Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Why don't you try installing Nord in a VM and monitoring traffic yourself, instead of taking low-quality blogspam Medium articles at face value?

If they're truly hijacking end user clients, why don't you point to the section of their open source client that's responsible for that?

https://github.com/NordSecurity/nordvpn-linux

Easy enough to prove.



Exactly, I'd love to see some proper proof other than "the parent company owns a residential proxy service"


Honestly, "the parent company owns a residential proxy service" is more than enough to deter me from the product.


If I were evil, I don't implement proxy feature on open Linux VPN client that geeks use, but just implement on closed Windows/Android client. Traffic monitoring is better.


I didn't even read the medium article, only the first one. That's what I quoted from. I agree, investigating traffic would be an excellent idea, but I don't intend on putting my credit card into nord's sketchy site (they apparently don't accept paypal)


They do accept paypal, I just checked their site.

Credit or debit card, Klarna, PayPal, Google Pay, Cryptocurrencies


Where? I'm presented with "Credit or debit" (direct input), AmazonPay, ACH Transfer, and Crypto https://imgur.com/G4j1DB8


Maybe possible it differs by country then:

https://i.imgur.com/fTtdOfR.png




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: