Nord Security has taken steps to increase transparency and boost user confidence in its Linux NordVPN client by releasing its source code and associated networking libraries.
The company made the move in response to growing concerns over user privacy and security. Additionally, Nord announced that its NordVPN MeshNet private tunneling feature, which allows users to create private tunnels with other NordVPN users to access the internet or internal devices, is now free for all users who install their software, whether or not they have a paid subscription.
Nord has shared all three of the released projects on their GitHub page, along with instructions on compiling the NordVPN Linux and libraries. The LibDrop library, which is part of Nord’s MeshNet feature, enables users to send and receive files over the private tunnel.
On the other hand, the LibTelio networking library is responsible for creating encrypted networks over the MeshNet feature and is heavily used across all NordVPN applications on all operating systems.
The VPN hopes the move will encourage coders and developers from the open-source community to scrutinize their code and make their service better.
The company believes that open-sourcing LibTelio is particularly important since it forms the backbone of all NordVPN applications and not just the Linux client.
They encourage users to modify the complete source code for the NordVPN Linux application to suit their needs and report any bugs they find to Nord Security’s HackerOne bug bounty program.
Additionally, they promise that any security vulnerabilities in the Linux client reported through the program will receive bounties ranging from $10,000 to $50,000, depending on their severity.
Overall, the move towards transparency is a welcome change in the cybersecurity industry.
By releasing their source code, Nord Security is providing users with a way to validate the security of their NordVPN service, building confidence in their product.
It also provides an opportunity for the developer community to review the code and suggest changes, which could ultimately improve the product’s overall security and effectiveness.