skip to content »

jenforum.ru

Free live phonesex trial

It's a cash cow for everyone, but especially for bad guys.The same situation exists for anyone who needs a throwaway email address that's nearly impossible to trace.

Little countries and even some little islands all have their own top-level domain these days. Many registrars around the world are pleased to sell these cc TLD and g TLD registrations.If those IPs change, then block Cloud Flare's entire IP space, and continue to monitor the situation.If Cloud Flare's traffic still gets through, you ask the ISP to pull the plug on Cloud Flare's racks.Suppose that grandpa, age 90, gets an official-looking email that advises him to immediately change his password.He clicks on the URL in the email and ends up at bankofamerica.q4on the use of SSL by Cloud Flare and similar services.

The Cloud Flare certificates we found all had the common name in the same style as the "ssl2796.cloudflare.com" shown in that Netcraft report.

The ISP replies that everything is encrypted, and Cloud Flare traffic cannot be intercepted.

In other words, nothing can be done about the ISIS sites, carders, booters, gamblers, escorts, phishers, malware, and copyright infringers that Cloud Flare protects. It's fairly obvious — you ask this ISP to block the Cloud Flare IP addresses used by the offending domains (this is already happening in Russia).

(Their "data centers" are typically a rack or two of equipment that Cloud Flare ships to a real data center, along with installation instructions.) We asked Cloud Flare to confirm that sniffing is possible at these so-called "data centers," but they didn't respond.

By now we're wondering if there's a plaintext Ethernet port at the back of their equipment rack that makes interception easy and convenient.

The traffic between the original web server and Cloud Flare remains unencrypted unless the web server owner has his own certificate installed on his machine.