How to sync data from MySQL to Google BigQuery using Debezium and Kafka Connect
Syncing data from a MySQL database to Google BigQuery can be a great way to keep your data up to date and easily accessible for analysis. In this article, we will explore the process of setting up...
View ArticleWireGuard kernel module vs. user space: Speed and performance
The WireGuard kernel module has been enabled in AOSP (Android Open Source Project) since 2020 and should in theory be preferred over user space implementations. The Nord Security team explored this...
View ArticleA quick dive into identity- and attribute-based encryption
Securing data and communications with genuine encryption is not a simple process, as anyone who has ever dealt with{‘ ‘} S/MIME {‘ ‘} or{‘ ‘} PGP {‘ ‘} can attest. The biggest problem is the trusted...
View ArticleUn gran motivo para entusiasmarse con NordLynx (TL;DR: es la velocidad)
NordLynx, nuestro flamante protocolo basado en WireGuard®, está encantando a los usuarios por su alta velocidad y sus excelentes seguridad y privacidad. Sin embargo, antes de publicarlo, necesitábamos...
View ArticleThreat Protection: NordVPN’s solution against phishing
With so much online content at your fingertips, it’s easy to click on a random link or a bright ad without thinking twice. But that’s how you might end up on a phishing website and put your privacy at...
View ArticleShift left: Proactive security, embedded early in development
Sensitive information on your phone, computer, or smartwatch is at risk every time you use an application that isn’t properly secured. To ensure the safety of user data and a robust application,...
View ArticleNordLynx 的厲害之處(如果太長不想看:就是網速)
NordLynx 是我們基於 WireGuard 的全新安全協定,給用戶帶來超快的網速和無懈可擊的安全及私隱。此外,我們在推出 NordLynx 前觀察了其實際表現,進行了配置調整和客戶端完善。我們準備把 NordLynx 發佈到 Windows、Mac、iOS 和 Android 等主要平台前,在 Linux 系統進行了測試。 我們相信 NordLynx 得益于 WireGuard®...
View ArticleLibdrop: File sharing through NordVPN
The Libdrop library allows NordVPN users to share files over Meshnet. In this article, we explain how we developed our file transfer system and the role Libdrop plays in it. What is Libdrop? Libdrop...
View ArticleThreat Protection Pro: Defending against cloaking techniques
Cloaking is a dangerous technique that scammers use to direct you to phishing websites. How can you know you’re being scammed if both the web page and its URL look legit? As the name suggests,...
View ArticleHow we implemented traffic routing in Meshnet for increased security
Traffic routing is a significant feature provided by NordVPN’s Meshnet. Essentially, it allows any Meshnet-connected device, called a node, to become a VPN server for other nodes. To do this, the end...
View Article