HOW TO TEST your favourite sites for #CloudFlare surveillance + other nasties.

1) In a new #TorBrowser tab, hit Ctrl+Shift+E for the #NetworkTab.

2) Load website.

3) Order fetched content in NetworkTab by #domainName then check each domain. Ensure that Server is not Cloudflare (or #AmazonS3 = #CloudFront = #amz and MS #azure).

If its bad, make a BLOK bookmark, if good make ALOW bookmark. Date it (eg. feb'22) so after a year you can test it again.

#cloudflareTest #deCloudflare #crimeFlare

This is apparently how it happened.

After a bit of effort a friend developed a special bot called @cloudflaretest. So you could, reply to a link with hashtag #cloudflareTest and both people can learn whether the site is under a #MITM scheme.

It was specifically designed to only respond to a person once per week, maximum.

But then…

1. (A) made a reply to someone (B) with hashtag
2. (A) instantly delete it
3. Bot made a reply to (A) and (B)
4. (B) got angry and call botsinspace owner
5. Ban

@sim
Hope you don't mind we are away from keyboard atm, doing a #cloudflareTest to save for later.

Three easy steps to test a site for #Cloudflare and other nasties.

1) In a new #TorBrowser tab, hit Ctrl+Shift+E to bring up the #NetworkTab.

2) Load the website (optional: strip URL to domain name only),

3) In the NetworkTab click each #domainName of assets that seem unique to that page. In the column that appears, ensure that Server is not Cloudflare, or #AmazonS3 (or #MicrosoftIIS). If its bad, make a BLOCKMARK bookmark, if good make an ALLOW b'mark. Date it.

#cloudflareTest #deCloudflare