-
-
Notifications
You must be signed in to change notification settings - Fork 385
What do you think about Cloudflare? #374
Comments
A big company that works with millions of sites, potentially tracking all their users. |
Didn't it had a security breach a few weeks ago? |
Fun fact: www.privacytools.io is using Cloudflare. |
Now the company websites are forced to write GDPR compatible privacy policy, what makes me laugh is they - who use Cloudflare to serve websites - are forgetting about Cloudflare MITM thing. |
"places now a cookie"? Really? I didn't noticed it... Oh ok, I always browse website without cookies anyway. (deny all) |
I have a few issues with CloudFlare: Problem with CloudFlareCloudFlare is a vigilante extremist organization who takes the decentralized web and centralizes it under one corporate power that controls the worlds largest walled-garden. A very large portion of the web (10%+) that was once freely open to all is now controlled and monitored by one central authority who decides for everyone who can see what web content. This does serious damage to net neutrality, privacy, and has immediate serious consequences:
Actions needed
Problem with siteground.comLooks like another malicious player has emerged with reckless false-positives in their anti-bot agenda. Web hosting service siteground is hitting human visitors of their sites with CAPTCHAs (e.g. https://thewimpyvegetarian.com/.well-known/captcha/). Siteground also has the misconception that all bots are malicious. Siteground can run along with CloudFlare to really compound the denial of service to legitimate Tor users. We need to get this problem on the radar as well before this bad player spreads. |
Isn't Cloudflare access through Tor supposed to be better since their onion service? I don't have anything to say on the other points. |
I won't touch that cloudflare onion site even with a ten foot pole. |
Perhaps, if by "better" you mean fewer CAPTCHAs. I've actually come to appreciate the CloudFlare CAPTCHAs because they quickly indicate a site I should avoid. The non-CAPTCHA related privacy abuses still remain for everyone and the CAPTCHA abuses still persist for Tor users who are not using CF's chosen browser. I shit you not, CF is dictating to Tor users which browser they may use -- so cURL, lynx, w3m users are still outright denied service. Controlling which tools users may use is unnecessary. If you visit This is laughable, and actually gives cause to distrust CF: (from the CF link)
First of all, you do have to trust CloudFlare because they still see all the traffic (they are still a MitM). That's true of their surface web pages and remains the same with the onion service they describe. They see all passwords in an unhashed form, for example. (from the CF link)
It's ridiculous that they use the SSL cert because it's totally unnecessary for an onion site. (from the CF link)
I get: "This site can’t be reached" |
ReCAPTCHA is a google service. Tor users are abused by this thing, Cloudflare offers - out of thin air - a ReCAPTCHA bypassing option for Tor users. Surely they track those who use their sevice. |
We are off CloudFlare. Hopefully we don't take too much of a performance hit. Try it out! https://www.privacytools.io/ |
Subjecting visitors to CF is worse than subjecting them to bad performance. So it was a good move. One more anti-CloudFlare change needed: the searx endorsement suggests the searx.me instance. That instance returns CloudFlare results. It should be replaced with searxes.danwin1210.me. The Danwin link randomly picks a decent instance, and then filters the CloudFlare results from that. I also have some performance optimization suggestions:
BTW, I'm impressed with how viewable (and speedy) the page is in lynx. Hopefully that never changes. You could advertise that somewhere on the page to encourage that kind of lean usage. |
Image dimensions is something I’ll work on today, I think we’re mostly good on that but there are definitely a few that need those specified. I don’t really think we should use third parties to host our images. We actually get a performance improvement from hosting them all ourselves with HTTP2, since there’s fewer external requests. Plus, for privacy related reasons I don’t think we should make all our visitors request third party resources where their servers may log traffic. With the current solution we can guarantee that there’s no access logging for web visitors. When I say we took a performance hit, it wasn’t that bad. Of course there was going to be a difference between a single server in Germany vs a network of hundreds of servers internationally serving our content, but we do have a high performance server and like you said, I think the trade-off was worth it to move off CloudFlare. I’m pretty happy with the results so far :) We have our own Searx instance now, I’ll probably just link to that or a list of public instances once we get ours listed in more places. Regarding everything else, probably best if you open a separate issue for them, like PayPal. Not much I can do about that currently personally. |
I didn't read this before but this is probably a good idea. We do have good bandwidth and a great server though so I'm not sure if this will end up being an issue. Something to investigate... |
There are a couple issues with that:
I would say if the PTIO instance is configured to filter out CF sites then self-endorsement is well-earned and easily justifiable. If not, then I think the best move is to list the Danwin searx instance which randomly selects a quality instance and then does the CF filtering on the results. When the PTIO instance seems stable enough, the Danwin operator could be asked to ensure that ptio is among the selection. There's nothing wrong with mentioning the PTIO searx instance, but it's a disservice to PTIO visitors to not make searxes.danwin1210.me the top recommendation and disclose the CloudFlare anti-feature of the PTIO instance. (edit) This could be discussed as a separate issue, but to me the searx endorsement is part of the CloudFlare avoidance remedial action. Danwin just got complicated. CloudFlare filtering is now off by default for those who use the clearnet site, and it looks non-trivial for users to switch that back. They caved to foolish clearnet users complaining about CloudFlare filtering. But the Danwin onion site still does the right thing. So the best recommendation for Tor users is to use the Danwin onion, and the best option for clearnet users is probably the PTIO instance. |
You're welcome to open an issue at https://github.com/privacytoolsIO/search/issues to continue this discussion in a more relevant repo, but at this moment I don't think the benefits of removing all CloudFlare-using websites from the results (if I understand you correctly) outweighs our main goal of being a feasible search engine for general use. So many sites use CloudFlare that if we filtered them by default our results wouldn't be nearly as generally useful. I would have to discuss it with @BurungHantu1605, but as far as I'm currently aware our main goal with the search project is to be a privacy-focused (anti advertising, anti logging) Google alternative, not a search engine for returning only privacy friendly results. |
What do you think about the possibility of sending all network traffic from your phone to Cloudflare? 😆 EDIT: Maybe that is a wrong emoji, I just hope no one gets a heart attack or something on reading the news. |
CloudFlare MITM: Now on sites that didn't agree to it. Edit: well if you're a webmaster and you're so bad at it that you still use http then you get what's coming to you. At least CloudFlare openly admits this is happening with their VPN lol |
This is a xreference from prism-break, the similar website endorsing privacy-focused software.
mozilla-mobile/focus-android#1743
I think your website need to mention Cloudflare under "Recommended Privacy Resources" - "Information".
The text was updated successfully, but these errors were encountered: