Cloudflare has been infamous among sysadmins and threat hunters for over a decade [1,2] now for having an almost-nonexistent moderation program. Their services have been routinely abused by malicious actors for years [3,4,5,6,7] They've arguably been the single largest commercial provider for criminals globally over that time period, including non-tech criminals like drug traffickers and actual terrorists [8,9], to say nothing of aiding and abetting war criminals [10].<p>In fact, Cloudflare is actually the second largest DNS provider in the world by number of domains served. [11]<p>They are in a position to log and analyze all of the traffic they decrypt, including all of the plaintext POST data, all of the cookies, all of the origin IPs, L7 payload sizes, and traffic timestamps for over 35 million websites.<p>Their extensive history of indiscriminately offering "free" services to evildoers likely ties back to their true purpose, which Matthew Prince has admitted to [12], which is to sell all of those passwords, all of that PII, all of your privacy, not only to the US government, but also to other bidders.<p>It is no exaggeration to say that anyone opposed to spam, phishing, malware, cybercrime, terrorism, war crimes, government surveillance dragnets, and infringements upon one's own digital privacy should have nothing but utter contempt for the soulless monsters responsible for this corporate atrocity.<p>If you are as passionate about the subject as I am after reading some of these citations, I'd encourage you to boycott any websites using CF that you don't <i>need</i> to visit, and make plenty of phone calls to California senators, representatives, and the governor demanding that the state of California revoke Cloudflare's corporate charter and right to conduct business in the state.<p>[1] <a href="https://www.malwarebytes.com/blog/news/2014/12/free-ssl-certificate-from-cloudflare-abused-in-phishing-scam" rel="nofollow">https://www.malwarebytes.com/blog/news/2014/12/free-ssl-cert...</a><p>[2] <a href="https://forum.spamcop.net/topic/14194-cloudflare-bulletproof-spammer-hosting/" rel="nofollow">https://forum.spamcop.net/topic/14194-cloudflare-bulletproof...</a><p>[3] <a href="https://thehackernews.com/2023/08/cybercriminals-abusing-cloudflare-r2.html" rel="nofollow">https://thehackernews.com/2023/08/cybercriminals-abusing-clo...</a><p>[4] <a href="https://www.threatdown.com/blog/cloudflare-tunnel-increasingly-abused-by-cybercriminals/" rel="nofollow">https://www.threatdown.com/blog/cloudflare-tunnel-increasing...</a><p>[5] <a href="https://any.run/cybersecurity-blog/clouflare-phishing-campaign/" rel="nofollow">https://any.run/cybersecurity-blog/clouflare-phishing-campai...</a><p>[6] <a href="https://venturebeat.com/security/rogue-ad-network-site-likely-infected-thousands-of-users-still-operational/" rel="nofollow">https://venturebeat.com/security/rogue-ad-network-site-likel...</a><p>[7] <a href="https://portswigger.net/daily-swig/cybercriminals-use-reverse-tunneling-and-url-shorteners-to-launch-virtually-undetectable-phishing-campaigns" rel="nofollow">https://portswigger.net/daily-swig/cybercriminals-use-revers...</a><p>[8] <a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/overlapping-technologies-cybercriminals-and-terrorist-organizations" rel="nofollow">https://www.trendmicro.com/vinfo/us/security/news/cybercrime...</a><p>[9] <a href="https://cyberscoop.com/cloudflare-ipo-terrorism-narcotics/" rel="nofollow">https://cyberscoop.com/cloudflare-ipo-terrorism-narcotics/</a><p>[10] <a href="https://www.timesofisrael.com/us-firm-helps-hamas-netanyahu-keep-hackers-at-bay/" rel="nofollow">https://www.timesofisrael.com/us-firm-helps-hamas-netanyahu-...</a><p>[11] <a href="https://bgp.he.net/report/tophosts" rel="nofollow">https://bgp.he.net/report/tophosts</a><p>[12] <a href="https://0xacab.org/blockedbyriseup/deCloudflare/-/raw/master/image/federalinterest.jpg" rel="nofollow">https://0xacab.org/blockedbyriseup/deCloudflare/-/raw/master...</a>