• Skankhunt420@sh.itjust.works
      link
      fedilink
      arrow-up
      4
      ·
      8 hours ago

      Yupp it sucks.

      But it does kind of reaffirm that it most likely is collecting just as much data as google. I hate cloudflare and don’t understand why the rest of the world wants to be so dependent on a US ran technology firm after waves arms all this

  • Aria@lemmygrad.ml
    link
    fedilink
    arrow-up
    4
    ·
    12 hours ago

    Is this even the privacy forum? A lot of people here implying OP should consent to the spying for better service. Cloudflare absolutely does gather as much as Google, and with much deeper access. If you can go without those websites, then block Cloudflare.

  • flactwin@lemmy.zip
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    15 hours ago

    for my server i use porkbun this cheap but relaible and my raspberry pi3b for small cloud servers, xmpp, wireguard, works nicely

  • HubertManne@piefed.social
    link
    fedilink
    English
    arrow-up
    13
    ·
    1 day ago

    As others have mentioned you are going to have a tough time seeing much on the web without it but I guess it would be a good way to see the web with like zero corpo stuff.

  • Björn@swg-empire.de
    link
    fedilink
    arrow-up
    19
    ·
    1 day ago

    Just blocking the domain won’t do you any good. Half the internet is behind Cloudflare. Even some Lemmy servers use it.

  • undefinedTruth@lemmy.zip
    link
    fedilink
    arrow-up
    135
    ·
    2 days ago

    If you are actively blocking Cloudflare and you are still able to use the web services you rely on then I am genuinely jealous of you.

  • chicken@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    51
    ·
    2 days ago

    If you set up a website with cloudflare, their user interface has a lot of tracking stuff on by default to be injected into it. It also encourages you to use their https service where the traffic is not actually encrypted from the user to your server, but man-in-the-middle’d by cloudflare. But the interface makes it super easy to do and refers to it like a good and normal default option.

    So yeah I think they really want your data.

    • ComradePenguin@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      13 hours ago

      Thanks for the info about HTTPS. I have used it a lot in the past, since its so incredibly easy and reliable

    • Björn@swg-empire.de
      link
      fedilink
      arrow-up
      7
      ·
      1 day ago

      Even if you don’t use Cloudflare’s https they still need the private keys to work. So they can read all traffic either way.

      • chicken@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        6
        ·
        1 day ago

        I’ll be more specific: if you set up a website on your own server, and use Cloudflare as a reverse proxy. If you do SSL yourself, on your own server, then the traffic is encrypted between the client and your server, and therefore Cloudflare cannot read it, they do not have the encryption keys, even though the traffic is passing through them. If you use Cloudflare’s https solution, Cloudflare provides the keys and decrypts the traffic before passing it on.

        The former is the more secure way to do it, but they encourage you to do it the way where they get to read all the traffic, which is pretty shady of them, because if a website has https people assume that means it is end to end encrypted to the website itself, but that assumption is being violated here and a user has no way to know.

        • Lee@retrolemmy.com
          link
          fedilink
          arrow-up
          2
          ·
          16 hours ago

          You should check the certificate shown to clients when accessing your domain. I think you’ll find that it is not the certificate that you created outside of Cloudflare. Cloudflare doesn’t need your private key as they issue a certificate for your domain to themselves and use that for the connection with the client. The certificate you created is used between Cloudflare and your server. The only option I’m aware to route traffic through Cloudflare where they don’t terminate SSL is an enterprise only feature.

          • chicken@lemmy.dbzer0.com
            link
            fedilink
            arrow-up
            1
            ·
            1 hour ago

            I checked just to be sure (and debugged some problems while I was at it like the certificate having been expired), the certificate is from Let’s Encrypt via certbot.

            Here is how to configure Cloudflare for this (I am using the free version):

            In the settings under SSL/TLS Overview, select “Custom SSL/TLS” instead of “Automatic SSL/TLS (default)”, and under that select Full:

            Full Enable encryption end-to-end. Use this mode when your origin server supports SSL certification but does not use a valid, publicly trusted certificate.

        • Björn@swg-empire.de
          link
          fedilink
          arrow-up
          3
          ·
          1 day ago

          How can they act as a proxy if they can’t terminate the connection? Or what service does that offer?

          I guess they could filter out some connections based on IP addresses. But is that enough for some customers? Or am I overlooking something?

          • chicken@lemmy.dbzer0.com
            link
            fedilink
            arrow-up
            3
            ·
            edit-2
            1 day ago

            How can they act as a proxy if they can’t terminate the connection?

            Why wouldn’t they be able to? The DNS record points to Cloudflare’s IP, they forward the traffic to your server’s IP. This is a common choice for self hosting setups because it’s a free service and it is a way to avoid pointing a DNS record at your home IP, which you may not want everyone to know. That doesn’t require decrypting the traffic.

            How this squares with the ddos protection and caching stuff, I’m not sure, but I know I set up SSL locally, did not give Cloudflare the keys, turned off all the options for them to handle it, and everything seems to work.

      • Bilb!@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        That’s true if you’re proxying your traffic for DDoS protection, but you don’t need to do that to use them as a DNS, if you must.

  • doodoo_wizard@lemmy.ml
    link
    fedilink
    arrow-up
    17
    arrow-down
    1
    ·
    1 day ago

    Lots of stuff breaks when you block cloudflare so a better way to avoid its data collection is to use a vpn and clear your browsing data.

  • Cherry@piefed.social
    link
    fedilink
    English
    arrow-up
    34
    arrow-down
    3
    ·
    2 days ago

    Reminds me of when my stepmother turned off the router because she didn’t want incoming radiation and then couldn’t figure why her emails were not arriving.

  • sidebro@lemmy.zip
    link
    fedilink
    English
    arrow-up
    27
    ·
    2 days ago

    I think I’d rather practice other anti-tracking or anti-fingerprinting measures rather than blocking one of the largest CDN’s in the world. But yes, they do track.

  • JadeEast@quokk.au
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 day ago

    I have the detect cloudlflare firefox extension. I avoid sites that use it. Haven’t tried blocking it completely yet but I could probably manage.