
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 09:39:02 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Community Update: empowering startups building on Cloudflare and creating an inclusive community]]></title>
            <link>https://blog.cloudflare.com/2024-community-update/</link>
            <pubDate>Fri, 05 Apr 2024 13:00:04 GMT</pubDate>
            <description><![CDATA[ We’re excited to close out Developer Week by sharing updates on our Workers Launchpad program, our latest Developer Challenge, and the work we’re doing to ensure our community spaces – like our Discord and Community forums – are safe and inclusive for all developers ]]></description>
            <content:encoded><![CDATA[ <p></p><p>With millions of developers around the world building on Cloudflare, we are constantly inspired by what you all are building with us. Every Developer Week, we’re excited to get your hands on new products and features that can help you be more productive, and creative, with what you’re building. But we know our job doesn’t end when we put new products and features in your hands during Developer Week. We also need to cultivate welcoming community spaces where you can come get help, share what you’re building, and meet other developers building with Cloudflare.</p><p>We’re excited to close out Developer Week by sharing updates on our Workers Launchpad program, our latest Developer Challenge, and the work we’re doing to ensure our community spaces – like our Discord and Community forums – are safe and inclusive for all developers.</p>
    <div>
      <h3>Helping startups go further with Workers Launchpad</h3>
      <a href="#helping-startups-go-further-with-workers-launchpad">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3o4VVoNQNo8wsyIhpDVu8Y/a102faa451bd9cc03e88f850f66bbe2e/image2-13.png" />
            
            </figure><p>In late 2022, we initiated the <a href="https://www.businesswire.com/news/home/20221117005263/en/Cloudflare%E2%80%99s-%E2%80%9CWorkers-Launchpad%E2%80%9D-Funding-Program-Grows-to-2-Billion-Announces-First-Cohort-of-Startups">$2 billion Workers Launchpad Funding Program</a> aimed at aiding the more than one million developers who use Cloudflare's Developer Platform. This initiative particularly benefits startups that are investing in building on Cloudflare to propel their business growth.</p><p>The Workers Launchpad Program offers a variety of resources to help builders scale faster and reach more customers. The program includes, but is not limited to:</p><ul><li><p>Fostering a community of like-minded founders</p></li><li><p>Facilitating introductions to the Launchpad’s VC partner network of 40+ leading investors</p></li><li><p>Company-building support and mentorship through virtual Founders Bootcamp sessions</p></li><li><p>Organizing technical office hours with our engineers</p></li><li><p>Access to preview upcoming Cloudflare products and Product Managers</p></li><li><p>Culminating in a Demo Day, for participants to share their stories globally with investors and prospective customers.</p></li></ul><p>So far, 50 amazing startups from 13 countries have successfully graduated from the Workers Launchpad program. We finished up <a href="https://cloudflare.tv/shows/workers-launchpad-demo-day/workers-launchpad-demo-day-cohort-1/5ZnnPRZA">Cohort #1</a> in March 2023, and <a href="https://cloudflare.tv/shows/workers-launchpad-demo-day/workers-launchpad-demo-day-cohort-2/3vVqLOgq">Cohort #2</a> wrapped up August 2023.</p>
    <div>
      <h3>Meet Cohort #3 of the Workers Launchpad!</h3>
      <a href="#meet-cohort-3-of-the-workers-launchpad">
        
      </a>
    </div>
    <p>Since the end of Cohort #2, we have received hundreds of new applications from startups across the globe. Startup applicants showcased incredible tools and software across a variety of industries, including AI, SaaS, Supply Chain, Media, Gaming, Hospitality, and Developer Productivity. While we were encouraged by this wave of applicants' ability to build amazing technology, there were a few that stood out that are leveraging Cloudflare’s Developer Suite to scale their business.</p><p>With that being said, we would like to introduce you to the <b>29</b> startups that have been chosen to participate in Cohort #3 of Workers Launchpad:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22LQ03omUvMEgQUGjtWzjw/7ebdcad1968f750fd021beb7e5cf7b76/image4-9.png" />
            
            </figure><p>Below, you will find a brief summary of what problems these startups are looking to solve:</p>
<table>
  <tr>
    <td><a href="https://www.autoblocks.ai/"><span>Autoblocks AI</span></a></td>
    <td><span>Evaluation &amp; testing platform to improve AI product quality.</span></td>
  </tr>
  <tr>
    <td><a href="https://www.massluminosity.com/"><span>BEAM (by Mass Luminosity)</span></a></td>
    <td><span>A next-gen live streaming platform that elevates creator-viewer interactions to the next level.</span></td>
  </tr>
  <tr>
    <td><a href="https://bentoml.com/"><span>BentoML</span></a></td>
    <td><span>Run any AI model in your cloud.</span></td>
  </tr>
  <tr>
    <td><a href="https://bohr.io/"><span>bohr.io</span></a></td>
    <td><span>An easy and fast development platform.</span></td>
  </tr>
  <tr>
    <td><a href="https://cleverev.net/"><span>CleverEV</span></a></td>
    <td><span>Manage EV charging infrastructure and experience for clients.</span></td>
  </tr>
  <tr>
    <td><a href="https://cloneable.ai/"><span>Cloneable</span></a></td>
    <td><span>Provides low/no-code tools to build and deploy applications to any device, instantly.</span></td>
  </tr>
    <tr>
    <td><a href="https://diaflow.io/"><span>Diaflow (by Toothless)</span></a></td>
    <td><span>Build GenAI-powered workflow automation and internal tools in minutes.</span></td>
  </tr>  
    <tr>
    <td><a href="https://dulia.io/"><span>Dulia</span></a></td>
    <td><span>Managed edge powered serverless AI platform.</span></td>
  </tr>
  <tr>
    <td><a href="https://erxes.io/"><span>Erxes</span></a></td>
    <td><span>Open-source experience operating system empowering businesses.</span></td>
  </tr>
  <tr>
    <td><a href="https://exporio.cloud/"><span>Exporio</span></a></td>
    <td><span>AI-first A/B testing and personalization platform.</span></td>
  </tr>
  <tr>
    <td><a href="https://helicone.ai/"><span>Helicone</span></a></td>
    <td><span>GenAI observability platform built for developers.</span></td>
  </tr>
  <tr>
    <td><a href="https://www.houdinigraphql.com/"><span>Houdini</span></a></td>
    <td><span>An end-to-end solution for building and deploying GraphQL applications.</span></td>
  </tr>
  <tr>
    <td><a href="https://intelligage.io/"><span>Intelligage</span></a></td>
    <td><span>Humanize your AI for customers.</span></td>
  </tr>
  <tr>
    <td><a href="http://langbase.com/"><span>Langbase</span></a></td>
    <td><span>Ship hyper-personalized AI apps in seconds — any LLM, any data, any developer.</span></td>
  </tr>
  <tr>
    <td><a href="https://milkshake.app/"><span>Milkshake</span></a></td>
    <td><span>Create websites via mobile within minutes.</span></td>
  </tr>
  <tr>
    <td><a href="https://nadrama.com/"><span>Nadrama</span></a></td>
    <td><span>Kubernetes PaaS in your cloud account, in minutes.</span></td>
  </tr>
  <tr>
    <td><span><a href="https://hub.nuxt.com"><span>NuxtHub</span></a> (by </span><a href="http://nuxtlabs.com/"><span>NuxtLabs</span></a><span>)</span></td>
    <td><span>Build full-stack applications on Cloudflare with zero configuration.</span></td>
  </tr>
  <tr>
    <td><a href="https://www.panaptico.com/"><span>Panaptico</span></a></td>
    <td><span>High performance networking fabrics for specialized workloads.</span></td>
  </tr>
  <tr>
    <td><a href="https://www.joinplayroom.com/"><span>Playroom</span></a></td>
    <td><span>Platform for game developers to build multiplayer games in minutes.</span></td>
  </tr>
  <tr>
    <td><a href="https://puzzlelabs.ai/"><span>Puzzle Labs</span></a></td>
    <td><span>P2P, prompt-first knowledge base for teams to collaborate with AI.</span></td>
  </tr>
  <tr>
    <td><a href="https://resilis.io/"><span>Resilis</span></a></td>
    <td><span>Intelligent edge caching for REST APIs.</span></td>
  </tr>
  <tr>
    <td><a href="https://scrappi.com/"><span>Scrappi</span></a></td>
    <td><span>A better way to collect, create and collaborate.</span></td>
  </tr>
  <tr>
    <td><a href="https://starlightlabs.co/"><span>Starlight Labs</span></a></td>
    <td><span>AI native game studio.</span></td>
  </tr>
  <tr>
    <td><a href="https://t4stack.com/"><span>T4 Stack</span></a></td>
    <td><span>Ship feature parity on universal apps.</span></td>
  </tr>
  <tr>
    <td><a href="https://textcortext.com/"><span>TextCortex AI</span></a></td>
    <td><span>AI copilot platform to leverage the power of easy customization and integration.</span></td>
  </tr>
  <tr>
    <td><a href="https://unfetch.com/"><span>Unfetch</span></a></td>
    <td><span>Generate and run scripts with AI to complete tasks within seconds.</span></td>
  </tr>
  <tr>
    <td><a href="https://unkey.dev/"><span>Unkey</span></a></td>
    <td><span>Redefines API management for developers. Add authentication, analytics, and rate-limiting to your APIs in minutes.</span></td>
  </tr>
  <tr>
    <td><a href="https://unnug.com/"><span>Unnug</span></a></td>
    <td><span>Transformative cloud compiler with an emphasis on user on-premises, cloud, and edge resources.</span></td>
  </tr>
  <tr>
    <td><a href="https://wope.com/"><span>Wope</span></a></td>
    <td><span>AI-powered marketing agent that leverages Gen AI to optimize businesses' online presence and drive more traffic.</span></td>
  </tr>
</table><p>The Cloudflare team is looking forward to working with Cohort #3 participants and sharing what they are building on Cloudflare. To follow along with Cohort #3 of Workers Launchpad, follow <a href="https://twitter.com/CloudflareDev">@CloudflareDev</a> and join our <a href="https://discord.cloudflare.com/">Developer Discord</a> server.</p><p>Are you a startup and interested in joining Cohort #4? Apply <a href="https://cfl.re/launchpad">here</a>!</p>
    <div>
      <h3>AI developer challenge</h3>
      <a href="#ai-developer-challenge">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6uJzbIHQKIDkfxkvADC3WU/5ffa47dc2a72eb3f82d67b435c9a88ae/image3-10.png" />
            
            </figure><p>Now that <a href="/workers-ai-ga-huggingface-loras-python-support">Workers AI is GA</a>, we’re excited to see what our community can build.  We’ve teamed up with our friends at DEV who will be running an <a href="https://dev.to/devteam/join-us-for-the-cloudflare-ai-challenge-3000-in-prizes-5f99">AI Developer challenge</a>, which officially launched on Wednesday, April 3, and runs until Sunday, April 14, 2024, when submissions close.</p><p>For this challenge, you will build a Workers AI application that makes use of AI task types from Cloudflare’s growing catalog of <a href="https://developers.cloudflare.com/workers-ai/models/">Open Models</a>. Apps will be evaluated on innovation, creativity, and demonstration of underlying technology with prizes awarded by DEV for the best overall app, as well as projects leveraging multiple models and tasks. For more information and details on how to participate, including DEV’s rules and requirements, head over to the <a href="https://dev.to/challenges/cloudflare">official challenge page</a>.</p>
    <div>
      <h3>Creating an inclusive community</h3>
      <a href="#creating-an-inclusive-community">
        
      </a>
    </div>
    <p>Our community has been growing really fast over the past year, so fast that it’s becoming more difficult to welcome each new member that joins our Discord server every day, and Developer Week has always been one of the main drivers of this growth.</p><p>When you come into the Cloudflare developer community, it’s important to us that you’re entering a space that is safe and welcoming. Even though we already have rules for the server and community forums, we needed guidelines for our community programs, so that’s why we’ve created a new <a href="https://community.cloudflare.com/t/cloudflare-community-programs-code-of-conduct/637702">Code of Conduct</a> that promotes inclusivity, respect, and will help us create a better community for everyone.</p><p>Do you want to be part of this and help us create a more inclusive and helpful community? Then please share your feedback and tell us what you would like to see improved in our community and our Discord server in this <a href="https://discord.com/channels/595317990191398933/1224816612423766097">thread</a>.</p> ]]></content:encoded>
            <category><![CDATA[Developer Week]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">1SjE8JApK53MLw5DsSpr2O</guid>
            <dc:creator>Ricky Robinett</dc:creator>
            <dc:creator>Veronica Marin</dc:creator>
            <dc:creator>Christopher Rotas</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Community Group for Web-interoperable JavaScript runtimes]]></title>
            <link>https://blog.cloudflare.com/introducing-the-wintercg/</link>
            <pubDate>Mon, 09 May 2022 13:00:27 GMT</pubDate>
            <description><![CDATA[ The Web-interoperable Runtimes Community Group is a new effort that brings contributors from Cloudflare Workers, Deno, and Node.js together to collaborate on common Web platform API standards. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, Cloudflare – in partnership with Vercel, Shopify, and individual core contributors to both <a href="https://nodejs.org">Node.js</a> and <a href="https://deno.land">Deno</a> – is announcing the establishment of a new <a href="https://www.w3.org/community/wintercg/">Community Group</a> focused on the interoperable implementation of standardized <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">web APIs</a> in non-web browser, JavaScript-based development environments.</p><p>The <a href="https://w3.org">W3C</a> and the <a href="https://whatwg.org/">Web Hypertext Application Technology Working Group</a> (or WHATWG) have long pioneered the efforts to develop standardized APIs and features for the web as a development environment. APIs such as <a href="https://fetch.spec.whatwg.org/">fetch()</a>, <a href="https://streams.spec.whatwg.org/">ReadableStream and WritableStream</a>, <a href="https://url.spec.whatwg.org/">URL</a>, <a href="https://wicg.github.io/urlpattern">URLPattern</a>, <a href="https://encoding.spec.whatwg.org/">TextEncoder</a>, and more have become ubiquitous and valuable components of modern web development. However, the charters of these existing groups have always been <a href="https://whatwg.org/faq#what-is-the-whatwg-working-on">explicitly limited to</a> considering only the specific needs of web browsers, resulting in the development of standards that are not readily optimized for any environment that does not look exactly like a web browser. A good example of this effect is that some non-browser implementations of the <a href="https://streams.spec.whatwg.org/">Streams standard</a> are an order of magnitude <a href="https://github.com/nodejs/undici/issues/1203"><i>slower</i></a> than the equivalent Node.js streams and Deno reader implementations due largely to how the API is specified in the standard.</p><p>Serverless environments such as <a href="https://workers.cloudflare.com/">Cloudflare Workers</a>, or runtimes like Node.js and Deno, have a broad wide range of requirements, issues, and concerns that are simply not relevant to web browsers, and vice versa. This disconnect and the lack of clear consideration of these differences while the various specifications have been developed, has led to a situation where the non-browser runtimes have implemented their own bespoke, ad-hoc solutions for functionality that is actually common across the environments.</p><p>This new effort is changing that by providing a venue to discuss and advocate for the common requirements of <i>all</i> web environments, deployed anywhere throughout the stack.</p>
    <div>
      <h2>What's in it for developers?</h2>
      <a href="#whats-in-it-for-developers">
        
      </a>
    </div>
    <p>Developers want their code to be portable. Once they write it, if they choose to move to a different environment (from Node.js to Deno, for instance) they don't want to have to completely <i>rewrite</i> it just to make it keep doing the exact same thing it already was.</p><p>One of the more common questions we get from Cloudflare users is how they can make use of some arbitrary module published to <a href="https://npmjs.org">npm</a> that makes use of some set of Node.js-specific or Deno-specific APIs. The answer usually involves pulling in some arbitrary combination of polyfill implementations. The situation is similar with the Deno project, which has opted to integrate a polyfill of the full Node.js core API directly into their standard library. The more these environments implement the same common standards, the more the developer ecosystem can depend on the code they write just working, regardless of where it is being run.</p><p>Cloudflare Workers, Node.js, Deno, and web browsers are all very different from each other, but they share a good number of common functions. For instance, they all provide APIs for generating cryptographic hashes; they all deal in some way with streaming data; they all provide the ability to send an HTTP request somewhere. Where this overlap exists, and where the requirements and functionality are the same, the environments should all implement the same standardized mechanisms.</p>
    <div>
      <h2>The Web-interoperable Runtimes Community Group</h2>
      <a href="#the-web-interoperable-runtimes-community-group">
        
      </a>
    </div>
    <p>The new <a href="https://github.com/wintercg">Web-interoperable Runtimes Community Group</a> (or "WinterCG") operates under the established processes of the <a href="https://www.w3.org/community/about/">W3C</a>.</p><p>The naming of this group is something that took us a while to settle on because it is critical to understand the goals the group is trying to achieve (and what it is <i>not</i>). The key element is the phrase "web-interoperable".</p><p>We use "web" in exactly the same sense that the W3C and WHATWG communities use the term – precisely: <i>web browsers</i>. The term "web-interoperable", then, means implementing features in a manner that is <i>either identical or at least as consistent as possible</i> with the way those features are implemented in web browsers. For instance, the way that the new URL() constructor works in browsers is exactly how the new URL() constructor should work in Node.js, in Deno, and in Cloudflare Workers.</p><p>It is important, however, to acknowledge the fact that Node.js, Deno, and Cloudflare Workers are explicitly <b>not</b> web browsers. While this point should be obvious, it is important to call out because the differences between the various JavaScript environments can greatly impact the design decisions of standardized APIs. Node.js and Deno, for instance, each provide full access to the local file system. Cloudflare Workers, in contrast, has no local file system; and web browsers necessarily restrict applications from manipulating the local file system. Likewise, while web browsers inherently include a concept of a website's "origin" and implement mechanisms such as <a href="https://fetch.spec.whatwg.org/#http-cors-protocol">CORS</a> to protect users against a variety of security threats, there is no equivalent concept of "origins" on the server-side where Node.js, Deno, and Cloudflare Workers operate.</p><p>Up to now, the W3C and WHATWG have concerned themselves strictly with the needs of web browsers. The new Web-interoperable Runtimes Community Group is explicitly addressing and advocating for the needs of everyone else.</p><p>It is not intended that WinterCG will go off and publish its own set of independent standard APIs. Ideas for new specifications that emerge from WinterCG will first be submitted for consideration by existing work streams in the W3C and WHATWG with the goal of gaining the broadest possible consensus. However, should it become clear that web browsers have no particular need for, or interest in, a feature that the other environments (such as Cloudflare Workers) have need for, WinterCG will be empowered to move forward with a specification of its own – with the constraint that nothing will be introduced that intentionally conflicts with or is incompatible with the established web standards.</p><p>WinterCG will be open for anyone to participate; it will operate under the established W3C processes and policies; all work will be openly accessible via the <a href="https://github.com/wintercg">"wintercg" GitHub organization</a>; and everything it does will be centered on the goal of maximizing interoperability.</p>
    <div>
      <h2>Work in Progress</h2>
      <a href="#work-in-progress">
        
      </a>
    </div>
    <p>WinterCG has already started work on a number of important work items.</p>
    <div>
      <h3>The Minimum Common Web API</h3>
      <a href="#the-minimum-common-web-api">
        
      </a>
    </div>
    <p>From the introduction in the current <a href="https://github.com/wintercg/proposal-common-minimum-api">draft of the specification</a>:</p><blockquote><p>"The Minimum Common Web Platform API is a curated subset of standardized web platform APIs intended to define a minimum set of capabilities common to Browser and Non-Browser JavaScript-based runtime environments."</p></blockquote><p>Or put another way: It is a minimal set of <i>existing</i> web APIs that will be implemented consistently and correctly in Node.js, Deno, and Cloudflare Workers. Most of the APIs, with some exceptions and nuances, already exist in these environments, so the bulk of the work remaining is to ensure that those implementations are conformant to their relative specifications and portable across environments.</p><p>The table below lists all the APIs currently included in this subset (along with an indication of whether the API is currently or likely soon to be supported by Node.js, Deno, and Cloudflare Workers):</p><table><tr><td><p></p></td><td><p><b>Node.js</b></p></td><td><p><b>Deno</b></p></td><td><p><b>Cloudflare Workers</b></p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://dom.spec.whatwg.org/#abortcontroller">AbortController</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://dom.spec.whatwg.org/#abortsignal">AbortSignal</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#bytelengthqueuingstrategy">ByteLengthQueueingStrategy</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://wicg.github.io/compression/#compression-stream">CompressionStream</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#countqueuingstrategy">CountQueueingStrategy</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://w3c.github.io/webcrypto/#dfn-Crypto">Crypto</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://w3c.github.io/webcrypto/#dfn-CryptoKey">CryptoKey</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://wicg.github.io/compression/#decompression-stream">DecompressionStream</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://webidl.spec.whatwg.org/#idl-DOMException">DOMException</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://dom.spec.whatwg.org/#event">Event</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://dom.spec.whatwg.org/#eventtarget">EventTarget</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#readablebytestreamcontroller">ReadableByteStreamController</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#readablestream">ReadableStream</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#readablestreambyobreader">ReadableStreamBYOBReader</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#readablestreambyobrequest">ReadableStreamBYOBRequest</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#readablestreamdefaultcontroller">ReadableStreamDefaultController</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#readablestreamdefaultreader">ReadableStreamDefaultReader</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://w3c.github.io/webcrypto/#dfn-SubtleCrypto">SubtleCrypto</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://encoding.spec.whatwg.org/#textdecoder">TextDecoder</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://encoding.spec.whatwg.org/#textdecoderstream">TextDecoderStream</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>(soon)</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://encoding.spec.whatwg.org/#textencoder">TextEncoder</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://encoding.spec.whatwg.org/#textencoderstream">TextEncoderStream</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p></p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#transformstream">TransformStream</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#transformstreamdefaultcontroller">TransformStreamDefaultController</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>(soon)</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://url.spec.whatwg.org/#url">URL</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://wicg.github.io/urlpattern/#urlpattern-class">URLPattern</a></p></td><td><p>?</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://url.spec.whatwg.org/#urlsearchparams">URLSearchParams</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#writablestream">WritableStream</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p><a href="http://web.archive.org/web/20230801055012/https://streams.spec.whatwg.org/#writablestreamdefaultcontroller">WritableStreamDefaultController</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p>globalThis.<a href="http://web.archive.org/web/20230801055012/https://html.spec.whatwg.org/multipage/window-object.html#dom-self">self</a></p></td><td><p>?</p></td><td><p>✔️</p></td><td><p>(soon)</p></td></tr><tr><td><p>globalThis.<a href="http://web.archive.org/web/20230801055012/https://html.spec.whatwg.org/multipage/webappapis.html#dom-atob">atob()</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p>globalThis.<a href="http://web.archive.org/web/20230801055012/https://html.spec.whatwg.org/multipage/webappapis.html#dom-btoa">btoa()</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p>globalThis.<a href="http://web.archive.org/web/20230801055012/https://console.spec.whatwg.org/#namespacedef-console">console</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p>globalThis.<a href="http://web.archive.org/web/20230801055012/https://w3c.github.io/webcrypto/#dom-windoworworkerglobalscope-crypto">crypto</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p>globalThis.navigator.<a href="http://web.archive.org/web/20230801055012/https://html.spec.whatwg.org/multipage/system-state.html#dom-navigator-useragent">userAgent</a></p></td><td><p>?</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p>globalThis.<a href="http://web.archive.org/web/20230801055012/https://html.spec.whatwg.org/multipage/timers-and-user-prompts.html#dom-queuemicrotask">queueMicrotask()</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p>globalThis.<a href="http://web.archive.org/web/20230801055012/https://html.spec.whatwg.org/multipage/timers-and-user-prompts.html#dom-settimeout">setTimeout()</a>/ globalthis.<a href="http://web.archive.org/web/20230801055012/https://html.spec.whatwg.org/multipage/timers-and-user-prompts.html#dom-cleartimeout">clearTimeout()</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p>globalThis.<a href="http://web.archive.org/web/20230801055012/https://html.spec.whatwg.org/multipage/timers-and-user-prompts.html#dom-setinterval">setInterval()</a>/ globalThis.<a href="http://web.archive.org/web/20230801055012/https://html.spec.whatwg.org/multipage/timers-and-user-prompts.html#dom-clearinterval">clearInterval()</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr><tr><td><p>globalThis.</p><p><a href="http://web.archive.org/web/20230801055012/https://html.spec.whatwg.org/multipage/structured-data.html#dom-structuredclone">structuredClone()</a></p></td><td><p>✔️</p></td><td><p>✔️</p></td><td><p>✔️</p></td></tr></table><p>Whenever one of the environments diverges from the standardized definition of the API (such as Node.js implementation of setTimeout() and setInterval()), clear documentation describing the differences will be made available. Such differences should only exist for backwards compatibility with existing code.</p>
    <div>
      <h3>Web Cryptography Streams</h3>
      <a href="#web-cryptography-streams">
        
      </a>
    </div>
    <p>The <a href="https://www.w3.org/TR/WebCryptoAPI/">Web Cryptography API</a> provides a minimal (and very <i>limited</i>) APIs for  common cryptography operations. One of its key limitations is the fact that – unlike Node.js' <a href="https://nodejs.org/dist/latest-v18.x/docs/api/crypto.html">built-in crypto module</a> – it does not have any support for streaming inputs and outputs to symmetric cryptographic algorithms. All Web Cryptography features operate on chunks of data held in memory, all at once. This strictly limits the performance and scalability of cryptographic operations. Using these APIs in any environment that is not a web browser, and trying to make them perform well, quickly becomes painful.</p><p>To address that issue, WinterCG has started <a href="https://github.com/wintercg/proposal-webcrypto-streams">drafting a new specification for Web Crypto Streams</a> that will be submitted to the W3C for consideration as part of a larger effort currently being bootstrapped by the W3C to update the Web Cryptography specification. The goal is to bring streaming crypto operations to the whole of the web, including web browsers, in a way that conforms with existing standards.</p>
    <div>
      <h3>A subset of fetch() for servers</h3>
      <a href="#a-subset-of-fetch-for-servers">
        
      </a>
    </div>
    <p>With the recent release of version 18.0.0, <a href="https://nodejs.org/dist/latest-v18.x/docs/api/globals.html#fetch">Node.js has joined</a> the collection of JavaScript environments that provide an implementation of the WHATWG standardized fetch() API. There are, however, a number of important differences between the way Node.js, Deno, and Cloudflare Workers implement fetch() versus the way it is implemented in web browsers.</p><p>For one, server environments do not have a concept of "origin" like a web browser does. Features such as CORS intended to protect against cross-site scripting vulnerabilities are simply irrelevant on the server. Likewise, where web browsers are generally used by one individual user at a time and have a concept of a globally-scoped cookie store, server and serverless applications can be used by millions of users simultaneously and a globally-scoped cookie store that potentially contains session and authentication details would be both impractical and dangerous.</p><p>Because of the acute differences in the environments, it is often difficult to reason about, and gain consensus on, proposed changes in the fetch standard. Some proposed new API, for instance, might be fantastically relevant to fetch users on a server but completely useless to fetch users in a web browser. Some set of security concerns that are relevant to the Browser might have no impact whatsoever on the server.</p><p>To address this issue, and to make it easier for non-web browser environments to implement fetch consistently, WinterCG is <a href="http://web.archive.org/web/20230801055012/https://github.com/wintercg/fetch">working on documenting a subset of the fetch</a> standard that deals specifically with those different requirements and constraints.</p><p>Critically, this subset will be fully compatible with the fetch standard; and is being cooperatively developed by the same folks who have worked on fetch in Node.js, Deno, and Cloudflare Workers. It is not intended that this will become a competing definition of the fetch standard, but rather a set of documented guidelines on how to implement fetch correctly in these other environments.</p>
    <div>
      <h2>We're just getting started</h2>
      <a href="#were-just-getting-started">
        
      </a>
    </div>
    <p>The Web-interoperable Runtimes Community Group is just getting started, and we have a number of ambitious goals. Participation is open to everyone, and all work will be done in the open via GitHub at <a href="https://github.com/wintercg">https://github.com/wintercg</a>. We are actively seeking collaboration with the W3C, the WHATWG, and the JavaScript community at large to ensure that web features are available, work consistently, and meet the requirements of all web developers working anywhere across the stack.</p><p>For more information on the WinterCG, refer to <a href="https://wintercg.org">https://wintercg.org</a>. For details on how to participate, refer to <a href="https://github.com/wintercg/admin">https://github.com/wintercg/admin</a>.</p>
    <div>
      <h3><i>Join us at Cloudflare Connect!</i></h3>
      <a href="#join-us-at-cloudflare-connect">
        
      </a>
    </div>
    <p><i>Interested in learning more about building with Cloudflare Pages? If you’re based in the New York City area, join us on Thursday, May 12th for a series of workshops on how to build a full stack application on Pages! Follow along with a fully hands-on lab featuring Pages in conjunction with other products like Workers, Images and Cloudflare Gateway, and hear directly from our product managers. </i><a href="https://events.www.cloudflare.com/flow/cloudflare/connect2022nyc/landing/page/page"><i>Register now</i></a><i>!</i></p> ]]></content:encoded>
            <category><![CDATA[Platform Week]]></category>
            <category><![CDATA[JavaScript]]></category>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Node.js]]></category>
            <category><![CDATA[Serverless]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <category><![CDATA[Developers]]></category>
            <guid isPermaLink="false">q3DlDZ0aYj6Ok5mROKeW3</guid>
            <dc:creator>James M Snell</dc:creator>
        </item>
        <item>
            <title><![CDATA[Meet The Workers Team Over Discord]]></title>
            <link>https://blog.cloudflare.com/meet-the-workers-team-over-discord/</link>
            <pubDate>Sat, 09 Jan 2021 14:00:00 GMT</pubDate>
            <description><![CDATA[ The Cloudflare Workers team is excited to announce the opening of our Discord Channel! ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The Cloudflare Workers team is excited to announce the opening of our Discord channel! You can join right away by going <a href="https://discord.com/invite/cloudflaredev">here</a>.</p><p>Through our Discord channel, you can now connect with the team to ask questions, show off what you’re building, and discuss the platform with other developers.</p><p>Sometimes you just need to talk to another human being. Our <a href="https://developers.cloudflare.com/workers/">developer docs</a> will always be the source of truth on the mechanics of Workers, but we want to provide quicker help if you need it.</p>
    <div>
      <h3>Growing The Workers Community</h3>
      <a href="#growing-the-workers-community">
        
      </a>
    </div>
    <p>Over the past three years, Cloudflare Workers evolved from an initial sandbox for enterprise customers writing edge code to a developer platform for creating new applications and systems.</p><p>“We bet our whole business on Workers and it paid off big time,” said Hamlet Batista, CEO of RankSense, a SEO automation platform. “We've been saving a lot of money on infrastructure costs and DevOps resources we no longer need.”</p><p>Our team is constantly surprised by the palette of use cases from those developing on Workers. For example, a developer in Belgium <a href="https://workers.cloudflare.com/built-with/projects/make-facemasks">created</a> a static Workers site that teaches an online tutorial in three different languages on how to make your own face mask, which earned the approval of the Belgian government.</p>
    <div>
      <h3>Why Discord?</h3>
      <a href="#why-discord">
        
      </a>
    </div>
    <p>Discord provides a medium that allows users to openly share their thoughts while maintaining anonymity. It’s also really fast — partially due to Discord’s use of Workers and Cloudflare’s network.</p><p>“Workers are in the path of virtually all Discord requests,” said Mark Smith, Director of Infrastructure at Discord. “We are longtime users of Workers and big fans of the power and flexibility they give us to continue building great things for our users.”</p><p>As we continue to build the ecosystem of developer tools, we’d love to hear what you’re building, whether it’s a personal site of your pet or an API gateway. Come <a href="https://discord.com/invite/cloudflaredev">say hi</a> today.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Serverless]]></category>
            <guid isPermaLink="false">5jadSJkfDBDXz8OFbUsPG4</guid>
            <dc:creator>Albert Zhao</dc:creator>
        </item>
        <item>
            <title><![CDATA[My living room intern experience at Cloudflare]]></title>
            <link>https://blog.cloudflare.com/my-living-room-intern-experience-at-cloudflare/</link>
            <pubDate>Mon, 03 Aug 2020 18:52:59 GMT</pubDate>
            <description><![CDATA[ For the past twelve weeks, I’ve had the pleasure of working as a Legal Intern at Cloudflare. This blogpost goes over a few key things that set this internship apart from even those in which I’ve been able to connect with people in-person. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>This was an internship unlike any other. With a backdrop of a pandemic, protests, and a puppy that interrupted just about every Zoom meeting, it was also an internship that demonstrated Cloudflare’s leadership in giving students meaningful opportunities to explore their interests and contribute to the company’s mission: to help build a better Internet.</p><p>For the past twelve weeks, I’ve had the pleasure of working as a Legal Intern at Cloudflare. A few key things set this internship apart from even those in which I’ve been able to connect with people in-person:</p><ul><li><p>Communication</p></li><li><p>Community</p></li><li><p>Commingling</p></li><li><p>Collaboration</p></li></ul><p>Ever since I formally accepted my internship, the Cloudflare team has been in frequent and thorough communication about what to expect and how to make the most of my experience. This approach to communication was in stark contrast to the approach taken by several other companies and law firms. The moment COVID-19 hit, Cloudflare not only reassured me that I’d still have a job, the company also <a href="/cloudflare-doubling-size-of-2020-summer-intern-class/">doubled down</a> on bringing on more interns. Comparatively, a bunch of my fellow law school students were left in limbo: unsure of if they had a job, the extent to which they’d be able to do it remotely, and whether it would be a worthwhile experience.</p><p>This approach has continued through the duration of the internship. I know I speak for my fellow interns when I say that we were humbled to be included in company-wide initiatives to openly communicate about the trying times our nation and particularly members of communities of color have experienced this summer. We weren’t left on the sidelines but rather invited into the fold. I’m so grateful to my manager, Jason, for clearing my schedule to participate in Cloudflare’s “Day On: Learning and Inclusion.” On June 18, the day before Juneteenth, Cloudflare employees around the world joined together for transformative and engaging sessions on how to listen, learn, participate, and take action to be better members of our communities. That day illustrated Cloudflare’s commitment to fostering communication as well as to building community and diversity.</p><p>The company’s desire to foster a sense of community pervades each team. Case in point, members of the Legal, Policy, and Trust &amp; Safety (LPT) team were ready and eager to help my fellow legal interns and me better understand the team’s mission and day-to-day activities. I went a perfect 11/11 on asks to LPT members for 1:1 Zoom meetings -- these meetings had nothing to do with a specific project but were merely meant to create a stronger community by talking with employees about how they ended up at this unique company.</p><p>From what I’ve heard from fellow interns, this sense of community was a common thread woven throughout their experiences as well. Similarly, other interns shared my appreciation for being given more than just “shadowing” opportunities. We were invited to commingle with our teammates and encouraged to take active roles in meetings and on projects.</p><p>In my own case, I got to dive into exciting research on privacy laws such as the GDPR and so much more. This research required that I do more than just be a fly on the wall, I was invited to actively converse and brief folks directly involved with making key decisions for the LPT. For instance, when Tilly came on in July as Privacy Counsel, I had the opportunity to brief her on the research I’d done related to Data Privacy Impact Assessments (DPIAs). In the same way, when Edo and Ethan identified some <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a> that likely infringed on Cloudflare’s trademark, my fellow intern, Elizabeth, and I were empowered to draft WIPO complaints per the Uniform Domain Name Dispute Resolution Policy. Fingers crossed our work continues Cloudflare’s strong record before the WIPO (<a href="https://www.wipo.int/amc/en/domains/search/text.jsp?case=DAI2019-0001">here’s an example</a> of a recent favorable division). These seemingly small tasks introduced me to a wide range of fascinating legal topics that will inform my future coursework and, possibly, even my career goals.</p><p>Finally, collaboration distinguished this internship from other opportunities. By way of example, I was assigned projects that required working with others toward a successful outcome. In particular, I was excited to work with Jocelyn and Alissa on research related to the intersection of law and public policy. This dynamic duo fielded my queries, sent me background materials, and invited me to join meetings with stakeholders. This was a very different experience from previous internships in which collaboration was confined to just an email assigning the research and a cool invite to reach out if any questions came up. At Cloudflare, I had the support of a buddy, a mentor, and my manager on all of my assignments and general questions.</p><p>When I walked out of Cloudflare’s San Francisco office back in December after my in-person interview, I was thrilled to potentially have the opportunity to return and help build a better Internet. Though I’ve yet to make it back to the office due to COVID-19 and, therefore, worked entirely remotely, this internship nevertheless allowed me and my fellow interns to advance Cloudflare’s mission.</p><p>Whatever normal looks like in the following weeks, months, and years, so long as Cloudflare prioritizes communication, community, commingling, and collaboration, I know it will be a great place to work.</p> ]]></content:encoded>
            <category><![CDATA[Internship Experience]]></category>
            <category><![CDATA[Life at Cloudflare]]></category>
            <category><![CDATA[COVID-19]]></category>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Careers]]></category>
            <guid isPermaLink="false">5Ve1F7Lx9JdKjEpF1OUfey</guid>
            <dc:creator>Kevin Frazier</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s Response to CSAM Online]]></title>
            <link>https://blog.cloudflare.com/cloudflares-response-to-csam-online/</link>
            <pubDate>Fri, 06 Dec 2019 14:06:00 GMT</pubDate>
            <description><![CDATA[ Responding to incidents of child sexual abuse material (CSAM) online has been a priority at Cloudflare from the beginning. The stories of CSAM victims are tragic, and bring to light an appalling corner of the Internet.  ]]></description>
            <content:encoded><![CDATA[ <p>Responding to incidents of child sexual abuse material (CSAM) online has been a priority at Cloudflare from the beginning. The stories of CSAM victims are tragic, and bring to light an appalling corner of the Internet. When it comes to CSAM, our position is simple: We don’t tolerate it. We abhor it. It’s a crime, and we do what we can to support the processes to identify and remove that content.</p><p>In 2010, within months of Cloudflare’s launch, we connected with the <a href="http://www.missingkids.com/">National Center for Missing and Exploited Children</a> (NCMEC) and started a collaborative process to understand our role and how we could cooperate with them. Over the years, we have been in regular communication with a number of government and advocacy groups to determine what Cloudflare should and can do to respond to reports about CSAM that we receive through our abuse process, or how we can provide information supporting investigations of websites using Cloudflare’s services.</p><p>Recently, <a href="https://twitter.com/mhkeller/status/1196818679683530752">36 tech companies</a>, including Cloudflare, received <a href="https://storage.googleapis.com/blog-cloudflare-com-assets/2019/12/senatorletter.pdf">this letter</a> from a group of U.S Senators asking for more information about how we handle CSAM content. The Senators referred to influential New York Times stories published in late September and early November that conveyed the disturbing number of images of child sexual abuse on the Internet, with graphic detail about the horrific photos and how the recirculation of imagery retraumatizes the victims. The stories focused on shortcomings and challenges in bringing violators to justice, as well as efforts, or lack thereof, by a group of tech companies including Amazon, Facebook, Google, Microsoft, and Dropbox, to eradicate as much of this material as possible through existing processes or new tools like PhotoDNA that could proactively identify CSAM material.  </p><p>We think it is important to share our response to the Senators (copied at the end of this blog post), talk publicly about what we’ve done in this space, and address what else we believe can be done.</p>
    <div>
      <h2>How Cloudflare Responds to CSAM</h2>
      <a href="#how-cloudflare-responds-to-csam">
        
      </a>
    </div>
    <p>From our work with NCMEC, we know that they are focused on doing everything they can to validate the legitimacy of CSAM reports and then work as quickly as possible to have website operators, platform moderators, or website hosts remove that content from the Internet. Even though Cloudflare is not in a position to remove content from the Internet for users of our core services, we have worked continually over the years to understand the best ways we can contribute to these efforts.</p>
    <div>
      <h3>Addressing  Reports</h3>
      <a href="#addressing-reports">
        
      </a>
    </div>
    <p>The first prong of Cloudflare’s response to CSAM is proper reporting of any allegation we receive. Every report we receive about content on a website using Cloudflare’s services filed under the “child pornography” category on our <a href="https://www.cloudflare.com/abuse/">abuse report page</a> leads to three actions:</p><ol><li><p>We forward the report to NCMEC. In addition to the content of the report made to Cloudflare, we provide NCMEC with information identifying the hosting provider of the website, contact information for that hosting provider, and the origin IP address where the content at issue can be located.</p></li><li><p>We forward the report to both the website operator and hosting provider so they can take steps to remove the content, and we provide the origin IP of where the content is located on the system so they can locate the content quickly. (Since 2017, we have given reporting parties the opportunity to file an anonymous report if they would prefer that either the host or the website operator not be informed of their identity).</p></li><li><p>We provide anyone who makes a report information about the identity of the hosting provider and contact information for the hosting provider in case they want to follow up directly.</p></li></ol><p>Since our founding, Cloudflare has forwarded 5,208 reports to NCMEC. Over the last three years, we have provided 1,111 reports in 2019 (to date), 1,417 in 2018, and 627 in 2017.  </p><p>Reports filed under the “child pornography” category account for about 0.2% of the abuse complaints Cloudflare receives. These reports are treated as the highest priority for our Trust &amp; Safety team and they are moved to the front of the abuse response queue. We are generally able to respond by filing the report with NCMEC and providing the additional information within a matter of minutes regardless of time of day or day of the week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5gldDA1mBLXQkHbABJIv9e/71dbbefd701e70d89f2a98630ee47f6d/form-fill-report_2x.png" />
            
            </figure>
    <div>
      <h3>Requests for Information</h3>
      <a href="#requests-for-information">
        
      </a>
    </div>
    <p>The second main prong of our response to CSAM is operation of our “trusted  reporter” program to provide relevant information to support the investigations of nearly 60 child safety organizations around the world. The "trusted reporter" program was established in response to our ongoing work with these organizations and their requests for both information about the hosting provider of the websites at issue as well as information about the origin IP address of the content at issue. Origin IP information, which is generally sensitive security information because it would allow hackers to circumvent certain security protections for a website, like DDoS protections, is provided to these organizations through dedicated channels on an expedited basis.</p><p>Like NCMEC, these organizations are responsible for investigating reports of CSAM on websites or hosting providers operated out of their local jurisdictions, and they seek the resources to identify and contact those parties as quickly as possible to have them remove the content. Participants in the “trusted reporter” program include groups like the <a href="https://www.iwf.org.uk/">Internet Watch Foundation</a> (IWF), the <a href="https://www.inhope.org/">INHOPE Association</a>, the <a href="https://www.esafety.gov.au/">Australian eSafety Commission</a>, and <a href="https://www.meldpunt-kinderporno.nl/">Meldpunt</a>. Over the past five years, we have responded to more than 13,000 IWF requests, and more than 5,000 requests from Meldpunt. We respond to such requests on the same day, and usually within a couple of hours. In a similar way, Cloudflare also receives and responds to law enforcement requests for information as part of investigations related to CSAM or exploitation of a minor.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7waacDQO5qvlvRoG95aGeP/5460dea950b94dfde9ebab57e74f5f50/trusted-reporter_2x.png" />
            
            </figure><p>Among this group, the Canadian Centre for Child Protection has been engaged in a unique effort that is worthy of specific mention. The Centre’s <a href="https://www.cybertip.ca/app/en/">Cybertip</a> program operates their Project Arachnid initiative, a novel approach that employs an automated web crawler that proactively searches the Internet to identify images that match a known CSAM hash, and then alerts hosting providers when there is a match. Based on our ongoing work with Project Arachnid, we have responded to more than 86,000 reports by providing information about the hosting provider and provide the origin IP address, which we understand they use to contact that hosting provider directly with that report and any subsequent reports.</p><p>Although we typically process these reports within a matter of hours, we’ve heard from participants in our “trusted reporter” program that the non-instantaneous response from us causes friction in their systems. They want to be able to query our systems directly to get the hosting provider and origin IP  information, or better, be able to build extensions on their automated systems that could interface with the data in our systems to remove any delay whatsoever. This is particularly relevant for folks in the Canadian Centre’s Project Arachnid, who want to make our information a part of their automated system.  After scoping out this solution for a while, we’re now confident that we have a way forward and informed some trusted reporters in November that we will be making available an API that will allow them to obtain instantaneous information in response to their requests pursuant to their investigations. We expect this functionality to be online in the first quarter of 2020.</p>
    <div>
      <h3>Termination of Services</h3>
      <a href="#termination-of-services">
        
      </a>
    </div>
    <p>Cloudflare takes steps in appropriate circumstances to terminate its services from a site when it becomes clear that the site is dedicated to sharing CSAM or if the operators of the website and its host fail to take appropriate steps to take down CSAM content. In most circumstances, CSAM reports involve individual images that are posted on user generated content sites and are removed quickly by responsible website operators or hosting providers. In other circumstances, when operators or hosts fail to take action, Cloudflare is unable on its own to delete or remove the content but will take steps to terminate services to the  website.  We follow up on reports from NCMEC or other organizations when they report to us that they have completed their initial investigation and confirmed the legitimacy of the complaint, but have not been able to have the website operator or host take down the content. We also work with Interpol to identify and discontinue services from such sites they have determined have not taken steps to address CSAM.</p><p>Based upon these determinations and interactions, we have terminated service to 5,428 domains over the past 8 years.</p><p>In addition, Cloudflare has introduced new products where we do serve as the host of content, and we would be in a position to remove content from the Internet, including Cloudflare Stream and Cloudflare Workers.  Although these products have limited adoption to date, we expect their utilization will increase significantly over the next few years. Therefore, we will be conducting scans of the content that we host for users of these products using PhotoDNA (or similar tools) that make use of NCMEC’s image hash list. If flagged, we will remove that content immediately. We are working on that functionality now, and expect it will be in place in the first half of 2020.</p>
    <div>
      <h2>Part of an Organized Approach to Addressing CSAM</h2>
      <a href="#part-of-an-organized-approach-to-addressing-csam">
        
      </a>
    </div>
    <p>Cloudflare’s approach to addressing CSAM operates within a comprehensive legal and policy backdrop. Congress and the law enforcement and child protection communities have long collaborated on how best to combat the exploitation of children. Recognizing the importance of combating the online spread of CSAM, NCMEC first created the <a href="http://www.missingkids.org/gethelpnow/cybertipline">CyberTipline</a> in 1998, to provide a centralized reporting system for members of the public and online providers to report the exploitation of children online.</p><p>In 2006, Congress conducted a year-long <a href="https://www.govinfo.gov/content/pkg/CPRT-109HPRT31737/html/CPRT-109HPRT31737.htm">investigation</a> and then passed a number of laws to address the sexual abuse of children. Those laws attempted to calibrate the various interests at stake and coordinate the ways various parties should respond. The policy balance Congress struck on addressing CSAM on the Internet had a number of elements for online service providers.</p><p>First, Congress formalized NCMEC’s role as the central clearinghouse for reporting and investigation, through the CyberTipline. The law adds a <a href="https://uscode.house.gov/view.xhtml?req=18+USC+2258A&amp;f=treesort&amp;fq=true&amp;num=3&amp;hl=true&amp;edition=prelim&amp;granuleId=USC-prelim-title18-section2258A">requirement</a>, backed up by fines, for online providers to report any reports of CSAM to NCMEC. The law specifically notes that to preserve privacy, they were not creating a requirement to monitor content or affirmatively search or screen content to identify possible reports.</p><p>Second, Congress responded to the many stories of child victims who emphasized the continuous harm done by the transmission of imagery of their abuse. As described by <a href="http://www.missingkids.com/theissues/sexualabuseimagery">NCMEC</a>, “not only do these images and videos document victims’ exploitation and abuse, but when these files are shared across the internet, child victims suffer re-victimization each time the image of their sexual abuse is viewed” even when viewed for ostensibly legitimate investigative purposes. To help address this concern, the law <a href="https://uscode.house.gov/view.xhtml?hl=false&amp;edition=prelim&amp;path=&amp;req=granuleid%3AUSC-prelim-title18-section2258B&amp;f=treesort&amp;fq=true&amp;num=0&amp;saved=%7CMTggVVNDIDIyNThB%7CdHJlZXNvcnQ%3D%7CdHJ1ZQ%3D%3D%7C3%7Ctrue%7Cprelim">directs</a> providers to minimize the number of employees provided access to any visual depiction of child sexual abuse.  </p><p>Finally, to ensure that child safety and law enforcement organizations had the records necessary to conduct an investigation, the law <a href="https://uscode.house.gov/view.xhtml?hl=false&amp;edition=prelim&amp;path=&amp;req=granuleid%3AUSC-prelim-title18-section2258A&amp;f=treesort&amp;fq=true&amp;num=0&amp;saved=%7CMTggVVNDIDIyNThB%7CdHJlZXNvcnQ%3D%7CdHJ1ZQ%3D%3D%7C3%7Ctrue%7Cprelim">directs</a> providers to preserve not only the report to NCMEC, but also “any visual depictions, data, or other digital files that are reasonably accessible and may provide context or additional information about the reported material or person” for a period of 90 days.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NhDSyBzr2XtU8bm1NSCuL/8dd8e1d02dd9d3c3f04ebf088d25676e/stats-_2x.png" />
            
            </figure><p>Because Cloudflare’s services are used so extensively—by more than 20 million Internet properties, and based on <a href="https://w3techs.com/technologies/history_overview/proxy/all/q">data from W3Techs</a>, more than 10% of the world’s top 10 million websites—we have worked hard to understand these policy principles in order to respond appropriately in a broad variety of circumstances. The processes described in this blogpost were designed to make sure that we comply with these principles, as completely and quickly as possible, and take other steps to support the system’s underlying goals.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>We are under no illusion that our work in this space is done. We will continue to work with groups that are dedicated to fighting this abhorrent crime and provide tools to more quickly get them information to take CSAM content down and investigate the criminals who create and distribute it.</p><p><a href="https://storage.googleapis.com/blog-cloudflare-com-assets/2019/12/cloudflareresponse.pdf"><b>Cloudflare's Senate Response (PDF)</b></a></p><p><a href="https://www.scribd.com/document/438491024/Cloudflare-s-Senate-Response#from_embed">Cloudflare's Senate Res...</a> by <a href="https://www.scribd.com/user/490411479/Cloudflare#from_embed">Cloudflare</a> on Scribd</p> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Trust & Safety]]></category>
            <guid isPermaLink="false">5Not63XGszOE0baXeqaEzN</guid>
            <dc:creator>Doug Kramer</dc:creator>
            <dc:creator>Justin Paine</dc:creator>
        </item>
        <item>
            <title><![CDATA[Harnessing the Power of the People: Cloudflare’s First Security Awareness Month Design Challenge Winners]]></title>
            <link>https://blog.cloudflare.com/cloudflare-security-awareness-month-design-challenge/</link>
            <pubDate>Wed, 27 Nov 2019 17:30:00 GMT</pubDate>
            <description><![CDATA[ Grabbing the attention of employees at a security and privacy-focused company on security awareness presents a unique challenge; how do you get people who are already thinking about security all day to think about it some more? ]]></description>
            <content:encoded><![CDATA[ <p>Grabbing the attention of employees at a security and privacy-focused company on security awareness presents a unique challenge; how do you get people who are already thinking about security all day to think about it some more? October marked Cloudflare’s first Security Awareness Month as a public company and to celebrate, the security team challenged our entire company population to create graphics, slogans, and memes to encourage us all to think and act more securely every day.</p><p>Employees approached this challenge with gusto; global participation meant plenty of high quality submissions to vote on. In addition to being featured here, the winning designs will be displayed in Cloudflare offices throughout 2020 and the creators will be on the decision panel for next year’s winners. Three rose to the top, highlighting creativity and style that is uniquely Cloudflarian. I sat down with the winners to talk through their thoughts on security and what all companies can do to drive awareness.</p>
    <div>
      <h3>Eugene Wang, Design Team, First Place</h3>
      <a href="#eugene-wang-design-team-first-place">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/445K8IjXvqiPsqliddti0/462dab8b8ca585c225a29ad8618c0850/Screen-Shot-2019-11-26-at-2.45.04-PM.png" />
            
            </figure><hr />
    <div>
      <h3>Sílvia Flores, Executive Assistant, Second Place</h3>
      <a href="#silvia-flores-executive-assistant-second-place">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1v4C1gtMc0G1DTwJ0RztXF/8bcc6c0ae07b1e92120eca5095fff0be/TAIL-GATOR.CLOUDFLARE--2--4.png" />
            
            </figure><hr />
    <div>
      <h3>Scott Jones, e-Learning Developer, Third Place</h3>
      <a href="#scott-jones-e-learning-developer-third-place">
        
      </a>
    </div>
    <p>Security Haiku</p><p>_Wipe that whiteboard clean_‌‌<i>Visitors may come and see</i><i>Secrets not for them</i></p><p><i>No tailgating please</i><i>You may be a nice person</i>_But I don’t know that_‌‌‌‌‌‌</p>
    <div>
      <h4>1. What inspired your design?</h4>
      <a href="#1-what-inspired-your-design">
        
      </a>
    </div>
    <p><b>Eugene:</b> The friendly "Welcome" cloud seen in our all company slides was a jumping off point. It seemed like a great character that embodied being a Cloudflarian and had tons of potential to get into adventures. I also wanted security to be a bit fun, where appropriate. Instead of a serious breach (though it could be), here it was more a minor annoyance personified by a wannabe-sneaky alligator. Add a pun, and there you go—poster design!</p><p><b>Sílvia:</b> What inspired my design was the cute Cloudflare mascot the otter since there are so many otters in SF. Also, security can be fun and I added a pun for all the employees to remember the security system in an entertaining and respectful way. This design is very much my style and I believe making things cute and bright can really grab attention from people who are so busy in their work. A bright, orange, leopard print poster cannot be missed!</p><p><b>Scott:</b> I have always loved the haiku form and poems were allowed!</p>
    <div>
      <h4>2. What's the number one thing security teams can do to get non-security people excited about security?</h4>
      <a href="#2-whats-the-number-one-thing-security-teams-can-do-to-get-non-security-people-excited-about-security">
        
      </a>
    </div>
    <p><b>Eugene:</b> Make them realize and identify the threats that can happen everyday, and their role in keeping things secure. Cute characters and puns help.</p><p><b>Sílvia:</b> Make it more accessible for people to engage and understand it, possibly making more activities, content, and creating a fun environment for people to be aware but also be mindful.</p><p><b>Scott:</b> Use whatever means available to keep the idea of being security conscious in everyone's active awareness. This can and should be done in a variety of different ways so as to engage everyone in one way or another, visually with posters and signs, mentally by having contests, multi-sensory through B.E.E.R. meeting presentations and yes, even through a careful use of fear by periodically giving examples of what can happen if security is not followed...I believe that people like working here and believe in what we are doing and how we are doing it, so awareness mixed in with a little fear can reach people on a more visceral and personal level.</p>
    <div>
      <h4>3. What's your favorite security tip?</h4>
      <a href="#3-whats-your-favorite-security-tip">
        
      </a>
    </div>
    <p><b>Eugene:</b> Look at the destination of the return email.</p><p><b>Sílvia:</b> LastPass. Oh my lord. I cannot remember one single password since we need to make them so difficult! With numbers, caps, symbols, emojis (ahaha). LastPass makes it easier for me to be secure and still be myself and not remembering any password without freaking out.</p><p>**Scott: “**See something, say something" because it both reflects our basic responsibility to each other and exhibits a pride that we have as being part of a company we believe in and want to protect.‌‌</p><p>‌‌For security practitioners and engagement professionals, it's easy to try to boil the ocean when Security Awareness Month comes around. The list of potential topics and guidance is endless. Focusing on two or three key messages, gauging the maturity of your organization, and encouraging company-wide participation makes it a company-wide effort. Extra recognition and glory for those that go over and above never hurts either.</p><p>Want to run a security awareness design contest at your company? Reach out to us at <a>securityawareness@cloudflare.com</a> for tips and best practices for getting started, garnering support, and encouraging participation.</p><p>‌‌</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">6Ktp6mdf0Bg1DqTzAgBpfa</guid>
            <dc:creator>Jacqueline Keith</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Project Jengo Saga: How Cloudflare Stood up to a Patent Troll – and Won!]]></title>
            <link>https://blog.cloudflare.com/the-project-jengo-saga-how-cloudflare-stood-up-to-a-patent-troll-and-won/</link>
            <pubDate>Mon, 04 Nov 2019 14:00:00 GMT</pubDate>
            <description><![CDATA[ Remember 2016? Pokemon Go was all the rage, we lost Prince, and there were surprising election results in both the UK and US. Back in 2016, Blackbird Technologies was notorious in the world of patent litigation. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Remember 2016? <a href="https://www.youtube.com/watch?v=p-XnTDcQZjY">Pokemon Go</a> was all the rage, we <a href="https://www.billboard.com/articles/news/7341522/prince-dead">lost Prince</a>, and there were surprising election results in both the <a href="https://www.cnbc.com/2016/06/24/brexit-how-did-this-just-happen.html">UK</a> and <a href="https://www.politico.com/story/2016/11/election-results-2016-clinton-trump-231070">US</a>. Back in 2016, Blackbird Technologies was notorious in the world of patent litigation. It was a boutique law firm that was one of the <a href="https://www.rpxcorp.com/wp-content/uploads/sites/2/2017/05/the-most-active-patent-trolls-of-2016.pdf">top ten</a> most active patent trolls, filing lawsuits against more than 50 different defendants in a single year.</p><p>In October 2016, Blackbird was looking to <a href="https://assignment.uspto.gov/patent/index.html#/patent/search/resultAssignment?id=39923-226">acquire</a> additional patents for their portfolio when they found an incredibly broad software patent with the ambiguous title, “PROVIDING AN INTERNET THIRD PARTY DATA CHANNEL.” They acquired this patent from its owner for $1 plus “other good and valuable consideration.” A little later, in March 2017, Blackbird decided to assert that patent against Cloudflare.</p><p>As we have <a href="/standing-up-to-a-dangerous-new-breed-of-patent-troll/">explained previously</a>, patent trolls benefit from a problematic incentive structure that allows them to take vague or abstract patents that they have no intention of developing and assert them as broadly as possible. Instead, these trolls collect licensing fees or settlements from companies who are otherwise trying to start a business, produce useful products, and create good jobs. Companies facing such claims usually convince themselves that settlements in the tens or hundreds of thousands of dollars are quicker and cheaper outcomes than facing years of litigation and millions of dollars in attorneys fees.  </p><p>The following is how we worked to upend this asymmetric incentive structure.  </p>
    <div>
      <h3>The Game Plan</h3>
      <a href="#the-game-plan">
        
      </a>
    </div>
    <p>After we were sued by Blackbird, we decided that we wouldn’t roll over. We decided we would do our best to turn the incentive structure on its head and make patent trolls think twice before attempting to take advantage of the system. We created Project Jengo in an effort to remove this economic asymmetry from the litigation. In our initial <a href="/standing-up-to-a-dangerous-new-breed-of-patent-troll/">blog post</a> we suggested we could level the playing field by: (i) defending ourselves vigorously against the patent lawsuit instead of rolling over and paying a licensing fee or settling, (ii) funding awards for crowdsourced prior art that could be used to invalidate any of Blackbird’s patents, not just the one asserted against Cloudflare, and (iii) asking the relevant bar associations to investigate what we considered to be Blackbird’s violations of the rules of professional conduct for attorneys.</p><p>How’d we do?</p>
    <div>
      <h3>The Lawsuit</h3>
      <a href="#the-lawsuit">
        
      </a>
    </div>
    <p>As promised, we fought the lawsuit vigorously. And as explained in a <a href="/winning-the-blackbird-battle/">blog post earlier this year</a>, we won as convincing a victory as one could in federal litigation at both the trial and appellate levels. In early 2018, the District Court for the Northern District of California dismissed the case Blackbird brought against us on subject matter eligibility grounds in response to an <i>Alice</i> motion. In a mere <a href="/bye-bye-blackbird/">two-page order</a>, Judge Vince Chhabria held that “[a]bstract ideas are not patentable” and Blackbird’s assertion of the patent “attempts to monopolize the abstract idea of monitoring a preexisting data stream between a server and a client.” Essentially, the case was rejected before it ever really started because the court found Blackbird’s patent to be invalid.</p><p>Blackbird appealed that decision to the Court of Appeals for the Federal Circuit, which unceremoniously affirmed the lower court decision dismissing the appeal just three days after the appellate argument was heard. Following this ruling, we celebrated.  </p><blockquote><p>Killed another Blackbird. <a href="https://t.co/xSNQbHbl6Y">pic.twitter.com/xSNQbHbl6Y</a></p><p>— Matthew Prince ? (@eastdakota) <a href="https://twitter.com/eastdakota/status/1096230176109735936?ref_src=twsrc%5Etfw">February 15, 2019</a></p></blockquote><p>As noted in our earlier <a href="/winning-the-blackbird-battle/">blog post</a>, although we won the litigation as quickly and easily as possible, the federal litigation process still lasted nearly two years, involved combined legal filings of more than 1,500 pages, and ran up considerable legal expenses. Blackbird’s right to seek review of the decision by the US Supreme Court expired this summer, so the case is now officially over. As we’ve said from the start, we only intended to pursue Project Jengo as long as the case remained active.  </p><p>Even though we won decisively in court, that alone is not enough to change the incentive structure around patent troll suits. Patent trolls are repeat players who don’t have significant operations, so the costs of litigation and discovery are much less for them.</p>
    <div>
      <h3>Funding Crowdsourced Prior Art to Invalidate Blackbird Patents</h3>
      <a href="#funding-crowdsourced-prior-art-to-invalidate-blackbird-patents">
        
      </a>
    </div>
    
    <div>
      <h4>Prior Art</h4>
      <a href="#prior-art">
        
      </a>
    </div>
    <p>An integral part of our strategy against Blackbird was to engage our community to help us locate prior art that we could use to invalidate all of Blackbird’s patents. One of the most powerful legal arguments against the validity of a patent is that the invention claimed in the patent was already known or made public somewhere else (“prior art”). A collection of prior art on all the Blackbird patents could be used by anyone facing a lawsuit from Blackbird to defend themselves. The existence of an organized and accessible library of prior art would diminish the overall value of the Blackbird patent portfolio. That sort of risk to the patent portfolio was the kind of thing that would nudge the incentive structure in the other direction. Although the financial incentives made possible by the US legal system may support patent trolls, we knew our secret weapon was a very smart, very motivated community that loathed the extortionary activities of patent trolls and wanted to fight back.</p><p>And boy, were we right! We established a prior art bounty to pay cash rewards for prior art submissions that read on the patent Blackbird asserted against Cloudflare, as well as any of Blackbird’s other patents.  </p><p>We received hundreds of submissions across Blackbird’s portfolio of patents. We were very impressed with the quality of those submissions and think they call the validity of a number of those patents into question. All the relevant submissions we collected can be found <a href="https://www.cloudflare.com/blackbirdpatents/">here</a> sorted by patent number, and we hope they are put to good use by other parties sued by Blackbird. Additionally, we’ve already forwarded prior art from the collection to a handful of companies and organizations that reached out to us because they were facing cases from Blackbird.</p><p>A high-level breakdown of the submissions:</p><ul><li><p>We received 275 total unique submissions from 155 individuals on 49 separate patents, and we received multiple submissions on 26 patents.</p></li><li><p>40.1% of the total submissions related to the <a href="https://patents.google.com/patent/US6453335">’335</a> patent asserted against Cloudflare.</p></li><li><p>The second highest concentration of prior art submissions (14.9% of total) relate to <a href="https://patents.google.com/patent/US20140200078">PUB20140200078</a> titled “Video Game Including User Determined Location Information.” The vast majority of these submissions note the similarity between the patent’s claims and the Niantic game <a href="https://en.wikipedia.org/wiki/Ingress_(video_game)">Ingress</a>.</p></li></ul><p>A few interesting examples of prior art that were submitted that we think are particularly damaging to some of the Blackbird patents:</p><ul><li><p><a href="https://patents.google.com/patent/US8996546B2/en"><b>Internet based resource retrieval system</b></a><b> (No. 8996546)</b>The first two sentences of this 2004 patent’s abstract summarize the patent as a “resource retrieval system compris[ing] a server having a searchable database wherein users can readily access region-based publications similar to, but not necessarily limited to, printed telephone directories. The resource retrieval system communicates with at least one user system, preferably via the Internet.”The Project Jengo community reviewed the incredibly broad language in the patent claims and submitted a reference to an <a href="https://web.archive.org/web/20001109034000/http://anywho.com/">online phone book</a> that allowed for the searching of local results from an online AT&amp;T database. The submission is a link to an archive of a webpage from the year 2000, potentially calling into question the Blackbird patent on eligibility grounds.</p></li><li><p><a href="https://patents.google.com/patent/US7086751B2/en"><b>Illuminated product packaging</b></a><b> (No. 7086751)</b>This patent seeks protection for packaging “intended to hold a product for sale. The product package includes one or more light sources disposed therein and configured to direct light through one or more openings in the exterior of the product package, in order to entice customers to purchase the product.”</p><p>In one of the more interesting Project Jengo submissions we received, the following information was provided: The <a href="https://en.wikipedia.org/wiki/Pulse_(Pink_Floyd_album)#/media/File:Pink_Floyd_Pulse_Light_Case.jpg">CD packaging</a> for Pink Floyd’s ‘Pulse’ included a blinking LED within the cardboard box that was active and visible on store shelves. We felt that this also spoke to the heart of this broad and seemingly obvious patented product. </p></li></ul><ul><li><p><a href="https://patents.google.com/patent/US7867058"><b>Sports Bra</b></a><b> (No. 7867058)</b>This Blackbird patent involves a “sports bra having an integral storage pouch.”</p><p>The Project Jengo community found that a submission on a <a href="https://www.fodors.com/community/europe/a-different-spin-on-hiding-money-in-bra-639147/">public discussion forum</a> that pre-dates the ’058 patent and disclosed an idea of modifying a bra by creating an incision in the inner lining and applying a velcro strip so as to form a resealable pocket within the bra… Or essentially the same invention.  </p></li></ul>
    <div>
      <h3>As a Bonus – an Ex Parte Victory</h3>
      <a href="#as-a-bonus-an-ex-parte-victory">
        
      </a>
    </div>
    <p>Almost immediately after we announced Jengo, we received an <a href="/patent-troll-battle-update-doubling-down-on-project-jengo/">anonymous donation</a> from someone who shared our frustration with patent trolls. As we announced, this gift allowed us to expand Jengo by using some of the prior art to directly challenge other Blackbird patents in administrative proceedings.</p><p>We initiated an administrative challenge against Blackbird Patent <a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=/netahtml/PTO/search-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN/7797448">7,797,448</a> (“GPS-internet Linkage”). The patent describes in broad and generic terms “[a]n integrated system comprising the Global Positioning System and the Internet wherein the integrated system can identify the precise geographic location of both sender and receiver communicating computer terminals.” You don’t have to be particularly technical to realize how largely obvious and widely applicable such a concept would be, as many modern Internet applications attempt to integrate some sort of location services using GPS. This was a dangerous patent in the hands of a patent troll.</p><p>Based on the strength of the <a href="/project-jengo-strikes-its-first-targets-and-looks-for-more/">prior art we received</a> from the Project Jengo community and the number of times Blackbird had asserted the ’448 Patent to elicit a settlement from startups, we filed for an ex parte reexamination (EPR) of the ’448 Patent by the US Patent &amp; Trademark Office (USPTO). The EPR is an administrative proceeding that can be used to challenge obviously deficient patents in a less complex, lengthy, or costly exercise than federal litigation.</p><p>We submitted our EPR challenge in November 2017. Blackbird responded to the ex parte by attempting to amend their patent’s claims to make them more narrow in an effort to make their patent more defensible and avoid the challenge. In March 2018, the USPTO issued a Non-Final Office Action that proposed rejecting the ’448 Patent’s claims altogether because the claims were found to be preempted by prior art submitted by Project Jengo. Blackbird did not respond to the Office Action. And a few months later, in August 2018, the USPTO issued a <a href="https://storage.googleapis.com/blog-cloudflare-com-assets/2019/10/jengo.pdf">final order</a> in line with the office action, which cancelled the ’448 Patent’s claims. The USPTO’s decision means the ‘448 patent is invalid and no one can assert the incredibly broad terms of the ‘448 patent again.</p>
    <div>
      <h3>Rewarding the Crowd</h3>
      <a href="#rewarding-the-crowd">
        
      </a>
    </div>
    <p>As promised, Cloudflare distributed more than $50,000 in cash awards to eighteen people who submitted prior art as part of the crowdsourced effort. We gave out more than \$25,000 to people in support of their submissions related to the ’335 patent asserted against Cloudflare. Additionally, we awarded more than \$30,000 to submitters in support of our efforts to invalidate the other patents in Blackbird’s portfolio.</p><p>In general, we awarded bounties based on whether we incorporated the art found by the community into our legal filings, the analysis of the art as provided in the submission, whether someone else had previously submitted the art, and the strength and number of claims the art challenged in the specified Blackbird patent.</p><p>We asked many of the recent bounty winners why they decided to submit prior art to Project Jengo and received some of the following responses:  </p><hr /><p><i>"Over the years I've been disappointed and angered by a number of patent cases where I feel that the patent system has been abused by so-called ‘patent trolls’ in order to stifle innovation and profit from litigation. With Jengo in particular, I was a fan of what Cloudflare had done previously with Universal SSL. When the opportunity arose to potentially make a difference with a real patent troll case, I was happy to try and help."</i></p><p></p><p>— <b>Adam</b>, Security Engineer</p><hr /><p><i>"I read the ’335 patent and thought it basically described a fundamental design principle of the world wide web (proxy servers). I was pretty sure such software was in widespread use by the priority date of the patent (1998). At that point I was curious if that was true so I did some Googling."</i></p><p></p><p>– <b>David</b>, Software Developer</p><hr /><p><i>"Personally, I believe the vast majority of software patents are obvious and trivial. They should have never been granted. At the same time, fighting a patent claim is costly and time consuming regardless of the patent’s merit, while filing the claim is relatively cheap. Patent trolls exploit this imbalance and, in turn, they stifle innovation. Project Jengo was a great opportunity to use my knowledge of prior academic work for a good cause."</i></p><p></p><p>– <b>Kevin</b>, Postdoctoral Research Scientist</p><hr /><p><i>"I'm pretty excited, I've never won a single thing in my life before. And to do it in service of taking down evil patent trolls? This is one of the best days of my life, no joke. I submitted because software patents are garbage and clearly designed to extort money from productive innovators for vague and obvious claims. Also, I was homeless at the time I submitted and was spending all day at the library anyway."</i></p><p></p><p>— <b>Garrett</b>, San Francisco</p><hr />
    <div>
      <h3>What was the Impact?</h3>
      <a href="#what-was-the-impact">
        
      </a>
    </div>
    <p>The whole point of Project Jengo was to flip the incentive structure around patent trolls, who assume they can buy broad patents, spend a little money to initiate litigation, and then sit back and expect that a great percentage of defendants will send them a check. Under a proper incentive structure, they should have to expend some effort to prove their claims have merit, and we wanted to make available information that would support other potential defendants who may want to push back against claims under Blackbird patents.</p><p>One very simple measure of the impact is to review the number of new lawsuits Blackbird is bringing with its patent portfolio, which is a public record. So what does Blackbird’s activity look like on that point?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/58YOO7M8g3TDCv7H6Okvop/6622482492a8d70e93092d3224a30c23/Project_Jengo-01.png" />
            
            </figure><p>In the one-year period immediately preceding Project Jengo, (Q2’16-Q2’17) Blackbird filed more than 65 cases. Since Project Jengo launched more than 2.5 years ago, the number of cases Blackbird has filed has fallen to an average rate of 10 per year.  </p><p>Not only are they filing fewer cases, but Blackbird as an organization seems to be operating with fewer resources than they did at their peak. When we launched Project Jengo in May 2017, the <a href="http://web.archive.org/web/20170511234303/http://www.blackbird-tech.com/the-team/">Blackbird website</a> identified a total team of 12: six lawyers, including two co-founders, four litigation counsel, as well as a patent analysis group of 6. Today, based on a review of the <a href="http://www.blackbird-tech.com/leadership/">website</a> and LinkedIn, it appears only three staff remain: one co-founder, one litigation counsel, and one member of the patent analysis group.  </p><p><b>Ethics Complaints</b> (<i>section</i> <i>submitted by Cloudflare’s General Counsel, Doug Kramer)</i></p><p>We filed ethics complaints against both of Blackbird’s co-founders before the bar associations in Massachusetts, Illinois, and the USPTO based on their self-described “new model” of pursuing intellectual property claims. Our complaints were based on rules of professional conduct prohibiting lawyers from acquiring a cause of action to assert on their own behalf, or in the alternative, rules prohibiting attorneys to split contingency fees with a non-attorney.</p><p>We did not file such complaints lightly, as we take ethical standards seriously and don’t think such proceedings should be used merely to harass. In this case, we think the public perception of patent trolls, who are seen as lawyers chasing an easy buck by taking advantage of distortions in the litigation process, has damaged the public perception of attorneys and respect for the legal profession--the exact sort of values the ethical rules and bar associations are meant to protect.</p><p>We based our complaints on the <a href="https://assignment.uspto.gov/patent/index.html#/patent/search/resultAssignment?id=39923-226">assignment agreement</a> we found filed with the USPTO, where Blackbird purchased the ’335 patent from an inventor in October 2016 for \$1. It seemed apparent that the actual but undisclosed compensation between the parties was considerably more than \$1, so Blackbird may have simply acquired the cause of action or the agreement involved an arrangement where Blackbird would split a portion of any recovered fees with the inventor. Such agreements are generally prohibited by the ethical rules.</p><p>In public statements, Blackbird’s <a href="http://fortune.com/2017/05/11/blackbird-patent-troll/">defense</a> to these allegations was that it (i) was not a law firm (despite the fact it is led exclusively by lawyers who are actively engaged in the litigation it pursues) and (ii) does not use contingency fee arrangements for the patents it acquires, but does use something “<a href="http://fortune.com/2017/05/11/blackbird-patent-troll/">similar</a>.” Both defenses were rather surprising to us. Isn’t an organization led and staffed exclusively by lawyers who are drafting complaints, filing papers with courts, and arguing before judges amount to a “law firm”? In fact, we found pleadings in other Blackbird cases where the Blackbird leadership asked to be treated as lawyers so they could have access to sensitive technical evidence in those cases that is usually off-limits to anyone but the lawyers. And what does it mean for an agreement to be merely “similar” to a contingency agreement?</p><p>The disciplinary proceedings in front of bar associations are generally confidential, so we are limited in our ability to report out developments in those cases. But regardless of the outcome, we’ve only approached bar associations in two states. Getting this back on the right track will require more than successful adjudications in front of such committees. Instead, it will take a broader change in orientation by these professional associations across the country to view such matters as more than mere political disputes or arguments between active litigants.  </p><p>Our questions go to the very heart of ensuring an ethical legal profession, they are meant to determine what safeguards should be put in place to make sure that attorneys who take the oath are held to a standard beyond mere greed or base opportunism. They go to the question of whether being an attorney is merely a job or if there are higher standards they should be held to, making sure their monopoly over the ability to bring lawsuits as officers of the court (and all the implications, costs, and power that represents) is only wielded by people who can be trusted to do so responsibly. Otherwise, what’s the point of ethical standards?</p>
    <div>
      <h3>That’s all ... for now</h3>
      <a href="#thats-all-for-now">
        
      </a>
    </div>
    <p>We’ve said from the beginning that Project Jengo was a response to the patent troll litigation and we would end it as soon as the case was over. And now it is. Although we are proud of our work on this issue, we need to turn our focus back to the company’s mission -- to help build a better Internet. But we may be back at some point. Patent trolls remain a risk to growing companies like Cloudflare and nothing in this experience has persuaded us that settling a patent lawsuit is ever the right answer. We don’t plan to settle, and if brought into such litigation again at some point in the future, we think we have a pretty good blueprint for how to respond.</p><p>The Blackbird prior art will remain available <a href="https://www.cloudflare.com/blackbirdpatents/">here</a>, and we remain available to consult with our colleagues at other companies who face these issues, as we have done many times over the past few years.</p><p>Finally, we would like to express our sincere gratitude to the community who researched the Blackbird patent portfolio and helped us fight this troll. It was our confidence in all of you that inspired the idea of Project Jengo in the first place, so its success belongs to you.</p><p>Thank you.</p> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Jengo]]></category>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">2wnzIhE4uu5tkQU26jYrT</guid>
            <dc:creator>Alex Krivit</dc:creator>
        </item>
        <item>
            <title><![CDATA[Terminating Service for 8Chan]]></title>
            <link>https://blog.cloudflare.com/terminating-service-for-8chan/</link>
            <pubDate>Mon, 05 Aug 2019 01:44:16 GMT</pubDate>
            <description><![CDATA[ The mass shootings in El Paso, Texas and Dayton, Ohio are horrific tragedies. In the case of the El Paso shooting, the suspected terrorist gunman appears to have been inspired by the forum website known as 8chan.  ]]></description>
            <content:encoded><![CDATA[ <p>The mass shootings in El Paso, Texas and Dayton, Ohio are horrific tragedies. In the case of the El Paso shooting, the suspected terrorist gunman appears to have been inspired by the forum website known as 8chan. Based on evidence we've seen, it appears that he posted a screed to the site immediately before beginning his terrifying attack on the El Paso Walmart killing 20 people.</p><p>Unfortunately, this is not an isolated incident. Nearly the same thing happened on 8chan before the terror attack in Christchurch, New Zealand. The El Paso shooter specifically referenced the Christchurch incident and appears to have been inspired by the largely unmoderated discussions on 8chan which glorified the previous massacre. In a separate tragedy, the suspected killer in the Poway, California synagogue shooting also posted a hate-filled “open letter” on 8chan. 8chan has repeatedly proven itself to be a cesspool of hate.</p><p>8chan is among the more than 19 million Internet properties that use Cloudflare's service. We just sent notice that we are terminating 8chan as a customer effective at midnight tonight Pacific Time. The rationale is simple: they have proven themselves to be lawless and that lawlessness has caused multiple tragic deaths. Even if 8chan may not have violated the letter of the law in refusing to moderate their hate-filled community, they have created an environment that revels in violating its spirit.</p><p>We do not take this decision lightly. Cloudflare is a network provider. In pursuit of our goal of helping build a better internet, we’ve considered it important to provide our security services broadly to make sure as many users as possible are secure, and thereby making cyberattacks less attractive — regardless of the content of those websites.  Many of our customers run platforms of their own on top of our network. If our policies are more conservative than theirs it effectively undercuts their ability to run their services and set their own policies. We reluctantly tolerate content that we find reprehensible, but we draw the line at platforms that have demonstrated they directly inspire tragic events and are lawless by design. 8chan has crossed that line. It will therefore no longer be allowed to use our services.</p>
    <div>
      <h2>What Will Happen Next</h2>
      <a href="#what-will-happen-next">
        
      </a>
    </div>
    <p>Unfortunately, we have seen this situation before and so we have a good sense of what will play out. Almost exactly two years ago we made the determination to kick another disgusting site off Cloudflare's network: <a href="https://new.blog.cloudflare.com/why-we-terminated-daily-stormer/">the Daily Stormer.</a> That caused a brief interruption in the site's operations but they quickly came back online using a Cloudflare competitor. That competitor at the time promoted as a feature the fact that they didn't respond to legal process. Today, the Daily Stormer is still available and still disgusting. They have bragged that they have more readers than ever. They are no longer Cloudflare's problem, but they remain the Internet's problem.</p><p>I have little doubt we'll see the same happen with 8chan. While removing 8chan from our network takes heat off of us, it does nothing to address why hateful sites fester online. It does nothing to address why mass shootings occur. It does nothing to address why portions of the population feel so disenchanted they turn to hate. In taking this action we've solved our own problem, but we haven't solved the Internet's.</p><p>In the two years since the Daily Stormer what we have done to try and solve the Internet’s deeper problem is engage with law enforcement and civil society organizations to try and find solutions. Among other things, that resulted in us cooperating around monitoring potential hate sites on our network and notifying law enforcement when there was content that contained an indication of potential violence. We will continue to work within the legal process to share information when we can to hopefully prevent horrific acts of violence. We believe this is our responsibility and, given Cloudflare's scale and reach, we are hopeful we will continue to make progress toward solving the deeper problem.</p>
    <div>
      <h2>Rule of Law</h2>
      <a href="#rule-of-law">
        
      </a>
    </div>
    <p>We continue to feel incredibly uncomfortable about playing the role of content arbiter and do not plan to exercise it often. Some have wrongly speculated this is due to some conception of the United States' First Amendment. That is incorrect. First, we are a private company and not bound by the First Amendment. Second, the vast majority of our customers, and more than 50% of our revenue, comes from outside the United States where the First Amendment and similarly libertarian freedom of speech protections do not apply. The only relevance of the First Amendment in this case and others is that it allows us to choose who we do and do not do business with; it does not obligate us to do business with everyone.</p><p>Instead our concern has centered around another much more universal idea: the Rule of Law. The Rule of Law requires policies be transparent and consistent. While it has been articulated as a framework for how governments ensure their legitimacy, we have used it as a touchstone when we think about our own policies.</p><p>We have been successful because we have a very effective technological solution that provides security, performance, and reliability in an affordable and easy-to-use way. As a result of that, a huge portion of the Internet now sits behind our network. <a href="https://w3techs.com/technologies/history_overview/proxy/all">10% of the top million, 17% of the top 100,000, and 19% of the top 10,000 Internet properties use us today</a>. 10% of the Fortune 1,000 are paying Cloudflare customers.</p><p>Cloudflare is not a government. While we've been successful as a company, that does not give us the political legitimacy to make determinations on what content is good and bad. Nor should it. Questions around content are real societal issues that need politically legitimate solutions. We will continue to engage with lawmakers around the world as they set the boundaries of what is acceptable in their countries through due process of law. And we will comply with those boundaries when and where they are set.</p><p>Europe, for example, has taken a lead in this area. As we've seen governments there attempt to address hate and terror content online, there is recognition that different obligations should be placed on companies that organize and promote content — like Facebook and YouTube — rather than those that are mere conduits for that content. Conduits, like Cloudflare, are not visible to users and therefore cannot be transparent and consistent about their policies.</p><p>The unresolved question is how should the law deal with platforms that ignore or actively thwart the Rule of Law? That's closer to the situation we have seen with the Daily Stormer and 8chan. They are lawless platforms. In cases like these, where platforms have been designed to be lawless and unmoderated, and where the platforms have demonstrated their ability to cause real harm, the law may need additional remedies. We and other technology companies need to work with policy makers in order to help them understand the problem and define these remedies. And, in some cases, it may mean moving enforcement mechanisms further down the technical stack.</p>
    <div>
      <h2>Our Obligation</h2>
      <a href="#our-obligation">
        
      </a>
    </div>
    <p>Cloudflare's mission is to help build a better Internet. At some level firing 8chan as a customer is easy. They are uniquely lawless and that lawlessness has contributed to multiple horrific tragedies. Enough is enough.</p><p>What's hard is defining the policy that we can enforce transparently and consistently going forward. We, and other technology companies like us that enable the great parts of the Internet, have an obligation to help propose solutions to deal with the parts we're not proud of. That's our obligation and we're committed to it.</p><p>Unfortunately the action we take today won’t fix hate online. It will almost certainly not even remove 8chan from the Internet. But it is the right thing to do. Hate online is a real issue. Here are some organizations that have active work to help address it:</p><ul><li><p><a href="https://www.adl.org/">Anti-Defamation League</a></p></li><li><p><a href="https://gennextfoundation.org/cve/">Gen Next Foundation</a></p></li><li><p><a href="https://www.perspectiveapi.com/#/home">Perspective API</a></p></li><li><p><a href="https://www.7cups.com/">7 Cups</a></p></li></ul><p>Our whole Cloudflare team’s thoughts are with the families grieving in El Paso, Texas and Dayton, Ohio this evening.</p> ]]></content:encoded>
            <category><![CDATA[Freedom of Speech]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">2rwUxACTOBuFB5P6FXrkuc</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[Help us update the Cloudflare Blog!]]></title>
            <link>https://blog.cloudflare.com/help-us-update-the-cloudflare-blog/</link>
            <pubDate>Fri, 05 Apr 2019 15:03:40 GMT</pubDate>
            <description><![CDATA[ As you’ve probably noticed over the years, we’re always evolving and improving the look and feel of different aspects of the Cloudflare experience. Sometimes it’s more about function, other times it’s more about form, and most of the time it’s a combination of both. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Want to get right to the feedback? <a href="https://docs.google.com/forms/d/e/1FAIpQLSeGU39TFExaW7WxBqm9kEamxhQjo00CZjsWDCrJOEdOkxMlkA/viewform?usp=sf_link">Click here</a>.</p><p>As you’ve probably noticed over the years, we’re always evolving and improving the look and feel of different aspects of the Cloudflare experience. Sometimes it’s more about <a href="/expanding-multi-user-access/">function</a>, other times it’s more about <a href="/time-for-an-update/">form</a>, and most of the time it’s a combination of <a href="/a-new-look-on-your-cloudflare-dashboard/">both</a>. But there’s one area of the site that many users visit even more frequently than they visit the homepage or their dashboard, and strangely enough it hasn’t really seen any major updates in years. And if you’re reading this, that means you're looking at it.</p><p>With more than 150 current contributors, and more than 1,000 posts, we have a lot of people dedicating a lot of their time to writing blog posts. And based on the responses I see in the comments, and on Twitter, there are a lot of people who really like to read what these authors have to say (whether it has much to do with Cloudflare or not).</p><p>Well, we’d like to finally give some love to the blog. And we really want to know what you, our loyal (or even occasional) readers, think. There are two options to choose from. Simply click the feedback button below and you can either answer some questions on a survey, or if you want to really go the extra mile you can choose to participate in a short, remote, user study with one of our researchers. Either way, we want to know what you think!</p> ]]></content:encoded>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">1qfygYREOsfu6ogmkPxzGu</guid>
            <dc:creator>Ryan Knight</dc:creator>
        </item>
        <item>
            <title><![CDATA[Digital Evidence Across Borders and Engagement with Non-U.S. Authorities]]></title>
            <link>https://blog.cloudflare.com/digital-evidence-across-borders-and-engagement-with-non-us-authorities/</link>
            <pubDate>Thu, 28 Feb 2019 13:00:00 GMT</pubDate>
            <description><![CDATA[ Since we first started reporting in 2013, our transparency report has focused on requests from U.S. law enforcement. Previous versions of the report noted that, as a U.S. company, we ask non-U.S. law enforcement agencies to obtain formal U.S. legal process before providing customer data.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Since we first started reporting in 2013, our transparency report has focused on requests from U.S. law enforcement. Previous versions of the report noted that, as a U.S. company, we ask non-U.S. law enforcement agencies to obtain formal U.S. legal process before providing customer data.</p><p>As more countries pass laws that seek to extend beyond their national borders and as we expand into new markets, the question of how to handle requests from non-U.S. law enforcement has become more complicated. It seems timely to talk about our engagement with non-U.S. law enforcement and how our practice is changing. But first, some background on the changes that we’ve seen over the last year.</p>
    <div>
      <h3>Law enforcement access to data across borders</h3>
      <a href="#law-enforcement-access-to-data-across-borders">
        
      </a>
    </div>
    <p>The explosion of cloud services -- and the fact that data may be stored outside the countries of residence of those who generated it -- has been a challenge for governments conducting law enforcement investigations. A number of U.S. laws, like the Stored Communications Act or the Electronic Communications Privacy Act restrict companies from providing particular types of data, such as the content of communications, to any person or entity, including foreign law enforcement agencies, without U.S. legal process. To get access to electronic data stored outside their home borders, law enforcement agencies around the world have long used Mutual Legal Assistance Treaties (MLATs) that allow one country to ask for another country’s help to get access to evidence. Unfortunately, the MLAT process can be slow and cumbersome.</p><p>Countries frustrated by the inability of law enforcement to quickly gather evidence held outside their borders have taken matters into their own hands. Some have proposed laws mandating that important data about their citizens remain in country, where it can be easily accessed when requested. Others have proposed laws that would allow law enforcement to get access to data wherever it is stored, which puts companies in the position of potentially violating one country’s laws in order to comply with another’s.</p><p>In short, a new paradigm that allows law enforcement to access appropriate digital evidence across borders, with sufficient procedural safeguards to protect our users’ privacy and ensure due process, is long overdue.</p>
    <div>
      <h3>U.S. CLOUD Act</h3>
      <a href="#u-s-cloud-act">
        
      </a>
    </div>
    <p>In March 2018, the U.S. Congress passed the Clarifying Lawful Overseas Use of Data (CLOUD) Act as part of a large bill funding the government. The idea behind the law is that governments that protect their citizens’ due process rights and civil liberties should be able to get access to electronic content related to their citizens when conducting law enforcement investigations, wherever that data is stored.</p><p>The CLOUD Act anticipates that the U.S. government will enter into agreements with other countries’ governments to give each of the participating governments access to data stored in other participating countries for the purpose of investigating and prosecuting certain crimes. Under the law, the U.S. government will have to determine that a country has “robust substantive and procedural protections for privacy and civil liberties” before entering into an agreement with that country. After a country enters a formal agreement with the United States, U.S. companies would no longer be restricted by U.S. law from providing that country’s law enforcement with access to content data in response to a valid law enforcement request.</p><p>From a practical standpoint, the CLOUD Act envisions that U.S. companies like Cloudflare will be providing information directly to governments that have entered into agreements with the U.S. government. The idea is to change the relevant question away from “where is the data stored?” to “is the person being investigated a citizen or resident of the country asking for the information?”, recognizing every government’s right to investigate crimes that occur within its borders or affect its citizens.</p>
    <div>
      <h3>Movement in Europe</h3>
      <a href="#movement-in-europe">
        
      </a>
    </div>
    <p>Governments outside the United States have also moved forward with proposals that would provide law enforcement agencies authority to obtain information related to their citizens across borders. The United Kingdom, for example, has been working to update their laws and negotiate a bilateral agreement with the United States for access to data maintained by U.S. companies, consistent with the framework established in the CLOUD Act.</p><p>The European Union has also been active in moving forward with a framework on obtaining electronic evidence across borders. Much like the U.S. CLOUD Act, the European Commission’s eEvidence Regulation would allow EU Member States to seek digital evidence outside of their national borders provided that fundamental rights are protected. The European Commission also envisions entering into negotiations with U.S. authorities on data sharing arrangements under the mandate of EU Member States.</p>
    <div>
      <h3>So where does all of this leave us?</h3>
      <a href="#so-where-does-all-of-this-leave-us">
        
      </a>
    </div>
    <p>As a U.S. company that stores customer records inside the United States, Cloudflare has long held the view that non-U.S. governments should have to follow U.S. due process requirements in order to obtain any records about our customers. When non-U.S. governments have come to us requesting records, we have explained the nature of our service and, to the extent they were interested in obtaining data, encouraged them to submit a request to the U.S. Department of Justice through the MLAT process.</p><p>But it’s important to note that these processes serve an important function and are not just intended to delay the efforts of foreign law enforcement. They have helped us address some of the more challenging requests that we have seen. Let’s say, for example, law enforcement from an otherwise-respected nation sent us a court order demanding information about websites run by a vocal group of dissenters or even the organizers of a separatist referendum and also asked us to redirect that website to a location of their choosing. In that case, we would direct that foreign agency to submit an MLAT request. In situations like this, we might not receive subsequent legal process from the U.S. government, either because the government declined to ask the Department of Justice for an MLAT related to activity that could be viewed as political or because the Department of Justice declined to process it.</p><p>With the changing legal and policy landscape, as well as our increased presence in non-U.S. locations, we think it’s time to take a step towards the new framework that is taking shape.</p>
    <div>
      <h3>What type of information could we provide to non-US law enforcement?</h3>
      <a href="#what-type-of-information-could-we-provide-to-non-us-law-enforcement">
        
      </a>
    </div>
    <p>The overwhelming majority of information that U.S. law enforcement seeks from Cloudflare through legal process is what we consider to be basic subscriber data -- the type of information that customers give us when they sign up for service. That includes things like name, email address, physical address, phone number, the means and source of payment, and non-content information about a customer’s account, such as data about login times and IP addresses used to login to the account.</p><p>Although we consider this account information to be private customer data, worthy of protection, we share the commonly held view that it is less sensitive than information considered to be content, such as email communications or documents created by users. In fact, U.S. law allows law enforcement to compel us to provide basic subscriber data with a subpoena, a type of legal process that does not require prior judicial review.</p><p>Recent policy discussions have convinced us that there may be situations where it is appropriate to provide this type of basic subscriber information to non-U.S law enforcement in response to non-U.S. legal process similar to a subpoena, a view in line with that of many other tech companies. We may therefore respond to requests for subscriber information if a government is seeking information about a crime in its country or about its citizens, we have employees in the country, and appropriate due process requirements and international standards have been met. We will also consider whether the country has signed a CLOUD Act agreement with the United States.</p><p>The CLOUD Act and other existing U.S. laws govern the provision of more sensitive, content data to non-U.S. law enforcement. U.S. companies are legally prohibited from providing content data to a non-U.S. government absent a U.S. CLOUD Act agreement with that country. Given the nature of our service, however, we rarely have records that constitute content that we could provide to law enforcement regardless of jurisdiction.</p>
    <div>
      <h3>Overall Principles We Follow</h3>
      <a href="#overall-principles-we-follow">
        
      </a>
    </div>
    <p>When we talk about our relationship with law enforcement, we often say that it is not Cloudflare's intent to make law enforcement's work any harder or any easier. We respect both that law enforcement agencies have a job to do and that our customers have rights relating to how their data is shared with law enforcement.</p><p>Regardless of what government is asking, there are certain standards we believe must be followed before we turn over customer data. Our goal is to maintain a healthy and open relationship with law enforcement officials so that they understand and respect our positions on each of these standards. The principles which remain important to us are as follows:</p><ul><li><p><b>Require Due Process.</b> Cloudflare requires government entities seeking access to personal customer information to obtain appropriate legal process, including prior independent judicial review of any request for content.</p></li><li><p><b>Provide Notice.</b> We believe our customers deserve to be notified when we receive legal requests for their information, whether the requests come from law enforcement or private parties involved in civil litigation. We will provide that notice before we disclose the information, unless prohibited by law.</p></li><li><p><b>Protect Privacy and User Rights.</b> Whether inside or outside the United States, Cloudflare will fight law enforcement requests that we believe are overbroad, illegal, or wrongly issued. This includes requests to delay or prevent notice that appear unnecessarily broad, given the government interests at stake.</p></li><li><p><b>Be Transparent.</b> We believe the ability to report on the numbers and types of requests that we get from law enforcement, as well as how we respond, is critical to building trust with our customers. We will fight requests that unnecessarily restrict our ability to be transparent with our users.</p></li></ul><p>Consistent with the last standard, we also intend to update our transparency report to reflect any requests that we receive from non-U.S. law enforcement authorities, whether for user information or anything else.</p> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Politics]]></category>
            <category><![CDATA[Abuse]]></category>
            <category><![CDATA[Due Process]]></category>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">4YcHdL78G4t1QL1hKNYsbS</guid>
            <dc:creator>Caroline Greer</dc:creator>
        </item>
        <item>
            <title><![CDATA[Out of the Clouds and into the weeds: Cloudflare’s approach to abuse in new products]]></title>
            <link>https://blog.cloudflare.com/out-of-the-clouds-and-into-the-weeds-cloudflares-approach-to-abuse-in-new-products/</link>
            <pubDate>Wed, 27 Feb 2019 13:00:00 GMT</pubDate>
            <description><![CDATA[ In a blogpost yesterday, we addressed the principles we rely upon when faced with numerous and various requests to address the content of websites that use our services.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In a <a href="/unpacking-the-stack-and-addressing-complaints-about-content/">blogpost</a> yesterday, we addressed the principles we rely upon when faced with numerous and various requests to address the content of websites that use our services. We believe the building blocks that we provide for other people to share and access content online should be provided in a content-neutral way. We also believe that our users should understand the policies we have in place to address complaints and law enforcement requests, the type of requests we receive, and the way we respond to those requests. In this post, we do the dirty work of addressing how those principles are put into action, specifically with regard to Cloudflare’s expanding set of features and products.</p>
    <div>
      <h3>Abuse reports and new products</h3>
      <a href="#abuse-reports-and-new-products">
        
      </a>
    </div>
    <p>Currently, we receive abuse reports and law enforcement requests on fewer than one percent of the more than thirteen million domains that use Cloudflare’s network. Although the reports we receive run the gamut -- from phishing, malware or other technical abuses of our network to complaints about content -- the overwhelming majority are allegations of copyright violations or violations of other intellectual property rights. Most of the complaints that we receive do not identify concerns with particular Cloudflare services or products.</p><p>In the last year or so, we’ve also launched a variety of new products, including our video product (<a href="https://www.cloudflare.com/products/stream-delivery/">Cloudflare Stream</a>), a serverless edge computing platform (<a href="https://www.cloudflare.com/products/cloudflare-workers/">Cloudflare Workers</a>), a <a href="https://www.cloudflare.com/products/registrar/">self-serve registrar service</a>, and a privacy-focused recursive resolver (<a href="https://1.1.1.1/">1.1.1.1</a>), among others. Each of these services raises its own complex set of questions.  </p><p>There is no one-size-fits-all solution to address possible abuse of our products. Different types of services come with different expectations, as well as different legal and contractual obligations. Yet as we discussed in relation to our focus on transparency on <a href="/cloudflare-transparency-update-joining-cloudflares-flock-of-warrant-canaries-2/">Monday</a>, being fully transparent means being consistent and predictable so our users can anticipate how we will respond to new situations.</p>
    <div>
      <h3>Developing an approach to abuse</h3>
      <a href="#developing-an-approach-to-abuse">
        
      </a>
    </div>
    <p>To help us sort through how to address both complaints and law enforcement requests, when we introduce new products or features, we ask ourselves four basic sets of questions about the relationship between the service we’re providing and potential complaints about content:</p><ul><li><p>First, how are Cloudflare’s services interacting with the website content? For example, are we doing anything more than providing security and acting as a reliable conduit from one location to another?  Are we providing definitive storage of content? Did we provide the website its domain name through our registrar service? Is the Cloudflare service or product doing anything that could be seen as organizing, analyzing, or promoting content?</p></li><li><p>Second, what type of action might a law enforcement or private complainant want us to take and what are the consequences of it?  What sort of information might law enforcement request -- private information about the user, content of what was sent over the Internet, or logs that would track activity?  Will third parties request information about a website; would they request removal of content from the Internet? Would removing our services address the problem presented?</p></li><li><p>Third, what laws, regulations or contractual requirements apply? Does the nature of our interaction with the online content impact our legal obligations? Has the law enforcement request or regulation satisfied basic principles of the rule of law or due process?</p></li><li><p>Fourth, will our response to the matter presented scale to address the variety of different requests or complaints we may receive over time, covering a variety of different subject matters and viewpoints? Can we craft a principled and content-neutral process to respond to the request? Would our response have an overbroad impact, either by impacting more than the problematic content or changing the Internet in jurisdictions beyond the one that has issued the law or regulation at issue?</p></li></ul><p>Although those preliminary questions help us determine what actions we must take, we also do our best to think about the broader implications on the Internet of any steps we might take to address complaints.</p>
    <div>
      <h2>So how does this work in practice?</h2>
      <a href="#so-how-does-this-work-in-practice">
        
      </a>
    </div>
    
    <div>
      <h3>Response to abuse complaints for customers using our proxy and CDN services</h3>
      <a href="#response-to-abuse-complaints-for-customers-using-our-proxy-and-cdn-services">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7fYyp9YRicdb7b4tQSIBnS/6ae08708e364e32a5c907f04d1b2459c/image5.png" />
            
            </figure><p>People often come to Cloudflare with abuse complaints because our network sits in front of our customers’ sites in order to protect them from cyber attacks and to improve the performance of their website.</p><p>There aren’t a lot of laws or regulations that impose obligations to address content on those providing security or <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">CDN services</a>, for good reason. Most people complaining about content are looking for someone who can take that content off the Internet entirely. As we’ve talked about on <a href="/thoughts-on-abuse/">other</a> <a href="/anonymity-and-abuse-reports/">occasions</a>, Cloudflare is unable to remove content that we don’t host, so we therefore try to make sure that the complaint gets to its intended audience -- the hosting provider who has the ability to remove the material from the Internet. As described on <a href="https://www.cloudflare.com/abuse/">our abuse page</a>,  complaining parties automatically receive information about how to contact the hosting provider, and unless the complaining party requests otherwise, abuse complaints are automatically forwarded to both the website owner and the hosting company to allow them to take action.</p><p>This approach has another benefit, consistent with the fourth set of questions we ask ourselves. It prevents addressing content with an unnecessarily blunt tool. Cloudflare is unable to remove its security and CDN services from only a sliver of problematic content on a website.  If we remove our services, it has to be from an entire domain or subdomain, which may cause considerable collateral damage. For example, think of the vast array of sites that allow individual independent users to upload content (“user generated content”). A website owner or host may be able to curate or deal with specific content, but if companies like Cloudflare had to respond to allegations of abuse by a single user’s upload of a single piece of concerning content by removing our core services from an entire site, and making it vulnerable to a cyberattack, those sites would be much more difficult to operate and the content contributed by all other users would be put at risk.</p><p>Similarly, there are a number of different infrastructure services that cooperate to make sure each connection on the Internet can happen successfully – DNS, <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/">registrars</a>, registries, security, etc.  If each of the providers of those services, any one of which could put the entire transmission at risk, is applying blunt tools to address content, then the aperture of what content will stay online will get smaller and smaller. Those are bad results for the Internet. Actions to address troubling content online should focus narrowly on the actual concern to avoid unintended collateral consequences.</p><p>While we are unable to remove content we do not host, we are able to take steps to address abuse of our services, such as phishing and malware attacks. Phishing attacks typically fall into two buckets -- a website that has been compromised (unintentional phishing) or a website solely dedicated to intentionally misleading others to gather information (intentional phishing). These buckets are treated differently.</p><p>We discussed earlier that we aim to use the most precise tools possible when addressing abuse, and we take a similar approach for unintentional phishing content. If a website has been compromised (typically an outdated CMS) we can place a warning interstitial page in front of that specific phishing content to protect users from accidentally falling victim to the attack. In the majority of situations, this action is taken at a URL level of granularity.</p><p>In the case of intentional phishing attacks, such a domain like  my-totally-secure-login-page{.}com in combination with our Trust &amp; Safety team being able to confirm the presence of phishing content on the website, we take broader action including a domain-wide interstitial warning page (effectively *my-totally-secure-login-page{.}com/*), and in some cases we may terminate our services to the intentionally malicious domain. To be clear though, this does not remove the phishing content that remains hosted by the website’s hosting provider. Ultimately, action still needs to be taken by the website owner or hosting provider to fully remove the underlying issue.</p>
    <div>
      <h3>Response to complaints about content stored definitively on our network</h3>
      <a href="#response-to-complaints-about-content-stored-definitively-on-our-network">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Mz81IWy2rQJhZgHnVwXJ9/df8e0f2ec7ca2a0d1240131009164bbc/image4.png" />
            
            </figure><p>We think our approach requires a different set of responses for the small, but growing, number of Cloudflare products that include some sort of storage. Cloudflare Stream, for example, allows users to store, transcode, distribute and playback their videos. And Cloudflare Workers may allow users to store certain content at the edge of our network without a core host server. Although we are not a website hosting provider, these products mean we may be the only place where a certain piece of content is stored in some cases.  </p><p>When we are the definitive repository for content through any of our services, Cloudflare will carefully review any complaints about that content and may disable access to it in response to a valid legal takedown request from either government or private actors. Most often, these legal takedown requests are from individuals alleging copyright infringement.  Under the U.S. Digital Millennium Copyright Act, there is a specific process online storage providers follow to remove or disable access to content alleged to infringe copyright and provide an opportunity for those who post the material to contest that it is infringing. We have already begun implementing this process for content stored on our network.  That’s why we’ve begun a new section of our <a href="https://cloudflare.invisionapp.com/share/RUPOO3MPDKH#/screens">transparency report</a> on requests for content takedown pursuant to U.S. copyright law for content that is stored on our network.  </p><p>We haven’t received any government requests yet to take down content stored on our network. Given the significant potential impact on freedom of expression from a government ordering that content be removed, if we do receive those requests in the future, we will carefully analyze the factual basis and legal authority for the request.  If we determine that the order is valid and requires Cloudflare action, we will do our best to address the request as narrowly as possible, for example, by clarifying overbroad requests or limiting blocking of access to the content to those areas where it violates local law, a practice known as “geo-blocking”. We will also update our transparency report on any government requests that we receive in the future and any actions we take.</p>
    <div>
      <h3>Response to complaints about our registrar service</h3>
      <a href="#response-to-complaints-about-our-registrar-service">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6FxcoT7686OkzBPJTPM7tN/ed90c776932edafbc6b95d59377d1703/registrar.png" />
            
            </figure><p>If you sign up for our self-serve registrar service, you’re legally bound by the terms of our contract with the Internet Corporation for Assigned Names and Numbers (ICANN), a non-profit organization responsible for coordinating unique Internet identifiers across the world, as well as our contract with the relevant domain name registry.  </p><p>Our registrar-focused <a href="https://www.cloudflare.com/products/registrar/abuse/">web page</a> for abuse reporting does not reference abuse complaints about a website’s content.  In our role as a domain registrar, Cloudflare has no control or ability to remove particular content from a domain. We would be limited to simply revoking or suspending the domain registration altogether which would remove the website owner’s control over the <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain name</a>. Such actions would typically only be done at the direction of the relevant domain name registry, in accordance with their registration rules associated with the <a href="https://www.cloudflare.com/learning/dns/top-level-domain/">Top Level Domain</a>, or more usually to address incidents of abuse as raised by the registry or ICANN. We therefore treat content-related complaints submitted based on our registrar services the same way we treat complaints about content for sites using our CDN or proxy services.  We forward them to the website owner and the website hosting company to allow them to take action or we work in tandem with the relevant registry and at their direction.</p><p>Running a registrar service comes with other legal obligations. As an ICANN accredited registrar, part of our contractual obligations include adhering to third party dispute resolution processes regarding trademark disputes, as handled by providers such as the World Intellectual Property Organization (WIPO) and the National Arbitration  Forum. Also, we continue to be part of the ICANN community discussions on how best to handle the collection, publication and provision of access to personal data in the WHOIS database in a manner consistent with the EU’s General Data Protection Regulation (GDPR) and other privacy frameworks. We will provide more updates on that front when the discussions have ripened.</p>
    <div>
      <h3>Response to complaints about IPFS</h3>
      <a href="#response-to-complaints-about-ipfs">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5T3SHdqfJMZSvtb0C4LBbo/84cd4798a1cb309eeae75972d2a3ca8e/ipfs.png" />
            
            </figure><p>Back in September, we <a href="/distributed-web-gateway/">announced</a> that Cloudflare would be providing a gateway to the InterPlanetary File System (IPFS). Cloudflare’s IPFS gateway is a way to access content stored on the IPFS peer-to-peer network. Because Cloudflare is not acting as the definitive storage for the IPFS network, we do not have the ability to remove content from that network. We simply operate as a cache in front of IPFS, much as we do for our more traditional customers.</p><p>Because content is stored on potentially dozens of nodes in IPFS, if one node that was caching content goes down, the network will just look for the same content on another node. That fact makes IPFS exceptionally resilient. That same resilience, however, means that unlike with our traditional customers, with IPFS, there is no single host to inform of a complaint about content stored on the IPFS network.  Cloudflare often has no knowledge of who the owner is of content being accessed through the gateway, and this makes it impossible to notify the specific owner when we receive a complaint.</p><p>The law hasn’t yet quite caught up with distributed networks like IPFS, and there’s a notable debate among IPFS users about how best to deal with abuse. Some argue that having problematic content stored on IPFS will discourage adoption of the protocol, and advocate for the development of lists of problematic hashes that  IPFS gateways could choose to block. Others point out that any mechanism intended to block IPFS content will itself be subject to abuse. We don’t have the answer to that debate, but it does demonstrate to us the importance of being thoughtful about how we proceed.</p><p>For the time being, our plan is to respond to U.S. court orders that require us to clear our cache of content stored on IPFS. More importantly, however, we intend to report in future transparency reports on any law enforcement requests we receive to clear our IPFS cache, to ensure continued public discussion.</p>
    <div>
      <h3>Cloudflare Resolvers: 1.1.1.1 and Resolver for Firefox</h3>
      <a href="#cloudflare-resolvers-1-1-1-1-and-resolver-for-firefox">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/atuUDCyhmzyh4RqbtOd6U/76647f964b85043f8d1296e5dd038dfd/1111-1.gif" />
            
            </figure><p>In April of last year, we <a href="/announcing-1111/">launched</a> our first DNS resolver, 1.1.1.1.  In June, we partnered with Mozilla to provide direct DNS resolution from within the Firefox browser using the Cloudflare Resolver for Firefox. Our goal with both resolvers was to develop fast DNS services that were focused on user privacy.  </p><p>We often get questions about how how we deal with both abuse complaints and law enforcement requests related to our resolvers.  Both of our resolvers are intended to provide only direct DNS resolution. In other words, Cloudflare does not block or filter content through either 1.1.1.1 or the Cloudflare Resolver for Firefox. If Cloudflare were to receive a request from a law enforcement or government agency to block access to domains or content through one of our resolvers, Cloudflare would fight that request. At this point, we have not yet received any government requests to block content through our resolvers. Cloudflare would also document any request to block content from our resolvers in our semi-annual transparency report, unless we were legally prohibited from doing so.</p><p>Similarly, Cloudflare has not received any government requests for data about the users of our resolvers, and would fight such a request if necessary. Given our public commitment not to retain any personally identifiable information for more than 24 hours, we believe it is unlikely that we would have any information even if asked. Nonetheless, if we were to receive a government request for data about a resolver user, we would document the request in our transparency report, unless legally prohibited from doing so.    </p>
    <div>
      <h3>The long road ahead</h3>
      <a href="#the-long-road-ahead">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/52nr5Co31KS2aVzil4x90h/c2d650f2d18ca8c78d0a13a9148a9603/road.png" />
            
            </figure><p>Although new products offered by Cloudflare in the future, as well as the legal and regulatory landscape, may change over the years, we expect that our approach to thinking about new products will stand the test of time. We’re guided by some central principles -- allowing our infrastructure to be as neutral as possible, following the rule of law or requiring due process, being open about what we’re doing, and making sure that we’re consistent regardless of the wide variety of issues we face. And we will work hard to make sure that doesn’t change, because even the smallest tweaks to the way we do things can have a significant impact at the scale we operate.</p> ]]></content:encoded>
            <category><![CDATA[Freedom of Speech]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Politics]]></category>
            <category><![CDATA[Abuse]]></category>
            <category><![CDATA[Due Process]]></category>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">3TokDJcXCygYPTjnifbwUM</guid>
            <dc:creator>Justin Paine</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unpacking the Stack and Addressing Complaints about Content]]></title>
            <link>https://blog.cloudflare.com/unpacking-the-stack-and-addressing-complaints-about-content/</link>
            <pubDate>Tue, 26 Feb 2019 13:00:00 GMT</pubDate>
            <description><![CDATA[ Although we are focused on protecting and optimizing the operation of the Internet, Cloudflare is sometimes the target of complaints or criticism about the content of a very small percentage of the more than thirteen million websites that use our service. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Although we are focused on protecting and optimizing the operation of the Internet, Cloudflare is sometimes the target of complaints or criticism about the content of a very small percentage of the more than thirteen million websites that use our service. Our termination of services to the Daily Stormer website a year and a half ago drew significant attention to our approach to these issues and prompted a lot of thinking on our part.  </p><p>At the time, Matthew <a href="/why-we-terminated-daily-stormer/">wrote</a> that calls for service providers to reject some online content should start with a consideration of how the Internet works and how the services at issue up and down the stack interact with that content. He tasked Cloudflare’s policy team with engaging broadly to try and find an answer. With some time having passed, we want to take stock of what we’ve learned and where we stand in addressing problematic content online.  </p>
    <div>
      <h3>The aftermath of the Daily Stormer decision</h3>
      <a href="#the-aftermath-of-the-daily-stormer-decision">
        
      </a>
    </div>
    <p>The weeks immediately following the decision in August 2017 were filled with conversations. Matthew made sure the Cloudflare team accepted every single invitation to talk about these issues; we didn’t simply put out a press release or “no comment” anyone. Our senior leadership team spoke with the media and with our employees -- some of whom had received threats related both to Cloudflare’s provision of services to the Daily Stormer and to the termination of those services. On the policy side, we spoke with a broad range of ideologically-diverse advocacy groups who reached out to alternatively congratulate us or chastise us for the decision.</p><p>As the time stretched into months, the conversations changed. We spoke with organizations who have made it their mission to fight hate and intolerance, with human rights organizations that depend on access to the Internet, with tech companies doing their best to moderate content, with academics who think about and research all aspects of content online, and with interested government and non-governmental organizations on two continents. In the end, we spoke with hundreds of different experts, groups, and entities about how different companies and different types of services address troubling content at different places in the Internet stack.  </p><p>Our overwhelming sense from these conversations is that the Internet, and the industry that has grown up around it, is at a crossroads. Policy makers and the public are rightly upset about misuse of the Internet.  We heard repeatedly that the world is moving away from the Internet as a neutral platform for people to express themselves and access information. Many governments and many of the constituents they represent appear to want the Internet cleaned up and stripped of troubling content through any technical means necessary, even if it means that innovation will be stifled and legitimate voices will be silenced. And companies large and small seem to be going along with it.</p>
    <div>
      <h3>Moving forward</h3>
      <a href="#moving-forward">
        
      </a>
    </div>
    <p>We’ve thought long and hard about what’s next both for us and the Internet in general. Although we share concerns about the exploitation of online tools, we are convinced that there are ways forward that do not shortchange the security, availability, and promise of the Internet.</p><p>We think the right solution will take us out of the clouds and into the weeds.  We have to figure out what core functions need to be protected to have the Internet we want, and we will have to get away from the idea that there’s a one-size-fits-all solution that will address the problems we see. If we really want to address risks online while maintaining the Internet as a forum for communication, commerce, and free expression, different kinds of services are going to have to deal with abuse differently.</p><p>The more we talked to people, the more that we saw a fundamental split on the Internet between the services that substantively touch content and the infrastructure services that do not.  It’s possible that, as a company that provides largely infrastructure services ourselves, we were were looking for this distinction. But we believe the distinction is real and helps explain why different businesses make distinctly different choices. As we discuss in our blog posts on transparency this week, the approach to questions about abuse complaints will mean different things for different Cloudflare products. Although we are not at the point yet where Cloudflare’s products organize, analyze, or promote content, we are aware that this conclusion may have implications for us in the future.</p>
    <div>
      <h3>Content curators</h3>
      <a href="#content-curators">
        
      </a>
    </div>
    <p>The Internet has revolutionized the way we communicate and access information. Because of the way the Internet works, everyone online has the opportunity to create and consume the equivalent of their own newspaper or television network. Almost any content you could want is available, if you can find it. That idea is at the heart of a the divide between services that curate content -- like social media platforms and search engines -- and basic Internet infrastructure services.  </p><p>Content curators make content-based decisions for a business purpose. For a search engine, that might mean algorithmically reviewing content to best match what is sought by the user. For a social media site, it might be a review of content to help predict what content the user will want to see next or what advertising might be most appealing.</p><p>For these types of online products, users understand and generally expect that the services will vary based on content. Different search engines yield different results; Different social media platforms will promote different content for you to review. These services are the Internet’s equivalents of the very small circle of newspaper editors or television network executives of old, making decisions about what you see online based on what they think you’ll want to see.</p><p>The value in these content curator services depends on how well they analyze, use, and make judgments about content.  From a business perspective, that means that these services want the flexibility to include or exclude particular content from their platforms. For example, it makes perfect sense for a platform that advertises itself as building community to have rules that prevent the community from being disrupted with hate-filled messages and disturbing content.</p><p>We should expect content curator services to moderate content and should give them the flexibility to do so. If these services are transparent about what they allow and don’t allow, and how they make decisions about what to exclude, they can be held accountable the same way people hold other businesses to account. If people don’t like the judgments being made, they can take their business to a platform or service that’s a better fit.</p>
    <div>
      <h4>Basic Internet infrastructure services</h4>
      <a href="#basic-internet-infrastructure-services">
        
      </a>
    </div>
    <p>Basic Internet services, on the other hand, facilitate the business of other providers and website owners by providing infrastructure that enables access to the Internet.  These types of services -- which Matthew described in detail in the Daily Stormer <a href="/why-we-terminated-daily-stormer/">blog post</a> -- include telecommunications services, hosting services, domain name services such as registry and <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/">registrar services</a>, and services to help optimize and secure Internet transmissions. The core expertise of these services is not content analysis, but providing the infrastructure needed for someone else to develop and analyze that content.</p><p>Because people expect these infrastructure services to be used to provide technical access to the Internet, the notion that these numerous services might be used to monitor what you’re doing online or make decisions about what content you should be entitled to access feels like a misuse, or even an invasion of privacy.</p><p>Internet infrastructure is a lot like other kinds of physical infrastructure.  At some basic level, we believe that everyone should be allowed to have housing, electricity or telephone, no matter what they plan to do with those services. Or that individuals should be able to send packages through FedEx or walk down the street wearing a backpack with a reasonable expectation they won’t be subject to unfounded search or monitoring. Much as we believe that the companies that provide these services should provide services to all, not just those with whom they agree, we continue to believe that basic internet infrastructure services, which provide the building blocks for other people to create and access content online, should be provided in a content-neutral way.</p>
    <div>
      <h3>Complicated companies</h3>
      <a href="#complicated-companies">
        
      </a>
    </div>
    <p>Developing different expectations for content curation services and infrastructure services is tougher than it seems. Behemoths best known for content curation services often provide infrastructure services as well. Alphabet, for example, provides content-neutral infrastructure services to millions of customers through Google Cloud and Google Domains, while also running one of the world’s largest content curated site in YouTube. And even if companies try to distinguish their infrastructure from content curation services, their customers may not.</p><p>In a world where content needs to be on a large network to stay online, there are only a handful of companies that can satisfy. Reducing that handful to those — like Cloudflare — that fall solely into the infrastructure bucket makes the number almost impossibly small. That is why we want to do better job talking about differences in expectations not by company, but by service.</p><p>And maybe we should also recognize that having only a small number of companies with robust enough networks to keep content online--most of which do content curation--is part of the problem. If you believe that the only way to be online is to be on a platform that curates content, you’re going to be rightly skeptical of that company’s right to take down content that they don’t want on their site. That doesn’t mean that a business that depends on analyzing content has to stop doing it, but it does make it that much more important that we have neutral infrastructure. It might be impossible for an alternate platform to be built, and for certain voices to have a presence online, without it.</p><p>The good news is that we’re not alone in our view of the fundamental difference between content curators and Internet infrastructure services. From the <a href="https://www.cloudflare.com/cloudflare-criticism/">criticism</a> we received for the Daily Stormer decision, to the <a href="https://www.techdirt.com/articles/20180819/00455840462/forget-about-social-media-content-moderation-get-ready-internet-infrastructure-content-moderation.shtml">commentary</a> of Mike Masnick at Techdirt, to the academic <a href="https://poseidon01.ssrn.com/delivery.php?ID=542020096000010096112083068071071102026044031032057003066126104028004098107027115066031056003008104040034096120064104017001089027091046046045108074101107103092011090089081106023090018070113114080075019004126030099064009084090096086093025085031070005&amp;EXT=pdf">analysis</a> of Yale Law Professor Jack Balkin, to the <a href="https://cyberstability.org/research/call-to-protect/">call</a> of the Global Commission on the Security of Cyberspace (GCSC) to protect the “public core” of the Internet, there’s an increasing awareness that not protecting neutral Internet infrastructure could undermine the Internet as we know it.</p>
    <div>
      <h3>Thoughts on due process</h3>
      <a href="#thoughts-on-due-process">
        
      </a>
    </div>
    <p>In his blog post on the Daily Stormer decision, Matthew talked about the importance of due process, the idea that you should be able to know the rules a system will follow if you participate in that system. But what we’ve learned in our follow up conversations is that due process has a different meaning for content curators.</p><p>There has been a clamor for companies like Facebook and Google to explain how they make decisions about what to show their users, what they take down, and how someone can challenge those decisions. Facebook has even developed an “Oversight Board for Content Decisions” -- dubbed as Facebook’s supreme court -- that is empowered to oversee the decisions the company makes based on its terms of service. Given that this process is based on terms of service, which the company can change at will to accommodate business decisions, this mostly seems like a way to build confidence in the company’s decision-making process. Instituting an internal review process may make users feel that the decisions are less arbitrary, which may help the company keep people in their community.</p><p>That idea of entirely privatized due process may make sense for content curators, who make content decisions by necessity, but we don’t believe it makes sense for those that provide infrastructure services. When access to basic Internet services is on the line, due process has to mean rules set and adjudicated by external decision-makers.</p>
    <div>
      <h3>Abuse on Internet infrastructure</h3>
      <a href="#abuse-on-internet-infrastructure">
        
      </a>
    </div>
    <p>Although we don’t believe it is appropriate for Cloudflare to decide what voices get to stay online by terminating basic Internet services because we think content is a problem, that’s far from the end of the story. Even for Internet infrastructure, there are other ways that problematic content online can be, and is, addressed.</p><p>Laws around the world provide mechanisms for addressing particular types of content online that governments decide is problematic. We can save for another day whether any particular law provides adequate due process and balances rights appropriately, but at a minimum, those who make these laws typically have a political legitimacy that infrastructure companies do not.</p><p>Tomorrow, we’ll talk about how we are operationalizing our view that it’s important to  get into the weeds by considering how different laws apply to us on a service-by-service, and function-by-function basis.</p> ]]></content:encoded>
            <category><![CDATA[Freedom of Speech]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Politics]]></category>
            <category><![CDATA[Due Process]]></category>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">ZLdefAUX2U3eaijY9OeZe</guid>
            <dc:creator>Alissa Starzak</dc:creator>
        </item>
        <item>
            <title><![CDATA[Securing U.S. Democracy: Athenian Project Update]]></title>
            <link>https://blog.cloudflare.com/athenian-project-update/</link>
            <pubDate>Thu, 19 Jul 2018 15:01:07 GMT</pubDate>
            <description><![CDATA[ Last December, Cloudflare announced the Athenian Project to help protect U.S. state and local election websites from cyber attack.

Since then, the need to protect our electoral systems has become increasingly urgent.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Last December, Cloudflare <a href="/the-athenian-project/">announced the Athenian Project</a> to help protect U.S. state and local election websites from cyber attack.</p><p>Since then, the need to protect our electoral systems has become increasingly urgent. As described by Director of National Intelligence Dan Coats, the “digital infrastructure that serves this country is literally under attack.” Just last week, we learned new details about how state election systems were targeted for cyberattack during the 2016 election. The U.S. government’s indictment of twelve Russian military intelligence officers describes the scanning of state election-related websites for vulnerabilities and theft of personal information related to approximately 500,000 voters.</p><p>This direct attack on the U.S. election systems using common Internet vulnerabilities reinforces the need to ensure democratic institutions are protected from attack in the future. The Athenian Project is Cloudflare’s attempt to do our part to secure our democracy.</p>
    <div>
      <h3>Engaging with Elections Officials</h3>
      <a href="#engaging-with-elections-officials">
        
      </a>
    </div>
    <p>Since announcing the Athenian Project, we’ve talked to state, county, and municipal officials around the country about protecting their election and voter registration websites. Today, we’re proud to report that we have Athenian Project participants in 19 states, and are in talks with many more. We have also strategized with civil society organizations, government associations, and federal government officials who share the goal of ensuring state and local officials have the tools they need to protect their institutions from cyberattack.</p><p>Working with state and local election officials has given us new appreciation for the dedication of those who serve as election officials, and how difficult it can be for those officials to identify and get the resources they need.</p><p>Local election officials — like ordinary voters — are the foundation of democracy. They guard the infrastructure of our constitutional system. Many officials juggle multiple roles within local government. They may manage multiple election websites, with limited information technology staff. Yet they know that their community, and sometimes the entire country, is relying on them to protect election integrity from countless global threats against it. The Athenian Project is about giving these dedicated professionals the tools they need to fight back and secure their systems.</p><p>A county Clerk-Recorder and Registrar of Voters, who is responsible for a number of election-related websites, told us that election officials worry about drawing attention to themselves, for fear they may be targeted for attack. Although cybersecurity is only one of the many responsibilities on her plate, this official is determined protect the county, using all the resources at her disposal. But without dedicated information technology staff, she has had difficulty identifying how best to protect county infrastructure.</p><p>Cloudflare can help, with both tools and know how.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6oiNdWOQ8TJwPETRvM6ATw/0e1b3a508e27ed5c8d6f1ceec1c929b2/BlogImagery-BenefitsOfCloudflareServices.png" />
            
            </figure>
    <div>
      <h3>Benefits of Cloudflare services</h3>
      <a href="#benefits-of-cloudflare-services">
        
      </a>
    </div>
    <p>Given the current threats, we think it’s important to provide more details about what our services do, and how they can help election officials. We’ve understood since the beginning that election websites would benefit from Cloudflare’s security features, including our DDoS mitigation, Web Application Firewall (WAF), IP reputation database, and ability to block traffic by country or IP address. In fact, reports of DDoS attacks on state and local government websites often get the most coverage because the impact — loss of service to the site — is visible to the public. Until our conversations, however, we did not fully appreciate how our services could solve other common problems for state and local government officials.</p><p>For election officials, the last day of voter registration and election day are often nerve-wracking events. Their websites can see more traffic in an hour than they’ve seen all year. For example, when the Special Election in Alabama in 2017 drew traffic from around the country, Alabama needed a distributed network and a CDN to ensure that the nearly 5 million Alabamians and everyone else in the U.S. could follow along.</p><p>Cloudflare’s other features can also help state and local election websites. The Senate Select Committee on Intelligence <a href="https://www.burr.senate.gov/imo/media/doc/RussRptInstlmt1-%20ElecSec%20Findings,Recs2.pdf">summary</a> of the 2016 election hacking attempts concluded that the majority of malicious access attempts on voting-related websites were perpetrated using SQL injection. Cloudflare’s WAF protects against SQL injection, as well as other forms of attack.</p><p>Recently, one of the states whose election websites are part of the Athenian Project was attacked and two non-election related websites were defaced. Website defacement occurs when someone who is not authorized to make website changes alters the content on the site, often changing the home page to display the hacker’s logo or other material. Although the state’s election websites saw a 100-fold increase in threat traffic, our WAF helped prevent a similar defacement on those sites.</p><p>For election websites that are not already running on HTTPS, Cloudflare can also simplify the process of transitioning to use of SSL. With <a href="/chrome-not-secure-for-http/">Google Chrome’s new initiative</a> to mark non-HTTPS sites as insecure, potential voters visiting non-encrypted voter registration websites will be warned not to enter sensitive information on the site “because it could be stolen by attackers.” That is not the message officials want to send to a public nervous about cyberattacks on election infrastructure. Adding a security certificate can be a daunting task for local officials without IT resources, but for Athenian Project participants, it’s available at the click of a button. Athenian Project participants who need help with certificate management are given dedicated, auto-renewed certificates to improve the security of their sites. Cloudflare page rules can then direct all traffic to the HTTPS site.</p>
    <div>
      <h3>Lessons learned and new tools</h3>
      <a href="#lessons-learned-and-new-tools">
        
      </a>
    </div>
    <p>We’ve also tailored the Athenian Project to better address the needs of those we are serving. So what have we done?</p><ul><li><p><i>More tools:</i> We wanted to provide more tools for those who want to learn about and set up our service. We’ve therefore revamped our website to be more intuitive to navigate and to provide more information. We’ve created a new, <a href="https://www.cloudflare.com/athenian/guide/">interactive guide</a> discussing <a href="https://www.cloudflare.com/learning/security/glossary/website-security-checklist/">website protection</a> and a short video sharing the experience of current Athenian Project participants.</p></li><li><p><i>How-to videos:</i> There are videos to not only walk new participants through creating an account and transitioning their DNS servers, but also to provide best practices so that new participants can identify and turn on important features.</p></li></ul><p><b>Getting Started</b></p><p><b>Best Practices</b></p><ul><li><p><i>Support help:</i> We have found that state and local election officials often have challenges at the onboarding stage that are best addressed through personal attention. We’ve therefore added support features — including Athenian-specific support — to increase the personal interaction we have with officials and to provide them an opportunity to describe their own situation and needs.</p></li><li><p><i>Set up flexibility:</i> We’ve learned to be flexible with how we set up our service. While some counties were eager to leverage as much of the service as possible, including using full DNS delegation and dedicated certificates, others preferred to pick and choose between options. Depending on the circumstances for a given jurisdiction, we customize protection so they can use Cloudflare without needing to change the IT system for the whole state or county.</p></li><li><p><i>Athenian Project-specific terms of service:</i> To address common government contracting restrictions, we’ve drafted an Athenian Project-specific <a href="https://www.cloudflare.com/media/pdf/cloudflare-athenian-project-terms-of-service.pdf">terms of service</a>.</p></li></ul><p>We hope these new details will make it even easier for election officials to get access to tools that can help them fulfill their critical responsibility to protect our elections.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/44eDvXiJ33WsvdWfvq9x6X/00a7950fb3cf8505e8e3170820a41d0c/BlogImagery-WhatsNext.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>In November, every state and district in the country will hold congressional elections. Election officials — and all of us — want to make sure that voter information remains secure and that websites stay online as voters seek out information on polling places and voting requirements, and anxiously refresh results pages on election night.</p><p>The entire American experiment is built on a simple act: a vote. To work as designed, citizens must trust the electoral system, its strength, integrity, and the people who protect it. Cloudflare is proud to support local officials on the front lines of election security.</p><p>And we, like election officials, know that building a resilient system requires long-term commitment. We are committed to continuing to do our part to keep U.S. election websites secure in this election and beyond.</p><p>If you would like more information about the Athenian Project, please visit our website <a href="https://www.cloudflare.com/athenian">cloudflare.com/athenian</a>.</p> ]]></content:encoded>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <guid isPermaLink="false">13ebYohKVfR99xxh4yzCk1</guid>
            <dc:creator>Alissa Starzak</dc:creator>
            <dc:creator>Erin Walk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Workers Recipe Exchange]]></title>
            <link>https://blog.cloudflare.com/cloudflare-workers-recipe-exchange/</link>
            <pubDate>Mon, 04 Jun 2018 21:25:55 GMT</pubDate>
            <description><![CDATA[ Share your Cloudflare Workers recipes with the Cloudflare Community. We’ve created a new tag “Recipe Exchange” in the Cloudflare Community Forum. We invite you to share your work, borrow / get inspired by the work of others, and upvote useful recipes written by others in the community.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qBx6cC3szlYnnQr7s1f40/e17744aa287f56c4e77050eafab00973/Indian_Spices-1.jpg" />
            
            </figure><p><a href="https://commons.wikimedia.org/wiki/File:Indian_Spices.jpg">Photo of Indian Spices</a>, by Joe mon bkk. <a href="https://commons.wikimedia.org/wiki/File:Indian_Spices.jpg">Wikimedia Commons</a>, <a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>.</p><p>Share your <a href="https://developers.cloudflare.com/workers/about/">Cloudflare Workers</a> recipes with the <a href="https://community.cloudflare.com/c/developers/workers">Cloudflare Community</a>. Developers in Cloudflare’s community each bring a unique perspective that would yield use cases our core team could never have imagined. That is why we invite you to share Workers recipes that are useful in your own work, life, or hobby.</p><p>We’ve created a new tag <a href="https://community.cloudflare.com/tags/recipe-exchange">“Recipe Exchange”</a> in the Workers section of the <a href="https://community.cloudflare.com/c/developers/workers">Cloudflare Community Forum</a>. We invite you to share your work, borrow / get inspired by the work of others, and upvote useful recipes written by others in the community.</p><p><a href="https://community.cloudflare.com/tags/recipe-exchange">Recipe Exchange in Cloudflare Community</a></p><p>We will be highlighting interesting and/or popular recipes (with author permission) in the coming months right here in this blog.</p>
    <div>
      <h3>What is Cloudflare Workers, anyway?</h3>
      <a href="#what-is-cloudflare-workers-anyway">
        
      </a>
    </div>
    <p><a href="https://developers.cloudflare.com/workers/about/">Cloudflare Workers</a> let you run JavaScript in Cloudflare’s hundreds of data centers around the world. Using a Worker, you can modify your site’s HTTP requests and responses, make parallel requests, or generate responses from the edge. Cloudflare Workers has been in open beta phase since February 1st. Read more about the launch in <a href="/cloudflare-workers-is-now-on-open-beta/">this blog post</a>.</p>
    <div>
      <h4>What can you do with Cloudflare Workers?</h4>
      <a href="#what-can-you-do-with-cloudflare-workers">
        
      </a>
    </div>
    <p>Cloudflare has an incredibly powerful global network of 151 data centers, where you can put compute anywhere and you can write with a language you’re familiar with (JavaScript) with a standard API you're familiar with (<a href="https://developer.mozilla.org/en-US/docs/Web/API/Service_Worker_API">Service Workers</a>). You can move your compute to be super low latency, to be much nearer to your end user, your database, your embedded device, or anything else you want faster round trips for.</p><p>You may access and leverage the power of Cloudflare’s network for your next applications or as an add-on for optimizing the performance of your existing projects by running JavaScript on Cloudflare’s edge network.</p><p>The <a href="/cloudflare-acquires-eager/">next</a> <a href="/neumob-optimizing-mobile/">product</a> that leverages Cloudflare's infrastructure to create security, performance, usability, and other optimizations for the Internet should have the lowest possible barriers to entry. Millions of customers should have access to those products on day one. That's how the Internet should work.</p>
            <figure>
            <a href="https://developers.cloudflare.com/workers/writing-workers/">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EG2qtJRjwzYosFIUu3RQA/1c48f5890f326937ab5e6cfafb56183c/developerplatform.png" />
            </a>
            </figure><p>For inspiration, the Workers core team baked up <a href="https://developers.cloudflare.com/workers/recipes/">some recipes</a> to highlight <b>a few popular use cases</b>:</p><ul><li><p><a href="https://developers.cloudflare.com/workers/recipes/a-b-testing/">A/B Testing</a> You can create a Cloudflare Worker to control A/B tests.</p></li><li><p><a href="https://developers.cloudflare.com/workers/recipes/aggregating-multiple-requests/">Aggregating Multiple Requests</a> Here, we make multiple requests to different API endpoints, aggregate the responses and send it back as a single response.</p></li><li><p><a href="https://developers.cloudflare.com/workers/recipes/conditional-routing/">Conditional Routing</a> The easiest way to deliver different content based on the device being used is to rewrite the URL of the request based on the condition you care about.</p></li><li><p><a href="https://developers.cloudflare.com/workers/recipes/return-403/">Custom responses that don't hit origin servers</a> You can return responses directly from the edge. No need to hit your origin.</p></li><li><p><a href="https://developers.cloudflare.com/workers/recipes/hotlink-protection/">Hot-link Protection</a> You can use Cloudflare Workers to protect your hot-links on your web properties.</p></li><li><p><a href="https://developers.cloudflare.com/workers/recipes/post-requests/">Post Requests</a> Reading content from an HTTP POST request</p></li><li><p><a href="https://developers.cloudflare.com/workers/recipes/random-content-cookies/">Random Content Cookies</a> You can create random content cookies using Cloudflare Workers.</p></li><li><p><a href="https://developers.cloudflare.com/workers/recipes/signed-requests/">Signed Requests</a> A common URL authentication method known as request signing1 can be implemented in a worker with the help of the Web Crypto API.</p></li><li><p><a href="https://developers.cloudflare.com/workers/recipes/streaming-responses/">Streaming Responses</a> Minimize the visitor’s time-to-first-byte and the amount of buffering done in the worker script.</p></li></ul>
    <div>
      <h4>What if I want to just offer an idea or a use case?</h4>
      <a href="#what-if-i-want-to-just-offer-an-idea-or-a-use-case">
        
      </a>
    </div>
    <p>That’s great! I’ve created <a href="https://community.cloudflare.com/t/recipe-request-thread/16906">this thread</a> in the <a href="https://community.cloudflare.com/c/developers/workers">Cloudflare Community forum</a> so anyone can submit a recipe idea, comment on one, and anyone can volunteer to write a recipe that there is a ready audience for.</p><p><a href="https://community.cloudflare.com/tags/recipe-exchange">Share your recipe in the Community Recipe Exchange</a></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[JavaScript]]></category>
            <category><![CDATA[Serverless]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <guid isPermaLink="false">4a5PNZbokOQfVPmj9NWtFX</guid>
            <dc:creator>Jade Q. Wang</dc:creator>
        </item>
        <item>
            <title><![CDATA[Project Jengo Celebrates One Year Anniversary by Releasing Prior Art]]></title>
            <link>https://blog.cloudflare.com/project-jengo-celebrates-one-year-anniversary/</link>
            <pubDate>Fri, 11 May 2018 17:30:00 GMT</pubDate>
            <description><![CDATA[ Today marks the one year anniversary of Project Jengo, a notorious patent troll. In homage to the typical anniversary cliché, we are taking this opportunity to reflect on the last year and confirm that we’re still going strong. ]]></description>
            <content:encoded><![CDATA[ <p>Today marks the one year anniversary of <a href="/project-jengo/">Project Jengo</a>, a crowdsourced search for prior art that Cloudflare created and funded in response to the actions of Blackbird Technologies, a notorious patent troll. Blackbird has filed more than one hundred lawsuits asserting dormant patents without engaging in any innovative or commercial activities of its own. In homage to the typical anniversary cliché, we are taking this opportunity to reflect on the last year and confirm that we’re still going strong.</p><p>Project Jengo arose from a sense of immense frustration over the way that patent trolls purchase over-broad patents and use aggressive litigation tactics to elicit painful settlements from companies. These trolls know that the system is slanted in their favor, and we wanted to change that. Patent lawsuits take years to reach trial and cost an inordinate sum to defend. Knowing this, trolls just sit back and wait for companies to settle. Instead of perpetuating this cycle, Cloudflare decided to bring the community together and fight back.</p><p>After Blackbird <a href="/standing-up-to-a-dangerous-new-breed-of-patent-troll/">filed a lawsuit</a> against Cloudflare alleging infringement of a vague and <a href="https://patents.google.com/patent/US6453335B1/en">overly-broad patent</a> (‘335 Patent), we launched Project Jengo, which offered a reward to people who submitted prior art that could be used to invalidate any of Blackbird’s patents. Through this program, we wanted to make sure Blackbird couldn’t use any of its patents to attack other innovating companies. So far, the project has been a great success. We’ve received <a href="/project-jengo-strikes-its-first-targets-and-looks-for-more/">hundreds of prior art submissions</a> from the Project that read across much of Blackbird’s patent portfolio.</p>
    <div>
      <h3>An Arsenal to Fight Back</h3>
      <a href="#an-arsenal-to-fight-back">
        
      </a>
    </div>
    <p>Today we are releasing the core of the prior art we have collected, reviewed, and organized. In this way, other innovators can benefit from the efforts of Project Jengo. If at any point you are sued by Blackbird, you can go <a href="https://www.cloudflare.com/blackbirdpatents/jengo/"><b>here</b></a> to find the list of approximately 200 pieces of prior art that apply to 34 Blackbird patents. If you find yourself on the wrong end of a Blackbird patent troll lawsuit asserting one of those patents, this free information may be what you need to defend yourself.</p>
    <div>
      <h4>Tired of All the Winning</h4>
      <a href="#tired-of-all-the-winning">
        
      </a>
    </div>
    <p>So far, our legal arguments against Blackbird’s patents have been very well received by courts and administrative officials. This supports our assertion that patent trolls raise claims of dubious merit and hope that parties will settle with them to avoid the cost of defense.</p><p>Blackbird’s case against Cloudflare: As readers of this blog <a href="/bye-bye-blackbird/">already know</a>, in February 2018 the U.S. District Court for the Northern District of California short-circuited Blackbird’s lawsuit against Cloudflare by granting Cloudflare’s Motion to Dismiss on an <a href="https://en.wikipedia.org/wiki/Alice_Corp._v._CLS_Bank_International"><i>Alice</i></a> motion, which means that the court ruled the '335 Patent was too abstract to be valid because abstract ideas are not patentable. In granting Cloudflare’s motion, Judge Chhabria noted that Blackbird’s assertion of the patent “attempts to monopolize the abstract idea of monitoring a preexisting data stream between a server.”</p><p>But there’s an update. Blackbird recently <a href="http://www.ipwatchdog.com/wp-content/uploads/2018/02/Blackbird-notice-of-appeal.pdf">appealed the ruling</a> to the United States Court of Appeals for the Federal Circuit, a special federal court that hears all appeals related to patents. Currently, the parties are submitting briefs to the court and expect to participate in a hearing on the issue in December. Cloudflare will continue our fight to show that Blackbird’s '335 Patent is a non-patentable abstract idea and its lawsuit is meritless.</p><p>In addition, there have been updates from the U.S. Supreme Court that relate to our fight. In April, the Supreme Court decided the <a href="https://en.wikipedia.org/wiki/Oil_States_Energy_Services,_LLC_v._Greene%E2%80%99s_Energy_Group,_LLC"><i>Oil States</i></a> case maintaining the constitutionality of the inter partes review (IPR) process. As we have previously <a href="/project-jengo-challenges/">discussed</a>, the IPR process is an administrative method for invalidating a patent outside of litigation, by going back to the Patent Office and petitioning them to review the validity of the patent based on the invention’s novelty or obviousness. To keep the pressure on Blackbird, Cloudflare filed an IPR related to the '335 Patent. The Patent Trial and Appeal Board (<a href="https://www.uspto.gov/patents-application-process/patenttrialandappealboard">PTAB</a>) will likely decide whether to grant the petition by October 2018 and, if granted, a hearing about invalidating the '335 Patent would be scheduled for approximately a year later. The legal and administrative challenges to the validity of the '335 Patent will proceed in parallel; they present slightly different goals but seek the same outcome -- to invalidate a bad patent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3931XlWwUDgQyo6xVPNmgC/181139be5c0494e3cc77a5c7ce5db94b/troll-hunter-jengo-blog_3x.png" />
            
            </figure><p>Project Jengo strikes its first target: We <a href="/project-jengo-challenges/">wrote previously</a> about Project Jengo’s intention to challenge other clearly invalid patents in the Blackbird portfolio before they could be used to victimize other innovative companies. The first target of Project Jengo apart from the patent asserted against Cloudflare was U.S. Patent <a href="http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&amp;Sect2=HITOFF&amp;p=1&amp;u=/netahtml/PTO/search-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;d=PALL&amp;RefSrch=yes&amp;Query=PN/7797448">7,797,448</a> (“GPS-internet Linkage”).</p><p>This patent described an “integrated system comprising the Global Positioning System and the Internet wherein the integrated system can identify the precise geographic location of both sender and receiver communicating computer terminals.” This broadly-worded patent could potentially be used to sue a massive number of technology products that involve GPS or other location technology. In July 2016, Blackbird sued and settled with six companies under a lawsuit relying on the '448 Patent. Even though Blackbird had not sued Cloudflare under this patent, and it seemed an unlikely threat to us directly, we made it a target of Project Jengo because we thought this patent was terrible and posed a unique threat to others in the tech industry. That’s the spirit and larger mission that brought so many of you to this effort.</p><p>We have good news to report on this front as well.</p><p>Based on the strength of the prior art we received through Project Jengo and the number of times Blackbird had used the ‘448 Patent to elicit a settlement, we filed for an ex parte reexamination (EPR) of the ‘448 Patent by the US Patent and Trademark Office (“USPTO”). The EPR is another--less formal--administrative proceeding that can be used to challenge obviously deficient patents. In March, the USPTO issued a Non-Final Office Action that proposed rejecting the ‘448 Patent, noting, “the ‘448 Patent does not have support for the new or amended claims.” In rejecting the ‘448 claims, USPTO relied heavily on prior art submitted by the Project Jengo community.</p><p>In response to the Non-FInal Office Action, Cloudflare supplied additional briefs for the USPTO to consider. After considering those briefs, the USPTO will decide whether or not to change its initial conclusions and issue a final order.</p>
    <div>
      <h3>The Search Continues</h3>
      <a href="#the-search-continues">
        
      </a>
    </div>
    <p>And we’re not done. As we’ve said from the beginning, our goal in this effort is to collect prior art on all of Blackbird’s patents. The window is still open. You’re welcome to submit additional prior art that will be considered for the bounty awards, added to the arsenal, and most importantly, earn you a nifty <a href="/patent-troll-battle-update-doubling-down-on-project-jengo/">Project Jengo t-shirt</a>.</p><blockquote><p>T-shirt arrived really quickly and I appreaciate how accommodating you were with organising my payment, it's helped to chip away at my student loan :)</p><p>Cheers!Adam</p></blockquote><p>We’ve awarded more than <a href="/project-jengo-strikes-its-first-targets-and-looks-for-more/">$7,500</a> to participants so far and plan to distribute more than $40,000 more before Project Jengo is done. If you would like to join Project Jengo, please submit any prior art you think will be relevant <a href="https://www.cloudflare.com/jengo/sable-prior-art-search/">here</a> and stay tuned for more awards and updates.</p>
    <div>
      <h4>A Blackbird Living in a Glass House (an appeal to Raytheon)</h4>
      <a href="#a-blackbird-living-in-a-glass-house-an-appeal-to-raytheon">
        
      </a>
    </div>
    <p>Finally, Matthew wouldn’t let us post another Jengo update without including a public appeal to our friends at Raytheon. You see, Raytheon, a company holding thousands of patents and headquartered in Massachusetts, bought a company called <a href="https://www.raytheon.com/news/feature/raytheon-blackbird-technologies">Blackbird Technologies in 2014</a> and still owns the trademark. When Blackbird Technologies, a notorious patent troll holding hundreds of patents and also based in Massachusetts, sued Cloudflare last year, we were briefly confused whether there was a connection ... there isn’t. So we’re looking for a senior executive at Raytheon with a sense of humor or a protective Raytheon lawyer without one that would be willing to give us a license to the trademark they hold for <a href="https://www.trademarkia.com/blackbird-technologies-75719948.html">Blackbird Techologies®</a> for a very limited and particular use. We’d suggest a fee of “$1 and other good and valuable consideration,” the same amount the patent troll claims they paid for the patent they used as the basis for their lawsuit against Cloudflare.</p><p>And this shouldn’t even need to engage the sense of humor over at Raytheon, we definitely think the attorneys on their IP team should be concerned that a company in their own backyard is infringing on and disparaging the name of one of their brands. This is especially the case since the patent troll holds <a href="https://www.cloudflare.com/blackbirdpatents/">a number of broad patents</a> on things like determining travel time, utilizing GPS data, and dealing with electronic equipment, that could be understood as overlapping with Raytheon’s business. It’s a lawsuit with much more legal merit and actual injury than the overwhelming number of cases brought by Blackbird Technologies, the patent troll. If any of you have friends at Raytheon who may be willing to help us use the intellectual property system to shut down or force the rebranding of a notorious patent troll, let us know in the comments.</p> ]]></content:encoded>
            <category><![CDATA[Jengo]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">1SNWl0GHauqCgwgcQYvH9J</guid>
            <dc:creator>Alex Krivit</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Rise of Edge Compute: The Video]]></title>
            <link>https://blog.cloudflare.com/rise-of-edge-compute-the-video/</link>
            <pubDate>Tue, 08 May 2018 21:28:44 GMT</pubDate>
            <description><![CDATA[ At the end of March, Kenton Varda, tech lead and architect for Cloudflare Workers, traveled to London and led a talk about the Rise of Edge Compute where he laid out our vision for the future of the Internet as a platform. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>At the end of March, <a href="https://twitter.com/KentonVarda">Kenton Varda</a>, tech lead and architect for <a href="https://developers.cloudflare.com/workers/">Cloudflare Workers</a>, traveled to London and led a talk about the <a href="https://edgecomputelondon.eventbrite.com">Rise of Edge Compute</a> where he laid out our vision for the future of the Internet as a platform.</p><p>Several of those who were unable to attend on-site asked for us to produce a recording. Well, we've completed the audio edits, so here it is!</p><hr /><p>Visit the Workers category on Cloudflare's community forum to learn more about Workers and share questions, answers, and ideas with other developers.</p><p><a href="https://community.cloudflare.com/c/developers/workers">Visit the Community Forum Here »</a></p> ]]></content:encoded>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Events]]></category>
            <category><![CDATA[Video]]></category>
            <category><![CDATA[Cloudflare Apps]]></category>
            <category><![CDATA[Cloudflare Meetups]]></category>
            <category><![CDATA[Serverless]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[MeetUp]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <guid isPermaLink="false">6l0Dh2IH2d2guyxlXTwE40</guid>
            <dc:creator>Andrew Fitch</dc:creator>
        </item>
        <item>
            <title><![CDATA[Copenhagen & London developers, join us for five events this May]]></title>
            <link>https://blog.cloudflare.com/copenhagen-london-developers/</link>
            <pubDate>Thu, 26 Apr 2018 05:32:00 GMT</pubDate>
            <description><![CDATA[ Are you based in Copenhagen or London? Drop by some talks we're hosting about the use of Go, Kubernetes, and Cloudflare’s Mobile SDK. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Photo by <a href="https://unsplash.com/@nickkarvounis?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Nick Karvounis</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></p><p>Are you based in Copenhagen or London? Drop by one or all of these five events.</p><p><a href="https://twitter.com/0xRLG">Ross Guarino</a> and <a href="https://twitter.com/terinjokes">Terin Stock</a>, both Systems Engineers at Cloudflare are traveling to Europe to lead Go and Kubernetes talks in Copenhagen. They'll then join <a href="https://twitter.com/IcyApril">Junade Ali</a> and lead talks on their use of Go, Kubernetes, and Cloudflare’s Mobile SDK at Cloudflare's London office.</p><p>My Developer Relations teammates and I are visiting these cities over the next two weeks to produce these events with Ross, Terin, and Junade. We’d love to meet you and invite you along.</p><p>Our trip will begin with two meetups and a conference talk in Copenhagen.</p>
    <div>
      <h3>Event #1 (Copenhagen): 6 Cloud Native Talks, 1 Evening: Special KubeCon + CloudNativeCon EU Meetup</h3>
      <a href="#event-1-copenhagen-6-cloud-native-talks-1-evening-special-kubecon-cloudnativecon-eu-meetup">
        
      </a>
    </div>
    
            <figure>
            <a href="https://www.meetup.com/GOTO-Nights-CPH/events/249895973/">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3PkIfrgFfKT97ZlXTCkM8N/b29595b25228a344e0c1b66c880d004f/GOTO.jpeg.jpeg" />
            </a>
            </figure><p><b>Tuesday, 1 May</b>: 17:00-21:00</p><p><b>Location</b>: <a href="https://trifork.com/">Trifork Copenhagen</a> - <a href="https://www.google.com/maps/place/Borgergade+24b,+1300+K%C3%B8benhavn,+Denmark/@55.684785,12.5840548,17z/data=!3m1!4b1!4m5!3m4!1s0x46525318dfb3b89d:0x855a7fb57181604f!8m2!3d55.684785!4d12.5862435">Borgergade 24B, 1300 København K</a></p><p>How to extend your Kubernetes cluster</p><p>A brief introduction to controllers, webhooks and CRDs. Ross and Terin will talk about how Cloudflare’s internal platform builds on Kubernetes.</p><p><b>Speakers</b>: Ross Guarino and Terin Stock</p><p><a href="https://www.meetup.com/GOTO-Nights-CPH/events/249895973/">View Event Details &amp; Register Here »</a></p>
    <div>
      <h3>Event #2 (Copenhagen): Gopher Meetup At Falcon.io: Building Go With Bazel &amp; Internationalization in Go</h3>
      <a href="#event-2-copenhagen-gopher-meetup-at-falcon-io-building-go-with-bazel-internationalization-in-go">
        
      </a>
    </div>
    
            <figure>
            <a href="https://www.meetup.com/Go-Cph/events/249830850/">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1YCo27Er0ncIR677a3eKFL/ae8b09422245f7c111d27f23607e16ff/Viking-Gopher.png" />
            </a>
            </figure><p><b>Wednesday, 2 May</b>: 18:00-21:00</p><p><b>Location</b>: <a href="https://www.falcon.io/">Falcon.io</a> - <a href="https://www.google.com/maps/place/H.+C.+Andersens+Blvd.+27,+1553+K%C3%B8benhavn,+Denmark/@55.674143,12.5629923,15z/data=!4m5!3m4!1s0x4652531251d1c86d:0xd1f236f0ffef562e!8m2!3d55.674143!4d12.571747">H.C. Andersen Blvd. 27, København</a></p><p>Talk 1: Building Go with Bazel</p><p>Fast and Reproducible go builds with Bazel. Learn how to remove Makefiles from your repositories.</p><p><b>Speaker</b>: Ross Guarino</p><p>Talk 2: Internationalization in Go</p><p>Explore making effective use of Go’s internationalization and localization packages and easily making your applications world-friendly.</p><p><b>Speaker</b>: Terin Stock</p><p><a href="https://www.meetup.com/Go-Cph/events/249830850/">View Event Details &amp; Register Here »</a></p>
    <div>
      <h3>Event #3 (Copenhagen): Controllers: Lambda Functions for Extending your Infrastructure at KubeCon + CloudNativeCon 2018</h3>
      <a href="#event-3-copenhagen-controllers-lambda-functions-for-extending-your-infrastructure-at-kubecon-cloudnativecon-2018">
        
      </a>
    </div>
    
            <figure>
            <a href="http://sched.co/DqwM">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DfqqwLIbsg89kEglVpmNr/5ee34593d6192c6cdb9bb3bac21da2e9/Screen-Shot-2018-04-25-at-2.41.41-PM.png" />
            </a>
            </figure><p><b>Friday, 4 May</b>: 14:45-15:20</p><p><b>Location</b>: <a href="https://events.linuxfoundation.org/events/kubecon-cloudnativecon-europe-2018/">KubeCon + CloudNativeCon 2018</a> - <a href="https://www.google.com/maps/place/Bella+Center/@55.6385357,12.5433961,13z/data=!3m1!5s0x465254a4eeec0777:0x55f95a7fe9ed3f83!4m13!1m5!2m4!1sBella+Center,+Center+Blvd.+5,+2300+K%C3%B8benhavn!5m2!5m1!1s2018-04-27!3m6!1s0x465254a363269c3d:0x61db300fc92fb898!5m1!1s2018-04-27!8m2!3d55.6375044!4d12.5785932">Bella Center, Center Blvd. 5, 2300 København</a></p><p>If you happen to be attending <a href="https://events.linuxfoundation.org/events/kubecon-cloudnativecon-europe-2018/">KubeCon + CloudNativeCon 2018</a>, check out Terin and Ross’s conference talk as well.</p><p>This session demonstrates how to leverage Kubernetes Controllers and Initializers as a framework for building transparent extensions of your Kubernetes cluster. Using a live coding exercise and demo, this presentation will showcase the possibilities of the basic programming paradigms the Kubernetes API server makes easy.</p><p><b>Speakers</b>: Ross Guarino and Terin Stock</p><p><a href="http://sched.co/DqwM">View Event Details &amp; Register Here »</a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NWrQuZUZgMIy7uJZv0OWr/4fe475faee0e83937f10542f86e6bb4c/photo-1508808402998-ec38e4bf0fd0" />
            
            </figure><p>Photo by <a href="https://unsplash.com/@photobuffs?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Paul Buffington</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></p><p>When <a href="https://events.linuxfoundation.org/events/kubecon-cloudnativecon-europe-2018/">KubeCon + CloudNativeCon 2018</a> concludes, we're all heading to the Cloudflare London office where we are hosting two more meetups.</p>
    <div>
      <h3>Event #4 (London): Kubernetes Controllers: Lambda Functions for Extending your Infrastructure</h3>
      <a href="#event-4-london-kubernetes-controllers-lambda-functions-for-extending-your-infrastructure">
        
      </a>
    </div>
    
            <figure>
            <a href="https://kubernetes-controlers.eventbrite.com">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4RvxFZQ2Thh4N7J4zBOcSu/4c02fcfd43a2fd108b19fac3c0e5aab8/Cloudflare-London.jpg" />
            </a>
            </figure><p><b>Wednesday, 9 May</b>: 18:00-20:00</p><p><b>Location</b>: Cloudflare London - <a href="https://www.google.com/maps/place/25+Lavington+St,+London+SE1+0NZ,+UK/@51.5047963,-0.1024043,17z/data=!3m1!4b1!4m5!3m4!1s0x487604a8a2b9c4f1:0x1126c5560c56cc41!8m2!3d51.5047963!4d-0.1002156">25 Lavington St, Second floor | SE1 0NZ London</a></p><p>This session demonstrates how to leverage Kubernetes Controllers and Initializers as a framework for building transparent extensions of your Kubernetes cluster. Using a live coding exercise and demo, this presentation will showcase the possibilities of the basic programming paradigms the Kubernetes API server makes easy. As an SRE, learn to build custom integrations directly into the Kubernetes API that transparently enhance the developer experience.</p><p><b>Speakers</b>: Ross Guarino and Terin Stock</p><p><a href="https://kubernetes-controlers.eventbrite.com">View Event Details &amp; Register Here »</a></p>
    <div>
      <h3>Event #5 (London): Architecture for Network Failure, Developing for Mobile Performance</h3>
      <a href="#event-5-london-architecture-for-network-failure-developing-for-mobile-performance">
        
      </a>
    </div>
    
            <figure>
            <a href="https://mobilearchitectureandperformance.eventbrite.com">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/atA3RsFZPPZbbHcZKMhZW/1c5d56415e2513375ef5e6db50344910/Screen-Shot-2018-04-25-at-8.59.10-AM.png" />
            </a>
            </figure><p><b>Thursday, 10 May</b>: 18:00-20:00</p><p><b>Location</b>: Cloudflare London - <a href="https://www.google.com/maps/place/25+Lavington+St,+London+SE1+0NZ,+UK/@51.5047963,-0.1024043,17z/data=!3m1!4b1!4m5!3m4!1s0x487604a8a2b9c4f1:0x1126c5560c56cc41!8m2!3d51.5047963!4d-0.1002156">25 Lavington St, Second floor | SE1 0NZ London</a></p><p>Whether you're building an <a href="https://www.cloudflare.com/ecommerce/">e-commerce app</a> or a new mobile game, chances are you'll be needing some network functionality at some point when building a mobile app. Network performance can vary dramatically between carriers, networks, and APIs, but far too often mobile apps are tested inconsistent conditions with the same decent network performance. Fortunately we can iterate on our apps by collecting real-life performance measurements from your users; however, unfortunately existing mobile app analytics platforms only provide visibility into in-app performance but have no knowledge about outgoing network call.</p><p>This talk will cover how you can easily collect vital performance data from your users at no cost and then use this data to improve your apps' reliability and experience, discussing the tips and tricks needed to <a href="https://www.cloudflare.com/solutions/ecommerce/optimization/">boost app performance</a>.</p><p><b>Speaker</b>: Junade Ali</p><p><a href="https://mobilearchitectureandperformance.eventbrite.com">View Event Details &amp; Register Here »</a></p>
    <div>
      <h3>More About the Speakers</h3>
      <a href="#more-about-the-speakers">
        
      </a>
    </div>
    <p><a href="https://twitter.com/0xRLG">Ross Guarino</a> is a Systems Engineer at Cloudflare in charge of the technical direction of the internal platform. He’s determined to improve the lives of developers building and maintaining everything from a simple function to complex globally distributed systems.</p><p><a href="https://twitter.com/terinjokes">Terin Stock</a> is a long-time engineer at Cloudflare, currently working on building an internal Kubernetes cluster. By night, he hacks on building new hardware projects. Terin is also a member of <a href="https://gulpjs.com/">gulp.js</a> core team and the author of the <a href="https://github.com/terinjokes/StickersStandard">Sticker Standard</a>.</p><p><a href="https://twitter.com/IcyApril">Junade Ali</a> is a software engineer who is specialised in computer security and software architecture. Currently, Junade works at Cloudflare as a polymath, and helps make the Internet more secure and faster; prior to this, he was a technical lead at some of the UK's leading digital agencies before moving into architecting software for mission-critical road-safety systems.</p><p>We'll hope to meet you soon!</p> ]]></content:encoded>
            <category><![CDATA[Events]]></category>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Kubernetes]]></category>
            <category><![CDATA[Go]]></category>
            <category><![CDATA[Mobile SDK]]></category>
            <category><![CDATA[Cloudflare Meetups]]></category>
            <category><![CDATA[MeetUp]]></category>
            <guid isPermaLink="false">4KmQqQHsaL4hmb1fHLo2VX</guid>
            <dc:creator>Andrew Fitch</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Carbon Neutral North America]]></title>
            <link>https://blog.cloudflare.com/a-carbon-neutral-north-america/</link>
            <pubDate>Mon, 23 Apr 2018 17:15:26 GMT</pubDate>
            <description><![CDATA[ In an effort to conduct processes in a sustainable manner, we’ve reduced Cloudflare’s environmental impact by contracting to purchase regional renewable energy certificates, or “RECs,” to match 100% of the electricity used in our North American data centers as well as our U.S. offices. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Photo by <a href="https://unsplash.com/@inf1783?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Karsten Würth (@inf1783)</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></p><p>Cloudflare's mission is to help build a better Internet. While working toward our goals, we want to make sure our processes are conducted in a sustainable manner.</p><p>In an effort to do so, we’ve reduced Cloudflare’s environmental impact by contracting to purchase regional renewable energy certificates, or “RECs,” to match 100% of the electricity used in our North American data centers as well as our U.S. offices. Cloudflare now has servers in 154 unique cities around the world, with 38 located in North America. Cloudflare has opted to support geographically diverse projects in proximity to our office and data center electricity usage. This renewable energy initiative reduces our electricity-based carbon footprint by 5,561 tons of CO2 which has a positive environmental impact. The impact can be compared to growing 144,132 trees seedlings for 10 years, or taking 1,191 cars off the road for one year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/744loBnM7zHh1egPMIbsNP/5c0fb4e417b642bda29144c8dafb1f13/rec_diagram_3degrees.gif" />
            
            </figure><p>How does buying a REC help reduce Cloudflare's carbon footprint you may ask? When 1MWh of electricity is produced from a renewable generator, such as a wind turbine, there are two products: the energy, which is delivered to the grid and mixes with other forms of energy, and the REC. When renewable energy is delivered to the grid, it cannot be distinguished from electrons from non-renewable sources. The REC is a way to track the renewable electricity and is like a receipt for owning the environmental benefits associated with the generation of renewable energy. RECs allow individuals and businesses to support renewable energy development and help to make renewable energy projects financially viable while lowering carbon footprints.</p><p>This purchase is an important step on our sustainability path. It is part of a broader sustainability effort which includes working with more data centers that specialize in lowering their PUE (Power Usage Effectiveness), as well as waste diversion and energy efficiency measures already in place in our offices worldwide. Moving forward, we plan to increase our renewable energy commitment to match energy used in our data centers and offices globally. We look forward to this and other opportunities to increase support of renewable energy and reduce our carbon footprint!</p> ]]></content:encoded>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Data Center]]></category>
            <category><![CDATA[North America]]></category>
            <guid isPermaLink="false">6oTLhFNplntvWtOrLuaMzl</guid>
            <dc:creator>Jess Bailey</dc:creator>
        </item>
        <item>
            <title><![CDATA[NAT To Be Missed At SXSW]]></title>
            <link>https://blog.cloudflare.com/sxsw/</link>
            <pubDate>Tue, 06 Mar 2018 19:00:00 GMT</pubDate>
            <description><![CDATA[ We’re at the EDGE of our seats, about to LANd in Austin, Texas in route for SXSW. (TKIP, hip, hooray!)  ARP you going to be there? We R going to have three epoch sessions by Cloudflare speakers.  ]]></description>
            <content:encoded><![CDATA[ <p>We’re at the <a href="https://en.wikipedia.org/wiki/Enhanced_Data_Rates_for_GSM_Evolution"><b>EDGE</b></a> of our seats, about to <a href="https://en.wikipedia.org/wiki/Local_area_network"><b>LAN</b></a>d in Austin, Texas in <a href="https://en.wikipedia.org/wiki/Route_(command)"><b>route</b></a> for SXSW. (<a href="https://en.wikipedia.org/wiki/Temporal_Key_Integrity_Protocol"><b>TKIP</b></a>, h<a href="https://en.wikipedia.org/wiki/Internet_Protocol"><b>ip</b></a>, hooray!)</p><p><a href="https://en.wikipedia.org/wiki/Address_Resolution_Protocol"><b>ARP</b></a> you going to be there? We <a href="https://en.wikipedia.org/wiki/R_(programming_language)"><b>R</b></a> going to have three <a href="https://en.wikipedia.org/wiki/Unix_time"><b>epoch</b></a> <a href="https://en.wikipedia.org/wiki/Session_(computer_science)"><b>sessions</b></a> by Cloudflare speakers. <a href="https://linux.die.net/man/8/ifdown"><b>Ifdown</b></a>, seems <a href="https://linux.die.net/man/8/apt"><b>apt</b></a> you could <a href="https://en.wikipedia.org/wiki/Select_(SQL)"><b>SELECT</b></a> to <a href="https://en.wikipedia.org/wiki/Join_(SQL)"><b>JOIN</b></a>. <a href="https://linux.die.net/man/1/cat"><b>Cat</b></a> make it? Not a <a href="http://man7.org/linux/man-pages/man1/bg.1p.html"><b>bg</b></a> deal, <a href="https://linux.die.net/man/1/wget"><b>wget</b></a> it (though it <a href="https://en.wikipedia.org/wiki/Hertz"><b>mega hertz</b></a> we won’t <a href="https://en.wikipedia.org/wiki/C_(programming_language)"><b>C</b></a> you). All the audio from the three sessions will be recorded, you can listen to the <a href="https://www.unix.com/man-page/posix/1posix/cd/"><b>cd</b></a>.</p><p><a href="https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup"><b>WPS</b></a>! I almost forgot to <a href="https://en.wikipedia.org/wiki/Telnet"><b>tel(net)</b></a> you <a href="https://en.wikipedia.org/wiki/WHOIS"><b>whois</b></a> going to be there, and <a href="https://en.wikipedia.org/wiki/Wide_area_network"><b>WAN</b></a> and where to <a href="https://en.wikipedia.org/wiki/Go_(programming_language)"><b>go</b></a>.</p><p>On Friday, March 9, I’m <a href="https://schedule.sxsw.com/2018/events/PP78776">moderating a panel</a> with Emily Schechter from Google, Aaron DeVera from Deloitte and Gabe Kassel from eero about how Wi-Fi networks work and <a href="https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy"><b>WEP</b></a> happens when attackers <a href="https://en.wikipedia.org/wiki/Wi-Fi_over_Coax"><b>coax</b></a> people into joining insecure networks. It’s at Salon K in the Hilton at 3:30PM.</p><p>On Sunday the 11th, <a href="/author/nitin-rao/">Nitin Rao</a> is <a href="https://schedule.sxsw.com/2018/events/PP78457">on a panel</a> with Heather West from Mozilla, Stefan Lederer from Bitmovin and Fred Benenson from Unlimited Liability Corporation LLC about the impact of the recent revocation of Net Neutrality rules on online video streaming. It’s at 11AM at Salon J in the Hilton. Nitin is really good at putting concepts in a <a href="https://en.wikipedia.org/wiki/GNU"><b>GNU</b></a> <a href="https://en.wikipedia.org/wiki/Frame_rate"><b>frame</b></a>, so I expect this to be a <a href="https://en.wikipedia.org/wiki/Bit_rate"><b>bit (g)rate</b></a>. <a href="http://www.linfo.org/whoami.html"><b>Whoami</b></a> kidding? It will be <a href="https://en.wikipedia.org/wiki/Emacs"><b>emacs</b></a>-ulate.</p><p>And then on Thursday March 15th, <a href="/author/marc-rogers/">Marc Rogers</a> is <a href="https://schedule.sxsw.com/2018/events/PP79265">giving a talk</a> about how he hacked the Tesla Model S and the current state of automotive security. (The <a href="https://en.wikipedia.org/wiki/Top-level_domain"><b>TLD</b></a>(r) is that it’s a long road ahead, but automotive companies are driven to make it better). It’s at 11am in Room 203-204 at the JW Marriot. He gave a <a href="https://www.youtube.com/watch?v=KX_0c9R4Fng">similar talk at Defcon</a> so this is kind of a <a href="https://en.wikipedia.org/wiki/SQL"><b>SQL</b></a>.</p><p>There’s a lot but looking forward to <a href="https://en.wikipedia.org/wiki/Network_packet"><b>packet</b></a> all in. <a href="https://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineers"><b>IEEE</b></a> hope you can join!</p><p>--</p><p>MAR 9, 2018 | 3:30PM – 4:30PM | HILTON AUSTIN DOWNTOWN SALON K<a href="https://schedule.sxsw.com/2018/events/PP78776">Should I Use This Wi-Fi?</a></p><p><i>You’re sitting at the gate, about to connect to the free airport Wi-Fi when you stop and think. You’ve heard something about insecure public Wi-Fi before, but could using a bad Wi-Fi network really leak your data or let someone hack your Facebook? Just as there will never be perfect code, there will always be inherent flaws in the tools we use to communicate, work and pay our bills. Find out how vulnerabilities in the web are exploited and what that means in the future of our online privacy.</i></p><p>MAR 11, 2018 | 11:00AM – 12:00PM | HILTON AUSTIN DOWNTOWN SALON J<a href="https://schedule.sxsw.com/2018/events/PP78457">Fighting the Demise of Net Neutrality w/Innovation</a></p><p><i>As consumer demand for streaming video explodes, digital publishers are scrambling to upgrade their video production capabilities in the fight for viewer eyeballs. But in light of eroding net neutrality protections, publishers must ensure their streaming infrastructure delivers a stellar consumer experience in order to stay relevant and compete with giants like Netflix and YouTube. Hear from industry leaders on how the war on net neutrality will alter how audiences consume video.</i></p><p>MAR 15, 2018 | 11:00AM – 12:00PM | JW MARRIOTT ROOM 203-204<a href="https://schedule.sxsw.com/2018/events/PP79265">Who’s Really in Control of Self-Driving Cars?</a></p><p><i>A few years back, I hacked the Tesla Model S. Scary, right? Actually, it’s not as scary as it seems. In this session, I’ll discuss the current state of automotive security as I see it and give a deep dive discussion on where security needs to be moving forward. I’ll discuss the steps needed to hack a car, the cars that are most vulnerable, the security of self-driving cars, and how concerned consumers can protect themselves.</i></p> ]]></content:encoded>
            <category><![CDATA[Life at Cloudflare]]></category>
            <category><![CDATA[Events]]></category>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[SXSW]]></category>
            <guid isPermaLink="false">6B4Xd2sDxlDfu2SbRz2lX6</guid>
            <dc:creator>Dani Grant</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare ♥ Open Source: upgrade to Pro Plan on the house]]></title>
            <link>https://blog.cloudflare.com/cloudflare-open-source-your-upgrade-is-on-the-house/</link>
            <pubDate>Wed, 14 Feb 2018 19:11:19 GMT</pubDate>
            <description><![CDATA[ Making core contributions to a qualifying open source project? We want to thank you for your work for the community with a free Pro Plan upgrade. ]]></description>
            <content:encoded><![CDATA[ <p>Happy Valentine's Day, Internet!</p><p>There’s a special place in our heart for all the open source projects that support the Internet and improve the lives of everyone in the developer community, and today seems like an appropriate time to express the gratitude we have for the non-profit / volunteer-run projects that hold everything together.</p><p>Cloudflare uses a lot of open source software and also <a href="https://cloudflare.github.io/">contributes to open source</a>. Informally, Cloudflare has already been upgrading the plans of certain eligible open source projects that have reached out to us or that we have interfaced with. Here are some of the projects whose landing pages are already protected by Cloudflare.</p>
            <figure>
            <a href="https://developers.cloudflare.com/sponsorships/">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Bk9BqNYgeQRZYl6Uha9d2/8473fc532409298d2271042c14f13099/opensource-sponsorships-1.png" />
            </a>
            </figure><p>To really pay the goodwill forward, we want to make this opportunity common knowledge in the developer community. In 2018, we intend to provide free <a href="https://www.cloudflare.com/plans/pro/">Cloudflare Pro Plan</a> upgrades to eligible open source projects (subject to a case-by-case evaluation) that:</p><ol><li><p>provide engineering tools or resources to the developer community; and</p></li><li><p>are volunteer-run or working on a non-profit basis.</p></li></ol><blockquote><p>Are you an open source project using <a href="https://twitter.com/Cloudflare?ref_src=twsrc%5Etfw">@Cloudflare</a>? We want to give you a free Pro Plan to thank you for your work for the community.  ? -&gt; <a>os-sponsorship@cloudflare.com</a> Please RT!</p><p>— Cloudflare (@Cloudflare) <a href="https://twitter.com/Cloudflare/status/958407278700515329?ref_src=twsrc%5Etfw">January 30, 2018</a></p></blockquote><p>Making core contributions to a qualifying open source project? Drop a line to <a>os-sponsorship@cloudflare.com</a> with a link to the project’s landing page, repo, and a description of what engineering tools or resources your project provides to the developer community.</p><p>And please <a href="https://twitter.com/Cloudflare/status/958407278700515329">RT this opportunity</a>, and <a href="https://www.facebook.com/Cloudflare/posts/10155594064085432">share it</a> with all the open source contributors in your life. Thanks!</p> ]]></content:encoded>
            <category><![CDATA[Open Source]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">qrpZspi2kEuieIU7A4YKl</guid>
            <dc:creator>Jade Q. Wang</dc:creator>
        </item>
    </channel>
</rss>