Archive by Author

CloudFlare Publishes Transparency Report for 2013

On January 27, the Department of Justice and the Director of National Intelligence announced a change in rules governing the disclosure of National Security Orders, affording slightly more latitude in how companies could report the number of National Security Orders which they had received. Within several hours, CloudFlare presented its initial Transparency Report on National […]

Fighting back responsibly

Today on The Day We Fight Back, companies are coming together to protest the NSA’s mass surveillance programs. CloudFlare is proud to be one of those companies. We are taking a stand and proclaiming that “we will push back against powers that seek to observe, collect, and analyze our every digital action.” Set Boundaries with […]

Participate in the Day We Fight Back with One Click

At CloudFlare, we’re fiercely committed to an open internet. That’s why we’re announcing a new app that lets you easily add to your website a banner from The Day We Fight Back. The DayWeFightBack.org has organized a protest against mass surveillance set for Tuesday, February 11th. The banner that your visitors would see urges them […]

CloudFlare DNS is simple, fast and flexible

Over the past few years, the CloudFlare blog has covered a great range of different topics, drilling down into the technology we use to both protect websites from attack, and optimise them so that they load faster for visitors. One thing we haven’t spent enough time talking about so far though also happens to be […]

Killing RC4 (softly)

Back in 2011, the BEAST attack on the cipher block chaining (CBC) encryption mode used in TLS v1.0 was demonstrated. At the time the advice of experts (including our own) was to prioritize the use of RC4-based cipher suites. The BEAST vulnerability itself had already been fixed in TLS v1.1 a few years before, but […]

How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer

There has been a lot of news lately about nefarious-sounding backdoors being inserted into cryptographic standards and toolkits. One algorithm, a pseudo-random bit generator, Dual_EC_DRBG, was ratified by the National Institute of Standards and Technology (NIST) in 2007 and is attracting a lot of attention for having a potential backdoor. This is the algorithm into […]