In order to be more open and lessen any worries about privacy and safety, Nord Security (Nord) has made their Linux NordVPN client and its related networking libraries source code available to the public.

Yesterday, Nord declared that the MeshNet private tunneling feature, which is part of their VPN, is now attainable without cost for anybody who downloads the software, regardless of whether or not they pay for the service.

NordVPN users have the ability to create private connections to other users of the service, granting them the possibility to access the web through the shared network or internal devices like individual gaming servers.

In concurrence with its announcement, NordVPN has published the source code for its Linux applications and two libraries, Libtelio and Libdrop.

Nord has publicly declared their dedication to transparency and responsibility by releasing their products as open source, as stated in their announcement.

The coding community’s input and examination is essential to us, and we trust in the quality of our software.

Nord Security’s GitHub page now holds all three projects, featuring comprehensive instructions on building the NordVPN Linux and libraries. Link provided.

The picture displayed here is of NordSecurity's GitHub page
The picture displayed here is of NordSecurity’s GitHub page

LibDrop, which is a component of Nord’s MeshNet, provides a convenient way for users to transfer files securely and privately through a tunnel.

Nord claims that the LibTelio networking library is widely used across all NordVPN applications on any platform it’s available, and it is responsible for forming encrypted networks using the MeshNet feature.

Nord explains that making Libtelio open source is particularly significant since it is used as the basis for all the NordVPN applications, not simply their Linux client.

By entrusting the Linux community with this material — one of the most colorful open-source domains currently in operation — we are hoping to motivate capable coders and developers to investigate our code and improve our service.

The source code for the NordVPN Linux application is available for download and compilation, and NordVPN encourages users to customize it as desired.

Nord Security implores users to check the source code carefully and report any bugs they might uncover.

Those who identify security weaknesses in the Linux client can share them with Nord Security’s bug bounty program, hosted on HackerOne. For critical errors, the company offers rewards of $10,000 to $50,000.

About the Author

Raymond Kenney, a seasoned IT professional and cybersecurity expert, is your go-to source for all things related to Virtual Private Networks (VPNs) and online privacy. With over a decade of experience in the IT field, Raymond has honed his skills in network security, data privacy, and cybersecurity, previously working for a leading Cybersecurity company. During his tenure, he authored numerous articles and technical papers on these topics, establishing himself as a trusted voice in the industry.

His passion for cybersecurity extends to his in-depth research on VPNs, where he seeks to educate users about the importance of online privacy and security. Known for his meticulous approach, Raymond reviews various VPN services, breaking down their features, analyzing their security protocols, and assessing their overall performance.

Raymond's expert tips and recommendations are grounded in his hands-on experience and continuous learning in the rapidly evolving field of network security. His articles are not merely informative but are practical guides helping users navigate the complex world of VPNs and online privacy.

Raymond's dedication to promoting online privacy extends beyond his professional work. He is an active participant in various cybersecurity forums and conferences, sharing his insights and learning from other industry experts. His commitment to his field is fueled by a desire to contribute to a safer, more secure digital world.

With Raymond Kenney, you can expect thorough, insightful, and reliable information on VPNs, network security, and online privacy. His expert advice is sure to enlighten, guide, and empower you in your digital journey.

View Articles