@ryo I do not control that mirror, it's hosted by an old friend. I am pretty sure he changed the headers as a joke, I don't even think onions can be CFed.
@digdeeper Yea, I know that onions can't use Cuckflare, considering it needs you to change DNS settings, which none of the darknets rely on.
By the way, which Tor and I2P mirrors are under your control? I'll update my webring accordingly, as I don't really trust 3rd party controlled ones for having them up forever (think cancel culture for example).
@ryo@digdeeper onions can be glowflared since they created an onion service that can act as a MitM, which in fact, everybody who uses Tor are connecting (at startup) unless you disable svc on about:config.
Since we're talking about Cloudflare, can I complain about it again? 18.4% of sites MitMed worldwide (I see it went down after the Kiwifarms censorship scandal - used to be over 20% already sometime ago). Still, NONE of the big privacy sites speak about it. NONE of the security experts like Krebs and Schneier speak about it. Some praise it. It's insane, I'm beginning to think this world is cursed.
@digdeeper@ryo the swarm of lazy devs who wants a free firewall+free+cdn+free+ca also like all major centralized spyware out they have the first mover advantage.
maybe some gov bs involved but i have no solid proof except from whats said in crimeflare.
@lilianabreeder@digdeeper@ryo > maybe some gov bs involved Well, I'll think it in this way: If I were the government I will be ashamed if I don't get my dirty hands on such a big target. And they will also be happy to borrow our power.
> Implementation status: SPDY and HTTP/2 are currently disabled by setting the Firefox preferences network.http.spdy.enabled, network.http.spdy.enabled.v2, network.http.spdy.enabled.v3, network.http.spdy.enabled.v3-1, network.http.spdy.enabled.http2, network.http.spdy.enabled.http2draft, network.http.altsvc.enabled, and network.http.altsvc.oe to false.
But, I still don't get how it is related to Cloudflare (directly).
@udon@digdeeper@ryo well, that problem is, some of these are connecting to glowflare.
long story short. the centralization problem are tremendous when they can fingerprint (pinky promise we won't do bad things tehee~) you during startup, cdn, destination service and dns.
i guess I should do a disclaimer that if you trust cuckflare (don't) its fine.
@lilianabreeder@digdeeper@ryo Are those the same connections in about:networking? In general I can see moz telemetries and in post 11.1 I can see securedrop telemetries.
@lilianabreeder@digdeeper@ryo I just now tested, request header is still 1.1. Btw, that securedrop thing can be disabled with "about:rulesets". No idea for the firefox.settings.mozilla thing.
@lilianabreeder@digdeeper@ryo Same... I gave up TBB when I couldn't remove those things with Spyware Watchdog's guide, since 11.5 (*typo in previous post, 11.5, not 11.1)