Protect your privacy:
Get NordVPN
[
Deal: 73% off 2-year plans + 3 extra months ]
- Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
- RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
- Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
- NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
- Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.
The DNS root servers were reported by Verisign to be under unexpected attack from name servers across the Internet following ICANN’s recent changes to their cryptographic master keys. Kevin Murphy reporting in Domain Incite writes: “The company, which runs the A and J root servers, said it saw requests for DNSSEC data at the root increase from 15 million a day in October to 1.15 billion a day a week ago. The cause was the October 11 root Key Signing Key rollover, the first change ICANN had made to the ‘trust anchor’ of DNSSEC since it came online at the root in 2010.”
Verisign’s Principal Research Scientist at Verisign in his post Unexpected Effects of the 2018 Root Zone KSK Rollover, says: “March 22, 2019, saw the completion of the final important step in the Key Signing Key (KSK) rollover—a process which began about a year and half ago. What may be less well known is that post rollover, and until just a couple days ago, Verisign was receiving a dramatically increasing number of root DNSKEY queries, to the tune of 75 times higher than previously observed, and accounting for ~7 percent of all transactions at the root servers we operate.”
With the removal of the revoked key, DNSKEY query rates are now returning to pre-revocation levels, says Verisign.
Editor’s Note: The title of this post was edited to omit the previously misused phrase “dns root servers came under attack” as per feedback received from the community.
This clickbait title is false, misleading and irresponsible. There was no attack at all.
False