Daily reminder that sites “protected” by cloudflare are effectively MITM attacks. HTTPS is now even more worthless. Cloudflare can see everything. this is a known fact and not a theory.
And if you think Cloudflare aren’t being tapped by the NSA, you’re sadly sadly naive.
All the “privacy respecting” sites use it too. So remember, as soon as you see that cloudflare portal page, you can assume that everything you plug into the site is property of NSA Inc. Trust no one, and do not trust code being served to you over the web if it comes through CF, there is no way to know what they’ve modified.
Would you mind posting a link where I can read more about this?
it’s all over the internet but here’s a good place to start
https://serverfault.com/questions/662946/does-cloudflare-know-the-decrypted-content-when-using-a-https-connection
Gonna do some research/reading about this and I’m being objective.
Thanks for sharing and replying so quickly.
I have created a blog post about how to bypass CGNAT for self-hosting. I have also written a little bit aboit how Cloudflare works.
https://blog.aiquiral.me/bypass-cgnat
You should update it with IPv6 support, it makes things much easier.
Basically every VPS gets at least 18,446,744,073,709,551,616 addresses that by using VPN you can pass to homeservers instead of one. So no need to port forward, proxy etc., homeserver can get full real address.
Is there a guide for how to do this in a more declarative fashion?
really good stuff, thanks so much