24:
288:
In April 2020, NordLocker launched the "NordLocker Bounty campaign", a hacking competition with the top prize of $ 10,000. To win, a person had to download an encrypted "locker" from the company's site, hack into it, and find the hidden message. Based on the NordLocker’s campaign page, there were
237:
encryption system, where the developers have no data about users' files. After the encryption process, the user can decide whether to store data locally or sync it via NordLocker’s cloud. NordLocker syncs files via a private cloud, so they can be accessed from any computer with the NordLocker app
301:
review noted that NordLocker was easy to use but lacked features like secure file deletion and two-factor authentication. In August 2020, ITPro called NordLocker’s cloud add-on a “critical feature for modern business, especially with the coronavirus outbreak forcing many companies’ workforces to
229:
NordLocker is an encryption software with cloud integration. The software uses so called "lockers" - encrypted folders to encrypt and store user files. Users can create an unlimited number of lockers, drop files in to encrypt them, and transfer lockers separately.
206:
was summer 2019, the actual launch took place in
November. The app was launched as a local file encryption tool with secure sharing. Users were able to encrypt up to 5 GB of data for free or pay for unlimited encryption.
302:
remain remote.” Restore
Privacy praised NordLocker for strong end-to-end encryption and the "new, lower price" but mentioned the fact that NordLocker is not open-source.
911:
901:
221:
In August 2020, NordLocker launched a cloud storage add-on, a feature allowing users to back up their data and synchronize it across multiple devices.
305:
Boxcryptor, another encryption service, has compared NordLocker’s security to their own but noted that NordLocker does not have a mobile application.
396:
273:
to generate a random 256-bit key and encrypt lockers. To encrypt that key, the app then uses XChaCha20-Poly1305 and the user’s master password.
202:
In May 2019, NordVPN announced the upcoming launch of NordLocker, "an app with a zero-knowledge encryption process". Although the initial
607:
716:
182:
business model, where users are offered a free account with unlimited local file encryption and a set amount of cloud storage with
896:
556:
634:
421:
254:
203:
848:
448:
369:
172:
906:
277:
150:
324:
234:
183:
120:
146:
117:
105:
100:
246:
82:
797:
691:
823:
211:
191:
157:
90:
72:
289:
over 600 attempts to break the locker but no one has claimed the bounty as of
December 2020.
319:
112:
59:
582:
501:
397:"Meet Nord Security: The company behind NordVPN wants to be your one-stop privacy suite"
233:
The app uses client-side encryption to secure files on the user's device first. It's a
210:
In March 2020, NordLocker announced newly implemented cloud sharing integrations with
890:
165:
153:
768:
662:
527:
215:
475:
449:"NordLocker - Creators of NordVPN Announce Launch of New Cybersecurity Product"
370:"NordLocker - Creators of NordVPN Announce Launch of New Cybersecurity Product"
314:
298:
31:
23:
717:"NordLocker Invites Ethical Hackers to Crack Encrypted Locker Worth $ 10,000"
270:
266:
179:
742:
258:
242:
169:
250:
187:
773:
667:
639:
532:
426:
262:
161:
67:
280:
cloud storage space beyond the 3 GB provided with the free plan.
608:"NordVPN's File Encryption Tool Launches a Cloud Storage Add-on"
276:
The local encryption is free as of
December 2020 — the service
344:
879:
849:"NordLocker: The New Cloud Encryption Solution by NordVPN"
131:
635:"NordVPN Expands Into File Encryption With NordLocker"
583:"NordLocker Introduces Encrypted Cloud Storage Add-on"
502:"NordLocker Introduces Encrypted Cloud Storage Add-on"
422:"NordVPN Expands Into File Encryption With NordLocker"
476:"New in NordLocker: recent folders, cloud and more"
126:
111:
99:
81:
58:
40:
30:
190:features. More cloud storage is available via a
8:
557:"NordLocker encryption heads to the cloud"
22:
18:
168:, the Lithuania-based company behind the
912:Internet properties established in 2019
336:
822:Long, Heinrich (September 16, 2020).
7:
902:Proprietary cross-platform software
767:Rubenking, Neil J. (May 31, 2019).
661:Rubenking, Neil J. (May 31, 2019).
526:Rubenking, Neil J. (May 31, 2019).
474:Armstrong, Elisa (March 19, 2020).
555:Cupler, Justin (August 21, 2020).
14:
796:Mills, Matt (December 25, 2019).
690:Mills, Matt (December 25, 2019).
581:Guta, Michael (August 25, 2020).
500:Guta, Michael (August 25, 2020).
249:encryption algorithms as well as
1:
633:Kan, Michael (May 31, 2019).
420:Kan, Michael (May 31, 2019).
395:Gewirtz, David (2022-02-04).
164:. NordLocker is developed by
743:"$ 10,000 NordLocker Bounty"
928:
204:estimated time of arrival
21:
16:File encryption software
173:virtual private network
897:Cryptographic software
612:cerebral-overload.com
587:Small Business Trends
506:Small Business Trends
156:. It is available on
46:; 4 years ago
325:Secure communication
151:end-to-end encrypted
121:proprietary software
824:"NordLocker Review"
455:. November 14, 2019
376:. November 14, 2019
269:). NordLocker uses
147:encryption software
106:Encryption software
855:. November 1, 2019
178:NordLocker uses a
614:. August 20, 2020
241:The program uses
192:paid subscription
140:
139:
91:Personal computer
51:November 13, 2019
44:November 13, 2019
919:
883:
882:
880:Official website
865:
864:
862:
860:
845:
839:
838:
836:
834:
819:
813:
812:
810:
808:
793:
787:
786:
784:
782:
764:
758:
757:
755:
753:
739:
733:
732:
730:
728:
713:
707:
706:
704:
702:
687:
681:
680:
678:
676:
658:
652:
651:
649:
647:
630:
624:
623:
621:
619:
604:
598:
597:
595:
593:
578:
572:
571:
569:
567:
552:
546:
545:
543:
541:
523:
517:
516:
514:
512:
497:
491:
490:
488:
486:
471:
465:
464:
462:
460:
445:
439:
438:
436:
434:
417:
411:
410:
408:
407:
392:
386:
385:
383:
381:
366:
360:
359:
357:
355:
341:
320:Internet privacy
149:integrated with
136:
133:
60:Operating system
54:
52:
47:
26:
19:
927:
926:
922:
921:
920:
918:
917:
916:
887:
886:
878:
877:
874:
869:
868:
858:
856:
847:
846:
842:
832:
830:
828:Restore Privacy
821:
820:
816:
806:
804:
795:
794:
790:
780:
778:
766:
765:
761:
751:
749:
741:
740:
736:
726:
724:
723:. April 2, 2020
721:Irish Tech News
715:
714:
710:
700:
698:
689:
688:
684:
674:
672:
660:
659:
655:
645:
643:
632:
631:
627:
617:
615:
606:
605:
601:
591:
589:
580:
579:
575:
565:
563:
554:
553:
549:
539:
537:
525:
524:
520:
510:
508:
499:
498:
494:
484:
482:
473:
472:
468:
458:
456:
453:Irish Tech News
447:
446:
442:
432:
430:
419:
418:
414:
405:
403:
394:
393:
389:
379:
377:
374:Irish Tech News
368:
367:
363:
353:
351:
343:
342:
338:
333:
311:
295:
286:
284:Hacking contest
227:
200:
130:
95:
77:
50:
48:
45:
41:Initial release
17:
12:
11:
5:
925:
923:
915:
914:
909:
904:
899:
889:
888:
885:
884:
873:
872:External links
870:
867:
866:
840:
814:
788:
759:
734:
708:
682:
653:
625:
599:
573:
547:
518:
492:
480:NordLocker.com
466:
440:
412:
387:
361:
335:
334:
332:
329:
328:
327:
322:
317:
310:
307:
294:
291:
285:
282:
235:zero-knowledge
226:
223:
199:
196:
138:
137:
128:
124:
123:
115:
109:
108:
103:
97:
96:
94:
93:
87:
85:
79:
78:
76:
75:
70:
64:
62:
56:
55:
42:
38:
37:
34:
28:
27:
15:
13:
10:
9:
6:
4:
3:
2:
924:
913:
910:
908:
907:Cloud storage
905:
903:
900:
898:
895:
894:
892:
881:
876:
875:
871:
854:
850:
844:
841:
829:
825:
818:
815:
803:
799:
792:
789:
777:
775:
770:
763:
760:
748:
744:
738:
735:
722:
718:
712:
709:
697:
693:
686:
683:
671:
669:
664:
657:
654:
642:
641:
636:
629:
626:
613:
609:
603:
600:
588:
584:
577:
574:
562:
558:
551:
548:
536:
534:
529:
522:
519:
507:
503:
496:
493:
481:
477:
470:
467:
454:
450:
444:
441:
429:
428:
423:
416:
413:
402:
398:
391:
388:
375:
371:
365:
362:
350:
349:Nord Security
346:
340:
337:
330:
326:
323:
321:
318:
316:
313:
312:
308:
306:
303:
300:
292:
290:
283:
281:
279:
274:
272:
268:
264:
260:
256:
252:
248:
245:and 4096-bit
244:
239:
236:
231:
224:
222:
219:
217:
213:
208:
205:
197:
195:
193:
189:
185:
181:
176:
174:
171:
167:
166:Nord Security
163:
159:
155:
154:cloud storage
152:
148:
144:
135:
129:
125:
122:
119:
116:
114:
110:
107:
104:
102:
98:
92:
89:
88:
86:
84:
80:
74:
71:
69:
66:
65:
63:
61:
57:
43:
39:
36:Nord Security
35:
33:
29:
25:
20:
859:December 17,
857:. Retrieved
852:
843:
833:December 17,
831:. Retrieved
827:
817:
807:December 16,
805:. Retrieved
801:
798:"NordLocker"
791:
781:December 16,
779:. Retrieved
772:
769:"NordLocker"
762:
752:December 17,
750:. Retrieved
746:
737:
727:December 17,
725:. Retrieved
720:
711:
701:December 16,
699:. Retrieved
695:
692:"NordLocker"
685:
673:. Retrieved
666:
663:"NordLocker"
656:
646:December 16,
644:. Retrieved
638:
628:
618:December 16,
616:. Retrieved
611:
602:
592:December 17,
590:. Retrieved
586:
576:
566:December 16,
564:. Retrieved
560:
550:
540:December 16,
538:. Retrieved
531:
528:"NordLocker"
521:
511:December 16,
509:. Retrieved
505:
495:
485:December 16,
483:. Retrieved
479:
469:
459:December 16,
457:. Retrieved
452:
443:
433:December 16,
431:. Retrieved
425:
415:
404:. Retrieved
400:
390:
380:December 16,
378:. Retrieved
373:
364:
354:December 16,
352:. Retrieved
348:
339:
304:
297:A June 2020
296:
287:
275:
240:
232:
228:
220:
216:Google Drive
209:
201:
177:
142:
141:
32:Developer(s)
238:installed.
891:Categories
853:Boxcryptor
802:itigic.com
747:NordLocker
696:itigic.com
406:2024-09-14
345:"Products"
331:References
315:Encryption
299:PCMagazine
145:is a file
143:NordLocker
132:nordlocker
118:Commercial
293:Reception
278:monetizes
271:Libsodium
259:XChaCha20
309:See also
267:Poly1305
225:Features
180:freemium
83:Platform
675:June 5,
243:AES-256
212:Dropbox
198:History
170:NordVPN
158:Windows
127:Website
113:License
73:Windows
49: (
265:, and
257:(with
251:Argon2
188:backup
774:PCMag
668:PCMag
640:PCMag
561:ITPro
533:PCMag
427:PCMag
401:ZDNET
263:EdDSA
162:macOS
68:macOS
861:2020
835:2020
809:2020
783:2020
754:2020
729:2020
703:2020
677:2020
648:2020
620:2020
594:2020
568:2020
542:2020
513:2020
487:2020
461:2020
435:2020
382:2020
356:2020
253:and
214:and
186:and
184:sync
160:and
134:.com
101:Type
255:ECC
247:RSA
893::
851:.
826:.
800:.
776:UK
771:.
745:.
719:.
694:.
670:UK
665:.
637:.
610:.
585:.
559:.
535:UK
530:.
504:.
478:.
451:.
424:.
399:.
372:.
347:.
261:,
218:.
194:.
175:.
863:.
837:.
811:.
785:.
756:.
731:.
705:.
679:.
650:.
622:.
596:.
570:.
544:.
515:.
489:.
463:.
437:.
409:.
384:.
358:.
53:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.