this post was submitted on 26 Dec 2023
63 points (89.9% liked)

Privacy

826 readers
1 users here now

Privacy is the ability for an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

Rules

  1. Don't do unto others what you don't want done unto you.
  2. No Porn, Gore, or NSFW content. Instant Ban.
  3. No Spamming, Trolling or Unsolicited Ads. Instant Ban.
  4. Stay on topic in a community. Please reach out to an admin to create a new community.

founded 2 years ago
MODERATORS
63
submitted 10 months ago* (last edited 10 months ago) by [email protected] to c/[email protected]
 

Nearly every website today seems to be hosted behind Cloudflare which is really concerning for the future of privacy on the internet.

Cloudflare no doubt logs, stores, and correlates network telemetry that can be used for a wide array of deanonymization attacks. Not only that, but Cloudflare acts as a man-in-the-middle for all encrypted traffic which means that not even TLS will prevent Cloudflare from snooping on you. Their position across the internet also lends them the ability to conduct netflow and traffic correlation attacks.

~~Even my proposed solution to use archive.org as a proxy is not a valid solution since I found out today that archive.org is also hosted behind Cloudflare...~~ edit: i was wrong

So what options do we even have? What privacy concerns did I miss, and are there any workaround solutions?

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 31 points 10 months ago (2 children)

I don't think it's possible to avoid companies like Cloudflare, AWS, Akamai, etc. Or not without a whole lot of effort that isn't really reasonable and would severely degrade user experience. They provide what's become fundamental infrastructure to the internet, and that doesn't seem likely to change.

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago)

It is possible to avoid Cloudflare (the worst offender), proven by instances that are run by more competent experts. For example:

  • fedia.io
  • sopuli.xyz
  • beehaw.org
  • infosec.pub
  • lemmy.dbzer0.com
  • slrpnk.net
  • links.hackliberty.org
  • lemmy.ml ← used to be Cloudflare-proxied but they got wiser
  • mander.xyz

^ Those are good instances where users’ traffic is not recklessly exposed to Cloudflare.

These instances below not only expose their users to Cloudflare, but they’re not even decent enough to inform their own users about it:

  • lemmy.world ← Cloudflare
  • sh.itjust.works ← Cloudflare
  • zerobytes.monster ← Cloudflare
  • lemmy.ca ← Cloudflare
  • lemm.ee ← Cloudflare
  • programming.dev ← Cloudflare
  • lemmy.zip ← Cloudflare

If you probe admins of the above list, some will say in effect that they regret pawning all their users to CF but claim they have no choice - that they do not know how to defend from attack. Some admins have no regrets and simply do not give a shit. Many admins are actually ignorant to the extent of not even knowing Cloudflare sees the traffic (yes, many times admins were appalled to learn this from me; who to them is just some random pleb). Probably the most despicable aspect to this is that no Cloudflare admin is socially responsible enough to post a banner msg making sure users are informed about their exposure. If they are proud of their choice and feel they have no choice, then why neglect to disclose it (esp. on a non-profit activity)?

Regardless of their reasons/excuses, it really does not matter to the user. What matters to users is that there are privacy-disrespecting choices and relatively privacy-respecting choices. Obviously street-wise users select from the first list I posted and not the 2nd list.

Only CFd government sites are unavoidable

The only Cloudflare sites that are unavoidable AFAICT are government sites. You can always boycott the private sector, but there are 6 or so states in the US where voter registration goes through Cloudflare. Even if you register on paper, the data entry worker likely goes to the Cloudflare site. I became a non-voter for this reason.

[–] [email protected] 2 points 10 months ago (3 children)

What's so fundamental about their services?

[–] [email protected] 5 points 10 months ago (1 children)

Cloudflare provides anti ddos protection, aws provides cloud computing for online services

[–] [email protected] 2 points 10 months ago (1 children)

But does everything on the internet require anti ddos protection?

[–] [email protected] 1 points 10 months ago (1 children)

From corporate perspective, if the ddos protection is cheaper than potential ddos attack, yes.

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago)

Of course it’s important to note that business case relies on users being uninformed. If a billion or more users suddenly became informed about this along with the fact that the business does not disclose it (not even in the fine print of the privacy policy), your business case would need to account for a PR backlash variable.

[–] [email protected] 3 points 10 months ago (1 children)

From a user side, nothing.

From a host side: AWS/GCP/Azure, scaling is built in; maybe isn’t cheaper than self hosting, but it eliminates maintenance worries, uptime is their responsibility.

Cloud front, F5, imperva: protection from: sql injection, basic script attacks, ddos, and man in the middle.

To avoid them you’d have to stick to small time web sites that self host and handle attacks on their own. Funny enough when I ran small-time sites we never had a successful injection attack, and I handled a ddos attack by just blocking IPs one at a time till they gave up. It’s not hard, but when the company hits a certain size where they hire a cyber security specialist, all the sudden we need these additional protection tools.

[–] [email protected] 1 points 10 months ago

Thank you. One of the best responses I've got so far.

[–] [email protected] 2 points 10 months ago (2 children)

A significant percentage of the internet relies on them. There's basically no avoiding these companies while using the internet as it now exists.

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago) (3 children)

That's a circular argument.

"It's impossible to avoid this these companies because a lot of sites use them."

Ok. Why?

"Because they provide fundamental services."

Ok, what's so fundamental about them?

"A lot of sites use them."

...ok? WHY?

[–] [email protected] 11 points 10 months ago (9 children)

The service they provide to websites is "better user experience" by acting as a cdn close to the user they get better download speeds and responsiveness. It also is a benefit for the business because they don't have to worry nearly as much about deploying and maintaining multiple servers around the world.

That is why it's impossible to avoid these companies, every sane website engineer is going to want the services they offer.

And it's a service that is easiest to offer when you are an already established large cdn.

load more comments (9 replies)
[–] [email protected] 5 points 10 months ago (2 children)

Not sure why people are being so weird about answering your questions, but e.g. CloudFlare does DDoS protection which now basically everything you put on the internet needs some type of , and is far too complicated to do yourself, when you need it.

Thus CloudFlare (or AWS's equivalent) is pretty essential. I'm sure there are other reasons too.

load more comments (2 replies)
[–] [email protected] 3 points 10 months ago (8 children)

Sorry, I was assuming that people knew what they did or would look it up themselves. The short and non-technical answer is "the cloud" actually means "other people's computers" and these companies are the "other people". The why of it is complicated, there are both technical and economic reasons. I think it probably comes down to efficiency and economies of scale.

load more comments (8 replies)
[–] [email protected] 2 points 10 months ago* (last edited 10 months ago)

Cloudflare can be avoided so far but this may not hold up for long. There are browser extensions that put a strikethrough on all links to CF sites. There is also a search service (Ombrelo) which tags and down-ranks Cloudflare sites in the results. There is a bot you can follow on Mastodon that will DM you whenever you share a link to a CF website, so you can remove it (documented here).

[–] [email protected] 19 points 10 months ago* (last edited 10 months ago) (1 children)

What's your threat model? Adjust accordingly.

The situation is, what it is, but there's a wide range of actions one can take that fall between the two poles of do nothing and burn all internet enabled devices.

load more comments (1 replies)
[–] [email protected] 12 points 10 months ago

It isn't feasible to avoid using the top few CDNs in the world, of which cloudflare is one. Using a traffic anonymizing service simply kicks the can down the road, and now you need to trust the service you use to obfuscate your identity.

If you use Apple devices, which I'm guessing you don't, then be aware that cloudflare operates some of Apple's anonymization nodes. If you rely on TOR to obfuscate who you are, beware that several nations run a LOT of that infrastructure so they can correlate entry and exit information. If you use a paid VPN service, your payment details and account link you directly to the traffic you generate. Do you really trust those services to face government prosecution to protect you?

It's a hard spot to be in, especially with fewer and fewer companies controlling larger portions of the internet.

[–] [email protected] 10 points 10 months ago (6 children)

Cf only acts as a mitm for encrypted traffic if you choose it in the options. If you provide your own cert then they can’t decrypt anything.

[–] [email protected] 1 points 10 months ago

Cf only acts as a mitm for encrypted traffic if you choose it in the options. If you provide your own cert then they can’t decrypt anything.

That’s really misleading. Most admins use Cloudflare’s gratis service and they use CF to handle the traffic load. This is only possible if CF has the private key and sees the traffic. If CF cannot see the traffic, it must pass it all through to the source webserver which defeats the purpose of using CF.

Most importantly, users have no way of knowing whether a web service opts to use their own key or CFs key. It’s impossible. So wise users have no choice but to assume the worst case (which is also the strong majority of cases): that CF sees the traffic.

load more comments (5 replies)
[–] [email protected] 3 points 10 months ago (1 children)

Stop using the Internet.

If you're so concerned about being tracked at those levels you might need to get off for your own mental well being anyways. If you don't want the benefits of the service (ddos attack protections for major sites, consistent website up time) leave it behind.

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago)

If you’re so concerned about being tracked at those levels

What do you mean by “at those levels”? You seem to imply Cloudflare’s abuse is not vastly harmful.

CF ruins Tor, VPNs, discriminates against poor people behind CGNAT, and people who look like bots because they don’t load images. You don’t even get basic protection from IP disclosure. CF sees all traffic on most of their sites, including usernames and unhashed passwords. The OP’s demand is reasonable. The demand that everyone partake in such reckless disclosure to a single gatekeeper running a private walled-garden is not reasonable. Cloudflare has removed the minimum baseline of security that everyone used to have and failed to achieve even a low level of privacy.

[–] [email protected] 2 points 10 months ago* (last edited 10 months ago)

Has avoiding Cloudflare become Impossible?

Mostly, yes. But let’s break this down. Cloudflare only breaks web services and so far Cloudflare’s privacy abuses and gate-keeping is mostly confined to the web. Avoiding Cloudflare is impossible in some circumstances.

CFd government sites are unavoidable (voting rights lost in the US)

The only Cloudflare sites that are strictly unavoidable AFAICT are government sites. You can always boycott the private sector, but the public sector is shoved down our throats. There are 6 or so states in the US where voter registration goes through Cloudflare. Even if you register on paper there is still no escape because the data entry worker likely uses the Cloudflare site. I am a non-voter for this reason. Although it’s still possible to move to one of the 44 other states and register there.

CFd medical websites

See How lack of digital rights, Cloudflare, and Google worsened a medical emergency situation and undermined human rights. When you need medical info in a hurry, boycotting is tough.

search is liberated -- but only by 1 single search service to date

There is only one general purpose search service that helps avoid Cloudflare: Ombrelo, which tags and down-ranks Cloudflare websites in the results.

[–] [email protected] 1 points 10 months ago (8 children)

How is Cloudflare able to decrypt TLS traffic?

[–] [email protected] 2 points 10 months ago* (last edited 10 months ago) (1 children)

The long answer is here.

The short answer: Cloudflare holds the TLS keys and terminates the tunnel. The padlock misleads people because they think that means the tunnel goes all the way to the server hosting the source website.

Note as well that you are using lemmy.zip, a Cloudflared instance. CF sees your IP address, username, password (unhashed) and everything you do. (edit: See this comment for alternatives).

[–] [email protected] 2 points 10 months ago (1 children)

Well, I'm surprised I didn't know this. Or that this isn't talked more about.

[–] [email protected] 1 points 10 months ago

Or that this isn’t talked more about.

Indeed. It’s disturbing how not even EFF (the org most reputable for educating people about privacy among other digital rights) keeps Cloudflare’s attack on the privacy of 20%+ web traffic out of the spotlight that it should have.

load more comments (7 replies)
[–] [email protected] 1 points 10 months ago* (last edited 10 months ago) (1 children)

Even my proposed solution to use archive.org as a proxy is not a valid solution since I found out today that archive.org is also hosted behind Cloudflare…

Yikes! Can you give more detail? I’ve used archive.org quite heavily for years (it’s the only practical universal escape from Cloudflare). The IP address is not in Cloudflare’s range. But recently Cloudflare as started hiding its own presence by outsourcing to 3rd parties. It’s a vast minority of cases but this could obviously worsen. Is archive.org using CF through one of the undisclosed 3rd parties? A couple years ago archive.org announced a disturbing partnership with CF but did not disclose the details.

[–] [email protected] 2 points 10 months ago

Upon further investigation, I mistook original cloudflare headers that were passed through with x-archive-orig-* as an indication that archive.org was behind cloudflare. my mistake. I have edited the original post.

[–] [email protected] 1 points 10 months ago

VPN. Tor. Those are basic tools for relative anonymity.

load more comments
view more: next ›