Daily reminder that sites “protected” by cloudflare are effectively MITM attacks. HTTPS is now even more worthless. Cloudflare can see everything. this is a known fact and not a theory.
And if you think Cloudflare aren’t being tapped by the NSA, you’re sadly sadly naive.
All the “privacy respecting” sites use it too. So remember, as soon as you see that cloudflare portal page, you can assume that everything you plug into the site is property of NSA Inc. Trust no one, and do not trust code being served to you over the web if it comes through CF, there is no way to know what they’ve modified.
Edit: good info link below https://serverfault.com/questions/662946/does-cloudflare-know-the-decrypted-content-when-using-a-https-connection
And then there’s people using Cloudflare tunnels, Tailscale and others for self-hosting stuff… that also may have your keys or inject clients at some point…
But we’re about to get downvoted to hell for pointing this out because our community is self-hosters that pride themselves on sovereignty can’t deal with the cognitive dissonance of having their favorite corporate solutions unmasked for what they are - spyware on steroids.
Tailscale keeps the private keys locally, . It just facillitates setting up wireguard. They could steal your private keys, as could any program you install with root access. But it would comepletely destroy their business, and it’s open source. I really dont think they have anything to gain by tricking everyone
Use headscale, I have no idea how people are OK with tailscale when they keep your keys and essentially have access to your network
There you go.
Are you sure that what you download from https://tailscale.com/download is 100% open-source and the same thing that is published on their repos?
Same goes for Cloudflare. Maybe Tailscale is secure and good people, or maybe they copy all keys to somewhere and covertly share them with govt agencies.