The developer in me hates what #CloudFlare's anti-bot checks are turning the web into. As a blind person, I'm occasionally frustrated at having to obtain an accessibility cookie to bypass the CAPTCHA. My inclusive design/accessibility professional side hates that those cookies have to be obtained in a way that doesn't fully respect privacy.
But simply as a human, what I find most objectional of all is CloudFlare's "Checking if the site connection is secure" messaging. That sounds like a good thing; how nice that this site is looking out for my protection as a humble web user! When in fact, my activity and circumstances are being checked against an arbitrary set of requirements and baseline-level metrics, to determine if I have the right to go where I want to go. It has nothing to do with security, and everything to do with information lockdown.
Of course, CloudFlare's lawyers probably signed off on this copy as being just close enough to the truth. They are checking that the site connection is secure... against bad actors. Which they may very well find to be you if they can't prove your human nature beyond reasonable doubt, so watch out.
After testing TrueNAS, CasaOS and Ubuntu Server on my #homelab server, I heard about #unraid. How did I not know about it before?!?
Set it up with a new dual SSD drive RAID1 setup and it's working great. I like the interface and support for both VMs and #Docker. $59 for up to 5 drives but using 30day trial now. Working on a #Cloudflare Tunnel setup for secure remote access.
Well, I guess I will not sign in to #GitLab, then. Gotta love the CloudFlare “are you human” loop playing ad nauseam. Turned off all content blockers, cleared site settings, to no avail.
#CloudFlare's “challenge platform” returns a 401 for one resource, I think that's the culprit.
I’ll not look at my repos today, I think. Either way, this is bullshit
The issue's pattern: you have a #cloudflare DNS service routing traffic to your Meshcentral instance, often behind an #nginx reverse proxy. The main website works, but the remote connections start failing half the time. Now they always fail at a 0 sec timeout.
Oops, banned my own IP address in #Cloudflare (#fail2ban working too well). Took a lot of monkey business to figure out how to unban myself, ha ha ha. #SysAdmin#fail
In a discussion about CAPTCHAs and accessibility, hCAPTCHA was put forwards as a solution. The good news: they forgo an audio experience (good! I’ve literally never been able to solve one) in lieu of signing up with an email address for a bypass cookie. Unfortunately this brings its own set of problems.
I have a little digital garden #blog...I don't know where the best place to host it would be.
I know there's GitHub pages but I don't want to host my #fiction and random stuff like that placed publicly and in with my code.
Something tells me it won't be purely fiction as I want to put some progress logs there for various things eventually.
Does anyone else have any ideas of a great free place to host a site made with a static site generator? (Because I'm cheap and currently unemployed rn.)
When connected to #Cloudflare Warp, images from most servers do not load at all. Wondering what’s the FIX to it or if there’s any alternative to Cloudflare Warp?
It was quite a lot of #MastoAdmin today with @KayOhtie to figure out that the Vultr node his don't-call-it-a-droplet was provisioned on seems to be failing (probably storage, maybe RAM?). But in the process, it got updated nginx configs, a clean slate for the database (dump and restore), cleaned-out redis, and more. Plus, a fancy #Prometheus + #Grafana stats dashboard (thanks @IPngNetworks!) that I'm currently #selfhosting to keep an eye on perf. The new "droplet" is literally 10x faster in Postgres and Redis ops.
It also got a simple "failover" media proxy:
#Cloudflare to mediacdn.blimps.xyz (Nginx on the droplet) => Cloudflare-fronted B2; if B2 is 404, serve Cloudflare-fronted DO Spaces instead.
Should keep egress costs down from DO and zero from B2 via caching and B2+CF Bandwidth Alliance.
Trying to figure out why people don't like #Cloudflare. I can tell it has something to do with centralization and privacy, but I can't tell if there's something more specific, too. #AskFedi
Using CloudFlare and other corporate MitM "services" to protect your server against DDOS attacks? Looking for an ethical replacement? Cory Doctorow is using Deflect for pluralistic.net:
Seeking advice on minimizing function and worker usage (Nuxt on Cloudflare Pages)
What I want to do:...