This investigation into nordvpn's "32+ million residential proxies" is interesting
https://medium.com/@derek./how-is-nordvpn-unblocking-disney-6c51045dbc30
2) I signed up NordVPN, connected to it, and checked the client ip header when making requests to http://disneyplus.com like in the link. Every request returns a different IP, so I wrote a little script to just make this request over and over and log it.
Here's a de-duped text file of about ~2 hours of continuously asking akamai what my IP is when making the disneyplus request:
https://github.com/jerwarren/nordvpn-ip-test/blob/master/nordhosts.txt
That repo also has a very simple bash script that just runs over and over logging to a file so you can replicate it yourself.
Alright, NordVPN basically admitted they're using residential IPs, but are claiming it's not secret, it's not malware, and they'll explain it to you if you sign an NDA.
https://twitter.com/MalwareJake/status/1201097310064787456?s=20
Hey, look. A new page on NordVPN explaining this. What a coincidence that it'd appear today...
OCR Output (chars: 849)