this post was submitted on 26 Aug 2025
26 points (96.4% liked)

Privacy

2350 readers
113 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
 

I've been reading this about Cloudflare and realized they require any site using their services to install their certificate to then proceed to fully sniff and analyze, and sometimes even modify https traffic. This is something I didn't realize before. Here are the relevant screenshots:

you are viewing a single comment's thread
view the rest of the comments
[–] probable_possum@leminal.space 28 points 4 days ago* (last edited 4 days ago) (1 children)

Yes. Reverse proxies need to own the private key which belongs to the FQDNs certificate for the TLS connection between rproxy and browser. Also, sometimes HTTP Headers need to be rewritten.

As a result there is no end to end encryption between the server and the browser. You need to trust cloudflare as you need to trust your hoster.

[–] WhatAmLemmy@lemmy.world 5 points 4 days ago* (last edited 4 days ago) (1 children)

TLS isn't really related to E2EE. E2EE data can be delivered securely over http without any transport encryption, as long as the secrets/passwords/keys themselves never leave the client unencrypted (the data is encrypted by the client before transport).

A cloudflare hosted/protected site can still provide E2EE. You just have to trust that they aren't going to conduct any sophisticated transport attacks to inject malicious code and surreptitiously obtain your secrets.

[–] probable_possum@leminal.space 2 points 3 days ago* (last edited 2 days ago)

TLS isn't really related to E2EE.

IMO it is. Is it not a solution which prevents everybody but the client's browser and the web-server from taking part in the communication? Why?

data can be delivered securely over http

On top of HTTP? Nice. Is there a RFC or a framework which implements such a solution?