• chicken@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    43
    ·
    15 hours ago

    If you set up a website with cloudflare, their user interface has a lot of tracking stuff on by default to be injected into it. It also encourages you to use their https service where the traffic is not actually encrypted from the user to your server, but man-in-the-middle’d by cloudflare. But the interface makes it super easy to do and refers to it like a good and normal default option.

    So yeah I think they really want your data.

    • Björn@swg-empire.de
      link
      fedilink
      arrow-up
      5
      ·
      3 hours ago

      Even if you don’t use Cloudflare’s https they still need the private keys to work. So they can read all traffic either way.

      • Bilb!@lemmy.ml
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 hours ago

        That’s true if you’re proxying your traffic for DDoS protection, but you don’t need to do that to use them as a DNS, if you must.

      • chicken@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        2 hours ago

        I’ll be more specific: if you set up a website on your own server, and use Cloudflare as a reverse proxy. If you do SSL yourself, on your own server, then the traffic is encrypted between the client and your server, and therefore Cloudflare cannot read it, they do not have the encryption keys, even though the traffic is passing through them. If you use Cloudflare’s https solution, Cloudflare provides the keys and decrypts the traffic before passing it on.

        The former is the more secure way to do it, but they encourage you to do it the way where they get to read all the traffic, which is pretty shady of them, because if a website has https people assume that means it is end to end encrypted to the website itself, but that assumption is being violated here and a user has no way to know.

        • Björn@swg-empire.de
          link
          fedilink
          arrow-up
          1
          ·
          21 minutes ago

          How can they act as a proxy if they can’t terminate the connection? Or what service does that offer?

          I guess they could filter out some connections based on IP addresses. But is that enough for some customers? Or am I overlooking something?