The company likely had no idea what was happening, or they would’ve intervened. Third-party could use the key to reroute connections through a different server. Third-party could decrypt information passing through the server. Unauthorized third party holds a NordVPN encryption key. Perpetrators could intercept traffic passing through the server for 30 days. Remote unauthorized access to a NordVPN server for 30 days. Here’s a neat table summarizing what happened with the Nord VPN hack and what it means. That meant they could’ve intercepted (and decrypted) any traffic going to the server. In March 2018, an unauthorized third party got access to a NordVPN server and its private key, which lets you encrypt and decrypt communications. Once in a while, though, even trustworthy VPNs experience data breaches. Since paid VPNs work with cybersecurity experts and invest in their infrastructure, they’re less likely to get hacked… right? Usually, that’s the case. Two takeaways: 1) Google, please fix your App Store rating system, and 2) you’re more likely to build a DIY VPN than find a reputable free VPN service.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |