@cR0w @buherator The simple "no need to assume malice" answer is that they didn't mention whether they were using hashes because they assumed their audience assumes they aren't idiots.
But your meta-point, that we don't know for sure unless there's some independent third-party audit of their internal practices, stands. This post suggests they have received third-party audits, but I'm not nearly familiar enough with the standards to tell at-a-glance whether they should give some assurance that this was done by, say, putting together an audit script to run in their data warehouse without any human having the ability to touch the raw passwords... or slurping a bunch of passwords to someone's workstation and running haveibeenpwned database dumps across all of them.
@buherator @cR0w Whether it should have been flagged by PR is, I think, a question of target audience. I can see a Schrodinger's PR Agent here that either asks them to add something about hashing to assuage the tech-savvy crowd... Or asked them to remove some detail about hashing because the target audience isn't the tech-savvy crowd, it's the kind of people who reuse passwords across services, and they don't even know what a "hash" is.
I'm not assuming malice. I'm simply not assuming legitimacy.
Ah, I see where you're coming from. I missed the distinction because since they're a network connectivity and security provider, I didn't see daylight between malice and illegitimate (equivalent outcomes).
But assuming that they didn't mention due care because "they assumed their audience assumes they aren't idiots" is quite an assumption in itself.
An alternative hypothesis is the target audience for this post isn't the people who care whether they did the analysis using hashed passwords in a humans-not-accessing-directly data lake or plaintext on someone's desktop; it's the kind of people who reuse passwords and don't even know what a "data lake" or a "hash" are.
@cR0w I dunno, 24.03 million websites seem to disagree. 🤷
@cR0w I'll drink to that.
Personally, what I'd love is a better option. I'm not thrilled about using a reverse proxy through someone else's permanent anchor to "the real internet" to host services from machines in my house. But I've tried alternative solutions for anything even vaguely approximating a secure connection (without risking, in general, exposing my intranet to attackers), and... It's kinda a hellscape out there?
Cloudflare is providing a hell of a convenient service that it'd be nice if someone else could provide without doing what Cloudflare does. I fear the architecture of the Internet herself somewhat precludes it.
@cR0w But then I'd have to pay more than $0, right?
@cR0w Actually, $3.50 / month is low enough to make me consider it. I was estimating from what it would take to spin up a proxy in a cloud provider like AWS or Google and that was coming out to something closer to $20 (with a risk of being real expensive if I eff up the config and somehow slam the instance to 100% CPU for all the time it's up).
@cy @cR0w Me personally, I'm not using it because I'm concerned about attackers. I'm using it because it lets me put a pinhole into my outward-facing firewall that accepts only one kind of traffic at the application level which, by default, doesn't even expose my IP address to the outside world (traceroutes stop at Cloudflare's network), and if my service provider changes my IP assignment, the reverse IP will self-heal.
you'd want the equivalent of mafia insurance, giving up 100% of your intranet's security
Here's the thing about big companies: they're also big targets for regulation. The larger the company, the more I can trust that if they do something truly disastrous, the government will care enough to come down on them like bricks (and if the government doesn't, shareholders or customers fleeing will make it financially painful enough that they have a reason to not drop the ball).
There should be a someone's law about this. It's like Too Big To Fail but for infra providers.
a pinhole into my outward-facing firewall that accepts only one kind of traffic at the application level which, by default, doesn't even expose my IP addressSounds like a VPS or VPN to me. Except those won't make you break your encryption for them.
@buherator do we take it that paid plans do *not* include this "feature" then?