TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Blocked by Cloudflare

632 pointsby jrhawleyalmost 2 years ago

54 comments

dcowalmost 2 years ago
So many privacy nuts use Chrome and don&#x27;t realize this:<p>&gt; What about Google Chrome?<p>&gt; I tried all of the above in Firefox. So I naturally tried to access the same page in Google Chrome to see if I’d still be blocked. Thankfully, I wasn’t.<p>&gt; But of course I wasn’t because Chrome doesn’t have the same privacy- and security-enhancing designs that Firefox does. Chrome will happily collect as much private information about me and my browsing history and share them with select parties, as needed. It also doesn’t resist fingerprinting or let me modify settings to the same degree that Firefox does because Chrome relies on those fingerprinting technologies to ensure that I am targeted by ads it deems necessary for me to see.<p>&gt; Being blocked on Firefox and not blocked on Chrome also tells me that Cloudflare is blocking me based on the fingerprint (or lackthereof) of my browser. Everything about my connection is identical between the two requests, aside from the browser being used. It’s the same security certificates, same corporate VPN, same machine, even the same timeframe when I try to access the site.<p>If you care about <i>anything</i> these days, don&#x27;t use Chrome.
评论 #37052669 未加载
评论 #37058073 未加载
评论 #37057775 未加载
评论 #37053660 未加载
评论 #37053419 未加载
评论 #37073380 未加载
评论 #37054180 未加载
评论 #37061708 未加载
评论 #37053436 未加载
adammartinettialmost 2 years ago
Hi there, I&#x27;m the PM for Cloudflare&#x27;s challenge platform. I&#x27;d love to look into what the cause of the problem is, so you don&#x27;t see these difficulties.<p>&gt; Cloudflare detected the high frequency of requests and denials (but not their faulty loop that caused this pattern of requests, of course), and tagged my browser as suspicious.<p>I can tell you at least that we don&#x27;t penalize users for this looping behavior, so this wouldn&#x27;t cause us to see your browser as suspicious. I hope we can dig into this more and uncover the cause of the problem.<p>Personally, I&#x27;m a big Firefox user, and this isn&#x27;t behavior I see. If there were a widespread Firefox wide issue, automated alerts would trigger and we&#x27;d consider this a critical incident.<p>You can drop me an email at amartinetti at cloudflare if you&#x27;re interested in troubleshooting.
评论 #37053359 未加载
评论 #37052629 未加载
评论 #37053289 未加载
评论 #37062366 未加载
评论 #37052736 未加载
评论 #37059408 未加载
评论 #37054740 未加载
评论 #37065640 未加载
评论 #37053293 未加载
评论 #37056954 未加载
评论 #37057140 未加载
评论 #37060731 未加载
评论 #37058713 未加载
评论 #37054777 未加载
评论 #37054354 未加载
评论 #37087328 未加载
AegirLeetalmost 2 years ago
I&#x27;ve had the exact same problem for a while. Here are some of the sites I&#x27;ve been unable to access (found by searching for &quot;just a moment&quot; in my browser history):<p>- <a href="https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in" rel="nofollow noreferrer">https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in</a><p>- <a href="https:&#x2F;&#x2F;steamdb.info&#x2F;login&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;steamdb.info&#x2F;login&#x2F;</a><p>- <a href="https:&#x2F;&#x2F;www.zabbix.com&#x2F;forum&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.zabbix.com&#x2F;forum&#x2F;</a><p>- <a href="https:&#x2F;&#x2F;casetext.com&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;casetext.com&#x2F;</a><p>- <a href="https:&#x2F;&#x2F;namemc.com&#x2F;login" rel="nofollow noreferrer">https:&#x2F;&#x2F;namemc.com&#x2F;login</a><p>- <a href="https:&#x2F;&#x2F;spinroot.com&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;spinroot.com&#x2F;</a><p>- <a href="https:&#x2F;&#x2F;camelcamelcamel.com&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;camelcamelcamel.com&#x2F;</a><p>It&#x27;s really annoying and Cloudflare is apparently doing nothing to fix it as this has been going on for months if not years. I guess Cloudflare just hates the open web and really wants to enforce Chrome&#x2F;Chromium&#x2F;Blink hegemony.
评论 #37051949 未加载
评论 #37051721 未加载
评论 #37050794 未加载
评论 #37050802 未加载
评论 #37051996 未加载
评论 #37058386 未加载
评论 #37051452 未加载
评论 #37052531 未加载
评论 #37053013 未加载
评论 #37052884 未加载
zer8kalmost 2 years ago
Any time a large portion of internet traffic is controlled by a single source it brings problems like this with it. All cloudflare has to do is arbitrarily decide who and who can&#x27;t use the internet and effectively their word becomes law. Like most things it starts with an innocent premise (e.g. &quot;an easy way to stop bad actors&quot;) and ends up extended to any number of arbitrary things. Worse, the argument from privacy advocates rings hollow because defending privacy means you have to allow Bad People (TM). The average drooler using the internet cannot understand the nuance. Even in the most innocent of cases, a bad commit getting merged, can bring down the internet. It has happened before with Cloudflare.<p>Companies like Cloudflare, Google, Meta, etc are the reason anti-trust law exists. Unfortunately, it appears there is no one with any power that is willing to use the laws for their purpose. The internet in 20 years will be nothing like we&#x27;ve seen before. That&#x27;s not a good thing.
评论 #37051875 未加载
评论 #37050672 未加载
评论 #37052789 未加载
评论 #37052596 未加载
评论 #37051567 未加载
derefralmost 2 years ago
If you&#x27;ve ever tried to take apart Cloudflare&#x27;s various session cookies, MITMed scripts sent for &quot;high integrity&quot; pages (or when in &quot;super bot-fight&quot; mode), etc., you&#x27;ll have observed that it&#x27;s basically running a web-worker to heuristically do browser-integrity checking. That is, Cloudflare is trying to run a series of tests that real browsers operated by users pass, but which headless browsers operated by bots will fail.<p>These range from pretty simple things that check that the browser is actually a browser rather than a raw HTML parser (e.g. &quot;draw an image on a &lt;canvas&gt;, export it to PNG, hash the PNG, compare to an expected result&quot;); to things that check for low-effort headless-browsing techniques like the one you get by default using Puppeteer in a Lambda&#x2F;Cloud Function (e.g. &quot;do we have the weirder fonts you&#x27;d expect to exist on a consumer OS, but which these default batteries-included container images don&#x27;t bother to bake in&quot;); to things that work really hard to detect the &quot;scent of humanity&quot; <i>through</i> the browser (e.g. &quot;before the user activated the integrity-check prompt, did we record a sequence of &#x27;extraneous&#x27; mouse movements and key events that look like a human making individualized mistakes on their way to completing the form, and <i>don&#x27;t</i> look like a recorded capture of such similar to other ones we&#x27;ve seen recently.&quot;)<p>If you&#x27;re getting caught in a verification loop, it&#x27;s because you&#x27;re using a browser or device or extension that obscures&#x2F;disables enough of these heuristics that Cloudflare can&#x27;t get <i>proof positive</i> that you&#x27;re a person rather than a bot — and so, under whatever settings the site-owner has it set at, it will just keep trying to get that proof, rather than telling you you&#x27;ve failed and been blocked. (Why? Because telling a bot they&#x27;ve failed tells them that they should stop trying something that&#x27;s not working and instead — in the words of Star Trek technobabble — &quot;rotate their shield frequency&quot; before trying again.)
评论 #37051026 未加载
评论 #37052626 未加载
评论 #37050936 未加载
adamgamblealmost 2 years ago
One thing that sometimes gets lost is site owners that use cloudflare have sort of global options for how paranoid they want to be, then they can make specific WAF rules that can be as granular and aggressive as they want. So at least in some cases, cloudflare gets blamed for website owners setting really aggressive rules. The effect on the end user usually looks exactly the same.<p>Case in point, I set a waf rule that blocked all non verified bot traffic from several big datacenters (Google cloud, OVH, digital ocean, etc). That turned out to be a mistake because a lot of corporations were routing their traffic through those ASNs for some reason. Now they’re blocked. They could have gotten pissed out cloudflare, the error page looks the same, but it was really misconfiguring it.
bradley13almost 2 years ago
Anecdote: For my programming classes, one example I use is a simple browser. It doesn&#x27;t do CSS or Javacript, so display is primitive, but it works.<p>On some sites. Many sites, especially the big ones, see that it&#x27;s an unknown browser, and refuse to send content. Probably they think it&#x27;s a bot. But even if it were, what&#x27;s wrong with bots, as long as they&#x27;re well-behaved?<p>What kind of closed web have we let the megacorps build?
评论 #37053711 未加载
评论 #37052935 未加载
buzeralmost 2 years ago
It&#x27;s also annoying how that check page ends up breaking page reload in Firefox. When Cloudflare redirects you back to the page it will happen via POST. This initial POST gets captured by Cloudflare, but if you reload the page that POST will go to page itself and there&#x27;s pretty good chance it doesn&#x27;t know what to do with that and just shows error.<p>The only fix is to navigate back to page somehow, either by going to address bar and pressing enter (to navigate there again instead of reloading) or finding some link that points you back to the page.<p>I wouldn&#x27;t be surprised if those POSTs will end up banning you from some website since they &quot;know&quot; you shouldn&#x27;t POSTing to that page so clearly you are evil bot trying to hack them.
kronoalmost 2 years ago
The amount of times Cloudflare is making me sit through their 15 to 30 second &quot;checking your connection&quot; page is insane.<p>For people going through life with ADHD such as myself, the impact of all these delays and disruptions throughout the day can be severe. Despite being properly medicated this measure is absolutely debilitating and makes for a dreadful and very taxing online experience.
评论 #37058699 未加载
评论 #37059375 未加载
评论 #37053041 未加载
thedanbobalmost 2 years ago
Just yesterday I realized that I couldn&#x27;t log into Paypal on Safari or Firefox, only a Chromium-based browser. We&#x27;re getting deeper all the time into &quot;this site is best viewed in Google Chrome&quot;.
评论 #37053070 未加载
评论 #37051047 未加载
CharlesWalmost 2 years ago
&gt; <i>The next day, I tried accessing a web page internal to my company… […] I couldn’t get past a security check page because of issues in Cloudflare’s software. […] The silliness of it all is that I was on my work device the whole time, which was behind my workplace VPN.</i><p>This seems more like an &quot;IT department gone mad&quot; problem than a Cloudflare problem. I&#x27;m surprised they&#x27;d rather switch to Chrome than submit a support ticket.<p>Having used passkeys for a month+ now via macOS&#x2F;iOS&#x2F;1Password betas, I don&#x27;t understand how they&#x27;re related or the author&#x27;s concerns. Couldn&#x27;t you just replace &quot;passkey&quot; with &quot;password&quot; in all of their questions?
评论 #37051754 未加载
superkuhalmost 2 years ago
This has been my experience for a handful of years but of course it&#x27;s getting worse. In the past I&#x27;d just be getting blocked from access commercial websites or applications and things I didn&#x27;t really need. But in the last few years many scientific publishers have put all their content behind cloudflare walls. Pretty much my only hope of being able to read a paper these days is that it came out long enough ago to be on sci-hub <i>or</i> they published the pre-print on arxiv&#x2F;bioarxiv&#x2F;etc. Once arxiv goes behind a cloudflare I don&#x27;t know what I&#x27;ll do.
Animatsalmost 2 years ago
Suing Cloudflare for interference with contract[1] might be an option. Cloudflare is not protected against lawsuits by some EULA, because the outside user has no contract with them. They&#x27;re a third party in the middle. Talk to a lawyer.<p>Most contract law lawsuits are settled out of court. The great advantage of suing someone is that you get past the low-level customer support people and talk to someone who&#x27;s authorized to settle.<p>[1] <a href="https:&#x2F;&#x2F;www.lodhs.com&#x2F;blog&#x2F;interference-with-contractual-or-advantageous-relationships&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.lodhs.com&#x2F;blog&#x2F;interference-with-contractual-or-...</a>
评论 #37055269 未加载
thedalyalmost 2 years ago
I&#x27;ve been getting stuck in the “browser integrity check” loop a lot on firefox lately. Not an issue in chrome, not using a vpn, etc. I assume it is some combination of extensions and&#x2F;or settings in firefox.
评论 #37050863 未加载
w0ts0nalmost 2 years ago
Users in Egypt are unable to visit my Fitness website <a href="https:&#x2F;&#x2F;musclewiki.com" rel="nofollow noreferrer">https:&#x2F;&#x2F;musclewiki.com</a><p>Cloudflare is a huge part of the internet. Often they won&#x27;t respond and it appears that for whatever reason, their IP range is blocked in Egypt. We probably get 10 support emails per week. I contacted Cloudflare and they simply said there is nothing they can do.
评论 #37054346 未加载
评论 #37052616 未加载
评论 #37050885 未加载
nhanpqalmost 2 years ago
I feel like this these days: the right to decide if I am free to choose to use or access a service or website is not based on whether I claim to be human (in captchas tests), but based on the data people collect about me - and decide on them - something that I don&#x27;t know behind invisible doors.<p>I thought privacy was on the rise after the data leaks and irresponsibility of the big tech companies, and the public&#x27;s involvement in the issue of individual privacy, but it seems like everything is still a step backwards.
samcat116almost 2 years ago
The fact that this person thinks Cloudflare has their MAC address leads me to believe they shouldn&#x27;t be speculating on the &quot;implications for the web&quot;
gsichalmost 2 years ago
&quot;Checking if the site connection is secure&quot; what a blatant lie. If you can read this you already have a TLS connection.
alberthalmost 2 years ago
I&#x27;m surprised Apple PAT and Google WEI wasn&#x27;t mentioned in the article.<p>Especially since Apple has partnered with Cloudflare on PAT.
评论 #37050502 未加载
miyurualmost 2 years ago
I cannot access flyertalk.com, which hosts lot of useful airline content from any IP from my country. I tried reaching out via email as mentioned in the error page and admin does even have a valid email posted anywhere.<p>I know cloudflare is not to blame here, but they provide way easy access to blocking to bad admins.
ricardo81almost 2 years ago
Boils down to gatekeepers doesn&#x27;t it.<p>Unfortunately there&#x27;s also bad actors on the web (and the definition of bad varies). I understand reasons to try centralise the removal of that so called bad, but obviously a central group deciding on the &#x27;bad&#x27; just isn&#x27;t democratic.<p>Ironically when chatgpt mentioned their UA on a web page the other day, users were presented with an anti-bot challenge.
koito17almost 2 years ago
Increasingly more sites are getting stuck in a Cloudflare verification loop on my end. I use Firefox on the beta channel, and I do have a few privacy extensions and a heavily modified user.js. If you want to give in to the browser fingerprinting, I have found that enabling WebGL, enabling performance timing (wow), setting network.http.referer.XOriginTrimmingPolicy to 0, among other tweaks, helps me break out of the verification loop.<p>In other words, if Cloudflare can&#x27;t reliably fingerprint your browser, you are treated as a &quot;bot&quot; and denied access to a huge chunk of the web. Well, in that case, I would rather be a bot than a human. Being a human seems to be increasingly annoying nowadays :)
parastialmost 2 years ago
Insanely enough, Cloudflare sometimes puts these pages in front of API endpoints, as if that JSON were for human eyes only.
1vuio0pswjnm7almost 2 years ago
The End of the Road for Cloudflare CAPTCHAs<p><a href="https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;end-cloudflare-captcha&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;end-cloudflare-captcha&#x2F;</a><p>Discriminate against all but &quot;major browsers&quot;. Why.<p><a href="https:&#x2F;&#x2F;developers.cloudflare.com&#x2F;fundamentals&#x2F;get-started&#x2F;concepts&#x2F;cloudflare-challenges&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;developers.cloudflare.com&#x2F;fundamentals&#x2F;get-started&#x2F;c...</a>
nfriedlyalmost 2 years ago
&gt; Anyone who uses a de-Googled Android phone has to go to great lengths to ensure hardware attestation is working correctly [...] or else they can’t using banking apps.<p>I have a relatively Google&#x27;d Android running lineageOS. It passes SafteyNet on a fresh install, but even that isn&#x27;t good enough for one of my banking apps (or netflix) - they both also perform a CTS Profile (Compatibility Test Suite) check and block me from using the app if they don&#x27;t like what they see.<p>I ultimately had to root the phone to be able to use my bank&#x27;s app. Rooting allowed me to use a fake CTS Profile, and then because it was rooted, SafteyNet started failing and I had to install a bypass to work around that.<p>Now everything works great, except OS updates un-root the phone and then &quot;secure&quot; apps stop working again.<p>(Oh, and if you mention that you&#x27;re rooted, the LineageOS folks will refuse to provide any support, even for unrelated issues. Making you choose between friendly help and a usable phone is probably the only thing I don&#x27;t like about LineageOS and, to my view, the biggest break from it&#x27;s CyanogenMod roots.)
kozhevnikovalmost 2 years ago
&gt; I temporarily disabled extensions. I opened a private browsing window.<p>FYI When using Chrome, incognito window carries a lot of baggage. For issues like this use Guest profile as it doesn&#x27;t include extensions, caches, storage, etc. Optionally do a Google search first to seed it with cookies.
评论 #37050380 未加载
评论 #37050686 未加载
评论 #37146737 未加载
simple-thoughtsalmost 2 years ago
I personally experience this loop all the time on different sites. I’ve completely given up - if a site loops I don’t use it and try again a few weeks later. If it’s something extremely urgent I use my mobile device which for some unknown reason never loops.
MichaelZuoalmost 2 years ago
This is a bit tangential to the author&#x27;s point but it does seem to indicate that IPv6 is mostly pointless for human users for exactly this reason.<p>Since it&#x27;s so much easier to hide behind a new unique address, compared to IPv4, that any service such as Cloudflare would need to be extremely aggressive in blocking to meet their internal metrics and customer advertised minimum thresholds.<p>So much so that it actually costs more to use IPv6 then sticking with IPv4.<p>I imagine the scenario described by the author would become more and more common as time goes on as more of the world&#x27;s internet users becomes harder to distinguish.
评论 #37051229 未加载
评论 #37051011 未加载
评论 #37053050 未加载
1vuio0pswjnm7almost 2 years ago
No problem for me accessing Gitlab without using a web browser. Moreover one can use Internet Archive, Archive.today, Google&#x27;s cache, etc. to avoid SNI.<p>The author did not specify which project he was trying to access so I picked a random one to test from &#x2F;explore&#x2F;projects&#x2F;topics&#x2F;bioinformatics. No problem accessing it without a web browser. TLS1.3. No SNI.<p><a href="https:&#x2F;&#x2F;one-touch-pipeline.gitlab.io&#x2F;otp&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;one-touch-pipeline.gitlab.io&#x2F;otp&#x2F;</a>
jeroenhdalmost 2 years ago
Some comments I have on this post:<p>&gt; Worse yet, I know that Cloudflare knows I have those certificates. Why? Because it asked for them!<p>Not really. Cloudflare notices your browser has TLS authentication available and asks you for it. That&#x27;s really annoying, but part of the protocol spec. Your browser won&#x27;t send this information unless you pick a certificate and hit OK.<p>Disable your ad blocker and you&#x27;ll find that many trackers will also ask you to identify yourself this way. It&#x27;s really annoying, browsers need to design better UX for this type of authentication.<p>&gt; · MAC address of my machine that I have previously used to access this site<p>How does it gather your MAC address? Did you disable IPv6 Privacy Extensions? Unless the website is sitting behind the same switch as your computer or you run some kind of native application that sends the MAC address, websites can&#x27;t read the MAC of your network interface. Enable the MAC randomisation that&#x27;s present (sometimes even turned on by default!) in every modern OS if you consider the local switch or WiFi network to be a privacy risk.<p>&gt; Will I be able to create and sync these passkeys myself?<p>Yes, assuming they follow the standard<p>&gt; Can only certain types of software use passkeys? If so, who decides what software meets this standard?<p>I don&#x27;t really understand the question. Any software supporting passkeys will be able to prompt you for generating or using a passkey.<p>&gt; Will I only be able to generate passkeys on a device with specific hardware&#x2F;software requirements like a TPM, DeviceCheck, or Integrity API?<p>According to the spec, keys can be stored in software no trouble. Websites and apps can ask for securely generated keys, but I don&#x27;t think those are all that common. Hardware can also be faked relatively easily in most circumstances.<p>&gt; Can I, at any time, export my passkeys from one service provider and switch to another provider?<p>Ask your service provider for export options. Most likely, you can&#x27;t just dump the keys and import them elsewhere (that would defeat the point).<p>&gt; If a passkey is invovled in a suspicious event, will that suspicious mark propogate to any other device that uses that same passkey? Do devices that contain suspicious passkeys also get marked as suspicious? If so, would that impact the ability of that device to access other independent websites?<p>That depends on the software using the key for authentication. Maybe?
评论 #37053117 未加载
Dweditalmost 2 years ago
The big problem I have with Cloudflare&#x27;s integrity check is that all the spam domains use a fake version which mimics it, and tries to trick you into completing a captcha.
phreackalmost 2 years ago
This happened to me just a few days ago. I tried to open a link in an app, which then tried to open it with an in-app WebView. Thus, the Cloudflare captcha loop of death. I could even see a &quot;human verification failed&quot; string appearing after clicking on an &quot;I am human&quot; checkbox. Alongside the annoyance of not being able to browse, this kind of language is awful! Literally being told to my face I am not a human.
rubatugaalmost 2 years ago
Actually cloudflare doesn&#x27;t have access to your MAC address so it&#x27;s a bit more difficult to attest that you are a legitimate user.
kelnosalmost 2 years ago
Prediction: if Google manages to ram Web Environment Integrity down our throats, CloudFlare will implement it as a part of these checks.
tamimioalmost 2 years ago
I was going to assume that the corp VPN is the reason as maybe someone is abusing that connection for something else and it’s getting flagged, but the fact that the site worked using chrome says otherwise.<p>Will using chromium for such cases work while having Firefox for the rest of sites?<p>And what’s cloudflare alternative that provides similar services for free including traffic analysis?
jonatronalmost 2 years ago
Does anyone who knows about GDPR know if being blocked by a CDN comes under &quot;Automated individual decision-making&quot;?
评论 #37051075 未加载
delfinomalmost 2 years ago
Yea I noticed the same thing for awhile. Cloudflare actively blocks non-Chrome browsers.
评论 #37051194 未加载
评论 #37052431 未加载
foxyladalmost 2 years ago
Off topic - but how can Cloudflare block access to an internal website when accessed by via VPN? And if CF has some kind of request verification API that the internal server is using, why would you use it for an internal resource?
评论 #37060750 未加载
rcMgD2BwE72Falmost 2 years ago
As a Firefox mobile user, I&#x27;ve never been able to go past that page for ~2 years.<p>And so I&#x27;ve stopped visiting websites that use that system (several per days).<p>There&#x27;s no way to report that to Cloudflare so f*ck&#x27;em.
lopkeny12koalmost 2 years ago
Anyone else find it odd that the author&#x27;s company-internal work intranet, which requires a VPN to access, is deployed behind a Cloudflare CDN? Why would anyone do this?
fartcanisteralmost 2 years ago
The same for Safari. If your website is available in only one browser, this means that you need to change the content delivery provider.
monsieurUKalmost 2 years ago
I use ungoogled chromium on my openBSD machine, and I think it&#x27;s better for privacy than firefox :-).
amatechaalmost 2 years ago
On one of my machines I run OpenBSD with Firefox with &quot;Strict&quot; privacy settings and &quot;privacy.resistFingerprinting&quot; enabled. There are so many websites I can&#x27;t access, I get a straight-up 403 Forbidden page because CloudFlare has decided I am not trustworthy. I mean like pretty big companies like DigiKey, Home Depot, Canadian Tire, etc. I simply cannot use their websites, or I can load the initial page but then the API calls that provide the functionality all fail with a 403. DigiKey did something to unblock me and I can use their site again, but I know it&#x27;s just a matter of time before it happens again. It&#x27;s also a frequent problem on smaller sites that are simply using CloudFlare , and I never know when I&#x27;m going to be blocked from a site arbitrarily. It&#x27;s especially egregious when it&#x27;s a plain old text-based site like hamuniverse.com , or a small independent vendor like digirig.net ...<p>This is one of the things that makes it so clear to me that the web is diverging into two, one that is the &quot;clean walled-garden capitalism web&quot; and the continuation of the original web that was open, freely-accessible and built around sharing and knowledge.
xmichael909almost 2 years ago
Cloudflare sucks, plain and simple, no idea why anyone uses it. So many better alternatives.
评论 #37053622 未加载
skybrianalmost 2 years ago
Fingerprinting is probably load-bearing for captchas and other anti-fraud stuff that many Internet services and businesses depend on:<p><a href="https:&#x2F;&#x2F;xkcd.com&#x2F;2347&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;xkcd.com&#x2F;2347&#x2F;</a><p>It should be replaced with something better. Unfortunately all attempts to do something better get attacked by people who don’t realize that you can’t just get rid of it, or important things will break.
issungalmost 2 years ago
I use cloudflare for hosting my sites, can I and how would I disable this functionality?
tracker1almost 2 years ago
For good or bad, this is why I have the Privacy Pass extension installed.
Havocalmost 2 years ago
Yeah also noticed I could t get past certain sites recently
j16sdizalmost 2 years ago
&gt; Worse yet, I know that Cloudflare knows I have those certificates. Why? Because it asked for them!<p>It doesn’t make sense for Cloudflare to request any client certificates.<p>I think there are real bugs somewhere.
评论 #37051538 未加载
评论 #37051770 未加载
datavirtuealmost 2 years ago
Please rename to &quot;Blocked by Firefox&quot;
ChrisArchitectalmost 2 years ago
Is there something more going on here like you&#x27;re using some kind of blocker and it&#x27;s stopping the captcha&#x2F;security &#x27;widget&#x27; from loading?
Jaskolkaalmost 2 years ago
Fuck Cloudflare
Tozenalmost 2 years ago
The problem with Cloudflare is they purposely attempt to break user privacy by dangling websites as carrots. It&#x27;s deception that they are attempting to determine if the person is human or not, because often they won&#x27;t even show you the CAPTCHA. Even if you do get to the CAPTCHA, sucessfully doing it usually won&#x27;t give you access to the website either. So, what is the point?<p>They want people to disable any privacy protections or push usage of browsers that have no to less privacy protections, in order to access the website they are blocking. This has nothing to do with if a user is an actual threat or bot, but is more a strategy to shape what browsers are used and destroy user privacy.<p>Cloudflare is also very aware of the numerous and constant complaints about what they are doing, coming from users and for years. They are ignored, because they have something else in mind.
rejectfinitealmost 2 years ago
Using something like Edge (for work), Vivaldi or Brave would be better than Chrome and probably let you in instead of Chrome.