Buy European
Overview:
The community to discuss buying European goods and services.
Rules:
-
Be kind to each other, and argue in good faith. No direct insults nor disrespectful and condescending comments.
-
Do not use this community to promote Nationalism/Euronationalism. This community is for discussing European products/services and news related to that. For other topics the following might be of interest:
-
Include a disclaimer at the bottom of the post if you're affiliated with the recommendation.
Feddit.uk's instance rules apply:
- No racism, sexism, homophobia, transphobia or xenophobia
- No incitement of violence or promotion of violent ideologies
- No harassment, dogpiling or doxxing of other users
- Do not share intentionally false or misleading information
- Do not spam or abuse network features.
- Alt accounts are permitted, but all accounts must list each other in their bios.
Benefits of Buying Local:
local investment, job creation, innovation, increased competition, more redundancy.
Related Communities:
Buy Local:
Buying and Selling:
!flohmarkt@lemmy.ca
Boycott:
!boycottus@lemmy.ca
Stop Publisher Kill Switch in Games Practice:
!stopkillinggames@lemm.ee
Banner credits: BYTEAlliance
view the rest of the comments
Thank you. So that's why you 'see' an US IP address while the physical server may be located anywhere, e.g. in Germany.
By looking at their Wikipedia, I've already found out that Cloudflare doesn't do hosting.
Cloudflare don't hoat sites, but they do end up being a 'man in the middle' attack on any site they proxy for, regardless of where that site is nominally hosted. That ends up exposing all traffic on those sites to a US corporation, and ultimately the US government. Considering that Cloudflare proxy somewhere between 19% and 40% of all websites, I think that's pretty alarming.
It's not an attack of you pay for it
You'll be attacked and pay for the priviledge! I suppose what you're really paying for is knowing who's attacking you. Mind you, I think it's free for small sites, which is probably quite an attractive trade-off for many.
I don't get the 'man in the middle' part. Is the ssl key for the encrypted https connection not from LW, but from cloudflare?
It's still problematic that they have metadata of the connections.
For cloudflare to encrypt the traffic they need the key.
But isn't for https the traffic supposed to be e2e encrypted between the client web browser and the server hosting the web page with the same cert? Does cloudflare decrypt and then re-encrypt the traffic data?
You see the problem. Yes, cloudflare decrypt the request from the browser, inspect it, then reencrypt it and send it to the host server. Then they take the response, decrypt that, inspect it, reencrypt it and send it to the browser.
Basically there are two TLS flows, one from the browser to cloudflare, and one from clourflare to the host server. Between those, on the cloudflare system, both the traffic and response are in plain text. That includes usernames, passwords (for HTTP basic auth anyway) and any sensitive data you send or receive.
Given that they front sonewhere between 19 and 40% of all websites, d£pending on whose stats you trust, that should be pretty alarming.