HOW TO TEST your favourite sites for #CloudFlare surveillance + other nasties.
1) In a new #TorBrowser tab, hit Ctrl+Shift+E for the #NetworkTab.
2) Load website.
3) Order fetched content in NetworkTab by #domainName then check each domain. Ensure that Server is not Cloudflare (or #AmazonS3 = #CloudFront = #amz and MS #azure).
If its bad, make a BLOK bookmark, if good make ALOW bookmark. Date it (eg. feb'22) so after a year you can test it again.
#cloudflare #torbrowser #NetworkTab #domainname #AmazonS3 #Cloudfront #amz #azure #cloudflareTest #deCloudflare #crimeflare
This is apparently how it happened.
After a bit of effort a friend developed a special bot called @cloudflaretest@botsin.space. So you could, reply to a link with hashtag #cloudflareTest and both people can learn whether the site is under a #MITM scheme.
It was specifically designed to only respond to a person once per week, maximum.
But then…
1. (A) made a reply to someone (B) with hashtag
2. (A) instantly delete it
3. Bot made a reply to (A) and (B)
4. (B) got angry and call botsinspace owner
5. Ban
@sim
Hope you don't mind we are away from keyboard atm, doing a #cloudflareTest to save for later.
Three easy steps to test a site for #Cloudflare and other nasties.
1) In a new #TorBrowser tab, hit Ctrl+Shift+E to bring up the #NetworkTab.
2) Load the website (optional: strip URL to domain name only),
3) In the NetworkTab click each #domainName of assets that seem unique to that page. In the column that appears, ensure that Server is not Cloudflare, or #AmazonS3 (or #MicrosoftIIS). If its bad, make a BLOCKMARK bookmark, if good make an ALLOW b'mark. Date it.
#cloudflare #torbrowser #NetworkTab #domainname #AmazonS3 #MicrosoftIIS #cloudflareTest #deCloudflare