the category.


Criticism

On October 21, 2019, a security researcher disclosed on
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
a server breach of NordVPN involving a leaked
private key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
. The cyberattack granted the attackers
root access In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of the ...
, which was used to generate an
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protoc ...
certificate Certificate may refer to: * Birth certificate * Marriage certificate * Death certificate * Gift certificate * Certificate of authenticity, a document or seal certifying the authenticity of something * Certificate of deposit, or CD, a financial p ...
that enabled the attackers to perform
man-in-the-middle attack In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
s to intercept the communications of NordVPN users. In response, NordVPN confirmed that one of its servers based in
Finland Finland, officially the Republic of Finland, is a Nordic country in Northern Europe. It borders Sweden to the northwest, Norway to the north, and Russia to the east, with the Gulf of Bothnia to the west and the Gulf of Finland to the south, ...
was breached in March 2018, but there was no evidence of an actual man-in-the-middle attack ever taking place. The exploit was the result of a
vulnerability Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
in a contracted
data center A data center is a building, a dedicated space within a building, or a group of buildings used to house computer systems and associated components, such as telecommunications and storage systems. Since IT operations are crucial for busines ...
's
remote administration Remote administration refers to any method of controlling a computer or other Internet-connected device, such as a smartphone, from a remote location. There are many commercially available and free-to-use software that make remote administration ...
system that affected the
Finland Finland, officially the Republic of Finland, is a Nordic country in Northern Europe. It borders Sweden to the northwest, Norway to the north, and Russia to the east, with the Gulf of Bothnia to the west and the Gulf of Finland to the south, ...
server between January 31 and March 20, 2018. Evidence suggests that when the data center became aware of the intrusion, all accounts that had caused the vulnerabilities were deleted and NordVPN was not notified about the mistake. According to NordVPN, the data center disclosed the breach to NordVPN on April 13, 2019, and NordVPN ended its relationship with the data center. In addition, experts state that there are no indications of any user's private information such as user credentials, billing details, or any other profile-related information being compromised during that event. Security researchers and media outlets criticized NordVPN for failing to promptly disclose the breach after the company became aware of it. NordVPN stated that the company initially planned to disclose the breach after it completed the audit of its 5,000 servers for any similar risks and later put regular updates on its blog. On November 1, 2019, in a separate incident, it was reported that approximately 2,000
usernames A user is a person who uses a computer or network service. A user often has a user account and is identified to the system by a username (or user name). Some software products provide services to other systems and have no direct end users ...
and
password A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
s of NordVPN accounts were exposed through
credential stuffing Credential stuffing is a type of cyberattack in which the attacker collects stolen account credentials, typically consisting of lists of usernames or email addresses and the corresponding passwords (often from a data breach), and then uses the cr ...
. In 2019, the
Advertising Standards Authority (United Kingdom) The Advertising Standards Authority (ASA) is the self-regulatory organisation of the advertising industry in the United Kingdom. The ASA is a non-statutory organisation and so cannot interpret or enforce legislation. However, its code of adve ...
(ASA) advised NordVPN not to repeat claims that public
WiFi Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
is so insecure it is equivalent to handing out your personal information to the people around you. The ASA ruled that HTTPS already provides "a significant layer of security" and that the impression the ad gave that users were at a significant risk from data theft was erroneous. In 2023, the ASA again ruled against NordVPN, this time over an advertisement which claimed NordVPN could "switch off... malware", holding that, in context, listeners were "likely to understand" it to mean the product would stop all malware, which NordVPN did not substantiate in response to the ASA. In January 2022, NordVPN updated its policy regarding law enforcement cooperation, according to statements from PCMag and TechRadar. Previously, NordVPN had maintained a strict no-logs policy, preventing any user-identifying data from being stored. The 2023 update clarified that, while the no-logs policy continued, NordVPN would comply with law enforcement requests when required by local legal authorities. This change reflected increased regulatory pressures on VPN providers to support investigations related to cybersecurity and criminal activities. Privacy advocates, including VPN.com, expressed concern that this cooperation might compromise user privacy and set a precedent for other VPN services. Critics argued that any law enforcement compliance could challenge NordVPN's commitment to anonymity, while NordVPN, as cited by TechRadar, asserted its dedication to privacy by only responding to legal requests and maintaining minimal data retention. Transparency statements from the company outlined strict compliance conditions, aiming to reassure users about privacy safeguards under the revised policy.


See also

*
Comparison of virtual private network services A virtual private network (VPN) service is a proxy server marketed to help users bypass Internet censorship such as geo-blocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks. ...
*
Encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
* Geo-blocking * Internet freedom in Panama *
Internet privacy Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. P ...
*
Secure communication Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...


References


External links

* {{VPN Virtual private network services Internet security Internet privacy Internet privacy software Software companies established in 2012 Telecommunications companies of Panama Lithuanian brands 2012 establishments in Lithuania 2022 mergers and acquisitions TvOS software