We earn commissions from the links, which influence where and how listings are displayed. Some providers are co-owned by our parent company.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of cybersecurity researchers, writers, and editors continues to help readers maintain their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and detailed examination by the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of cybersecurity researchers, writers, and editors continues to help readers maintain their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and detailed examination by the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

NordVPN To Retire Meshnet in December 2025

NordVPN To Retire Meshnet in December 2025
Author Image Hendrik Human
Hendrik Human Published on August 22, 2025 Cybersecurity Researcher

NordVPN announced that it will discontinue its Meshnet feature, effective 1 December 2025. Current and new users will be able to continue using the feature as normal until then. No other features will be impacted by Meshnet’s removal.

NordVPN first unveiled Meshnet in 2022 as a free feature that came installed by default and is currently supported on all its apps, including Windows, macOS, Linux, Android, and iOS. It provided a secure way for users to primarily share files between their devices using a secure connection, no matter where they are.

Users could access the feature simply by installing NordVPN apps, linking the devices, setting permissions, and then sharing files directly from the device’s file explorer. In its official announcement, NordVPN recommends that users start to “plan ahead” and look “into alternative solutions.”

Additionally, they suggest their NordLocker service as a possible replacement. NordLocker is a freemium cloud storage and file-sharing service that offers a 3GB free-forever plan. It’s supported on Chrome, Firefox, Edge, Safari, Android, and iOS, so that users can upload, access, and manage files across all their devices.

NordVPN said that they originally “built it as an extension of our mission to provide safer access to the internet,” but that it failed to reach a “wide enough audience.” Furthermore, NordVPN says that supporting and developing Meshnet requires too many ongoing resources, which it will now redirect to its core VPN capabilities.

NordVPN rolled out post-quantum encryption to all its apps earlier this year. It also launched a new protocol called NordWhisper aimed at bypassing various network blocks. Both these changes also signal a pivot toward the most important functionalities for most VPN users: protecting their data and avoiding internet restrictions.

About the Author

  • Author Image Hendrik Human
  • Hendrik Human Cybersecurity Researcher

Hendrik is a writer at The How To Guide, specializing in VPN comparisons and user guides. With 5+ years of experience as a tech and cybersecurity writer, plus a background in corporate IT, he brings a variety of perspectives to test VPN services and analyze how they address the needs of different users.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Special characters are not allowed in the Name field

Please enter a valid email address