<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: slothsarecool</title><link>https://news.ycombinator.com/user?id=slothsarecool</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 10 May 2026 08:49:33 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=slothsarecool" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by slothsarecool in "Cloudflare outage on February 20, 2026"]]></title><description><![CDATA[
<p>Their WAF isn't there yet, the moment it can build the expressions you can build with CF (and allows you to have as much visibility into the traffic as CF does), then it might be a solid option, assuming they have the compute/network capacity.</p>
]]></description><pubDate>Sat, 21 Feb 2026 21:38:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47105073</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=47105073</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47105073</guid></item><item><title><![CDATA[New comment by slothsarecool in "Cloudflare outage on February 20, 2026"]]></title><description><![CDATA[
<p>L7 DDoS protection and global routing + CDN, there is not a single paygo provider that can handle the capacity CF can, especially not at this price range (mitigated attacks distributed from approximately 50-90k ips, adding up to about 300-700k rps).<p>We tried Stackpath, Imperva (Incapsula back in the day), etc but they were either too expensive or went out of business.</p>
]]></description><pubDate>Sat, 21 Feb 2026 21:36:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47105061</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=47105061</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47105061</guid></item><item><title><![CDATA[New comment by slothsarecool in "Cloudflare outage on February 20, 2026"]]></title><description><![CDATA[
<p>There are no alternatives, and those alternatives that did exist back in the day, had to shut down due to either going out of business or not being able to keep a paygo model.<p>Not everybody needs cloudflare, but those that need it and aren't major enterprises, have no other option.</p>
]]></description><pubDate>Sat, 21 Feb 2026 21:11:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47104809</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=47104809</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47104809</guid></item><item><title><![CDATA[New comment by slothsarecool in "Cloudflare asks browser devs to sign insane NDAs before fixing browser blocking"]]></title><description><![CDATA[
<p>Those are different products. BIC prevents requests such as empty UAs or corrupted HTTP requests to pass CF without a challenge.<p>Turnstile/Challenges per se don't rely on the UA at all.</p>
]]></description><pubDate>Mon, 17 Mar 2025 10:37:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=43386954</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=43386954</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43386954</guid></item><item><title><![CDATA[New comment by slothsarecool in "Tell HN: Cloudflare is blocking Pale Moon and other non-mainstream browsers"]]></title><description><![CDATA[
<p>I think it's pretty clear you have never worked on fraud protections or bot detections, otherwise you'd understand the struggles of supporting many environments with a single solution, you already have an opinion on this and by the way your messages are typed, it doesn't seem like any rational will change your ideas.<p>This is the internet and everybody is a field expert the moment they want to win an argument, best of luck with that.</p>
]]></description><pubDate>Tue, 11 Feb 2025 23:57:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=43019938</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=43019938</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43019938</guid></item><item><title><![CDATA[New comment by slothsarecool in "Tell HN: Cloudflare is blocking Pale Moon and other non-mainstream browsers"]]></title><description><![CDATA[
<p>I think the issue is that Cloudflare tends to be a toggle-and-forget, it's very easy to use and it works for most people.<p>The problem with this setup, is that it sacrifices on both security (because it needs to keep false positives at a minimum, even if that means allowing some known bots) and user experience (because situations like the one you have will occur from time to time). When you enable a challenge page on CF, it will work as-is and you have no ruling over it, the most you can do is skip the page for the browsers having false positives.<p>If CF gave site owners a clearer view of what they are blocking and let them choose which rules to enforce (within the challenge page), it would be much easier to simply say that the customer running CF doesn't want you visiting their page/doesn't care about few false positives.</p>
]]></description><pubDate>Wed, 05 Feb 2025 23:23:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=42956829</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=42956829</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42956829</guid></item><item><title><![CDATA[New comment by slothsarecool in "Tell HN: Cloudflare is blocking Pale Moon and other non-mainstream browsers"]]></title><description><![CDATA[
<p>You can create a new browser, there are plenty of modern new browsers that aren't considered major and work just fine because they run on top of recent releases of chromium.<p>There are actually hundreds of smaller chromium forks that add small features, such as built-in adblock and have no issues with neither Cloudflare nor other captchas.</p>
]]></description><pubDate>Wed, 05 Feb 2025 22:04:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=42955932</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=42955932</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42955932</guid></item><item><title><![CDATA[New comment by slothsarecool in "Tell HN: Cloudflare is blocking Pale Moon and other non-mainstream browsers"]]></title><description><![CDATA[
<p>> * If your visitors are using an up-to-date version of a major browser *
> * they will receive the challenge correctly. *<p>I'm unsure what part of this isn't clear, major browsers, as long as they are up to date, are supported and should always pass challenges.
Palemoon isn't a major browser, neither are the other browsers mentioned on the thread.<p>> * Nowhere is it mentioned that internet access will be denied to visitors not using "major" browsers *<p>Challenge pages is what your browser is struggling to pass, you aren't seeing a block page or a straight up denying of the connection, instead, the challenge isn't passing because whatever update CF has done, has clearly broken the compatibility with Palemoon, I seriously doubt this was on purpose.
Regarding those annoying challenge pages, these aren't meant to be used 24/7 as they are genuinely annoying, if you are seeing challenge pages more often than you are on chrome, its likely that the site owner is actively is flagging your session to be challenged, they can undo this by adjusting their firewall rules.<p>If a site owner decides to enable challenge pages for every visitor, you should shift the blame on the site owners lack of interest in properly tunning their firewall.</p>
]]></description><pubDate>Wed, 05 Feb 2025 21:43:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=42955634</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=42955634</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42955634</guid></item><item><title><![CDATA[New comment by slothsarecool in "Tell HN: Cloudflare is blocking Pale Moon and other non-mainstream browsers"]]></title><description><![CDATA[
<p>Cloudflare is actually pretty upfront about which browsers they support. You can find the whole list right in their developer docs. This isn't some secret they're trying to hide from website owners or users - it's right here <a href="https://developers.cloudflare.com/waf/reference/cloudflare-challenges/#supported-browsers" rel="nofollow">https://developers.cloudflare.com/waf/reference/cloudflare-c...</a>  - My guess is that there is no response because not one of the browsers you listed is supported.<p>Think about it this way: when a framework (many modern websites) or CAPTCHA/Challenge doesn't support an older or less common browser, it's not because someone's sitting there trying to keep people out.
It's more likely they are trying to balance the maintenance costs and the hassle involved in allowing or working with whatever other many platforms there are (browsers in this case). At what point is a browser relevant? 1 user? 2 users? 100? Can you blame a company that accommodates for probably >99% of the traffic they usually see? I don't think so, but that's just me.<p>At the end, site owners can always look at their specific situation and decide how they want to handle it - stick with the default security settings or open things up through firewall rules. It's really up to them to figure out what works best for their users.</p>
]]></description><pubDate>Wed, 05 Feb 2025 21:14:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=42955234</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=42955234</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42955234</guid></item><item><title><![CDATA[New comment by slothsarecool in "Ask HN: How is BunnyCDN DDoS protection VS Cloudflare?"]]></title><description><![CDATA[
<p>BunnyCDN DDoS protection is made to protect their servers and the customers, it's not meant to serve your service as a shield against attacks.<p>This is a common misconception with many providers, they have DDoS protection to ensure that an attack against them won't cause your website/service being unavailable, however, if an attack targets your service, it most likely won't be filtered by their system.</p>
]]></description><pubDate>Sun, 18 Jun 2023 00:13:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=36376079</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=36376079</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36376079</guid></item><item><title><![CDATA[New comment by slothsarecool in "Tell Cloudflare: You're Breaking Tor/VPN/Shared IPs Again"]]></title><description><![CDATA[
<p>Banking sites and anybody who suffers from any sort of attack, whether it's scraping, DDoS, bots, bruteforcing...<p>Does everybody get those attacks? Probably not, however, Cloudflare centralizes the attacks into a single IP reputation database so, if at some point, a certain node was abused on x site that uses Cloudflare, anybody who is routed through that node will have a poor experience browsing CF sites.<p>This approach of centralizing IP reputations has its own flaws and benefits, Tor Nodes aren't inherently given a bad reputation, it just happens that if 90 people are using the tool for all the good things, 2 assholes can abuse the IPs and have them blacklisted on almost any website, whether it's Cloudflare, Imperva, Akamai, PX, you name it. Cloudflare is the most known name but there are tons of other E2E/B2B providers that don't show up as often.</p>
]]></description><pubDate>Mon, 02 Jan 2023 17:14:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=34220463</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=34220463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34220463</guid></item><item><title><![CDATA[New comment by slothsarecool in "Six charged in mass takedown of DDoS-for-hire sites"]]></title><description><![CDATA[
<p>Things are significantly better now, I can't comment on how good the aid is if you are under attack since we always had a team ready to handle DDoS, however, their follow-up has always been fast.<p>Regarding security features, if you are on a cloud such as GCP, AWS or Azure things are complicated since you can't easily route the traffic elsewhere(you can have BGP connections to DDoS mitigation inside GRE/L2TP tunnels only when attacks occur and it would be cheap to rent on a monthly/yearly basis). Voxility is an example that comes to mind and they are very affordable in general terms.<p>HTTP or HTTPs attacks are easier to handle with Cloudflare, however, there are other interesting solutions such as Stackpath.</p>
]]></description><pubDate>Thu, 15 Dec 2022 13:13:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=33999001</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=33999001</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33999001</guid></item><item><title><![CDATA[New comment by slothsarecool in "Six charged in mass takedown of DDoS-for-hire sites"]]></title><description><![CDATA[
<p>We get attacked several times a month, we rely on Cloudflare & Corero to mitigate attacks. 
Cloudflare handles HTTP/s attacks and Corero handles network level attacks.<p>Both require tweaking and are far from being 1-click setup tools (despite some marketing attempts that try to make it seem that way), however, if you can manage them, they are very powerful and considerably cheaper than other alternatives.</p>
]]></description><pubDate>Thu, 15 Dec 2022 13:04:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=33998891</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=33998891</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33998891</guid></item><item><title><![CDATA[New comment by slothsarecool in "Six charged in mass takedown of DDoS-for-hire sites"]]></title><description><![CDATA[
<p>We report each DDoS attack our company receives to a special department our police has, your country likely has something similar and I guess it doesn't hurt reaching out to them.<p>From my experience they will get back to you quickly (usually in <1-2 hour) and they can try helping out if you are still under attack / need some consultation.<p>Will we ever get compensated for the wasted engineering time to stop these attacks? probably not, but if the police ever finds them and they have extra logs of companies that reported issues, its likely an aggravation of the case.</p>
]]></description><pubDate>Wed, 14 Dec 2022 20:48:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=33990309</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=33990309</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33990309</guid></item><item><title><![CDATA[New comment by slothsarecool in "NopeCHA: Captcha Solver"]]></title><description><![CDATA[
<p>This is what hCaptcha is currently doing, they are switching the image category every 24-72 hours.
How useful is it? Not very. Modern ML models such as mobilenet, resnet or yolo require only a few hundred images for it to be accurate to solve those captchas.<p>You don't need few million samples, with 500-700 images per category you are more than ready to solve current captchas.</p>
]]></description><pubDate>Mon, 28 Nov 2022 03:53:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=33769652</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=33769652</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33769652</guid></item><item><title><![CDATA[New comment by slothsarecool in "NopeCHA: Captcha Solver"]]></title><description><![CDATA[
<p>However, that's not a solution but a patch.<p>Google accounts give you a good score and tend to deliver easy captchas while dealing with Recaptcha; however, for this reason, google accounts are being sold and bought constantly.<p>People have tried similar fight tactics in the past. SMS and phone verification have failed because the return on investment is far greater than the price barrier it adds to get any of those "virtual identities".<p>iPhones might work but then, for how long? If you guarantee that an IPhone won't get captchas, it's a good investment to buy many old(or new) ones and sell token access to skip any captcha.<p>Many farms already have thousands of phones scrolling through youtube videos to get views, likes, and other stats for videos/channels.<p>The same "logic" applies to yubikeys and similar auth hardware; attackers can exploit it similarly.<p>Companies will tell you that they have abuse policies and actively fight abuse/bot farms, but again, they are not solving a problem but solving the problem with tape.<p>ReCAPTCHA was very useful for a while, it did genuinely stop bots reasonably well, but none of the "newer" versions seem as efficient as the older versions used to be. Progress stopped after V2.</p>
]]></description><pubDate>Mon, 28 Nov 2022 03:15:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=33769434</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=33769434</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33769434</guid></item><item><title><![CDATA[New comment by slothsarecool in "NopeCHA: Captcha Solver"]]></title><description><![CDATA[
<p>Ever since ML has reached the "general public", developing models against hearing or vision based CAPTCHAS has become trivial.<p>Sure, you have to emulate or simulate the client JS challenges but when bots are running browsers in the background you can only do so much.<p>I wonder what the future of captchas, if any, will look like.</p>
]]></description><pubDate>Mon, 28 Nov 2022 01:47:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=33768932</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=33768932</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33768932</guid></item><item><title><![CDATA[New comment by slothsarecool in "Cloudflare servers don't own IPs anymore so how do they connect to the internet?"]]></title><description><![CDATA[
<p>You do not get attacked from Cloudflare with TCP attacks. Somebody is spoofing the IP header and make it seem like Cloudflare is DDoSing you.<p>The only way for somebody to DDoS from Cloudflare would be using workers, however, this isn't practical as workers have a very limited IP Range.</p>
]]></description><pubDate>Fri, 25 Nov 2022 20:45:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=33746567</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=33746567</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33746567</guid></item><item><title><![CDATA[New comment by slothsarecool in "Workerd: Open-source Cloudflare workers runtime"]]></title><description><![CDATA[
<p>Adding raw TCP is a big deal, it skips all the existing security stack that focuses on HTTP/S.
There is Spectrum and Transit to provide network level protection but... only a few can afford that.<p>Does this mean that TCP workers would be exposed to network level attacks or would it use transit/spectrum?
If it turns out to be protected; I'd say there would be little to no reason to use Spectrum unless the pricing turns out to be atrocious for long lived connections (which is kind of the point of having TCP workers in the first place).<p>I hope I did not come out as rude; I'm genuinely curious about what's the plan behind all of this.<p>Edit: I pointed out there would be no use for spectrum since one could "easily" build a reverse proxy with a tcp worker.</p>
]]></description><pubDate>Wed, 28 Sep 2022 00:36:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=33002962</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=33002962</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33002962</guid></item><item><title><![CDATA[New comment by slothsarecool in "Blocking Kiwifarms"]]></title><description><![CDATA[
<p>Just adding some light to the escalations; there were bomb and shoot threats over the last few days.
The userbase on the site upped the tone of their "jokes"/threats after the last blog post and thats what caused the final suspension.</p>
]]></description><pubDate>Sat, 03 Sep 2022 22:55:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=32707149</link><dc:creator>slothsarecool</dc:creator><comments>https://news.ycombinator.com/item?id=32707149</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32707149</guid></item></channel></rss>