
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 07 Apr 2026 19:35:17 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Standing up for the open Internet: why we appealed Italy’s "Piracy Shield" fine]]></title>
            <link>https://blog.cloudflare.com/standing-up-for-the-open-internet/</link>
            <pubDate>Mon, 16 Mar 2026 19:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is appealing a €14 million fine from Italian regulators over "Piracy Shield," a system that forces providers to block content without oversight. We are challenging this framework to protect the Internet from disproportionate overblocking and lack of due process. ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare, our mission is to help build a better Internet. Usually, that means rolling out new services to our millions of users or defending the web against the world’s largest cyber attacks. But sometimes, building a better Internet requires us to stand up against laws or regulations that threaten its fundamental architecture.</p><p>Last week, Cloudflare continued its legal battle against "Piracy Shield,” a misguided Italian regulatory scheme designed to protect large rightsholder interests at the expense of the broader Internet. After Cloudflare resisted registering for Piracy Shield and challenged it in court, the Italian communications regulator, AGCOM, fined Cloudflare a staggering €14 million (~$17 million). We appealed that fine on March 8, and we continue to challenge the legality of Piracy Shield itself. </p><p>While the fine is significant, the principles at stake are even larger. This case isn't just about a single penalty; it’s about whether a handful of private entities can prioritize their own economic interests over those of Internet users by forcing global infrastructure providers to block large swaths of the Internet without oversight, transparency, or due process.</p>
    <div>
      <h3>What is Piracy Shield?</h3>
      <a href="#what-is-piracy-shield">
        
      </a>
    </div>
    <p>To understand why we are fighting this, it’s necessary to take a step back and understand Piracy Shield. Marketed by AGCOM as an innovative tool to fight copyright infringement, the system is better understood as a blunt tool for rightsholders to control what is available on the Internet without any traditional legal safeguards.</p><p>Piracy Shield is an unsupervised electronic portal through which an unidentified set of Italian media companies can submit websites and IP addresses that online service providers registered with Piracy Shield are then required to block within 30 minutes. Piracy Shield operates as a “black box” because there is:</p><ul><li><p><b>No judicial oversight:</b> Private companies, not judges or government officials, decide what gets blocked.</p></li><li><p><b>No transparency:</b> The public, and even the service providers themselves, are often left in the dark about who requested a block or why.</p></li><li><p><b>No due process:</b> There is no mechanism for a website owner to challenge a block before their site becomes unavailable on the Italian web.</p></li><li><p><b>No redress:</b> Along with a complete lack of transparency or due process, Piracy Shield offers no effective way for impacted parties to seek redress from erroneous blocking.</p></li></ul><p>It’s not entirely surprising that Piracy Shield so clearly prioritizes the economic interests of media companies over the rights of Italian Internet users. The system was “donated” to the Italian government by SP Tech, an arm of the law firm that represents several of Piracy Shield’s major direct beneficiaries, including Lega Nazionale Professionisti Serie A (Italy’s major soccer league).</p>
    <div>
      <h3>The high cost of Piracy Shield</h3>
      <a href="#the-high-cost-of-piracy-shield">
        
      </a>
    </div>
    <p>Almost immediately after Piracy Shield was rolled out, there were significant problems. In addition to the unworkable 30-minute deadline and the lack of safeguards described above, the scheme requires service providers to engage in IP address blocking. This creates an unavoidable risk of <a href="https://blog.cloudflare.com/consequences-of-ip-blocking/"><u>overblocking innocent websites</u></a> due to the fact that IP addresses are regularly and necessarily shared by thousands of websites. Not surprisingly, within a few months of its launch, Piracy Shield caused major outages for people and businesses who had done nothing wrong. </p><p>Notable failures include:</p><ul><li><p><b>Government and educational blackouts: </b>Tens of thousands of legitimate sites were rendered inaccessible from Italy, including Ukrainian government websites for schools and scientific research.</p></li><li><p><b>Small business &amp; NGO disruption:</b> A wide range of European small businesses and NGOs focused on social programs for women and children were inadvertently blocked.</p></li><li><p><b>Loss of essential services:</b> The system blocked access to Google Drive for over 12 hours, preventing thousands of Italian students and professionals from accessing critical files.</p></li><li><p><b>Persistent collateral blocking:</b> A September 2025 <a href="https://research.utwente.nl/en/publications/90th-minute-a-first-look-to-collateral-damages-and-efficacy-of-th/"><u>study</u></a> by the University of Twente confirmed that the system routinely blocks legitimate websites for months at a time.</p></li></ul><p>Even when faced with clear evidence that Piracy Shield has caused significant and repeated overblocking, AGCOM did not change course. Rather, it chose to <i>expand</i> Piracy Shield to apply to global DNS providers and VPNs, services which are closely associated with privacy and free expression. AGCOM also started taking increasingly aggressive steps to force global service providers, even ones with no legal or operational presence in Italy, to register with Piracy Shield.</p>
    <div>
      <h3>Cloudflare’s principled challenge</h3>
      <a href="#cloudflares-principled-challenge">
        
      </a>
    </div>
    <p>Cloudflare has been clear about the risks posed by Piracy Shield from the beginning. In 2024, we met with AGCOM to highlight the scheme’s structural flaws and <a href="https://labs.ripe.net/author/antonio-prado/live-event-blocking-at-scale-effectiveness-vs-collateral-damage-in-italys-piracy-shield/"><u>consequences</u></a> and proposed <a href="https://blog.cloudflare.com/h1-2025-transparency-report/"><u>more effective ways to collaborate</u></a> that wouldn't break the Internet’s core architecture.  </p><p>When these concerns were ignored, we moved on to legal action. We challenged AGCOM’s effort to force Cloudflare to join Piracy Shield in the Italian administrative courts and, along with the Computer &amp; Communications Industry Association (CCIA), we filed a complaint with the European Commission. More informally, we have continued to reach out to government officials both in Italy and at the EU level to explain our position and make our concerns known. Our position has been consistent and remains that Piracy Shield is incompatible with EU law, most notably the Digital Services Act (DSA), which requires that any content restriction be proportionate and subject to strict procedural safeguards.</p><p>The European Commission, following our complaint, expressed similar concerns, issuing a <a href="https://assets.ctfassets.net/zkvhlag99gkb/2GPYK05HVkVtsXNlZG4VsP/f4a0b571e8be3bb43e28b20973f0a1cb/2025-148-it-en-6852dc2dd741b167827775.pdf"><u>letter</u></a> on June 13, 2025, criticizing the lack of oversight inherent in the Piracy Shield framework. And on December 23, 2025, the Italian administrative court issued an encouraging ruling requiring AGCOM to share with Cloudflare all the records that purportedly support Piracy Shield blocking orders. While we have not yet received those records, we expect them to shed significant light on Piracy Shield’s operations. </p>
    <div>
      <h3>An excessive fine and still no transparency</h3>
      <a href="#an-excessive-fine-and-still-no-transparency">
        
      </a>
    </div>
    <p>Rather than awaiting the outcome of our legal challenges, and less than one week after being ordered to disclose Piracy Shield records to Cloudflare, AGCOM moved on December 29, 2025, to issue its fine. The fine’s timing was not the only eyebrow-raising thing about it. The math behind the penalty is as flawed as the system it is seeking to enforce.</p><p>Under Italian law, fines for non-compliance are capped at 2% of a company’s revenue <i>within the relevant jurisdiction</i>. Based on Cloudflare’s Italian earnings, that cap should have limited any fine to approximately €140,000. Instead, AGCOM calculated the fine based on our <i>global</i> revenue, resulting in a penalty nearly 100 times higher than the legal limit.</p><p>This disproportionate approach sends a chilling message to the global tech community: if you question a flawed regulatory system or defend the rights of your users and the global Internet, you risk facing punitive and excessive financial retaliation.</p><p>At the same time, AGCOM still has not shared with Cloudflare the Piracy Shield records that it was ordered to disclose. Instead, just four days before the deadline for disclosure, AGCOM informed us that it would make some of the records available for inspection at an AGCOM facility in Naples, subject to supervision by AGCOM officials. These limitations are not just unreasonably burdensome and contrary to the letter and spirit of the disclosure order; they raise real questions about why AGCOM is so intent on resisting transparency.</p>
    <div>
      <h3>Next steps: the path forward</h3>
      <a href="#next-steps-the-path-forward">
        
      </a>
    </div>
    <p>We are not backing down. Cloudflare is appealing the €14 million fine, pushing for full access to AGCOM’s Piracy Shield records, and will continue to challenge the underlying legality of the Piracy Shield blocking orders in the Italian administrative courts.</p><p>We recognize that rightsholders have a legitimate interest in protecting their content. In fact, we work with rightsholders every day to address infringement in ways that are precise and effective. But those interests cannot override the basic requirements of legal due process or the technical integrity of the global Internet and our network.</p><p>We will continue to pursue this challenge in the Italian courts and through the European Commission. Global connectivity is too important to be governed by "black boxes" with 30-minute deadlines that result in widespread overblocking with no means of redress. Cloudflare remains committed to building a better Internet: one where the rules are transparent, the regulators are accountable, and the infrastructure that connects the world remains free, open, and secure.</p> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Transparency]]></category>
            <category><![CDATA[Internet Regulation]]></category>
            <category><![CDATA[Cybersecurity]]></category>
            <guid isPermaLink="false">6V4c3s6W2nqoSNaUeUpqWX</guid>
            <dc:creator>Patrick Nemeroff</dc:creator>
            <dc:creator>Emily Terrell</dc:creator>
        </item>
        <item>
            <title><![CDATA[Google’s AI advantage: why crawler separation is the only path to a fair Internet]]></title>
            <link>https://blog.cloudflare.com/uk-google-ai-crawler-policy/</link>
            <pubDate>Fri, 30 Jan 2026 17:01:04 GMT</pubDate>
            <description><![CDATA[ Google's dual-purpose crawler creates an unfair AI advantage. To protect publishers and foster competition, the UK’s Competition and Markets Authority must mandate crawler separation for search and AI. ]]></description>
            <content:encoded><![CDATA[ <p>Earlier this week, the UK’s Competition and Markets Authority (CMA) <a href="https://www.gov.uk/government/news/cma-proposes-package-of-measures-to-improve-google-search-services-in-uk"><u>opened its consultation</u></a> on a package of proposed conduct requirements for Google. The consultation invites comments on the proposed requirements before the CMA imposes any final measures. These new rules aim to address the lack of choice and transparency that publishers (broadly defined as “any party that makes content available on the web”) face over how Google uses search to fuel its generative AI services and features. These are the first consultations on conduct requirements launched under the digital markets competition regime in the UK. </p><p>We welcome the CMA’s recognition that publishers need a fairer deal and believe the proposed rules are a step into the right direction. Publishers should be entitled to have access to tools that enable them to control the inclusion of their content in generative AI services, and AI companies should have a level playing field on which to compete. </p><p>But we believe the CMA has not gone far enough and should do more to safeguard the UK’s creative sector and foster healthy competition in the market for generative and agentic AI. </p>
    <div>
      <h2>CMA designation of Google as having Strategic Market Status </h2>
      <a href="#cma-designation-of-google-as-having-strategic-market-status">
        
      </a>
    </div>
    <p>In January 2025, the UK’s regulatory landscape underwent a significant legal shift with the implementation of the Digital Markets, Competition and Consumers Act 2024 (DMCC). Rather than relying on antitrust investigations to address risks to competition, the CMA can now designate firms as having Strategic Market Status (SMS) when they hold substantial, entrenched market power. This designation allows for targeted CMA interventions in digital markets, such as imposing detailed conduct requirements, to improve competition. </p><p>In October 2025, the CMA <a href="https://assets.publishing.service.gov.uk/media/68e8b643cf65bd04bad76724/Final_decision_-_strategic_market_status_investigation_into_Google_s_general_search_services.pdf"><u>designated Google</u></a> as having SMS in general search and search advertising, given its 90 percent share of the search market in the UK. Crucially, this designation encompasses AI Overviews and AI Mode, with the CMA now having the authority to impose conduct requirements on Google’s search ecosystem. Final requirements imposed by the CMA are not merely suggestions but legally enforceable rules that can relate specifically to AI crawling with significant sanctions to ensure Google operates fairly. </p>
    <div>
      <h2>Publishers need a meaningful way to opt out of Google’s use of their content for generative AI</h2>
      <a href="#publishers-need-a-meaningful-way-to-opt-out-of-googles-use-of-their-content-for-generative-ai">
        
      </a>
    </div>
    <p>The CMA’s designation could not be more timely. As we’ve <a href="https://blog.cloudflare.com/building-a-better-internet-with-responsible-ai-bot-principles/"><u>said before</u></a>, we are indisputably in a time when the Internet needs clear “rules of the road” for AI crawling behavior. </p><p>As the CMA rightly <a href="https://assets.publishing.service.gov.uk/media/6979d0bf75d44370965520a0/Publisher_conduct_requirement.pdf"><u>states</u></a>, “publishers have no realistic option but to allow their content to be crawled for Google’s general search because of the market power Google holds in general search. However, Google currently uses that content in both its search generative AI features and in its broader generative AI services.” </p><p>In other words: the same content that Google scrapes for search indexing is also used for inference/grounding purposes, like AI Overviews and AI Mode, which rely on fetching live information from the Internet in response to real-time user queries. And that creates a big problem for publishers—and for competition.</p><p>Because publishers cannot afford to disallow or block Googlebot, Google’s search crawler, on their website, they have to accept that their content will be used in generative AI applications such as AI Overviews and AI Mode within Google Search that <a href="https://blog.cloudflare.com/crawlers-click-ai-bots-training/"><u>return very little, if any, traffic to their websites</u></a>. This undermines the ad-supported business models that have sustained digital publishing for decades, given the critical role of Google Search in driving human traffic to online advertising. It also means that Google’s generative AI applications enter into direct competition with publishers by reproducing their content, most often without attribution or compensation. </p><p>Publishers’ reluctance to block Google because of its dominance in search gives Google an unfair competitive advantage in the market for generative and agentic AI. Unlike other AI bot operators, Google can use its search crawler to gather data for a variety of AI functions with little fear that its access will be restricted. It has minimal incentive to pay publishers for that data, which it is already getting for free. </p><p>This prevents the emergence of a well-functioning marketplace where AI developers negotiate fair value for content. Instead, other AI companies are disincentivized from coming to the table, as they are structurally disadvantaged by a system that allows one dominant player to bypass compensation entirely. As the CMA itself <a href="https://assets.publishing.service.gov.uk/media/6979d05275d443709655209f/Introduction_to_the_consultation.pdf"><u>recognizes</u></a>, "[b]y not providing sufficient control over how this content is used, Google can limit the ability of publishers to monetise their content, while accessing content for AI-generated results in a way that its competitors cannot match”. </p>
    <div>
      <h2>Google’s advantage</h2>
      <a href="#googles-advantage">
        
      </a>
    </div>
    <p>Cloudflare data validates the concern about Google’s competitive advantage. Based on our data, Googlebot sees significantly more Internet content than its closest peers. </p><p>Over an observed period of two months, Googlebot successfully accessed individual pages almost two times more than ClaudeBot and GPTBot, three times more than Meta-ExternalAgent, and more than three times more than Bingbot. The difference was even more extreme for other popular AI crawlers: for instance, Googlebot saw 167 times more unique pages than PerplexityBot. Out of the sampled unique URLs using our network that we observed over the last two months, Googlebot crawled roughly 8%.</p><p><b>In rounded multiple terms, Googlebot sees:</b></p><ul><li><p>vs. ~1.70x the amount of unique URLs seen by ClaudeBot;</p></li><li><p>vs. ~1.76x the amount of unique URLs seen by GPTBot;</p></li><li><p>vs. ~2.99x the amount of unique URLs by Meta-ExternalAgent;</p></li><li><p>vs. ~3.26x the amount of unique URLs seen by Bingbot;</p></li><li><p>vs. ~5.09x the amount of unique URLs seen by Amazonbot;</p></li><li><p>vs. ~14.87x the amount of unique URLs seen by Applebot;</p></li><li><p>vs. ~23.73x the amount of unique URLs seen by Bytespider;</p></li><li><p>vs. ~166.98x the amount of unique URLs seen by PerplexityBot;</p></li><li><p>vs. ~714.48x the amount of unique URLs seen by CCBot; and</p></li><li><p>vs: ~1801.97x the amount of unique URLs seen by archive.org_bot.</p></li></ul><p>Googlebot also stands out in other Cloudflare datasets.  </p><p>Even though it ranks as the most active bot by overall traffic, publishers are far less likely to disallow or block Googlebot in their <a href="https://www.cloudflare.com/learning/bots/what-is-robots-txt/"><u>robots.txt file</u></a> compared to other crawlers. This is likely due to its importance in driving human traffic to their content—and, as a result, ad revenue—through search. </p><p>As shown below, almost no website explicitly disallows the dual-purpose Googlebot in full, reflecting how important this bot is to driving traffic via search referrals. (Note that partial disallows often impact certain parts of a website that are irrelevant for search engine optimization, or SEO, such as login endpoints.)</p>
<p>
Robots.txt merely allows the expression of crawling preferences; it is not an enforcement mechanism. Publishers rely on “good bots” to comply. To manage crawler access to their sites more effectively—and independently of a given bot’s compliance—publishers can set up a Web Application Firewall (WAF) with specific rules, technically preventing undesired crawlers from accessing their sites. Following the same logic as with robots.txt above, we would expect websites to block mostly other AI crawlers but not Googlebot. </p><p>Indeed, when comparing the numbers for customers using <a href="https://www.cloudflare.com/lp/pg-ai-crawl-control/"><u>AI Crawl Control</u></a>, Cloudflare’s own <a href="https://developers.cloudflare.com/ai-crawl-control/configuration/ai-crawl-control-with-waf/"><u>AI crawler blocking tool</u></a> that is integrated in our Application Security suite, between July 2025 and January 2026, one can see that the number of websites actively blocking other popular AI crawlers (e.g., GPTBot, Claudebot), was nearly seven times as high as the number of websites that blocked Googlebot and Bingbot. (Like Googlebot, Bingbot combines search and AI crawling and drives traffic to these sites, but given its small market share in search, its impact is less significant.)</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/344ATKpYmJHsSRlEtxQen5/2fc5da1211b4fd0189e026f0ec19548f/BLOG-3170_3.png" />
          </figure><p>So we agree with the CMA on the problem statement. But how can publishers be enabled to effectively opt out of Google using their content for its generative AI applications? We share the CMA’s conclusion that “in order to be able to make meaningful decisions about how Google uses their Search Content, (...) publishers need the ability effectively to opt their Search Content out of both Google’s search generative AI features and Google’s broader generative AI services.” </p><p>But we’re concerned that the CMA’s proposal is insufficient.</p>
    <div>
      <h2>CMA’s proposed publisher conduct requirements</h2>
      <a href="#cmas-proposed-publisher-conduct-requirements">
        
      </a>
    </div>
    <p>On January 28, 2026, the CMA published four sets of proposed conduct requirements for Google, including <a href="https://assets.publishing.service.gov.uk/media/6979ceae75d443709655209c/Publisher_conduct_requirement.pdf"><u>conduct requirements related to publishers</u></a>. According to the CMA, the proposed publisher rules are designed to address concerns that publishers (1) lack sufficient choice over how Google uses their content in its AI-generated responses, (2) have limited transparency into Google’s use of that content, and (3) do not get effective attribution for Google’s use of their content. The CMA recognized the importance of these concerns because of the role that Google search plays in finding content online. </p><p>The conduct requirements would mandate Google grant publishers <a href="https://assets.publishing.service.gov.uk/media/6979d05275d443709655209f/Introduction_to_the_consultation.pdf"><u>"meaningful and effective" </u></a>control over whether their content is used for AI features, like AI Overviews. Google would be prohibited from taking any action that negatively impacts the effectiveness of those control options, such as intentionally downranking the content in search. </p><p>To support informed decisionmaking, the CMA proposal also requires Google to increase transparency, by publishing clear documentation on how it uses crawled content for generative AI and on exactly what its various publisher controls cover in practice. Finally, the proposal would require Google to ensure effective attribution of publisher content and to provide publishers with detailed, disaggregated engagement data—including specific metrics for impressions, clicks, and "click quality"—to help them evaluate the commercial value of allowing their content to be used in AI-generated search summaries.</p>
    <div>
      <h2>The CMA’s proposed remedies are insufficient</h2>
      <a href="#the-cmas-proposed-remedies-are-insufficient">
        
      </a>
    </div>
    <p>Although we support the CMA’s efforts to improve options for publishers, we are concerned that the proposed requirements do not solve the underlying issue of promoting fair, transparent choice over how their content is used by Google. Publishers are effectively forced to use Google’s proprietary opt-out mechanisms, tied specifically to the Google platform and under the conditions set by Google, rather than granting them direct, autonomous control. <b>A framework where the platform dictates the rules, manages the technical controls, and defines the scope of application does not offer “effective control” to content creators or encourage competitive innovation in the market. Instead, it reinforces a state of permanent dependency.</b>  </p><p>Such a framework also reduces choice for publishers. Creating new opt-out controls makes it impossible for publishers to choose to use external tools to block Googlebot from accessing their content without jeopardizing their appearance in Search results. Instead, under the current proposal, content creators will still have to allow Googlebot to scrape their websites, with no enforcement mechanisms to deploy and limited visibility available if Google does not respect their signalled preferences. Enforcement of these requirements by the CMA, if done properly, will be very onerous, without guarantee that publishers will trust the solution.</p><p>In fact, Cloudflare has received feedback from its customers that Google’s current proprietary opt-out mechanisms, including Google-Extended and ‘nosnippet’, have failed to prevent content from being utilized in ways that publishers cannot control. These opt-out tools also do not enable mechanisms for fair compensation for publishers. </p><p>More broadly, as reflected in our proposed <a href="https://blog.cloudflare.com/building-a-better-internet-with-responsible-ai-bot-principles/"><u>responsible AI bot principles</u></a>, we believe that all AI bots should have one distinct purpose and declare it, so that website owners can make clear decisions over who can access their content and why. Unlike its leading competitors, such as OpenAI and Anthropic, Google does not comply with this principle for Googlebot, which is used for multiple purposes (search indexing, AI training, and inference/grounding). Simply requiring Google to develop a new opt-out mechanism would not allow publishers to achieve meaningful control over the use of their content. </p><p>The most effective way to give publishers that necessary control is to require Googlebot to be split up into separate crawlers. That way, publishers could allow crawling for traditional search indexing, which they need to attract traffic to their sites, but block access for unwanted use of their content in generative AI services and features. </p>
    <div>
      <h2>Requiring crawler separation is the only effective solution </h2>
      <a href="#requiring-crawler-separation-is-the-only-effective-solution">
        
      </a>
    </div>
    <p>To ensure a fair digital ecosystem, the CMA must instead empower content owners to prevent Google from accessing their data for particular purposes in the first place, rather than relying on Google-managed workarounds after the crawler has already accessed the content for other purposes. That approach also enables creators to set conditions for access to their content. </p><p>Although the CMA described crawler separation as an “equally effective intervention”, it ultimately rejected mandating separation based on Google’s input that it would be too onerous. We disagree.</p><p>Requiring Google to split up Googlebot by purpose — just like Google already does for its <a href="https://developers.google.com/crawling/docs/crawlers-fetchers/overview-google-crawlers"><u>nearly 20 other crawlers</u></a> — is not only technically feasible, but also a necessary and proportionate remedy that empowers website operators to have the granular control they currently lack, without increasing traffic load from crawlers to their websites (and in fact, perhaps even decreasing it, should they choose to block AI crawling).</p><p>To be clear, a crawler separation remedy benefits AI companies, by leveling the playing field between them and Google, in addition to giving UK-based publishers more control over their content. (There has been widespread public support for a crawler separation remedy by Daily Mail Group, the Guardian and the News Media Association.) Mandatory crawler separation is not a disadvantage to Google, nor does it undermine investment in AI. On the contrary, it is a pro-competitive safeguard that prevents Google from leveraging its search monopoly to gain an unfair advantage in the AI market. By decoupling these functions, we ensure that AI development is driven by fair-market competition rather than the exploitation of a single hyperscaler’s dominance.</p><p>******</p><p>The UK has a unique chance to lead the world in protecting the value of original and high-quality content on the Internet. However, we worry that the current proposals fall short. We would encourage rules that ensure that Google operates under the same conditions for content access as other AI developers, meaningfully restoring agency to publishers and paving the way for new business models promoting content monetization.</p><p>Cloudflare remains committed to engaging with the CMA and other partners during upcoming consultations to provide evidence-based data to help shape a final decision on conduct requirements that are targeted, proportional, and effective. The CMA still has an opportunity to ensure that the Internet becomes a fair marketplace for content creators and smaller AI players—not just a select few tech giants.</p> ]]></content:encoded>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[AI Bots]]></category>
            <category><![CDATA[Google]]></category>
            <category><![CDATA[Legal]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1csdasmGFE5gWnYFDBbN9j</guid>
            <dc:creator>Maria Palmieri</dc:creator>
            <dc:creator>Sebastian Hufnagel</dc:creator>
        </item>
        <item>
            <title><![CDATA[Giving users choice with Cloudflare’s new Content Signals Policy]]></title>
            <link>https://blog.cloudflare.com/content-signals-policy/</link>
            <pubDate>Wed, 24 Sep 2025 13:10:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Content Signals Policy gives creators a new tool to control use of their content. 
 ]]></description>
            <content:encoded><![CDATA[ <p>If we want to keep the web open and thriving, we need more tools to express how content creators want their data to be used while allowing open access. Today the tradeoff is too limited. Either website operators keep their content open to the web and risk people using it for unwanted purposes, or they move their content behind logins and limit their audience.</p><p>To address the concerns our customers have today about how their content is being used by crawlers and data scrapers, we are launching the Content Signals Policy. This policy is a new addition to robots.txt that allows you to express your preferences for how your content can be used after it has been accessed. </p>
    <div>
      <h2>What <code>robots.txt</code> does, and does not, do today</h2>
      <a href="#what-robots-txt-does-and-does-not-do-today">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/bots/what-is-robots-txt/"><u>Robots.txt</u></a> is a plain text file hosted on your domain that implements the <a href="https://www.rfc-editor.org/rfc/rfc9309.html"><u>Robots Exclusion Protocol</u></a>. It allows you to instruct which crawlers and bots can access which parts of your site.  Many crawlers and some bots obey robots.txt files, but not all do.</p><p>For example, if you wanted to allow all crawlers to access every part of your site, you could host a robots.txt file that has the following: </p>
            <pre><code>User-agent: * 
Allow: /
</code></pre>
            <p>A user-agent is how your browser, or a bot, identifies themselves to the resource they are accessing. In this case, the asterisk tells visitors that any user agent, on any device or browser, can access the content. The / in the <code>Allow</code> field tells the visitor that they can access any part of the site as well.</p><p>The <code>robots.txt</code> file can also include commentary by adding characters after # symbol. Bots and machines will ignore these comments, but it is one way to leave more human-readable notes to someone reviewing the file. Here is <a href="https://www.cloudflare.com/robots.txt"><u>one example</u></a>:</p>
            <pre><code>#    .__________________________.
#    | .___________________. |==|
#    | | ................. | |  |
#    | | ::[ Dear robot ]: | |  |
#    | | ::::[ be nice ]:: | |  |
#    | | ::::::::::::::::: | |  |
#    | | ::::::::::::::::: | |  |
#    | | ::::::::::::::::: | |  |
#    | | ::::::::::::::::: | | ,|
#    | !___________________! |(c|
#    !_______________________!__!
#   /                            \
#  /  [][][][][][][][][][][][][]  \
# /  [][][][][][][][][][][][][][]  \
#(  [][][][][____________][][][][]  )
# \ ------------------------------ /
#  \______________________________/
</code></pre>
            <p>Website owners can make <code>robots.txt</code> more specific by listing certain user-agents (such as for only permitting certain bot user-agents or browser user-agents) and by stating which parts of a site they are or are not allowed to crawl. The example below tells bots to skip crawling the archives path.</p>
            <pre><code>User-agent: * 
Disallow: /archives/
</code></pre>
            <p>And the example here gets more specific, telling Google’s bot to skip crawling the archives path.</p>
            <pre><code>User-agent: Googlebot 
Disallow: /archives/
</code></pre>
            <p>This allows you to specify which crawlers are allowed and what parts of your site they can access. It does not, however, let them know what they are able to do with your content after accessing it. As many have <a href="https://datatracker.ietf.org/wg/aipref/about/"><u>realized,</u></a> there needs to be a standard, machine-readable way to signal the rules of your road for how your data can be used even after it has been accessed. </p><p>That is what the Content Signals Policy allows you to express: your preferences for what a crawler can, and cannot do with your content. </p>
    <div>
      <h2>Why are we launching the Content Signals Policy now? </h2>
      <a href="#why-are-we-launching-the-content-signals-policy-now">
        
      </a>
    </div>
    <p>There are companies that scrape vast troves of data from the Internet every day. There is a real cost to website operators to serve these data scrapers, in particular when they receive no compensation in return; we are experiencing a classic <a href="https://en.wikipedia.org/wiki/Free-rider_problem"><u>free-rider problem</u></a>. This is only going to get worse: we expect bot traffic to exceed human traffic on the Internet by the end of 2029, and by 2031, we anticipate that bot activity alone will surpass the sum of current Internet traffic. </p><p>The de facto defaults of the Internet permitted this. The norm had been that your data would be ingested, but then you, the creator of that content, would get something in return: either referral traffic that you could monetize, or at a minimum some sort of attribution that cited you as the author. Think of the <a href="https://en.wikipedia.org/wiki/Linkback"><u>linkback</u></a> in the early days of blogging, which was a way to give credit to the original creator of the work. No money changed hands, but that attribution drove future discovery and had intrinsic value. This norm has been embedded in many permissive licenses such as <a href="https://en.wikipedia.org/wiki/MIT_License"><u>MIT</u></a> and <a href="https://creativecommons.org/share-your-work/cclicenses/"><u>Creative Commons</u></a>, each of which require attribution back to the original creator. </p><p>That world has changed; that scraped content is now sometimes used to economically compete against the original creator. It’s left many with an <a href="https://blog.cloudflare.com/introducing-ai-crawl-control/"><u>impossible choice</u></a>: do you lock down access to your content and data, or accept the reality of fewer referrals and minimal attribution? If the only recourse is the former, the open transmission of ideas on the web is harmed and newer entrants to the AI ecosystem are put at an unfair disadvantage for their efforts to train new models. </p>
    <div>
      <h2>The Cloudflare Content Signals Policy</h2>
      <a href="#the-cloudflare-content-signals-policy">
        
      </a>
    </div>
    <p>The Content Signals Policy integrates into website operators’ robots.txt files. It is human-readable text following the # symbol to designate it as a comment. This policy defines three content signals - search, ai-input, and ai-train - and their relevance to crawlers.</p><p>A website operator can then optionally express their preferences via machine-readable content signals. </p>
            <pre><code># As a condition of accessing this website, you agree to abide by the following content signals:

# (a)  If a content-signal = yes, you may collect content for the corresponding use.
# (b)  If a content-signal = no, you may not collect content for the corresponding use.
# (c)  If the website operator does not include a content signal for a corresponding use, the website operator neither grants nor restricts permission via content signal with respect to the corresponding use.

# The content signals and their meanings are: 

# search: building a search index and providing search results (e.g., returning hyperlinks and short excerpts from your website's contents).  Search does not include providing AI-generated search summaries.
# ai-input: inputting content into one or more AI models (e.g., retrieval augmented generation, grounding, or other real-time taking of content for generative AI search answers). 
# ai-train: training or fine-tuning AI models.

# ANY RESTRICTIONS EXPRESSED VIA CONTENT SIGNALS ARE EXPRESS RESERVATIONS OF RIGHTS UNDER ARTICLE 4 OF THE EUROPEAN UNION DIRECTIVE 2019/790 ON COPYRIGHT AND RELATED RIGHTS IN THE DIGITAL SINGLE MARKET. </code></pre>
            <p>There are three parts to this text: </p><ul><li><p>The first paragraph explains to companies how to interpret any given content signal.  “Yes” means go, “no” means stop, and the absence of a signal conveys no meaning. That final, neutral option is important: it lets website operators express a preference with respect to one content signal without requiring them to do so for another.    </p></li><li><p>The second paragraph defines the content signals vocabulary. We kept the signals simple to make it easy for anyone accessing content to abide by them.  </p></li><li><p>The final paragraph reminds those automating access to data that these content signals might have legal rights in various jurisdictions. </p></li></ul><p>A website operator can then announce their specific preferences in machine-readable text using comma-delimited, ‘yes’ or ‘no’ syntax. If a website operator wants to allow search, disallow training, and expressed no preference regarding ai-input, they could include the following in their robots.txt:</p>
            <pre><code>User-Agent: *
Content-Signal: search=yes, ai-train=no 
Allow: / 
</code></pre>
            <p>If a website operator leaves the content signal for ai-input blank like in the above example, it does not mean they have no preference regarding that use; it just means they have not used this part of their robots.txt file to express it.</p>
    <div>
      <h2>How to add content signals to your website</h2>
      <a href="#how-to-add-content-signals-to-your-website">
        
      </a>
    </div>
    <p>If you already know how to configure your robots.txt file, deploying content signals is as simple as adding the Content Signals Policy above and then defining your preferences via a content signal.  </p><p>We want to make adopting content signals simple. Cloudflare customers have already turned on our managed robots.txt feature for over 3.8 million domains. By doing so, they have chosen to instruct companies that they <a href="https://www.cloudflare.com/learning/ai/how-to-block-ai-crawlers/">do not want the content on those domains to be used for AI training</a>. For these customers, we will update the robots.txt file that we already serve on their behalf to include the Content Signals Policy and the following signals:</p>
            <pre><code>Content-Signal: search=yes, ai-train=no</code></pre>
            <p>We will not serve an “ai-input” signal for our managed robots.txt customers. We don’t know their preference with respect to that signal, and we don’t want to guess.  </p><p>Starting today, we also will serve the commented, human-readable Content Signals Policy for any free customer zone that does not have an existing robots.txt file. In practice, that means a request to robots.txt on that domain would return the comments that define what content signals are. These comments are ignored by crawlers. Importantly, it will not include any Allow or Disallow directives, nor will not serve any actual content signals. The users are the ones to choose and express their actual preferences if and when they are ready to do so. Customers with an existing robots.txt file will see no change.</p><p>Zones on a free plan can turn off the Content Signals Policy in the Security Settings section of the Cloudflare dashboard, as well as via the Overview section. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69VPgMTwoI1KqUTP4cNqG5/9576a3ca6eeee93b58688aea7f7ff0ae/BLOG-2956_2.png" />
          </figure><p>To create your own content signals, just copy and paste the text that we help you generate at <a href="http://contentsignals.org"><u>ContentSignals.org</u></a> into your <code>robots.txt</code> file, or immediately deploy via the Deploy to Cloudflare button. You can alternatively turn on our <a href="https://developers.cloudflare.com/bots/additional-configurations/managed-robots-txt/"><u>managed robots.txt feature</u></a> if you would like to express your preference to disallow training. </p><p>It’s important to remember that content signals express preferences; they are not <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">technical countermeasures against scraping</a>. Some companies might simply ignore them. If you are a website publisher seeking to control what others do with your content, we think it is best to combine your content signals with <a href="https://developers.cloudflare.com/waf/"><u>WAF</u></a> rules and <a href="https://www.cloudflare.com/application-services/products/bot-management/"><u>Bot Management</u></a>.</p><p>While these Cloudflare features aim to make it easier to use, we want to encourage adoption by anyone, anywhere. In order to promote this practice, we are releasing this policy under a <a href="https://creativecommons.org/publicdomain/zero/1.0/"><u>CC0 License</u></a>, which allows anyone to implement and use it freely. </p>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Our customers are fully in the driver’s seat for what crawlers they want to allow and what they’d like to block. Some want to write for the superintelligence, others want more control: we think they should be the ones to decide.</p><p>Content signals allow anyone to express how they want their content to be used after it has been accessed. Enabling the ability to express preferences was overdue. </p><p>We know there’s more work to do. Signaling the rules of the road only works if others recognize those rules. That’s why we’ll continue to work in standards bodies to develop and standardize solutions that meet the needs of our customers and are accepted by the broader Internet community.</p><p>We hope you’ll join us in these efforts: the open web is worth fighting for.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Bot Management]]></category>
            <category><![CDATA[AI]]></category>
            <guid isPermaLink="false">1wk9EDViBe0NsG2Hs8dURz</guid>
            <dc:creator>Will Allen</dc:creator>
        </item>
        <item>
            <title><![CDATA[To build a better Internet in the age of AI, we need responsible AI bot principles. Here’s our proposal.]]></title>
            <link>https://blog.cloudflare.com/building-a-better-internet-with-responsible-ai-bot-principles/</link>
            <pubDate>Wed, 24 Sep 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ We are proposing—as starting points—responsible AI bot principles that emphasize transparency, accountability, and respect for content access and use preferences. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare has a unique vantage point: we see not only how changes in technology shape the Internet, but also how new technologies can unintentionally impact different stakeholders. Take, for instance, the increasing reliance by everyday Internet users on AI–powered <a href="https://www.cloudflare.com/learning/bots/what-is-a-chatbot/"><u>chatbots</u></a> and <a href="https://www.pewresearch.org/short-reads/2025/07/22/google-users-are-less-likely-to-click-on-links-when-an-ai-summary-appears-in-the-results/sr_25-07-22_ai_summaries_1/"><u>search summaries</u></a>. On the one hand, end users are getting information faster than ever before. On the other hand, web publishers, who have historically relied on human eyeballs to their website to support their businesses, are seeing a <a href="https://www.forbes.com/sites/torconstantino/2025/04/14/the-60-problem---how-ai-search-is-draining-your-traffic/"><u>dramatic</u></a> <a href="https://blog.cloudflare.com/ai-search-crawl-refer-ratio-on-radar/"><u>decrease</u></a> in those eyeballs, which can reduce their ability to create original high-quality content. This cycle will ultimately hurt end users and AI companies (whose success relies on fresh, high-quality content to train models and provide services) alike.</p><p>We are indisputably at a point in time when the Internet needs clear “rules of the road” for AI bot behavior (a note on terminology: throughout this blog we refer to AI bots and crawlers interchangeably). We have had ongoing cross-functional conversations, both internally and with stakeholders and partners across the world, and it’s clear to us that the Internet at large needs key groups — publishers and content creators, bot operators, and Internet infrastructure and cybersecurity companies — to reach a consensus on certain principles that AI bots should follow.</p><p>Of course, agreeing on what exactly those principles are will take time and require continued discussion and collaboration, and a policy framework can’t perfectly capture every technical concern. Nevertheless, we think it’s important to start a conversation that we hope others will join. After all, a rough draft is better than a blank page.</p><p>That is why we are proposing the following responsible AI bot principles as starting points:</p><ol><li><p><b>Public disclosure: </b>Companies should publicly disclose information about their AI bots;</p></li><li><p><b>Self-identification: </b>AI bots should truthfully self-identify, eventually replacing less reliable methods, like user agent and IP address verification, with cryptographic verification;</p></li><li><p><b>Declared single purpose:</b> AI bots should have one distinct purpose and declare it;</p></li><li><p><b>Respect preferences: </b>AI bots should respect and comply with preferences expressed by website operators where proportionate and technically feasible;</p></li><li><p><b>Act with good intent:</b> AI bots must not flood sites with excessive traffic or engage in deceptive behavior.</p></li></ol><p>Each principle is discussed in greater detail <a href="#responsible-ai-bot-principles"><u>below</u></a>. These principles focus on AI bots because of the impact <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/"><u>generative AI</u></a> is having on the Internet, but we have already seen these practices in action with other types of (non-AI) bots as well. We believe these principles will help move the Internet in a better direction. That said, we acknowledge that they are a starting point for this conversation, which requires input from other stakeholders. The Internet has always been a collaborative place for innovation, and these principles should be seen as equally dynamic and evolving. </p>
    <div>
      <h2>Why Cloudflare is encouraging this conversation</h2>
      <a href="#why-cloudflare-is-encouraging-this-conversation">
        
      </a>
    </div>
    <p>Since declaring July 1st <a href="https://blog.cloudflare.com/content-independence-day-no-ai-crawl-without-compensation/"><u>Content Independence Day</u></a>, Cloudflare has strived to play a balanced and effective role in safeguarding the future of the Internet in the age of generative AI. We have enabled customers to <a href="https://blog.cloudflare.com/introducing-pay-per-crawl/"><u>charge AI crawlers for access</u></a> or <a href="https://www.cloudflare.com/learning/ai/how-to-block-ai-crawlers/"><u>block them with one click</u></a>, published and enforced our <a href="https://developers.cloudflare.com/bots/concepts/bot/verified-bots/policy/"><u>verified bots policy</u></a> and developed the <a href="https://developers.cloudflare.com/bots/reference/bot-verification/web-bot-auth/"><u>Web Bot Auth</u></a> proposal, and unapologetically <a href="https://blog.cloudflare.com/perplexity-is-using-stealth-undeclared-crawlers-to-evade-website-no-crawl-directives/#how-well-meaning-bot-operators-respect-website-preferences"><u>called out and stopped bad behavior</u></a>.</p><p>While we have recently focused our attention on AI crawlers, Cloudflare has long been a leader in the bot management space, helping our customers protect their websites from unwanted — and even malicious —traffic. We also want to make sure that anyone — whether they’re our customer or not — can see <a href="https://radar.cloudflare.com/ai-insights#ai-bot-best-practices"><u>which AI bots are abiding by all, some, or none of these best practices</u></a>. </p><p>But we aren’t ignorant to the fact that companies operating crawlers are also adapting to a new Internet landscape — and we genuinely believe that most players in this space want to do the right thing, while continuing to innovate and propel the Internet in an exciting direction. Our hope is that we can use our expertise and unique vantage point on the Internet to help bring seemingly incompatible parties together and find a path forward — continuing our mission of helping to build a better Internet for everyone.</p>
    <div>
      <h2>Responsible AI bot principles</h2>
      <a href="#responsible-ai-bot-principles">
        
      </a>
    </div>
    <p>The following principles are a launchpad for a larger conversation, and we recognize that there is work to be done to address many nuanced perspectives. We envision these principles applying to AI bots but understand that technical complexity may require flexibility. <b>Ultimately, our goal is to emphasize transparency, accountability, and respect for content access and use preferences.</b> If these principles fall short of that — or fail to consider other important priorities — we want to know.</p>
    <div>
      <h3>Principle #1: Public disclosure</h3>
      <a href="#principle-1-public-disclosure">
        
      </a>
    </div>
    <p><b>Companies should publicly disclose information about their AI bots.</b> The following information should be publicly available and easy to find:</p><ul><li><p><b>Identity:</b> information that helps external parties identify a bot, <i>e.g.</i>, user agent, relevant IP address(es), and/or individual cryptographic identification (more on this below, in <a href="#principle-2-self-identification"><i><u>Principle #2: Self-identification</u></i></a>).</p></li><li><p><b>Operator:</b> the legal entity responsible for the AI bot, including a point of contact (<i>e.g.</i>, for reporting abuse);</p></li><li><p><b>Purpose:</b> for which purpose the accessed data will be used, <i>i.e.</i>, search, AI-input, or training (more on this below, in <a href="#principle-3-declared-single-purpose"><i><u>Principle #3: Declared Single Purpose</u></i></a>).</p></li></ul><p>OpenAI is an example of a leading AI company that clearly <a href="https://platform.openai.com/docs/bots"><u>discloses their bots</u></a>, complete with detailed explanations of each bot’s purpose. The benefits of this disclosure are apparent in the subsequent principles. It helps website operators validate that a given request is in fact coming from OpenAI and what its purpose is (<i>e.g.</i>, search indexing or AI model training). This, in turn, enables website operators to control access to and use of their content through preference expression mechanisms, like <a href="https://www.cloudflare.com/learning/bots/what-is-robots-txt/"><u>robots.txt files</u></a>.</p>
    <div>
      <h3>Principle #2: Self-identification</h3>
      <a href="#principle-2-self-identification">
        
      </a>
    </div>
    <p><b>AI bots should truthfully self-identify.</b> Not only should information about bots be disclosed in a publicly accessible location, this information should also be clearly communicated by bots themselves, <i>e.g.,</i> through an HTTP request that conveys the bot’s official user agent and comes from an IP address that the bot claims to send traffic from. Admittedly, this current approach is flawed, as we discuss in <a href="#a-note-on-cryptographic-verification-and-the-future-of-principle-2"><u>more detail below</u></a>. But until cryptographic verification is more widely adopted, we think relying on user agent and IP verification is better than nothing.</p><p>OpenAI’s <a href="https://radar.cloudflare.com/bots/directory/gptbot"><u>GPTBot</u></a> is an example of this principle in action. OpenAI <a href="https://platform.openai.com/docs/bots"><u>publicly shares</u></a> the expected full user-agent string for this bot and includes it in its requests. OpenAI also explains this bot’s purpose (“used to make [OpenAI’s] generative AI foundation models more useful and safe” and “to crawl content that may be used in training [their] generative AI foundation models”). And we have observed this bot sending traffic from IP addresses reported by OpenAI. Because site operators see GPTBot’s user agent and IP addresses matching what is publicly disclosed and expected, and they know information about the bot is publicly documented, they can confidently recognize the bot. This enables them to make informed decisions about whether they want to allow traffic from it.</p><p>Unfortunately, not all bots uphold this principle, making it difficult for website owners to know exactly which bot operators respect their crawl preferences, much less enforce them. For example, while Anthropic publishes its user agent alone, absent other verifiable information, it’s unclear which requests are truly from Anthropic. And xAI’s bot, grok, does not self-identify at all, making it impossible for website operators to block it. Anthropic and xAI’s lack of identification undermines trust between them and website owners, yet this could be fixed with minimal effort on their parts.</p>
    <div>
      <h2>A note on cryptographic verification and the future of Principle #2</h2>
      <a href="#a-note-on-cryptographic-verification-and-the-future-of-principle-2">
        
      </a>
    </div>
    <p>Truthful declaration of user agent and dedicated IP lists have historically been a functional way to verify. But in today’s rapidly-evolving bot climate, bots are increasingly vulnerable to being spoofed by bad actors. These bad actors, in turn, ignore robots.txt, which communicates allow/disallow preferences only on a user agent basis (so, a bad bot could spoof a permitted user agent and circumvent that domain’s preferences).</p><p><b>Ultimately, every AI bot should be cryptographically verified using an accepted standard.</b> This would protect them against spoofing and ensure website operators have the accurate and reliable information they need to properly evaluate access by AI bots. At this time, we believe that <a href="https://datatracker.ietf.org/doc/html/draft-meunier-web-bot-auth-architecture?cf_history_state=%7B%22guid%22%3A%22C255D9FF78CD46CDA4F76812EA68C350%22%2C%22historyId%22%3A43%2C%22targetId%22%3A%226EAB129D6194DD2C4E8CCD7C06D57DE2%22%7D"><u>Web Bot Auth</u></a> is sufficient proof of compliance with Principle #2. We recognize that this standard is still in development, and, as a result, this principle may evolve accordingly.</p><p>Web Bot Auth <a href="https://blog.cloudflare.com/web-bot-auth/"><u>uses cryptography to verify bot traffic</u></a>; cryptographic signatures in HTTP messages are used as verification that a given request came from an automated bot. Our implementation relies on proposed IETF <a href="https://datatracker.ietf.org/doc/html/draft-meunier-http-message-signatures-directory"><u>directory</u></a> and <a href="https://datatracker.ietf.org/doc/html/draft-meunier-web-bot-auth-architecture"><u>protocol</u></a> drafts. Initial reception of Web Bot Auth has been very positive, and we expect even more adoption. For example, a little over a month ago, Vercel <a href="https://vercel.com/changelog/vercels-bot-verification-now-supports-web-bot-auth"><u>announced</u></a> that its bot verification now supports Web Bot Auth. And OpenAI’s <a href="https://help.openai.com/en/articles/11845367-chatgpt-agent-allowlisting"><u>ChatGPT agent now signs its requests using Web Bot Auth</u></a>, in addition to using the HTTP Message Signatures <a href="https://datatracker.ietf.org/doc/html/rfc9421"><u>standard</u></a>.</p><p>We envision a future where cryptographic authentication becomes the norm, as we believe this will further strengthen the trustworthiness of bots.</p>
    <div>
      <h3>Principle #3: Declared single purpose </h3>
      <a href="#principle-3-declared-single-purpose">
        
      </a>
    </div>
    <p><b>AI bots should have one distinct purpose and declare it. </b>Today, <a href="https://blog.cloudflare.com/ai-crawler-traffic-by-purpose-and-industry"><u>some</u></a> bots self-identify their purpose as Training, Search, or User Action (<i>i.e.</i>, accessing a web page in response to a user’s query).</p><p>However, these purposes are sometimes combined without clear distinction. For example, content accessed for search purposes might also be used to train the AI model powering the search engine. When a bot’s purpose is unclear, website operators face a difficult decision: block it and risk undermining search engine optimization (SEO), or allow it and risk content being used in unwanted ways.</p><p>When operators deploy bots with distinct purposes, website owners are able to make clear decisions over who can access their content. What those purposes should be is up for debate, but we think the following breakdown is a starting point based on bot activity we see. We recognize this is an evolving space and changes may be required as innovation continues:</p><ul><li><p><b>Search:</b> building a search index and providing search results (<i>e.g.</i>, returning hyperlinks and short excerpts from your website’s contents). Search does <u>not</u> include providing AI-generated search summaries;</p></li><li><p><b>AI-input:</b> inputting content into one or more AI models, <i>e.g.</i>, retrieval-augmented generation (RAG), grounding, or other real-time taking of content for generative AI search answers; and</p></li><li><p><b>Training:</b> training or fine-tuning AI models.</p></li></ul><p>Relatedly, bots should not combine purposes in a way that prevents web operators from deliberately and effectively deciding whether to allow crawling.</p><p>Let’s consider two AI bots, OAI-SearchBot and Googlebot, from the perspective of Vinny, a website operator trying to make a living on the Internet. OAI-SearchBot has a single purpose: linking to and surfacing websites in ChatGPT’s search features. If Vinny takes OpenAI at face value (which we think it makes sense to do), he can trust that OAI-SearchBot does not crawl his content for training OpenAI’s generative AI models rather, a separate bot (GPTBot, as discussed in <a href="https://docs.google.com/document/d/1LQ2DkaKBaTn6pXrgLZp-5BjHsQd1FOS-7vmkf6DVxx0/edit?tab=t.1023mi6snxqe#heading=h.yfcrchlj1en9"><i><u>Principle #2: Self-identification</u></i></a>) does. Vinny can decide how he wants his content used by OpenAI, <i>e.g.</i>, permitting its use for search but not for AI training, and feel confident that his choices are respected because OAI-SearchBot <i>only</i> crawls for search purposes, while GPTBot is not granted access to the content in the first place (and therefore cannot use it).</p><p>On the other hand, while Googlebot scrapes content for traditional search-indexing (not model training), it also uses that content for inference purposes, such as for AI Overviews and AI Mode. Why is this a problem for Vinny? While he almost certainly wants his content appearing in search results, which drive the human eyeballs that fund his site, Vinny is forced to also accept that his content will appear in Google’s AI-generated summaries. If eyeballs are satisfied by the summary then they never visit Vinny’s website, which leads to <a href="https://www.bain.com/insights/goodbye-clicks-hello-ai-zero-click-search-redefines-marketing/"><u>“zero-click” searches</u> and undermines</a> Vinny’s ability to financially benefit from his content.</p><p>This is a vicious cycle: creating high-quality content, which typically leads to higher search rankings, now inadvertently also reduces the chances an eyeball will visit the site because that same valuable content is surfaced in an AI Overview (if it is even referenced as a source in the summary). To prevent this, Vinny must either opt out of search completely or use snippet controls (which risks degrading how his content appears in search results). This is because the only available signal to opt-out of AI, disallowing <a href="https://developers.google.com/search/docs/crawling-indexing/google-common-crawlers#google-extended"><u>Google-Extended,</u></a> is limited to training and does not apply to AI Overview, which is attached to search. Whether by accident or by design, this setup forces an impossible choice onto website owners.</p><p>Finally, the prominent technical argument in favor of combining multiple purposes — that this reduces the crawler operator’s costs — needs to be debunked. To reason by analogy: it’s like arguing that placing one call to order two pizzas is cheaper than placing two calls to order two pizzas. In reality, the cost of the two pizzas (both of which take time and effort to make) remains the same. The extra phone call may be annoying, but its costs are negligible.</p><p>Similarly, whether one bot request is made for two purposes (<i>e.g.</i>, search indexing and AI model training) or a separate bot request is made for each of two purposes, the costs basically remain the same. For the crawler, the cost of compute is the same because the content still needs to be processed for each purpose. And the cost of two connections (<i>i.e.</i>, for two requests) is virtually the same as one. We know this because Cloudflare runs one of the largest networks in the world, handling on average 84 million requests per second, so we understand the cost of requests at Internet scale. (As an aside, while additional crawls incur costs on website operators, they have the ability to choose whether the crawl is worth the cost, especially when bots have a single purpose.)</p>
    <div>
      <h3>Principle # 4: Respect preferences</h3>
      <a href="#principle-4-respect-preferences">
        
      </a>
    </div>
    <p><b>AI bots should respect and comply with preferences expressed by website operators where proportionate and technically feasible.</b> There are multiple options for expressing preferences. Prominent examples include the longstanding and familiar robots.txt, as well as newly emerging HTTP headers.</p><p>Given the widespread use of robots.txt files, bots should make a good faith attempt to fetch a robots.txt file first, in accordance with <a href="https://datatracker.ietf.org/doc/html/rfc9309"><u>RFC 9309</u></a>, and abide by both the access and use preferences specified therein. AI bot operators should also stay up to date on how those preferences evolve as a result of a <a href="https://ietf-wg-aipref.github.io/drafts/draft-ietf-aipref-vocab.html"><u>draft vocabulary</u></a> currently under development by an IETF working group. The goal of the proposed vocabulary is to improve granularity in robots.txt files, so that website operators are empowered to control how their assets are used. </p><p>At the same time, new industry standards under discussion may involve the attachment of machine-readable preferences to different formats, such as individual files. AI bot operators should eventually be prepared to comply with these standards, too. One idea currently being explored is a way for site owners to list preferences via HTTP headers, which offer a server-level method of declaring how content should be used.</p>
    <div>
      <h3>Principle #5: Act with good intent</h3>
      <a href="#principle-5-act-with-good-intent">
        
      </a>
    </div>
    <p><b>AI bots must not flood sites with excessive traffic or engage in deceptive behavior.</b> AI bot behavior should be benign or helpful to website operators and their users. It is also incumbent on companies that operate AI bots to monitor their networks and resources for breaches and patch vulnerabilities. Jeopardizing a website’s security or performance or engaging in harmful tactics is unacceptable.</p><p>Nor is it appropriate to appear to comply with the principles, only to secretly circumvent them. Reaffirming a long-standing principle of acceptable bot behavior, AI bots must never engage in <a href="https://blog.cloudflare.com/perplexity-is-using-stealth-undeclared-crawlers-to-evade-website-no-crawl-directives/"><u>stealth crawling</u></a> or use other stealth tactics to try and dodge detection, such as modifying their user agent, changing their source <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASNs</u></a> to hide their crawling activity, or ignoring robots.txt files. Doing so would undermine the preceding four principles, hurting website operators and worsening the Internet for all.</p>
    <div>
      <h2>The road ahead: multi-stakeholder efforts to bring these principles to life</h2>
      <a href="#the-road-ahead-multi-stakeholder-efforts-to-bring-these-principles-to-life">
        
      </a>
    </div>
    <p>As we continue working on these principles and soliciting feedback, we strive to find a balance: we want the wishes of content creators respected while still encouraging AI innovation. It’s a privilege to sit at the intersection of these important interests and to play a crucial role in developing an agreeable path forward.</p><p>We are continuing to engage with right holders, AI companies, policy-makers, and regulators to shape global industry standards and regulatory frameworks accordingly. We believe that the influx of generative AI use need not threaten the Internet’s place as an open source of quality content. Protecting its integrity requires agreement on workable technical standards that reflect the interests of web publishers, content creators, and AI companies alike.  </p><p>The whole ecosystem must continue to come together and collaborate towards a better Internet that truly works for everyone. Cloudflare advocates for neutral forums where all affected parties can discuss the impact of AI developments on the Internet. One such example is the IETF, which has current work focused on some of the technical aspects being considered. Those efforts attempt to address some, but not all, of the issues in an area that deserves holistic consideration. We believe the principles we have proposed are a step in the right direction — but we hope others will join this complex and important conversation, so that norms and behavior on the Internet can successfully adapt to this exciting new technological age.</p> ]]></content:encoded>
            <category><![CDATA[AI Bots]]></category>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Better Internet]]></category>
            <category><![CDATA[Generative AI]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1sZkiH7eUUcU8zs4jpo6F8</guid>
            <dc:creator>Leah Romm</dc:creator>
            <dc:creator>Sebastian Hufnagel</dc:creator>
        </item>
        <item>
            <title><![CDATA[The White House AI Action Plan:  a new chapter in U.S. AI policy]]></title>
            <link>https://blog.cloudflare.com/the-white-house-ai-action-plan-a-new-chapter-in-u-s-ai-policy/</link>
            <pubDate>Fri, 25 Jul 2025 01:52:00 GMT</pubDate>
            <description><![CDATA[ The White House AI Action Plan is a pivotal policy document outlining the current administration's priorities and deliverables in AI to establish American AI as the gold standard for AI worldwide. ]]></description>
            <content:encoded><![CDATA[ <p>On July 23, 2025, the White House <a href="https://www.ai.gov/action-plan"><u>unveiled its AI Action Plan</u></a> (Plan), a significant policy document outlining the current administration's priorities and deliverables in Artificial Intelligence. This plan emerged after the White House received over <a href="https://www.whitehouse.gov/articles/2025/04/american-public-submits-over-10000-comments-on-white-houses-ai-action-plan/"><u>10,000 public comments in response to a February 2025 Request for Information (RFI)</u></a>. Cloudflare’s <a href="https://files.nitrd.gov/90-fr-9088/Cloudflare-AI-RFI-2025.pdf"><u>comments</u></a> urged the White House to foster conditions for U.S. leadership in AI and support open-source AI, among other recommendations. </p><p>There is a lot packed into the three pillar, 28-page Plan. </p><ul><li><p>Pillar I: Accelerate AI Innovation. Focuses on removing regulations, enabling AI adoption and developing, and ensuring the availability of open-source and open-weight AI models.</p></li><li><p>Pillar II: Build American AI Infrastructure. Prioritizes the construction of high-security data centers, bolstering critical infrastructure cybersecurity, and promoting Secure-by-Design AI technologies. </p></li><li><p>Pillar III: Lead in International AI Diplomacy and Security. Centers on providing America’s allies and partners with access to AI, as well as strengthening AI compute export control enforcement. </p></li></ul><p>Each of these pillars outlines policy recommendations for various federal agencies to advance the plan’s overarching goals. There’s much that the Plan gets right. Below we cover a few parts of the Plan that we think are particularly important. </p>
    <div>
      <h3><b>Encouraging U.S. technology leadership</b></h3>
      <a href="#encouraging-u-s-technology-leadership">
        
      </a>
    </div>
    <p>The Plan takes the position that the U.S. is in a global race to achieve AI dominance, and that it is a national priority for U.S. technology companies to be the gold standard for AI globally. Through the Plan, President Trump commits his Administration to support American workers, technology, and energy to achieve that objective. </p><p>We share the view that governments have a helpful role to play in shaping rules and regulations that will enable private-sector innovation to flourish. For Cloudflare’s network to continue to operate globally, we need the U.S. government to shape and influence the right regulatory conditions. They should balance national and economic security concerns, promote consensus industry-led international standards, and support interoperable regulatory regimes. </p><p>Far too often in recent years, we’ve observed policy developments that have unnecessarily increased restrictions on U.S. technology providers and have made it challenging to operate. Protectionist mandates, including data sovereignty requirements, customer data retention policies, various supervisory and government access requirements, do little to improve security or innovation and have unintended consequences. Protectionism increases costs for businesses, limits access to world-class technologies, and increases cybersecurity risk. </p><p>Implementing policies that guarantee access to global, distributed edge-compute networks and the freedom to choose the best technology for users' needs will help ensure the right conditions to enable AI to flourish. </p>
    <div>
      <h3><b>The AI ecosystem needed to spur innovation and development</b></h3>
      <a href="#the-ai-ecosystem-needed-to-spur-innovation-and-development">
        
      </a>
    </div>
    <p>The Plan endorses open-source and open-weight AI models to spur innovation and to benefit commercial and government adoption. The plan recommends ensuring access to computing resources to increase capability in the start-up and academic worlds. </p><p>Cloudflare shares the view that open-source AI models play a crucial role in driving innovation. As recognized in the Plan, these models offer companies flexibility, freeing them from dependence on closed providers and enabling the use of AI with sensitive data where exporting to closed models might not be possible. That’s why Cloudflare includes access to more than fifty open-source models as part of our <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI model catalog</u></a>. </p><p>However, access to open-source models alone is not enough to harness AI’s potential. A complete ecosystem is needed to build and deploy the AI applications and tools that will usher in the new age imagined by the Plan. Cloudflare’s global network, with our GPU-powered inference, can play an essential role. Having a distributed network like ours which allows AI inference at the edge is critical for fast, efficient AI development and for building the next generation of AI applications.</p><p>Open ecosystems are deeply embedded in Cloudflare's DNA. Our developer platform democratizes access, providing powerful tools for anyone to build and deploy applications. We offer global network infrastructure that removes complexities and reduces barriers. This lets AI developers innovate freely, using many different AI models, without relying on gatekeepers. Our commitment to making these tools easy to use mirrors the Plan’s call to foster innovation and support U.S. AI leadership by enabling developers to use open-source AI models to build, deploy, and scale new AI applications globally. </p>
    <div>
      <h3><b>Enhancing cybersecurity with AI</b></h3>
      <a href="#enhancing-cybersecurity-with-ai">
        
      </a>
    </div>
    <p>The Plan stresses <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">the importance of cybersecurity for AI i</a>n several ways. There are two we want to highlight. </p><p>First, it endorses the use of AI technologies for the <a href="https://www.cloudflare.com/the-net/government/critical-infrastructure/">cybersecurity of critical infrastructure</a>. The use of AI-assisted cyber-defense tools are force multipliers for network defenders, and will be absolutely necessary for all organizations — but particularly critical infrastructure — to protect against cyber threats. </p><p>Cloudflare’s network uses predictive AI and machine learning to block 247 billion cyberattacks daily. Under the theory of <a href="https://blog.cloudflare.com/defensive-ai/"><u>Defensive AI</u></a>, Cloudflare uses information to constantly improve the effectiveness of our security solutions. With <a href="https://blog.cloudflare.com/ai-labyrinth/"><u>AI Labyrinth</u></a>, we’ve even created a new tool that uses AI to trap AI. It is a new, next generation honeypot and cybersecurity defensive tool that leverages AI to confuse crawlers and bots that ignore "no crawl" directives. Instead of <a href="https://www.cloudflare.com/learning/ai/how-to-block-ai-crawlers/">blocking these bots</a>, AI Labyrinth directs bots into an endless maze of convincing, AI-generated pages. </p><p>Second, to address potential vulnerabilities in AI technologies, the Plan tasks the U.S. government with ensuring that they are secure-by-design. </p><p>To <a href="https://www.cloudflare.com/ai-security/">secure AI</a>, Cloudflare has been active in shaping the cybersecurity and risk management of AI technologies. We have supported and provided feedback to the U.S. National Institute of Standards and Technology’s efforts to develop a Cybersecurity Profile for Artificial Intelligence. This is critically important and builds on our <a href="https://blog.cloudflare.com/tag/cisa/"><u>Secure-by-Design</u></a> commitment. </p><p>We look forward to working with the Administration on the proposed AI information sharing and analysis center and the proposed vulnerability information exchange. </p>
    <div>
      <h3><b>Cloudflare stands ready to accelerate AI adoption in government</b></h3>
      <a href="#cloudflare-stands-ready-to-accelerate-ai-adoption-in-government">
        
      </a>
    </div>
    <p>The Plan envisions the federal government playing a key role in accelerating AI adoption. Cloudflare can help. As the Plan notes, integrating AI can significantly enhance public service, making government more efficient and effective. Most, if not all, federal agencies now have Chief AI Officers, indicating a clear commitment to this technological shift. The government can further its efforts by fostering information sharing between government agencies, promoting best practices, and training its workforce to maximize AI’s efficiency gains.</p><p>Cloudflare can be a key partner in this journey. Our platform provides the secure, reliable, and scalable infrastructure necessary for federal agencies to deploy AI applications with full-stack AI building blocks. <a href="https://www.cloudflare.com/cloudflare-for-government/"><u>Cloudflare is FedRAMP Moderate authorized</u></a>, and we are committed to <a href="https://www.cloudflare.com/learning/privacy/what-is-fedramp/">FedRAMP</a> High. By leveraging Cloudflare’s global network, federal agencies can ensure their AI initiatives are resilient and accessible, driving greater public benefit. </p>
    <div>
      <h3><b>The need to balance the export of AI with export controls</b></h3>
      <a href="#the-need-to-balance-the-export-of-ai-with-export-controls">
        
      </a>
    </div>
    <p>To lead on AI internationally, the Plan outlines a dual strategy, presenting two approaches in tension with each other: aggressive AI export to allies and partners, and stringent restrictions on exporting AI compute and semiconductors. On one hand, the Plan emphasizes that providing the full U.S. AI technology stack is crucial to prevent allies from turning to rivals. This aims to solidify a global AI alliance and ensure the enduring diffusion of American technology.</p><p>Conversely, the plan calls for strengthening export control enforcement and plugging loopholes to prevent export of sensitive technologies. The administration seeks to use export controls — restrictions on what goods a company can export — to deny foreign adversaries access to certain resources for both geostrategic competition and national security concerns. The challenge arises because overly stringent export controls, while aiming to deny access to adversaries, may inadvertently make it harder to export AI even to allies. </p><p>This dual approach highlights a critical tightrope walk. Cloudflare, along with many other industry players, will be watching closely to see how the administration balances these competing goals. Providing individuals across the world with access to resources that enable them to innovate and build applications close to their end users aligns with our mission to help build a better, more connected Internet. Having a globally distributed network like ours also enables U.S. AI companies to deploy their services globally. Although we appreciate the need for restricting access to sensitive compute resources, overly broad or imprecise controls could inadvertently stifle innovation and impede the open exchange of ideas crucial for AI development. The implementation of export controls must be meticulously balanced to target adversaries effectively without unwittingly hindering the very innovation and secure global digital ecosystem it seeks to protect. </p><p>A reassuring aspect of the Plan is its clear recognition of the private sector's indispensable role. The document repeatedly emphasizes the need for collaboration with industry and consultation with leading technology companies across various recommended policy actions. For instance, it specifically calls for establishing programs within the Department of Commerce to gather proposals from industry consortia for AI export packages. Furthermore, for strengthening AI compute export control enforcement, it advises exploring new measures “in collaboration with industry.” This commitment to partnership is essential to navigate the complexities of AI development and deployment. This collaboration with industry will ensure that policies are technically feasible, globally effective, and avoid unforeseen negative impacts on the digital economy and cybersecurity.</p>
    <div>
      <h3><b>Shaping the future of AI together</b></h3>
      <a href="#shaping-the-future-of-ai-together">
        
      </a>
    </div>
    <p>The Plan represents a critical moment for U.S. AI leadership, and Cloudflare stands ready to partner in shaping the future of this critical technology. We applaud the Plan’s focus on accelerating AI development, building robust infrastructure, and leading global diplomacy. The Internet's global nature means that achieving these goals requires a delicate balance, particularly as the business model for the AI-powered web rapidly evolves. </p><p>Cloudflare champions an approach that fosters innovation while upholding an open, secure, and interoperable Internet. By prioritizing consensus-driven standards and ensuring that regulations do not inadvertently create barriers to a globally distributed AI infrastructure, we help ensure continued U.S. technological leadership and a sustainable, beneficial AI ecosystem.</p> ]]></content:encoded>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Politics]]></category>
            <guid isPermaLink="false">NpabdoDRydEF5bKz9jUY4</guid>
            <dc:creator>Zaid Zaid</dc:creator>
            <dc:creator>Vincent Voci</dc:creator>
        </item>
        <item>
            <title><![CDATA[Celebrate Micro-Small, and Medium-sized Enterprises Day with Cloudflare ]]></title>
            <link>https://blog.cloudflare.com/celebrate-micro-small-and-medium-sized-enterprises-day-with-cloudflare/</link>
            <pubDate>Fri, 27 Jun 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ To celebrate United Nations Micro, Small, and Medium Sized Enterprises Day, Cloudflare is sharing success stories of small businesses building and growing on our platform. ]]></description>
            <content:encoded><![CDATA[ <p>On June 27, the United Nations celebrates <a href="https://www.un.org/en/observances/micro-small-medium-businesses-day"><u>Micro-, Small, and Medium-sized Enterprises Day</u></a> (MSME) to recognize the critical role these businesses play in the global economy and economic development. According to the <a href="https://openknowledge.worldbank.org/entities/publication/50dccfb5-81ec-4d9e-a1d9-3b9c266ab2f2?utm_source=chatgpt.com"><u>World Bank</u></a> and the <a href="https://www.un.org/en/observances/micro-small-medium-businesses-day"><u>UN</u></a>, small and medium-sized businesses make up about 90 percent of all businesses, between 50-70 percent of global employment, and 50 percent of global GDP. They not only drive local and national economies, but also sustain the livelihoods of women, youth, and other groups in vulnerable situations. </p><p>As part of MSME Day, we wanted to highlight some of the amazing startups and small businesses that are using Cloudflare to not only secure and improve their websites, but also build, scale, and deploy new serverless applications (and businesses) directly on Cloudflare's global network. </p>
    <div>
      <h2>A startup for startups</h2>
      <a href="#a-startup-for-startups">
        
      </a>
    </div>
    <p>Cloudflare <a href="https://blog.cloudflare.com/cloudflare-winner-of-the-2009-harvard-busines/"><u>started</u></a> as an idea to provide better security and performance tools for everyone. Back in 2010, if you were a large enterprise and wanted better performance and security for your website, you could buy an expensive piece of on-premise hardware or contract with a large, global <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/"><u>Content Delivery Network (CDN)</u></a> provider. Those same types of services were not only unaffordable for most website owners or smaller businesses, but also generally unavailable, as they typically demanded expensive on-premise hardware or direct server access that most smaller operations lacked. Cloudflare launched, fittingly <a href="https://blog.cloudflare.com/reflections-on-techcrunch-disrupt-launch/"><u>at a startup competition</u></a>, with the goal of making those same types of tools available to everyone.</p><p>As Cloudflare has grown, we have <a href="https://blog.cloudflare.com/cloudflares-commitment-to-free/"><u>continued</u></a> to highlight how our millions of free customers, many of them individual developers, <a href="https://blog.cloudflare.com/expanding-cloudflares-startup-program/"><u>startups</u></a>, and <a href="https://blog.cloudflare.com/how-cloudflare-helps-protect-small-businesses/"><u>small businesses</u></a>, drive our network, company, and mission. They help keep our costs low, allow us to interconnect with more networks, and help us build better products.   </p><p>Over the last 12 months, we have put even more of an emphasis on supporting startup and small business communities by expanding free <a href="https://www.cloudflare.com/developer-platform/products/"><u>developer tools</u></a>, which make it easier for anyone to build full stack, <a href="https://ai.cloudflare.com/"><u>AI-enabled applications</u></a> directly on Cloudflare's network, and investing in programs like <a href="https://www.cloudflare.com/forstartups/"><u>Cloudflare for Startups</u></a>, <a href="https://www.cloudflare.com/lp/workers-launchpad/"><u>Workers Launchpad</u></a>, and the <a href="https://blog.cloudflare.com/en-us/launchpad-cohort4-dev-starter-pack/"><u>Dev Alliance</u></a>. For example:  </p><ul><li><p>More than 3,000 startups are receiving free credits to build and scale their applications directly on Cloudflare's global network using our developer services. </p></li><li><p>In 2024 alone, 122 startups in 22 countries were accepted into Cloudflare's Launchpad Program, which provides additional infrastructure, tools, and community support to help entrepreneurs scale their applications and businesses, including access to Cloudflare <a href="https://cloudflare.tv/shows/workers-launchpad-demo-day"><u>demo days</u></a>. </p></li><li><p>Since 2022, Cloudflare has worked with over 40 venture capital partners to secure more than $2 billion in potential financing for companies participating in our startup programs. </p></li></ul><p>With the right tools in hand, entrepreneurs are turning ideas into real world impact, and we’re honored to support them. </p>
    <div>
      <h2>Spotlighting innovation across the globe</h2>
      <a href="#spotlighting-innovation-across-the-globe">
        
      </a>
    </div>
    <p>Cloudflare proudly supports over hundreds of thousands of small businesses that are using our services, including SaaS startups, health and wellness providers, real estate firms, local retailers, and global service providers. Here are just a few examples of these amazing new companies.  </p>
    <div>
      <h3>Built with Cloudflare: European startups </h3>
      <a href="#built-with-cloudflare-european-startups">
        
      </a>
    </div>
    <table><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/Flotiq/"><u>Flotiq (Poland)</u></a></p></td><td><p>A scalable headless CMS for developers that generates fully documented APIs, delivered worldwide using Workers and Pages.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/Capgo/"><u>Capgo (Estonia)</u></a></p></td><td><p>Enables mobile developers to push live updates without app store delays, with Workers &amp; R2 distributing updates at the edge.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/CurrencyAPI/"><u>CurrencyAPI (UK)</u></a></p></td><td><p>Offers real-time and historical exchange rate data for 150+ currencies, using Workers to ensure fast, reliable API access. </p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/EmbedNotionPages.com/"><u>Embed Notion Pages (Netherlands)</u></a></p></td><td><p>Turns Notion pages into embeddable web content, dynamically rendered and cached with Workers and Pages.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/Webstudio/"><u>Webstudio (Germany)</u></a></p></td><td><p>An open-source visual site builder delivering fast, global performance through Pages and Workers.</p></td></tr><tr><td><p><a href="http://pullpi.io"><u>Pullpi.io (Spain)</u></a></p></td><td><p>Streamlines code review workflows to reduce tech debt, with Workers helping automate and scale delivery.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/specsavers"><u>Specsavers (UK)</u></a></p></td><td><p>A global optical retailer modernizing its frontend architecture using Pages and Workers for faster, scalable web experiences.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/NuxtHub/"><u>NuxtHub (France)</u></a></p></td><td><p>A full-stack platform for Nuxt developers to build, store, and deploy apps with ease and integrated with Workers, Pages, and more.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/Starterindex"><u>Starterindex (Romania)</u></a></p></td><td><p>A curated directory of startup tools, served instantly worldwide with Pages and Workers.</p></td></tr><tr><td><p><a href="https://unfetch.com/"><u>Unfetch (Italy)</u></a></p></td><td><p>Builds AI-native productivity tools that are fast, modular, and edge-ready using Cloudflare to support performance and flexibility.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/capawesome"><u>Capawesome (Germany)</u></a></p></td><td><p>Offers open-source Capacitor plugins for mobile developers, with docs and assets served quickly via Workers and Pages.</p></td></tr></table>
    <div>
      <h3>Built with Cloudflare: Asia-Pacific businesses </h3>
      <a href="#built-with-cloudflare-asia-pacific-businesses">
        
      </a>
    </div>
    <table><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/Atlas/"><u>Atlas Kitchen (Singapore)</u></a></p></td><td><p>No-code storefronts for food brands, delivering ultra-low latency and handling high traffic with Workers.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/Qwilr/"><u>Qwilr (Australia)</u></a></p></td><td><p>Creates interactive sales documents that load fast and stay secure globally using Workers, KV, and R2.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/Joystick/"><u>Joystick (Hong Kong)</u></a></p></td><td><p>Multiplayer game SDK and backend platform providing low-latency previews and real-time APIs with Workers and Pages.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/TripTech/"><u>TripTech (Australia)</u></a></p></td><td><p>Powers transport apps with geolocation-aware content and secure APIs, ensuring uptime even in remote areas via Workers.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/SlidesAI/"><u>SlidesAI (India)</u></a></p></td><td><p>AI-driven presentation builder handling high-volume rendering quickly using Pages and Workers.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/FynLink"><u>FynLink (India)</u></a></p></td><td><p>Provides tools for logistics companies to monitor vehicle fleets, manage drivers, and improve fuel efficiency. </p></td></tr><tr><td><p><a href="https://subjective.candra.dev/"><u>Subjective (Australia)</u></a></p></td><td><p>Social platform focused on meaningful questions, fast-loading and globally accessible with Pages and Workers.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/IDM"><u>IDM (India)</u></a></p></td><td><p>Provides secure identity infrastructure with high-performance APIs and built-in protection using Workers and R2.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/DaySchedule"><u>DaySchedule (India</u></a>)</p></td><td><p>AI-powered scheduling tool delivering fast booking and timezone handling at Cloudflare’s edge. </p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/Ambie"><u>Ambie (Taiwan)</u></a></p></td><td><p>Ambient audio streaming with ultra-low latency for mobile and desktop users, powered by Workers and R2.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/homely"><u>Homely (Australia)</u></a></p></td><td><p>Property search platform delivering fast, map-based listings and seamless mobile experience via Pages and Workers.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/dgm"><u>MKLabs (South Korea)</u></a></p></td><td><p>Digital garden showcasing creative web projects, hosted and powered for speed on  Pages and Workers.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/boxhero"><u>BoxHero (South Korea)</u></a></p></td><td><p>Inventory management app delivering fast UIs and APIs globally using Workers, R2, and Pages.</p></td></tr><tr><td><p><a href="https://workers.cloudflare.com/built-with/projects/Milkshake/"><u>Milkshake (Australia) </u></a></p></td><td><p>Mobile-friendly mini websites from Instagram bios, powered by Workers for routing and Pages for hosting.</p></td></tr></table><p>Cloudflare is also working with our civil society partners in the Asia-Pacific region to help provide security training for new businesses. For example, in 2025, we partnered with <a href="https://www.cyberpeace.org/about-us"><u>Cyberpeace</u></a>, a leading nonprofit organization in India, to host a webinar focused on <a href="https://www.cloudflare.com/learning/security/what-is-cyber-resilience/">building cyber resilience</a>. The session included a live onboarding session, training on security services, and information on the most common cyber threats. Our first session attracted over 95 participants, and due to the high demand, Cloudflare is planning to host an additional in-person training session later this year. Stay tuned for more details!</p>
    <div>
      <h2>Helping protect small businesses (and a new security guide!)</h2>
      <a href="#helping-protect-small-businesses-and-a-new-security-guide">
        
      </a>
    </div>
    <p>It is incredible to see all the innovative ways companies are building new ideas with Cloudflare. However, as a startup originally designed to protect other startups, we know security remains one of the most pressing concerns for any small business. According to the <a href="https://www.fcc.gov/communications-business-opportunities/cybersecurity-small-businesses"><u>U.S. Federal Communications Commission</u></a>, theft of digital information has surpassed physical theft as the most commonly reported fraud for small businesses. In 2025 so far, Cloudflare has mitigated over three million <a href="https://developers.cloudflare.com/ddos-protection/about/attack-coverage/"><u>Layer 3 (network layer) DDoS attacks</u></a> targeting small businesses protected by our network.</p><p>This year, to help celebrate MSME day, Cloudflare is continuing our efforts to provide training and capacity building for our small business partners by releasing a brand new Cloudflare Small Business Security Guide. The guide includes step-by-step instructions that will allow anyone to better understand cyber security services and protect their business and customers from common cyberattacks. For more information, visit the <a href="https://www.cloudflare.com/small-business/"><u>Cloudflare for Small Businesses</u></a> page to download the guide today. </p><p>Cloudflare will always make robust security services available to any small business that needs them, free of charge. It is a fundamental part of our mission to help build a better Internet and our identity as a company. </p><p>If you are building a small business and need access to better developer or security services, getting started with Cloudflare is simple, fast, and straightforward. <a href="https://www.cloudflare.com/plans/free/"><u>Signing up for a Free plan</u></a> takes only minutes and can instantly provide access to the tools you need to secure and accelerate your web presence and keep your small business thriving.</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Free]]></category>
            <category><![CDATA[Impact]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">RZxPGrzjOiPmMdVhXUdSi</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
            <dc:creator>Smrithi Ramesh</dc:creator>
            <dc:creator>Patrick Day</dc:creator>
        </item>
        <item>
            <title><![CDATA[Russian Internet users are unable to access the open Internet]]></title>
            <link>https://blog.cloudflare.com/russian-internet-users-are-unable-to-access-the-open-internet/</link>
            <pubDate>Thu, 26 Jun 2025 22:33:30 GMT</pubDate>
            <description><![CDATA[ Since June 9, 2025, Internet users located in Russia and connecting to the open Internet have been throttled by Russian Internet Service Providers (ISPs). ]]></description>
            <content:encoded><![CDATA[ <p>Since June 9, 2025, Internet users located in Russia and connecting to web services protected by Cloudflare have been throttled by Russian Internet Service Providers (ISPs).</p><p>As the throttling is being applied by local ISPs, the action is outside of Cloudflare’s control and we are unable, at this time, to restore reliable, high performance access to Cloudflare products and protected websites for Russian users in a lawful manner. </p><p>Internal data analysis suggests that the throttling allows Internet users to load only the first 16 KB of any web asset, rendering most web navigation impossible.</p><p>Cloudflare has not received any formal outreach or communication from Russian government entities about the motivation for such an action. Unfortunately, the actions are consistent with <a href="https://blog.cloudflare.com/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/"><u>longstanding</u></a> Russian efforts to isolate the Internet within its borders and reduce reliance on Western technology by replacing it with domestic alternatives. Indeed, Russian President Vladimir Putin recently publicly <a href="https://www.barrons.com/news/putin-threatens-to-throttle-western-firms-remaining-in-russia-8bb06070"><u>threatened</u></a> to throttle US tech companies operating inside Russia. </p><p><a href="https://en.zona.media/article/2025/06/19/cloudflare"><u>External reports</u></a> corroborate our analysis, and further suggest that a number of other service providers are also affected by throttling or other disruptive actions in Russia, including at least Hetzner, DigitalOcean, and OVH.</p>
    <div>
      <h2>The impact</h2>
      <a href="#the-impact">
        
      </a>
    </div>
    <p>Cloudflare is seeing disruptions across connections initiated from inside Russia, even when the connection reaches our servers outside of Russia. Consistent with <a href="https://dl.acm.org/doi/10.1145/3517745.3561461"><u>public reporting</u></a> on Russia's practices, this suggests that the disruption is happening inside Russian ISPs, close to users.</p><p>Russian Internet Services Providers (ISPs) confirmed to be implementing these disruptive actions include, but are not limited to, Rostelecom, Megafon, Vimpelcom, MTS, and MGTS.</p><p>Based on our observations, Russian ISPs are using several throttling and blocking mechanisms affecting sites protected by Cloudflare, including injected packets to halt the connection and blocking packets so the connection times out. A new tactic that began on June 9 limits the amount of content served to 16 KB, which renders many websites barely usable.</p><p>The throttling affects all connection methods and protocols, including HTTP/1.1 and HTTP/2 on TCP and TLS, as well as HTTP/3 on QUIC.</p>
    <div>
      <h2>The view from Cloudflare data</h2>
      <a href="#the-view-from-cloudflare-data">
        
      </a>
    </div>
    
    <div>
      <h3>Traffic trends</h3>
      <a href="#traffic-trends">
        
      </a>
    </div>
    <p>Cloudflare Radar exists to share insights and bring transparency to Internet trends. The high rate of connectivity errors to all our data centers has resulted in an overall decrease in traffic served to Russian users. The reduction in traffic can be observed on <a href="https://radar.cloudflare.com/ru?dateStart=2025-06-01&amp;dateEnd=2025-06-26"><u>Cloudflare Radar</u></a>:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64iapMiGlMvgHJXPyPH9Xo/bec47ff9147019ffa01e365f9bc11309/BLOG-2859_2.png" />
          </figure>
    <div>
      <h3>Client-side reports via Network Error Logging</h3>
      <a href="#client-side-reports-via-network-error-logging">
        
      </a>
    </div>
    <p>Some customers elect to enable <a href="https://www.w3.org/TR/network-error-logging/"><u>W3C</u></a>-defined <a href="https://developers.cloudflare.com/network-error-logging/"><u>Network Error Logging</u></a> (NEL), a feature that embeds error-reporting instructions inside the headers of web content that users request. The instructions tell web browsers what errors to report, and how to do so. Below is a view of NEL reports that show an increase of TCP connections being ‘reset’ prematurely (as explained in our <a href="https://blog.cloudflare.com/connection-tampering/"><u>tampering</u></a> and Radar <a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>resets</u></a> blogs). Separately, the large growth in h3.protocol.error shows that QUIC connections have been greatly affected:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hduiNgSSfVk6FaJ4JLyGN/9f4f014796d000e919b5794c37eda18c/BLOG-2859_3.png" />
          </figure>
    <div>
      <h3>Corroboration of throttling using internal data</h3>
      <a href="#corroboration-of-throttling-using-internal-data">
        
      </a>
    </div>
    <p>The effects of the throttling can also be observed in our internal tooling. The chart below shows packet loss to our Russian data centers, each data center represented by a different line. The Y-axis is the proportion of packet loss:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7DIMgYxjPniMlPS2q2PIbP/c9762738b31278bfd9809457546303c6/BLOG-2859_4.png" />
          </figure><p>High packet loss is a strong signal but does not on its own indicate throttling, since there might be other explanations. For example, an explanation may be our servers trying to resend packets multiple times in during some other mass failure that hinders, but does not completely halt, communication.</p><p>However, we have two additional pieces of information to work with. The first consists of public reports that “throttling” in this case means blocking all connections after <a href="https://en.zona.media/article/2025/06/19/cloudflare"><u>16 KB of data</u></a> has been transmitted, which takes 10 to 14 packets (depending on the underlying technology). Second, we have our recently deployed “<a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>Resets and Timeouts</u></a>” data that captures anomalous behaviour in TCP when it occurs within the first 10 packets. Since 10 packets can contain 16 KB of data, some connections that are blocked around 16 KB will be visible at the “Post PSH” stage in the Radar data. In TCP, the ‘PSH’ message means Cloudflare got the initial request and data transfer has begun. If the connection is blocked at this stage, then many of the sent packets will be lost. </p><p>The graph below uses Radar’s <a href="https://radar.cloudflare.com/embed/DataExplorerVisualizer?path=tcp_resets_timeouts%2Ftimeseries_groups&amp;dateRange=28d&amp;mainLocation=ru&amp;locale=en-US&amp;widgetState=%7B%22showAnnotations%22%3Atrue%2C%22xy.hiddenSeries%22%3A%5B%22Post+SYN%22%2C%22Later%22%2C%22Post+ACK%22%2C%22No+match%22%5D%2C%22xy.highlightedSeries%22%3Anull%2C%22xy.hoveredSeries%22%3Anull%2C%22xy.previousVisible%22%3Atrue%7D&amp;ref=%2Fexplorer%3FdataSet%3Dtcp_resets_timeouts%26loc%3Dru%26dt%3D28d"><u>Data Explorer</u></a> to focus on just the Post-PSH stage, where there is a dip followed by an immediate and proportionally large increase before June 11. This pattern corresponds closely with the loss data seen above:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RNvY4vrO6LQZ8qFeW5ENK/1f0f79701a46e2c2d43eb1b5aa812351/BLOG-2859_5.png" />
          </figure>
    <div>
      <h2>If you run Internet sites for Russian users</h2>
      <a href="#if-you-run-internet-sites-for-russian-users">
        
      </a>
    </div>
    <p>If you are using Cloudflare to protect your sites, unfortunately, at this time, Cloudflare does not have the ability to restore Internet connectivity for Russia-based users. We advise you to reach out and solicit Russian entities to lift the throttling measures that have been put in place.</p><p>If you are a Cloudflare enterprise customer, please reach out to your account team for further assistance.</p><p>Access to a free and open Internet is critical for individual rights and economic development. We condemn any attempt to prevent Russian citizens from accessing it.</p> ]]></content:encoded>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">vyxFL3zp5DqpF5RpHznRv</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>Alissa Starzak</dc:creator>
        </item>
        <item>
            <title><![CDATA[Celebrating 11 years of Project Galileo’s global impact]]></title>
            <link>https://blog.cloudflare.com/celebrating-11-years-of-project-galileo-global-impact/</link>
            <pubDate>Thu, 12 Jun 2025 10:00:00 GMT</pubDate>
            <description><![CDATA[ June 2025 marks the 11th anniversary of Project Galileo, Cloudflare’s effort to protect vulnerable public interest organizations from cyber threats. ]]></description>
            <content:encoded><![CDATA[ <p>June 2025 marks the 11th anniversary of <a href="https://www.cloudflare.com/galileo/"><u>Project Galileo</u></a>, Cloudflare’s initiative to provide free cybersecurity protection to vulnerable organizations working in the public interest around the world. From independent media and human rights groups to community activists, Project Galileo supports those often targeted for their essential work in human rights, civil society, and democracy building.</p><p>A lot has changed since we marked the <a href="https://blog.cloudflare.com/pt-br/celebrating-10-years-of-project-galileo/"><u>10th anniversary</u></a> of Project Galileo. Yet, our commitment remains the same: help ensure that organizations doing critical work in human rights have access to the tools they need to stay online.  We believe that organizations, no matter where they are in the world, deserve reliable, accessible protection to continue their important work without disruption.</p><p>For our 11th anniversary, we're excited to share several updates including:</p><ul><li><p>An interactive <a href="https://radar.cloudflare.com/reports/project-galileo-11th-anniv"><u>Cloudflare Radar report</u></a> providing insights into the cyber threats faced by at-risk public interest organizations protected under the project. </p></li><li><p>An expanded commitment to digital rights in the Asia-Pacific region with two new Project Galileo partners.</p></li><li><p><a href="https://www.cloudflare.com/project-galileo-case-studies/"><u>New stories </u></a>from organizations protected by Project Galileo working on the frontlines of civil society, human rights, and journalism from around the world.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3xVNGtdTOw6NXqSfzU7Up1/8a2cbe643108fa97a4d14af477a6cb80/image3.png" />
          </figure>
    <div>
      <h2>Tracking and reporting on cyberattacks with the Project Galileo 11th anniversary Radar report </h2>
      <a href="#tracking-and-reporting-on-cyberattacks-with-the-project-galileo-11th-anniversary-radar-report">
        
      </a>
    </div>
    <p>To mark Project Galileo’s 11th anniversary, we’ve published a <a href="https://radar.cloudflare.com/reports/project-galileo-11th-anniv"><u>new Radar report</u></a> that shares data on cyberattacks targeting organizations protected by the program. It provides insights into the types of threats these groups face, with the goal of better supporting researchers, civil society, and vulnerable groups by promoting the best cybersecurity practices. Key insights include:</p><ul><li><p>Our data indicates a growing trend in DDoS attacks against these organizations, becoming more common than attempts to exploit traditional web application vulnerabilities.</p></li><li><p>Between May 1, 2024, to March 31, 2025, Cloudflare blocked 108.9 billion cyber threats against organizations protected under Project Galileo. This is an average of nearly 325.2 million cyber attacks per day over the 11-month period, and a 241% increase from our 2024 Radar report. </p></li><li><p>Journalists and news organizations experienced the highest volume of attacks, with over 97 billion requests blocked as potential threats across 315 different organizations. The peak attack traffic was recorded on September 28, 2024. Ranked second was the Human Rights/Civil Society Organizations category, which saw 8.9 billion requests blocked, with peak attack activity occurring on October 8, 2024.</p></li><li><p>Cloudflare onboarded the <a href="https://investigatebel.org/en"><u>Belarusian Investigative Center</u></a>, an independent journalism organization, on September 27, 2024, while it was already under attack. A major application-layer DDoS attack followed on September 28, generating over 28 billion requests in a single day. </p></li><li><p>Many of the targets were investigative journalism outlets operating in regions under government pressure (such as Russia and Belarus), as well as NGOs focused on combating racism and extremism, and defending workers’ rights.</p></li><li><p><a href="https://t4p.co/"><u>Tech4Peace</u></a>, a human rights organization focused on digital rights, was targeted by a 12-day attack beginning March 10, 2025, that delivered over 2.7 billion requests. The attack saw prolonged, lower-intensity attacks and short, high-intensity bursts. This deliberate variation in tactics reveals a coordinated approach, showing how attackers adapted their methods throughout the attack.</p></li></ul><p>The full Radar report includes additional information on public interest organizations, human and civil rights groups, environmental organizations, and those involved in disaster and humanitarian relief. The dashboard also serves as a valuable resource for policymakers, researchers, and advocates working to protect public interest organizations worldwide.</p>
    <div>
      <h2>Global partners are the key to Project Galileo's continued growth</h2>
      <a href="#global-partners-are-the-key-to-project-galileos-continued-growth">
        
      </a>
    </div>
    <p>Partnerships are core to Project Galileo success. We rely on <a href="https://www.cloudflare.com/galileo/"><u>56 trusted civil society organizations</u></a> around the world to help us identify and support groups who could benefit from our protection. With our partners' help, we’re expanding our reach to provide tools to communities that need protection the most. Today, we’re proud to welcome two new partners to Project Galileo who are championing digital rights, open technologies, and civil society in Asia and around the world. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Jg4RyM682Ykduf5EKGmXe/c0a8a797a1f889d0a1e02b68115238f9/Screenshot_2025-06-11_at_14.13.51.png" />
          </figure><p><a href="https://engagemedia.org/"><u>EngageMedia</u></a> is a nonprofit organization that brings together advocacy, media, and technology to promote digital rights, open and secure technology, and social issue documentaries. Based in the Asia-Pacific region, EngageMedia collaborates with changemakers and grassroots communities to protect human rights, democracy, and the environment.</p><p>As part of our partnership, Cloudflare participated in a 2025 Tech Camp for Human Rights Defenders hosted by EngageMedia, which brought together around 40 activist-technologists from across Asia-Pacific. Among other things, the camp focused on building practical skills in digital safety and website resilience against online threats. Cloudflare presented on common attack vectors targeting nonprofits and human rights groups, such as DDoS attacks, phishing, and website defacement, and shared how Project Galileo helps organizations mitigate these risks. We also discussed how to better promote digital security tools to vulnerable groups. The camp was a valuable opportunity for us to listen and learn from organizations on the front lines, offering insights that continue to shape our approach to building effective, community-driven security solutions.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tX9mgOO8Ss3Wp41E6xj8Q/33e88d0736cf403882b2cef590b2f9bb/Screenshot_2025-06-11_at_14.14.04.png" />
          </figure><p>Founded in 2014 by leaders of Taiwan’s open tech communities, the <a href="https://ocf.tw/en/"><u>Open Culture Foundation </u></a>(OCF) supports efforts to protect digital rights, promote civic tech, and foster open collaboration between government, civil society, and the tech community. Through our partnership, we aim to support more than 34 local civil society organizations in Taiwan by providing training and workshops to help them manage their website infrastructure, address vulnerabilities such as DDoS attacks, and conduct ongoing research to tackle the security challenges these communities face.</p>
    <div>
      <h2>Stories from the field  </h2>
      <a href="#stories-from-the-field">
        
      </a>
    </div>
    <p>We continue to be inspired by the amazing work and dedication of the organizations that participate in Project Galileo. Helping protect these organizations and allowing them to focus on their work is a fundamental part of helping build a better Internet. Here are some of their stories:</p><ul><li><p><a href="https://fairfuturefoundation.org/"><u>Fair Future Foundation</u></a> (Indonesia): non-profit that provides health, education, and access to essential resources like clean water and electricity in ultra-rural Southeast Asia. </p></li><li><p><a href="https://yihr.org/"><u>Youth Initiative for Human Rights</u></a> (Serbia): regional NGO network promoting human rights, youth activism, and reconciliation in the Balkans.</p></li><li><p><a href="https://investigatebel.org/en"><u>Belarusian Investigative Center</u></a> (Belarus): media organization that conducts in-depth investigations into corruption, sanctions evasion, and disinformation in Belarus and neighboring regions. </p></li><li><p><a href="https://gcef.ca/en/"><u>The Greenpeace Canada Education Fund (GCEF)</u></a> (Canada): non-profit that conducts research, investigations, and public education on climate change, biodiversity, and environmental justice. </p></li><li><p><a href="https://insightcrime.org/"><u>Insight Crime</u></a> (LATAM): nonprofit think tank and media organization that investigates and analyzes organized crime and citizen security in Latin America and the Caribbean. </p></li><li><p><a href="http://diez.md"><u>Diez.md</u></a> (Moldova): youth-focused Moldovan news platform offering content in Romanian and Russian on topics like education, culture, social issues, election monitoring and news. </p></li><li><p><a href="https://engagemedia.org/"><u>EngageMedia</u></a> (APAC): nonprofit dedicated to defending digital rights and supporting advocates for human rights, democracy, and environmental sustainability across the Asia-Pacific. </p></li><li><p><a href="https://pussyriot.love/"><u>Pussy Riot</u></a> (Europe): a global feminist art and activist collective using art, performance, and direct action to challenge authoritarianism and human rights violations. </p></li><li><p><a href="https://www.ilrc.org/"><u>Immigrant Legal Resource Center</u></a> (United States): nonprofit that works to advance immigrant rights by offering legal training, developing educational materials, advocating for fair policies, and supporting community-based organizations.</p></li><li><p><a href="https://5wf.org/"><u>5W Foundation</u></a> (Netherlands): wildlife conservation non-profit that supports front-line conservation teams globally by providing equipment to protect threatened species and ecosystems.</p></li></ul><p>These case studies offer a window into the diverse, global nature of the threats these groups face and the vital role cybersecurity plays in enabling them to stay secure online. Check out their stories and more: <a href="http://cloudflare.com/project-galileo-case-studies/"><u>cloudflare.com/project-galileo-case-studies/</u></a></p>
    <div>
      <h2>Continuing our support of vulnerable groups around the world </h2>
      <a href="#continuing-our-support-of-vulnerable-groups-around-the-world">
        
      </a>
    </div>
    <p>In 2025, many of our Project Galileo partners have faced significant funding cuts, affecting their operations and their ability to support communities, defend human rights, and champion democratic values. Ensuring continued support for those services, despite financial and logistical challenges, is more important than ever. We’re thankful to our civil society partners who continue to assist us in identifying groups that need our support. Together, we're working toward a more secure, resilient, and open Internet for all. To learn more about Project Galileo and how it supports at-risk organizations worldwide, visit <a href="https://cloudflare.com/galileo"><u>cloudflare.com/galileo</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Project Galileo]]></category>
            <category><![CDATA[Impact]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">7mDMJrIALhItjbx62fNSv4</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[Vulnerability transparency: strengthening security through responsible disclosure]]></title>
            <link>https://blog.cloudflare.com/vulnerability-transparency-strengthening-security-through-responsible/</link>
            <pubDate>Fri, 16 May 2025 15:00:00 GMT</pubDate>
            <description><![CDATA[ In line with CISA’s Secure By Design pledge, Cloudflare shares its vulnerability disclosure process, CVE issuance criteria, and CNA duties.  ]]></description>
            <content:encoded><![CDATA[ <p>In an era where digital threats evolve faster than ever, cybersecurity isn't just a back-office concern — it's a critical business priority. At Cloudflare, we understand the responsibility that comes with operating in a connected world. As part of our ongoing commitment to security and transparency, Cloudflare is proud to have joined the <a href="https://www.cisa.gov/"><u>United States Cybersecurity and Infrastructure Security Agency’s (CISA)</u></a> <a href="https://www.cisa.gov/securebydesign/pledge"><u>“Secure by Design” pledge</u></a> in May 2024. </p><p>By signing this pledge, Cloudflare joins a growing coalition of companies committed to strengthening the resilience of the digital ecosystem. This isn’t just symbolic — it's a concrete step in aligning with cybersecurity best practices and our commitment to protect our customers, partners, and data. </p><p>A central goal in CISA’s Secure by Design pledge is promoting transparency in vulnerability reporting. This initiative underscores the importance of proactive security practices and emphasizes transparency in vulnerability management — values that are deeply embedded in Cloudflare’s Product Security program. ​We believe that openness around vulnerabilities is foundational to earning and maintaining the trust of our customers, partners, and the broader security community.</p>
    <div>
      <h2>Why transparency in vulnerability reporting matters</h2>
      <a href="#why-transparency-in-vulnerability-reporting-matters">
        
      </a>
    </div>
    <p>Transparency in vulnerability reporting is essential for building trust between companies and customers. In 2008, Linus Torvalds <a href="https://lkml.org/lkml/2008/7/15/293"><u>noted</u></a> that disclosure is inherently tied to resolution: “<i>So as far as I'm concerned, disclosing is the fixing of the bug</i>”, emphasizing that resolution must start with visibility. While this mindset might apply well to open-source projects and communities familiar with code and patches, it doesn’t scale easily to non-expert users and enterprise users who require structured, validated, and clearly communicated disclosures regarding a vulnerability’s impact. Today’s threat landscape demands not only rapid remediation of vulnerabilities but also clear disclosure of their nature, impact and resolution. This builds trust with the customer and contributes to the broader collective understanding of common vulnerability classes and emerging systemic flaws.</p>
    <div>
      <h3>What is a CVE?</h3>
      <a href="#what-is-a-cve">
        
      </a>
    </div>
    <p>Common Vulnerabilities and Exposures (CVE) is a catalog of publicly disclosed vulnerabilities and exposures. Each CVE includes a unique identifier, summary, associated metadata like the Common Weakness Enumeration (CWE) and Common Platform Enumeration (CPE), and a severity score that can range from None to Critical. </p><p>The format of a CVE ID consists of a fixed prefix, the year of the disclosure and an arbitrary sequence number ​​like<b> </b>CVE-2017-0144. Memorable names such as "EternalBlue"  (<a href="https://www.cve.org/CVERecord?id=CVE-2017-0144"><u>CVE-2017-0144</u></a>)  are often associated with high-profile exploits to enhance recall.</p>
    <div>
      <h3>What is a CNA?</h3>
      <a href="#what-is-a-cna">
        
      </a>
    </div>
    <p>As an authorized <a href="https://www.cve.org/ResourcesSupport/Glossary#glossaryCNA"><u>CVE Numbering Authority (CNA)</u></a>, Cloudflare can assign CVE identifiers for vulnerabilities discovered within our products and ecosystems. Cloudflare has been actively involved with MITRE's <a href="https://www.cve.org"><u>CVE program</u></a> since its founding in 2009. As a CNA, Cloudflare assumes the responsibility to manage disclosure timelines ensuring they are accurate, complete, and valuable to the broader industry. </p>
    <div>
      <h3>Cloudflare CVE issuance process</h3>
      <a href="#cloudflare-cve-issuance-process">
        
      </a>
    </div>
    <p>Cloudflare issues CVEs for vulnerabilities discovered internally and through our <a href="https://hackerone.com/cloudflare"><u>Bug Bounty program</u></a> when they affect <b>open source software</b> and/or our <b>distributed closed source products</b>.</p><p>The findings are triaged based on real-world exploitability and impact. Vulnerabilities without a plausible exploitation path, in addition to findings related to test repositories or exposed credentials like API keys, typically do not qualify for CVE issuance.</p><p>We recognize that CVE issuance involves nuance, particularly for sophisticated security issues in a complex codebase (for example, the <a href="https://www.youtube.com/watch?v=Rg_VPMT0XXw"><u>Linux kernel</u></a>). Issuance relies on impact to users and the likelihood of the exploit, which depends on the complexity of executing an attack. The growing number of CVEs issued industry-wide reflects a broader effort to balance theoretical vulnerabilities against real-world risk. </p><p>In scenarios where Cloudflare was impacted by a vulnerability, but the root cause was within another CNA’s scope of products, Cloudflare will not assign the CVE. Instead, Cloudflare may choose other mediums of disclosure, like blog posts.</p>
    <div>
      <h3>How does Cloudflare disclose a CVE?</h3>
      <a href="#how-does-cloudflare-disclose-a-cve">
        
      </a>
    </div>
    <p>Our disclosure process begins with internal evaluation of severity and scope, and any potential privacy or compliance impacts. When necessary, we engage our Legal and Security Incident Response Teams (SIRT). For vulnerabilities reported to Cloudflare by external entities via our Bug Bounty program, our standard disclosure timeline is within 90 days. This timeline allows us to ensure proper remediation, thorough testing, and responsible coordination with affected parties. While we are committed to transparent disclosure, we believe addressing and validating fixes before public release is essential to protect users and uphold system security. For open source projects, we also issue security advisories on the relevant GitHub repositories. Additionally, we encourage external researchers to publish/blog about their findings after issues are remediated. Full details and process of Cloudflare’s external researcher/entity disclosure policy can be found via our <a href="https://hackerone.com/cloudflare?type=team#:~:text=the%20next%20level!-,Disclosure,-Cloudflare%20strongly%20supports"><u>Bug Bounty program</u></a> policy page</p>
    <div>
      <h2>Outcomes</h2>
      <a href="#outcomes">
        
      </a>
    </div>
    <p>To date, Cloudflare has issued and disclosed<b> </b>multiple<b> </b>CVEs. Because of the security platforms and products that Cloudflare builds, vulnerabilities have primarily been in the areas of denial of service, local privilege escalation, logical flaws, and improper input validation. Cloudflare also believes in collaboration and open sources of some of our software stack, therefore CVEs in these repositories are also promptly disclosed.</p><p>Cloudflare disclosures can be found <a href="https://www.cve.org/CVERecord/SearchResults?query=Cloudflare"><u>here</u></a>. Below are some of the most notable vulnerabilities disclosed by Cloudflare:</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2024-1765"><u>CVE-2024-1765</u></a>: quiche: Memory Exhaustion Attack using post-handshake CRYPTO frames</h3>
      <a href="#quiche-memory-exhaustion-attack-using-post-handshake-crypto-frames">
        
      </a>
    </div>
    <p><a href="https://github.com/cloudflare/quiche"><u>Cloudflare quiche</u></a> (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running a quiche server or client.</p><p>A remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake.</p><p>Exploitation was possible for the duration of the connection, which could be extended by the attacker.</p><p>quiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue.</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2024-0212"><u>CVE-2024-0212</u></a>: Cloudflare WordPress plugin enables information disclosure of Cloudflare API (for low-privilege users)</h3>
      <a href="#cloudflare-wordpress-plugin-enables-information-disclosure-of-cloudflare-api-for-low-privilege-users">
        
      </a>
    </div>
    <p>The <a href="https://github.com/cloudflare/Cloudflare-WordPress"><u>Cloudflare WordPress</u></a> plugin was found to be vulnerable to improper authentication. The vulnerability enables attackers with a lower privileged account to access data from the Cloudflare API.</p><p>The issue has been fixed in version &gt;= 4.12.3 of the plugin</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2023-2754"><u>CVE-2023-2754</u></a> - Plaintext transmission of DNS requests in Windows 1.1.1.1 WARP client</h3>
      <a href="#plaintext-transmission-of-dns-requests-in-windows-1-1-1-1-warp-client">
        
      </a>
    </div>
    <p>The Cloudflare WARP client for Windows assigns loopback IPv4 addresses for the DNS servers, since WARP acts as a local DNS server that performs DNS queries securely. However, if a user is connected to WARP over an IPv6-capable network, the WARP client did not assign loopback IPv6 addresses but rather Unique Local Addresses, which under certain conditions could point towards unknown devices in the same local network, enabling an attacker to view DNS queries made by the device.</p><p>This issue was patched in version 2023.7.160.0 of the WARP client (Windows).</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord?id=CVE-2025-0651"><u>CVE-2025-0651</u></a> - Improper privilege management allows file manipulations </h3>
      <a href="#improper-privilege-management-allows-file-manipulations">
        
      </a>
    </div>
    <p>An improper privilege management vulnerability in Cloudflare WARP for Windows allowed file manipulation by low-privilege users. Specifically, a user with limited system permissions could create symbolic links within the <code>C:\ProgramData\Cloudflare\warp-diag-partials</code> directory. When the "Reset all settings" feature is triggered, the WARP service — running with SYSTEM-level privileges — followed these symlinks and may delete files outside the intended directory, potentially including files owned by the SYSTEM user.</p><p>This vulnerability affected versions of WARP prior to 2024.12.492.0.</p>
    <div>
      <h3><a href="https://www.cve.org/CVERecord/SearchResults?query=CVE-2025-23419"><u>CVE-2025-23419</u></a>: TLS client authentication can be bypassed due to ticket resumption (disclosed Cloudflare impact via blog post)</h3>
      <a href="#tls-client-authentication-can-be-bypassed-due-to-ticket-resumption-disclosed-cloudflare-impact-via-blog-post">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/en-gb/learning/access-management/what-is-mutual-tls/"><u>mutual TLS</u></a> implementation caused a vulnerability in the session resumption handling. The underlying issue originated from <a href="https://github.com/google/boringssl"><u>BoringSSL</u></a>’s process to resume TLS sessions. BoringSSL stored client certificates, which were reused from the original session (without revalidating the full certificate chain) and the original handshake's verification status was not re-validated. </p><p>While Cloudflare was impacted by the vulnerability, the root cause was within NGINX's implementation, making F5 the appropriate CNA to assign the CVE. This is an example of alternate mediums of disclosure that Cloudflare sometimes opt for. This issue was fixed as per guidance from the respective CVE — please see our <a href="https://blog.cloudflare.com/resolving-a-mutual-tls-session-resumption-vulnerability/"><u>blog post</u></a> for more details.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Irrespective of the industry, if your organization builds software, we encourage you to familiarize yourself with <a href="https://www.cisa.gov/securebydesign"><u>CISA’s “Secure by Design” principles</u></a> and create a plan to implement them in your company. The CISA Secure by Design pledge is built around seven security goals, prioritizing the security of customers, and challenges organizations to think differently about security. </p><p>As we continue to enhance our security posture, Cloudflare remains committed to enhancing our internal practices, investing in tooling and automation, and sharing knowledge with the community. CVE transparency is not a one-time initiative — it’s a sustained effort rooted in openness, discipline, and technical excellence. By embedding these values in how we design, build and secure our products, we aim to meet and exceed expectations set out in the CISA pledge and make the Internet more secure, faster and reliable!</p><p>For more updates on our CISA progress, review our related <a href="https://blog.cloudflare.com/tag/cisa/"><u>blog posts</u></a>. Cloudflare has delivered five of the seven CISA Secure by Design pledge goals, and we aim to complete the remainder of the pledge goals in May 2025.</p> ]]></content:encoded>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[CVE]]></category>
            <guid isPermaLink="false">1Ni8ekT7qEWe5PVydsDP1m</guid>
            <dc:creator>Sri Pulla</dc:creator>
            <dc:creator>Martin Schwarzl</dc:creator>
            <dc:creator>Trishna</dc:creator>
        </item>
        <item>
            <title><![CDATA[Project Jengo for Sable — final winners!]]></title>
            <link>https://blog.cloudflare.com/project-jengo-for-sable-final-winners/</link>
            <pubDate>Wed, 26 Mar 2025 05:00:00 GMT</pubDate>
            <description><![CDATA[ With Cloudflare’s victory against patent trolls Sable IP and Sable Networks in the books, it’s time to close out the case’s Project Jengo competition. ]]></description>
            <content:encoded><![CDATA[ <p>With Cloudflare’s victory against patent trolls Sable IP and Sable Networks in the books, it’s time to close out the case’s <a href="https://blog.cloudflare.com/project-jengo/"><u>Project Jengo</u></a> competition. </p><p>In our last <a href="https://blog.cloudflare.com/patent-troll-sable-pays-up/"><u>update</u></a>, we talked about the conclusion of Sable’s 3+ year campaign to extort a payment from Cloudflare based on meritless patent infringement claims. After Cloudflare’s victory at trial in February 2024, Sable finally — and fully — capitulated, agreeing to: (1) pay Cloudflare $225,000, (2) grant Cloudflare a royalty-free license to Sable’s entire patent portfolio, and (3) dedicate all of Sable’s patents to the public. </p><p>With the fight against Sable ended, we <a href="https://blog.cloudflare.com/patent-troll-sable-pays-up/"><u>announced</u></a> the Conclusion of the Case under the <a href="https://www.cloudflare.com/jengo/sable-rules/"><u>Project Jengo Sable Rules</u></a>. Now that the Grace Period has passed, we are pleased to announce the final winners of Project Jengo for the Sable case!</p><p>Read on for background on the case, details on the Project Jengo final winners, and other patent troll-related updates.</p>
    <div>
      <h3>The Sable win</h3>
      <a href="#the-sable-win">
        
      </a>
    </div>
    <p>For anyone unfamiliar with the Sable case, the story can be traced back all the way to 2006, when patent troll Sable bought patents from a company going out of business. In 2021, fifteen years after buying the patents, Sable filed suit asserting these patents against a huge swath of companies: Cloudflare, Cisco, Fortinet, Check Point, SonicWall, Juniper Networks, and others. Sable knew that, no matter how weak its case, companies were likely to pay it just to avoid the considerable cost and trouble of litigating. </p><p>Cloudflare doesn’t pay trolls for meritless patent claims. Rather than paying off Sable to make the suit go away, we aggressively litigated the case, knocking out nearly <b>100 claims</b> spanning <b>4 patents</b>. By the time we got to trial, just a <b>single claim</b> was left.</p><p>At trial, the jury’s verdict was decisive. After just <b>2 hours</b> of deliberating, the jury found that Cloudflare didn’t infringe the remaining live claim (claim 25 of the ’919 patent). The jury then went on to <i>also </i>find that claim 25 was invalid in the first place. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3AOcLxu1X8ziNdWTJIiSIz/6bbb3544996cba99294bb561edc52991/1.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2EHcDi1tfbZNb3CvEAetvy/fda5c4947f4d5e7e177e954a08a44d6d/2.png" />
          </figure><p>In fact, Cloudflare’s victory was so complete that Sable didn’t bother appealing. Instead, Sable agreed to pay <i>Cloudflare</i> $225,000. In other words, not only did Sable miss out on its payday, it had to pay up for its failed litigation. </p><p>Even better, Sable granted Cloudflare a royalty-free license to its entire patent portfolio and dedicated all of its patents to the public, meaning Sable can no longer use these patents to profit off of frivolous lawsuits. This case, and Cloudflare’s aggressive defense, put Sable out of the patent troll business for good. </p>
    <div>
      <h3>Announcing the final Project Jengo winners</h3>
      <a href="#announcing-the-final-project-jengo-winners">
        
      </a>
    </div>
    <p>With the Sable litigation resolved, it’s time to close out the Project Jengo contest!</p><p>Project Jengo is our <a href="https://www.cloudflare.com/jengo/sable-prior-art-search/"><u>prior art bounty program</u></a>. It plays a fundamental role in our battle against patent trolls, helping us crowdsource key evidence that the trolls’ patents are invalid. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6xGNxkEw0J9Ttev9j3aPdd/17030c04222d1353ff01c5331112fc65/3.png" />
          </figure><p><sup><i>Prior art = instances of the inventions being claimed in the patents already being used or made public before the patent application was filed, meaning the patent is invalid.</i></sup></p><p>Project Jengo <a href="https://blog.cloudflare.com/the-project-jengo-saga-how-cloudflare-stood-up-to-a-patent-troll-and-won/"><u>began</u></a> in 2017 when Cloudflare was sued by prolific patent troll Blackbird. We put out a call, offering cash rewards not just for prior art to invalidate the patents asserted against us in the lawsuit, but against <i>any Blackbird patents</i>. We received hundreds of submissions, more than half of which were related to patents that weren’t asserted against Cloudflare. That meant Project Jengo was a threat to Blackbird’s entire portfolio — far more than Blackbird bargained for when it first sued us. After several years of litigation, the program helped us soundly defeat Blackbird in court and put it out of business. </p><p>When Sable filed its suit in 2021, we <a href="https://blog.cloudflare.com/project-jengo-redux-cloudflares-prior-art-search-bounty-returns/"><u>revived</u></a> Project Jengo for this next round in the fight against patent trolls. Cloudflare committed <b>$100,000</b> to the Sable prior art search. Winners were announced after each of eight submission periods in blog posts here: <a href="https://blog.cloudflare.com/project-jengo-2-first-three-winners/"><u>Chapter 1</u></a>, <a href="https://blog.cloudflare.com/former-rd-engineer-wins-round-2-of-project-jengo-and-cloudflare-wins-at-the-patent-office/"><u>Chapter 2</u></a>, <a href="https://blog.cloudflare.com/arkansas-engineer-wins-round-3-of-project-jengo-and-cloudflare-continues-to-win-at-the-patent-office/"><u>Chapter 3</u></a>, <a href="https://blog.cloudflare.com/three-new-winners-of-project-jengo-and-more-defeats-for-the-patent-troll/"><u>Chapters 4-6</u></a>, and <a href="https://blog.cloudflare.com/patent-troll-sable-pays-up/"><u>Chapters 7-8</u></a>. Now, we’re ready to announce the <a href="https://www.cloudflare.com/jengo/sable-rules/"><u>Final Awards</u></a> based on all of the submissions over the case’s journey. These Final Awards winners will collectively receive $30,000! </p>
    <div>
      <h4>Jean-Pierre Le Rouzic: Cloudflare user, 12-time patent grantee, and our Chapter Two winner</h4>
      <a href="#jean-pierre-le-rouzic-cloudflare-user-12-time-patent-grantee-and-our-chapter-two-winner">
        
      </a>
    </div>
    <p>Jean-Pierre received an additional <b>$10,000</b> as a final winner for his contributions to the Sable round of Project Jengo! </p><p>As detailed in the <a href="https://blog.cloudflare.com/former-rd-engineer-wins-round-2-of-project-jengo-and-cloudflare-wins-at-the-patent-office/"><u>blog post</u></a> announcing Jean-Pierre’s chapter two victory, he is a retired telecommunications R&amp;D engineer living in Rennes, France. Since retiring, he has been using Cloudflare for his blog. </p><p>After seeing Project Jengo on Hacker News, he decided to join in. He was particularly motivated because of the similar trends he sees within the pharmaceutical industry, of intellectual property (IP) profiteering displacing innovative R&amp;D efforts. He explained: </p><blockquote><p><i>The challenge faced by Cloudflare is close to my heart. … Cloudflare is facing an entity which is unreasonably stretching the meaning of their patent claims.</i></p></blockquote><p>Jean-Pierre applied his patent expertise (he wrote 12 patents related to online authentication and identity management in the 2000s) to the Sable case. He followed a methodical process, preparing “two conceptual trees, one started from Sable patents and expanded with possible prior arts, and the other” from the asserted claims. Jean-Pierre ultimately prepared a 24-page submission, including a meticulously detailed claim chart, identifying prior art challenging the ’431 patent asserted against Cloudflare (titled “Micro-Flow Management” and concerning Internet switching technology for network service providers). See our prior post <a href="https://blog.cloudflare.com/former-rd-engineer-wins-round-2-of-project-jengo-and-cloudflare-wins-at-the-patent-office/#appendix-jean-pierres-findings-compared-to-us-7406098"><u>here</u></a> for a detailed walk-through of his findings.</p>
    <div>
      <h4>George J.: engineer, patent attorney, and our Chapter Seven winner</h4>
      <a href="#george-j-engineer-patent-attorney-and-our-chapter-seven-winner">
        
      </a>
    </div>
    <p>Like Jean-Pierre, George J. won an additional <b>$10,000</b> for his submission during <a href="https://blog.cloudflare.com/patent-troll-sable-pays-up/#we-are-thrilled-to-announce-the-winners-of-chapters-7-and-8"><u>chapter seven</u></a>! </p><p>George is an electrical engineer and patent attorney who is actively engaged in the IP community. He found out about Project Jengo on the legal site Law360. With a knack for prior art searches and claim charts, he decided to apply his professional background to the Sable challenge.</p><p>George’s submissions to Project Jengo included three prior art references for the ’431 patent. He also found that one of those three overlapped with the inventions in the ’919 patent (titled “Micro-Flow Label Switching”), the patent ultimately contested at trial. George provided 39 pages of detailed charts comparing the prior art he found against the Sable patents. </p>
    <div>
      <h4>Peter S. and Jatin: our Chapter Four and Eight winners</h4>
      <a href="#peter-s-and-jatin-our-chapter-four-and-eight-winners">
        
      </a>
    </div>
    <p>Peter S. and Jatin have each been awarded <b>$5,000</b> more for their submissions! </p><p>Peter S. is unique among this group of winners in lacking a technical/patent background. But when he saw Project Jengo on Cloudflare’s website, that didn’t stop him from deciding to take a stab at it. We’re glad he did! As we described in our prior <a href="https://blog.cloudflare.com/three-new-winners-of-project-jengo-and-more-defeats-for-the-patent-troll/"><u>post</u></a> about Peter’s submission, the ʼ593 patent is the Sable patent concerning the detection of “bad” flows. Peter’s prior art reference developed the same thing <i>five years earlier</i>: “This thesis studies a means of using such mechanisms to identify nonadaptive [what Sable calls ‘bad’] network flows, and proposes a protocol to push this information, along with penalization responsibility, towards the flows’ sources.” Since Yang’s <a href="https://dspace.mit.edu/bitstream/handle/1721.1/47543/40470984-MIT.pdf"><u>work</u></a> predates the ’593 patent’s alleged new solutions by years, this was a great find.</p><p>Jatin, a computer science analyst who also discovered Project Jengo while reading Cloudflare’s blog, submitted two pieces of prior art. As we noted in the Chapter Eight <a href="https://blog.cloudflare.com/patent-troll-sable-pays-up/#we-are-thrilled-to-announce-the-winners-of-chapters-7-and-8"><u>post</u></a>, they were particularly good references for Sable’s ’919 patent (the one patent that remained contested at trial).</p>
    <div>
      <h3>In other troll-related news…</h3>
      <a href="#in-other-troll-related-news">
        
      </a>
    </div>
    <p>And there’s more! On the heels of the Sable litigation coming to a close, another troll filed but promptly abandoned its case against Cloudflare after realizing what it would have been up against. </p><p>Patent troll Touchpoint Projections Innovations sued Cloudflare in May 2024. Cloudflare was clear from the start that we would not back down. Several months later, when the case was still in its early stages, we published our blog post about Sable’s total capitulation — paying Cloudflare and getting out of the patent troll game. </p><p>Just <i>two weeks later</i>, Touchpoint voluntarily dismissed the case with prejudice. The “with prejudice” language means it’s final, and that the case can’t restart at any point in the future. In other words, Touchpoint threw in the towel before things had really gotten started. </p><p>Sure, the timing could be coincidental. But we have a hunch that when Touchpoint realized what they’d be up against, they took a hard look at their case, and decided it just wasn’t worth it.</p><p>We’ve seen this pattern before. Back in 2022, PacSec3 LLC accused Cloudflare of patent infringement. But after we made clear our intention to fight back, PacSec3 called it quits, dismissing its case.</p><p>Cloudflare’s trial victories and Project Jengo are sending a clear message to patent trolls. We’re not afraid of a fight! We hope other trolls take note and find other, more productive, avenues for their efforts.  </p> ]]></content:encoded>
            <category><![CDATA[Jengo]]></category>
            <category><![CDATA[Jengo Policy]]></category>
            <category><![CDATA[Legal Patents Sable]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">7vpLPW7ezoVN0nUbSRGmeJ</guid>
            <dc:creator>Emily Terrell</dc:creator>
            <dc:creator>Natalie Ritchie</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Security now available for free for political parties and campaigns through Cloudflare for Campaigns]]></title>
            <link>https://blog.cloudflare.com/email-security-now-available-for-free-for-political-parties-and-campaigns/</link>
            <pubDate>Mon, 17 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ We’re excited to announce that Cloudflare for Campaigns now includes Email Security, adding an extra layer of protection to email systems that power political campaigns. ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare, we believe that every political candidate — regardless of their affiliation — should be able to run their campaign without the constant worry of cyber attacks. Unfortunately, malicious actors, such as nation-states, financially motivated attackers, and hackers, are often looking to disrupt campaign operations and messaging. These threats have the potential to interfere with the democratic process, weaken public confidence, and cause operational challenges for campaigns of all scales.</p><p>In 2020, in partnership with the non-profit, non-partisan <a href="https://defendcampaigns.org/"><u>Defending Digital Campaigns</u> </a>(DDC), we launched <a href="https://www.cloudflare.com/campaigns/usa/"><u>Cloudflare for Campaigns</u></a> to offer a free package of cybersecurity tools to political campaigns, especially smaller ones with limited resources. Since then, we have helped over 250 political campaigns and parties across the US, regardless of affiliation.</p><p>This is why we are excited to announce that we have extended our Cloudflare for Campaigns product suite to include <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a>, to secure email systems that are essential to safeguarding the integrity and success of a political campaign. By preventing phishing, spoofing, and other email threats, it helps protect candidates, staff, and supporters from cyberattacks that could compromise sensitive data.</p>
    <div>
      <h3>The front line of protection is email security  </h3>
      <a href="#the-front-line-of-protection-is-email-security">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/phishing-attack/"><u>Phishing attacks</u></a> on political campaigns have been a major cybersecurity threat in recent years, often leading to data breaches, leaks, and misinformation. In 2016,<a href="https://www.washingtonpost.com/world/national-security/how-the-russians-hacked-the-dnc-and-passed-its-emails-to-wikileaks/2018/07/13/af19a828-86c3-11e8-8553-a3ce89036c78_story.html"> <u>attackers targeted</u></a> Democratic National Committee (DNC) staff with <a href="https://www.cloudflare.com/learning/access-management/spear-phishing/"><u>spear phishing emails</u></a> disguised as Google security alerts, allowing hackers to access thousands of emails. In 2018, Russian intelligence agents<a href="https://www.npr.org/2018/07/26/632897181/russian-agents-unsuccessfully-tried-to-hack-sen-claire-mccaskills-campaign"> <u>attempted to infiltrate</u></a> Senator Claire McCaskill's re-election campaign by sending emails to her staff, urging them to change their passwords. </p><p>This unsettling trend has affected political parties as well. In 2020, the Republican Party of Wisconsin fell <a href="https://cyberscoop.com/wisconsin-gop-alleges-late-race-hack-cost-party-2-3-million-from-fund-to-reelect-trump/"><u>victim to a phishing attack</u></a> that resulted in hackers stealing $2.3 million. </p><p>During the<a href="https://blog.cloudflare.com/securing-the-inboxes-of-democracy/"> <u>2022 US midterm elections</u></a>, Cloudflare safeguarded the email inboxes of more than 100 campaigns, election officials, and public organizations involved in the election process. These ranged from first-time candidates in local races to seasoned incumbents at the national level. In the three months leading up to the 2022 midterms, Cloudflare processed over 20 million emails and successfully blocked around 150,000 phishing attempts targeting campaign staff. </p><p>During the <a href="https://blog.cloudflare.com/exploring-internet-traffic-shifts-and-cyber-attacks-during-the-2024-us-election/"><u>2024 US election</u></a>, we actively protected state and local election offices, political campaigns, state parties, independent media, and voting rights organizations. In addition, we safeguarded the inboxes of hundreds of political campaigns, ensuring secure and uninterrupted communications to help campaigns focus on their message and outreach without the fear of cyberattack derailing their efforts. Over the course of the year, Cloudflare:</p><ul><li><p>Scanned 5.7 million emails for campaigns and political parties </p></li><li><p>Blocked 400,000 malicious messages before they reached campaign staff and teams</p></li><li><p>Detected and blocked 21,000 suspicious emails</p></li><li><p>Prevented 14,000 unique spoofing attempts</p></li></ul>
    <div>
      <h3>Providing tools to help political campaigns and parties stay secure online </h3>
      <a href="#providing-tools-to-help-political-campaigns-and-parties-stay-secure-online">
        
      </a>
    </div>
    <p>We launched <a href="https://blog.cloudflare.com/introducing-cloudflare-for-campaigns/"><u>Cloudflare for Campaigns in 2020</u></a> to help political campaigns stay online amid cyber attacks. US campaign finance laws prohibit corporations from donating money or services to federal candidates or parties. However, we partner with Defending Digital Campaigns (DDC), approved by the Federal Election Commission, to offer free and discounted cybersecurity services. Through DDC, we provide tailored security solutions for resource-limited campaigns and parties facing heightened cyber threats.</p><blockquote><p><i>"DDC is thrilled that Cloudflare is expanding their product offerings to campaigns with the addition of Email Security. This will expedite robust protections from the real and serious threats posed by phishing. Now campaigns, in concert with the DDoS protection Cloudflare provides via Cloudflare for Campaigns, will be able to easily enable a suite of core protections. This new offering further exemplifies Cloudflare's extraordinary and generous commitment to protecting campaigns. Cloudflare has been one of DDC’s core partners since we were founded."</i><i><b>  </b></i><b>– Michael Kaiser, President &amp; CEO of Defending Digital Campaigns</b></p></blockquote><p>Over five years, our partnership has strengthened protections against DDoS attacks and web vulnerabilities. However, campaigns have frequently asked for help combating malicious emails that target campaign staff. </p><p><a href="https://www.cloudflare.com/press-releases/2022/cloudflare-to-acquire-area-1-security/"><u>Cloudflare acquired Area 1 Security in 2022</u></a> to enhance its Zero Trust platform by integrating an email security solution that proactively identifies and blocks phishing threats before they reach users' inboxes. Before the acquisition, Area 1 provided low-cost email security to political campaigns with direct FEC approval. </p><p>Fast-forward to 2025, and we are excited to officially integrate Email Security into our full Cloudflare for Campaigns portfolio to better protect US political parties and campaigns.</p>
    <div>
      <h3>Access free Email Security for your political campaign or party with Cloudflare for Campaigns </h3>
      <a href="#access-free-email-security-for-your-political-campaign-or-party-with-cloudflare-for-campaigns">
        
      </a>
    </div>
    <p>Under this program, <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> is available starting today and includes: </p><ul><li><p><b>Phishing protection</b>: AI-powered threat detection that automatically identifies and blocks malicious emails before they reach their target</p></li><li><p><b>Email authentication</b>: Built-in support for <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/"><u>DMARC, DKIM, and SPF</u></a> to prevent email spoofing</p></li><li><p><b>Real-time monitoring</b>: Continuous scanning for suspicious activities and anomalies</p></li><li><p><b>Seamless integration</b>: Easily integrates with existing email providers without disrupting workflows</p></li><li><p><b>Insightful reporting</b>: Actionable analytics and reports to track security events and improve defenses</p></li></ul><p>At Cloudflare, we are committed to helping build a better Internet — one where election campaigns can operate securely, free from the threat of cyber attacks. </p><p>Current campaigns and political parties that are protected under Cloudflare for Campaigns will receive an email with information on how to enable Email Security. If you are a campaign or a political party interested in applying for the project to get access to the full suite of products, please visit <a href="https://www.cloudflare.com/campaigns/usa/"><u>https://www.cloudflare.com/campaigns/usa</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Impact]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1vrjPL7SVTINpzIEqARhsx</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare is using automation to tackle phishing head on]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-is-using-automation-to-tackle-phishing/</link>
            <pubDate>Mon, 17 Mar 2025 05:00:00 GMT</pubDate>
            <description><![CDATA[ How Cloudflare is using threat intelligence and our Developer Platform products to automate phishing abuse reports. ]]></description>
            <content:encoded><![CDATA[ <p>Phishing attacks have grown both in volume and in sophistication over recent years. Today’s threat isn’t just about sending out generic <a href="https://www.cloudflare.com/learning/email-security/what-is-email/"><u>emails</u></a> — bad actors are using advanced phishing techniques like <a href="https://bolster.ai/blog/man-in-the-middle-phishing"><u>2 factor monster in the middle</u></a> (MitM) attacks, <a href="https://blog.cloudflare.com/how-cloudflare-cloud-email-security-protects-against-the-evolving-threat-of-qr-phishing/"><u>QR codes</u></a> to bypass detection rules, and <a href="https://www.malwarebytes.com/blog/news/2025/01/ai-supported-spear-phishing-fools-more-than-50-of-targets"><u>using artificial intelligence (AI)</u></a> to craft personalized and targeted phishing messages at scale. Industry organizations such as the Anti-Phishing Working Group (APWG) <a href="https://docs.apwg.org/reports/apwg_trends_report_q2_2024.pdf"><u>have shown</u></a> that phishing incidents continue to climb year over year.</p><p>To combat both the increase in phishing attacks and the growing complexity, we have built advanced automation tooling to both detect and take action. </p><p>In the first half of 2024, Cloudflare resolved 37% of phishing reports using automated means, and the median time to take action on hosted phishing reports was 3.4 days. In the second half of 2024, after deployment of our new tooling, we were able to expand our automated systems to resolve 78% of phishing reports with a median time to take action on hosted phishing reports of under an hour.</p><p>In this post we dig into some of the details of how we implemented these improvements.</p>
    <div>
      <h3>The phishing site problem</h3>
      <a href="#the-phishing-site-problem">
        
      </a>
    </div>
    <p><a href="https://blog.cloudflare.com/dispelling-the-generative-ai-fear-how-cloudflare-secures-inboxes-against-ai-enhanced-phishing/"><u>Cloudflare has observed a similar increase</u></a> in the volume of phishing activity throughout 2023 and 2024. We receive <a href="https://abuse.cloudflare.com/"><u>abuse reports</u></a> from anyone on the Internet that may have seen potentially abusive behaviors from websites using Cloudflare services. Our Trust &amp; Safety investigators and engineers have been tasked with responding to these complaints, and more recently have been using the data from these reports to improve our threat intelligence, brand protection, and email security product offerings.</p><p>Cloudflare has always believed in using the vast amounts of traffic that flows through our network to improve threat detection and customer security. This has been at the core of how we protect our customers from <a href="https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/"><u>DoS attacks</u></a> and other <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/"><u>cybersecurity</u></a> threats. We've been applying the same concepts our internal teams use to mitigate <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/"><u>phishing</u></a> to improve detection of phishing on our network and our ability to detect and notify our customers about potential risks to their brand.</p><p>Prior to last year, phishing abuse reported to Cloudflare relied on manual, human review and intervention to remediate. Trust &amp; Safety (T&amp;S) investigators would have to look at each complaint, the allegations made by the reporter, and the content on the reported websites to make assessments as quickly as possible about whether the website was phishing or <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/"><u>malware</u></a>.</p><p>Given the growing scale of our customer base and phishing across the Internet, this became unsustainable. By collecting a group of internal experts on abuse, we were able to tackle this problem by using insights across our network, internal data from our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/"><u>Email Security</u></a> product, external feeds from trusted sources, and years of abuse report processing data to automatically assess risk of likely phishing and recommend appropriate action.</p>
    <div>
      <h3>Turning our intelligence inward</h3>
      <a href="#turning-our-intelligence-inward">
        
      </a>
    </div>
    <p>We built our automated phishing identification on the <a href="https://www.cloudflare.com/developer-platform/products/"><u>Cloudflare Developer Platform</u></a> so that we could meet our scanning demand without concern for how we might scale. This allowed us to focus more on creating a great phishing detection engine and less on the infrastructure required to meet that demand. </p><p>Each URL submitted to our phishing detection <a href="https://workers.cloudflare.com/"><u>Worker</u></a> begins with an initial scan by the <a href="https://radar.cloudflare.com/scan"><u>Cloudflare URL Scanner</u></a>. The scan provides us with the rendered HTML, network requests, and attributes of the site. After scanning, we collect reputational information about the site by submitting the HTML and page resources to our in-house <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/"><u>machine learning</u></a> classifiers; meanwhile, the <a href="https://www.cloudflare.com/learning/security/what-are-indicators-of-compromise/"><u>indicators of compromise (IOCs)</u></a> are sent to our suite of <a href="https://www.cloudflare.com/learning/security/glossary/threat-intelligence-feed/"><u>threat feeds</u></a> and domain categorization tools to highlight any known malicious sites or site categorizations.</p><p>Once we have all of this information collected, we expose it to a set of rules and heuristics that identify the URL as phishing or not based on how T&amp;S investigators have traditionally responded to similar abuse reports and patterns of bad behaviors we’ve observed. Rules will suggest decisions to make against the reports, and remediations to make against harmful content. It is through this process that we were able to convert the manual reviews by T&amp;S investigators into an automated flow of phishing identification. We also recognize that reporters make mistakes or even deliberately try to weaponize abuse processes. Our rules must therefore consider the possibility of false positives, in which reports are created against legitimate websites (intentionally or unintentionally). False positives can erode the trust of our customers and create incidents, so automation must include processes to disregard erroneous reports.</p><p>The magic of all of this was the powerful suite of tools on the Cloudflare Developer Platform. Whether it was using <a href="https://developers.cloudflare.com/kv/"><u>KV</u></a> to store report summaries that could scale indefinitely or <a href="https://developers.cloudflare.com/durable-objects/"><u>Durable Objects</u></a> to keep running counters of an unlimited number of attributes that could be tracked or leveraged over time, we were able to integrate the solutions quickly allowing us easily add or remove new enrichments with little effort. We also made use of <a href="https://developers.cloudflare.com/hyperdrive/"><u>Hyperdrive</u></a> to access the internal Postgres database that stores our abuse reports, <a href="https://developers.cloudflare.com/queues/"><u>Queues</u></a> to manage the scanning jobs, <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a> to run machine learning classifiers, and <a href="https://developers.cloudflare.com/d1/"><u>D1</u></a> to store detection logs for efficacy and evaluation review. To tie it all together, the team also deployed a <a href="https://developers.cloudflare.com/pages/framework-guides/deploy-a-remix-site/"><u>Remix Pages UI</u></a> to present all the phishing detection engine’s analysis to T&amp;S investigators for follow-on investigations and evaluations of inconclusive results.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7MQYa4u71uKm9J6AaNxQNy/0cce686f51988ece4a1a46d87dae6df9/image1.png" />
          </figure><p><sup><i>Architecture of Trust &amp; Safety’s phishing automation detection pipeline</i></sup></p>
    <div>
      <h3>Moving forward</h3>
      <a href="#moving-forward">
        
      </a>
    </div>
    <p>The same intelligence we’re gathering to expedite and refine abuse report processing isn’t just for abuse response; it’s also used to empower our customers. By analyzing patterns and trends of abusive behaviors — such as identifying common phrases used in phishing attempts, recognizing infrastructure used by malicious actors or spotting coordinated campaigns across multiple domains — we enhance the efficacy of our application security, email security, and threat intelligence products.</p><p>For our <a href="https://developers.cloudflare.com/learning-paths/application-security/security-center/brand-protection/"><u>Brand Protection</u></a> customers, this translates into a significant advantage: the ability to easily report suspected abuse directly from the Cloudflare dashboard. This feature ensures that potential phishing sites are addressed rapidly, minimizing the risk to your customers and brand reputation. Furthermore, the Trust and Safety team can use this information to take action on similar threats across the Cloudflare network, protecting all customers, even those who aren't Brand Protection users.</p><p>Alongside our network-wide efforts, we’ve also been partnering with our customers, as well as experts outside of Cloudflare, to understand trends they are seeing in their own phishing mitigation efforts. By soliciting intelligence regarding the abuse issues that affect the attack’s targets, we can better identify and prevent abuse of Cloudflare products. We’ve been able to use these partnerships and discussions with external organizations to craft highly targeted rules that head off emerging patterns of phishing activity. </p>
    <div>
      <h3>It takes a village: if you see something, say something</h3>
      <a href="#it-takes-a-village-if-you-see-something-say-something">
        
      </a>
    </div>
    <p>If you believe you’ve identified phishing activity that is passing through Cloudflare’s network, please report it via our <a href="https://abuse.cloudflare.com/"><u>abuse reporting form</u></a>. For technical users who might be interested in a programmatic way to report to us, please review our <a href="https://developers.cloudflare.com/api/resources/abuse_reports/"><u>abuse reporting API</u></a> documentation.</p><p>We invite all of our customers to join us in helping make the Internet safer:</p><ol><li><p>Enterprise customers should speak with their Customer Success Manager about enabling <a href="https://blog.cloudflare.com/safeguarding-your-brand-identity-logo-matching-for-brand-protection/"><u>Brand Protection</u></a>, included by default for all enterprise customers. </p></li><li><p>For existing users of the Brand Protection product, update your <a href="https://developers.cloudflare.com/security-center/brand-protection/"><u>brand's assets</u></a>, so we can better identify the legitimate websites and logos of our customers vs. possible phishing activity.</p></li><li><p>As a Cloudflare customer, make sure your <a href="https://developers.cloudflare.com/fundamentals/setup/account/account-security/abuse-contact/"><u>abuse contact</u></a> is up-to-date in the Cloudflare dashboard.</p></li></ol><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Abuse]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">3Bb3gcZ92DhVXA44P3XF7x</guid>
            <dc:creator>Javier Castro</dc:creator>
            <dc:creator>Justin Paine</dc:creator>
            <dc:creator>Rachael Truong</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s 2024 Transparency Reports - now live with new data and a new format]]></title>
            <link>https://blog.cloudflare.com/cloudflare-2024-transparency-reports-now-live-with-new-data-and-a-new-format/</link>
            <pubDate>Fri, 28 Feb 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s 2024 Transparency Reports are now live — with new topics, new data points, and a new format, consistent with the EU’s Digital Services Act ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s 2024 <a href="https://www.cloudflare.com/transparency/"><u>Transparency Reports</u></a> are now live — with new topics, new data points, and a new format. For <a href="https://www.cloudflare.com/transparency/archive/"><u>over 10 years</u></a>, Cloudflare has published transparency reports twice a year in order to provide information to our customers, policymakers, and the public about how we handle legal requests and abuse reports relating to the websites using our services. Such transparency reporting is now recognized as a <a href="https://www.accessnow.org/campaign/transparency-reporting-index/"><u>best practice</u></a> among companies offering online services, and has even been written into law with the European Union’s Digital Service Act (DSA).</p><p>While Cloudflare has been publishing transparency reports for a long time, this year we chose to revamp the report in light of new reporting obligations under the DSA, and our goal of making our reports both comprehensive and easy to understand. Before you dive into the reports, learn more about Cloudflare’s longstanding commitment to transparency reporting and the key updates we made in this year’s reports.</p>
    <div>
      <h3>Cloudflare’s approach to transparency reporting</h3>
      <a href="#cloudflares-approach-to-transparency-reporting">
        
      </a>
    </div>
    <p>Cloudflare started issuing transparency reports early on, because we have long believed that transparency is essential to earning trust. In addition to sharing data about the number and nature of requests we receive, our transparency reports have provided a forum for Cloudflare to articulate the principles we apply in approaching <a href="https://www.cloudflare.com/trust-hub/law-enforcement/"><u>legal requests for customer information</u></a> and how we <a href="https://www.cloudflare.com/trust-hub/abuse-approach/"><u>handle abuse</u></a>.</p><p>Grounded in Cloudflare’s principles, our transparency reports have necessarily evolved over time as the scale and complexity of our services has grown. While our initial reports were focused on governmental requests for customer information, our reports have expanded to cover a broader set of issues, including civil requests for customer information, legal requests to limit or terminate services, and our process for handling reports of abuse on websites using our services.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7xcEb5PMZSvbk1Blkh7I1S/1694b584f1223a24d5aedde0065352ae/image2.png" />
          </figure>
    <div>
      <h3>The EU’s Digital Services Act</h3>
      <a href="#the-eus-digital-services-act">
        
      </a>
    </div>
    <p>A key driver of this year’s updates was the transparency reporting obligations in the <a href="https://blog.cloudflare.com/digital-services-act/"><u>EU’s Digital Services Act (DSA)</u></a>. As we have written about <a href="https://blog.cloudflare.com/digital-services-act/"><u>previously</u></a>, the DSA replaced a 20-year-old law called the e-Commerce Directive, providing an important framework for addressing the legal responsibilities of online service providers.</p><p>While the DSA addresses a number of topics, an important one is transparency. The DSA sets different transparency reporting obligations for different services, establishing baseline reporting requirements for all intermediary services, more detailed reporting for hosting services, and the most extensive reporting for online platforms like social media sites and search engines. Most of Cloudflare’s services are pass-through (intermediary) services related to security and performance with limited transparency reporting requirements under the DSA, while our hosting services have some additional requirements related to our abuse-related actions.</p><p>The DSA transparency obligations align with Cloudflare’s longstanding practices and company principles toward transparency. Because Cloudflare has always strived to provide meaningful transparency into its approach to these issues, we are well positioned to comply with the specific reporting obligations set forth in the DSA. That said, while we believe that our existing reports already satisfied much of the DSA, we identified changes we wanted to make to match specific types of data or formatting called for under the DSA. </p>
    <div>
      <h3>New data and a new format</h3>
      <a href="#new-data-and-a-new-format">
        
      </a>
    </div>
    <p>Our 2024 Transparency Reports include more information than ever before, all in a new format that we believe will make the information easier to understand.</p><p>Prompted by the DSA’s requirements and the continued expansion of services we offer, the 2024 reports includes new information, including additional categories of hosted content abuse, automated steps Cloudflare has taken to mitigate phishing and technical abuse, the mean time to take action on different types of abuse reports, and information about additional types of requests for customer information that we have received. You’ll find a machine-readable version of the data alongside our transparency reports, consistent with DSA requirements. We also introduced "additional context" boxes to call out trends or notable developments during the reporting period.</p><p>To try to make all of this information as digestible as possible, we divided our transparency report into two parts. Our report on Legal Requests for Information addresses the law enforcement, government, and civil requests for customer information that Cloudflare receives in the United States and around the world. Our report on Abuse Processes addresses Cloudflare’s processes for handling reports of abuse on websites using our services and our response to legal requests to terminate or restrict access to our users.</p><p>Because we divided the report into two parts, you’ll find our ‘<a href="https://blog.cloudflare.com/cloudflare-transparency-update-joining-cloudflares-flock-of-warrant-canaries-2/"><u>warrant canaries</u></a>’ on the <a href="https://www.cloudflare.com/transparency/"><u>transparency report landing page</u></a> of our <a href="https://www.cloudflare.com/trust-hub/"><u>Trust Hub</u></a> and no longer in the reports themselves. The warrant canary statements about things we have never done as a company are an essential part of our commitment to transparency in how we handle both customers’ information in response to legal requests and abuse reports. All of our warrant canaries remain intact, meaning we still haven't done any of these things.</p><p>We’ll continue to publish transparency reports twice a year, available on the <a href="https://www.cloudflare.com/transparency/"><u>Transparency page</u></a> of our website as well as through an <a href="https://www.cloudflare.com/transparency/rss.xml"><u>RSS feed</u></a>. Our approach to these reports will continue to evolve in order to provide meaningful transparency in line with our company principles, product portfolio growth, and in line with the new regulatory environment.</p> ]]></content:encoded>
            <category><![CDATA[Trust & Safety]]></category>
            <category><![CDATA[Transparency]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">6r04i7Ke1lNGEWK4u3pRK1</guid>
            <dc:creator>Abby Vollmer</dc:creator>
            <dc:creator>Despina Papageorge</dc:creator>
        </item>
        <item>
            <title><![CDATA[Helping civil society monitor cyber attacks with the CyberPeaceTracer and Cloudflare Email Security ]]></title>
            <link>https://blog.cloudflare.com/helping-civil-society-monitor-attacks-with-the-cyberpeacetracer-and-cloudflare-email-security/</link>
            <pubDate>Mon, 17 Feb 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ We’re proud to collaborate with CyberPeace Institute by powering its latest initiative, the CyberPeace Tracer, a platform that enables civil society organizations to proactively report cyber threats. ]]></description>
            <content:encoded><![CDATA[ <p>Civil society organizations have always been at the forefront of humanitarian relief efforts, as well as safeguarding civil and human rights. These organizations play a large role in delivering services during crises, whether it is <a href="https://www.cloudflare.com/case-studies/awaq-ongd/"><u>fighting climate change</u></a>, <a href="https://www.cloudflare.com/case-studies/valdosta-amateur-radio-club/"><u>support during natural disasters</u></a>, <a href="https://www.cloudflare.com/case-studies/hera-digital-health/"><u>providing health services to marginalized communities</u></a> and <a href="https://www.cloudflare.com/project-galileo-case-studies/"><u>more. </u></a></p><p>What do many of these organizations have in common? Many times, it’s cyber attacks from adversaries looking to steal sensitive information or disrupt their operations. Cloudflare has seen this firsthand when providing free cybersecurity services to vulnerable groups through programs like <a href="https://www.cloudflare.com/galileo/"><u>Project Galileo,</u></a> and found that in aggregate, organizations protected under the project experience an average of 95 million attacks per day. While cyber attacks are a problem across all industries in the digital age, civil society organizations are disproportionately targeted, many times due to their advocacy, and because attackers know that they typically operate with limited resources. In most cases, these organizations don’t even know they have been attacked until it is too late. </p><p>Over the last 10 years of Project Galileo, we’ve had the opportunity to work more closely with leading civil society organizations. This has led to a number of exciting new partnerships, including our work with the <a href="https://cyberpeaceinstitute.org/"><u>CyberPeace Institute</u></a>. That’s why we’re excited to share work on a new resource, the <a href="https://cyberpeacetracer.ngo/"><u>CyberPeace Tracer</u></a>. This resource will enable researchers, civil society, governments, and other organizations to understand threats and data-driven insights about the cyber threat landscape of the vulnerable communities we serve.</p>
    <div>
      <h3>Partnership with CyberPeace Institute </h3>
      <a href="#partnership-with-cyberpeace-institute">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/A2J1R7yr7kojfk6xCcsC0/4f029ea06f2d10fde4228ace88ba400b/Screenshot_2025-02-17_at_18.04.04.png" />
          </figure><p>The CyberPeace Institute is an independent non-profit based in Switzerland, dedicated to making cyberspace safer and more equitable for everyone. The Institute works closely with partners to minimize the impact of cyberattacks on people’s lives worldwide. In addition to partnerships, the organization provides independent <a href="https://cyberpeaceinstitute.org/cyber-incident-tracers/"><u>data-driven insights on the threat landscape</u></a>, from the global healthcare system to cyber attacks during the Russian government's invasion of Ukraine. By analyzing these attacks, they are able to highlight real-world consequences, expose violations of international laws and norms, and promote responsible behavior online.</p><p>Cloudflare's work with the CyberPeace Institute started in 2022 when the organization joined Project Galileo.Through the program, Cloudflare was proud not only to help protect the CyberPeace website, but also provide <a href="https://blog.cloudflare.com/democratizing-access-to-zero-trust-with-project-galileo/"><u>Zero Trust tools</u></a> that secure access to internal applications for the institute's global workforce. In addition to participating in Project Galileo, CyberPeace has also joined as an official partner, alongside more than 53 civil society organizations that help us identify organizations in need of protection.</p><p>As the CyberPeace Institute helped us grow Project Galileo, they also tested out new features including <a href="https://developers.cloudflare.com/email-security/"><u>Cloudflare Email Security</u></a>, a Cloudflare product designed to help protect against phishing and ransomware attacks. Testing the product for their organizations, they found that our approach to proactively detect and block malicious email, and ease of deployment with no need for hardware or extra software, would benefit the wider community they serve. With this in mind, CyberPeace came to us with an idea: they saw the potential to extend Email Security to smaller organizations that don’t have the same technical tools or budget to protect themselves. </p><p>Through our unique partnership, the CyberPeace Institute onboards its network of NGOs with Cloudflare Email Security, serving as a central hub to aggregate real-time data on email threats. This information powers a live dashboard, providing other organizations with visibility into phishing campaigns that could impact the broader community. One key challenge in tracking targeted phishing attacks is that many incidents go unreported, or victims may not realize they have been compromised until much later. By having a partner serve as a centralized point of contact, it helps ensure that insights into phishing attempts at one NGO can help protect others before the attack spreads. </p>
    <div>
      <h3>CyberPeace Tracer</h3>
      <a href="#cyberpeace-tracer">
        
      </a>
    </div>
    <p>The <a href="https://cyberpeacetracer.ngo/analysis"><u>CyberPeace Tracer </u></a>shares vulnerabilities and threats faced by the community of NGOs, developed by the CyberPeace Institute. The CyberPeace Tracer gathers and analyzes data on cyberattacks and disinformation campaigns targeting NGOs, non-profits, and charities that address global societal challenges. The goal is to better understand the scale and impact of these threats to inform the public, so that organizations can become aware of emerging threats and take action to improve their defenses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3TvamEbkKLmzwwRmGBSfyO/e9538a60967b4384e184c437206b081e/image3.png" />
          </figure><p>For the Tracer, CyberPeace partners and collects data directly from partners who monitor a predefined set of NGO domains. The dashboards detail publicly disclosed software and hardware vulnerabilities that can be exploited against monitor NGOs, malware infections detected, and analysis of phishing attacks that reveal trends and attacker tactics. The Tracer breaks out incidents by sector, including organizations working in health, development, food, water, energy, human rights, women’s rights and more. On the <a href="https://cyberpeacetracer.ngo/analysis/phishing-threats"><u>phishing dashboard</u></a>, users can filter by country, identify the top phishing subject lines that NGOs received, as well as the top five threats that were blocked by the Email Security product. </p><p>Our collaboration with CyberPeace strengthens defenses against phishing by allowing the CyberPeace Institute to analyze flagged emails, helping to identify and disrupt malicious domains and ongoing threats. By analyzing past incidents, we have found that organizations can learn from others’ experiences and implement best practices to reduce the likelihood of future attacks and data breaches, especially in a sector where many times, attacks go unreported. </p>
    <div>
      <h3>Strengthening cyber security resources for vulnerable communities</h3>
      <a href="#strengthening-cyber-security-resources-for-vulnerable-communities">
        
      </a>
    </div>
    <p>This is an exciting development for strengthening reporting on cyber attacks to non-profits, enabling them to collaborate on solutions, share threat intelligence, and build stronger defenses across the sector. We encourage NGOs who are interested in onboarding to Cloudflare Email Security through the CyberPeace Institute to visit <a href="https://cyberpeaceinstitute.org/cloudflare-area-1/"><u>cyberpeaceinstitute.org/cloudflare-area-1/</u></a>. If you are looking for protection under Project Galileo, apply at <a href="https://www.cloudflare.com/galileo/"><u>cloudflare.com/galileo/</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Impact]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Project Galileo]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1dxYqaMbG63psPH7NGAf1O</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare meets new Global Cross-Border Privacy (CBPR) standards]]></title>
            <link>https://blog.cloudflare.com/cloudflare-cbpr-a-global-privacy-first/</link>
            <pubDate>Tue, 28 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is the first organization globally to announce having been successfully audited against the ‘Global Cross-Border Privacy Rules’ system and ‘Global Privacy Recognition for Processors’. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare proudly leads the way with our approach to <a href="https://www.cloudflare.com/learning/privacy/what-is-data-privacy/">data privacy</a> and the protection of <a href="https://www.cloudflare.com/learning/privacy/what-is-personal-information/">personal information</a>, and we’ve been an ardent supporter of the need for the free flow of data across jurisdictional borders. So today, on Data Privacy Day (also known internationally as Data Protection Day), we’re happy to announce that we’re adding our fourth and fifth privacy validations, and this time, they are global firsts! Cloudflare is the first organisation to announce that we have been successfully audited against the brand new <a href="https://www.globalcbpr.org/privacy-certifications/"><u>Global Cross-Border Privacy Rules (Global CBPRs) for data controllers and the Global Privacy Recognition for Processors (Global PRP)</u></a>. These validations demonstrate our support and adherence to global standards that provide for privacy-respecting data flows across jurisdictions. Organizations that have been successfully audited will be formally certified when the certifications officially launch, which we expect to happen later in 2025. </p><p>Our participation in the Global CBPRs and Global PRP joins our roster of privacy validations: we were one of the first cybersecurity organizations to certify to the international privacy standard <a href="https://blog.cloudflare.com/iso-27701-privacy-certification/"><u>ISO 27701:2019</u></a> when it was published, and in 2022 we also certified to the cloud privacy certification, <a href="https://www.cloudflare.com/trust-hub/compliance-resources/iso-certifications/"><u>ISO 27018:2019</u></a>. In 2023, we added our third privacy validation, undergoing a review by an independent monitoring body in the European Union (EU) and declared to be adherent to the first official GDPR code of conduct — <i>the </i><a href="https://blog.cloudflare.com/cloudflare-official-gdpr-code-of-conduct/"><i><u>EU Cloud Code of Conduct</u></i></a>.</p>
    <div>
      <h3>Why this matters to Cloudflare customers</h3>
      <a href="#why-this-matters-to-cloudflare-customers">
        
      </a>
    </div>
    <p>Taking these privacy certifications together, Cloudflare demonstrates that we are meeting key official privacy validations in 39 jurisdictions around the world, from Australia and Austria to Sweden and the United States. An additional four jurisdictions (United Kingdom, Bermuda, Mauritius, and the Dubai International Finance Centre) are also in the process of joining and recognising the Global CBPR certifications. That's important for Cloudflare customers as it provides reassurance that the privacy practices we have built are recognised by governments around the world.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RFlkr3Wht9Gu34lv2xxN9/8f3c8e5dc23963614d275dab085cd8ce/unnamed.png" />
          </figure>
    <div>
      <h3>What is the Global CBPR System?</h3>
      <a href="#what-is-the-global-cbpr-system">
        
      </a>
    </div>
    <p>In the last three years, governments across the world have been busy preparing two brand-new international privacy standards. A major milestone was achieved on April 30, 2024 when <a href="https://www.globalcbpr.org/global-cbpr-forum-announces-the-establishment-of-the-global-cbpr-and-global-prp-systems-and-welcomes-new-global-cape-participants/"><u>the Global CBPR System was established</u></a>. The CBPRs are a voluntary, enforceable, international, accountability-based system that facilitates privacy-respecting data flows among members’ economies. They provide a baseline level of privacy protection for consumers through a set of rules on how to handle people’s personal information. This facilitates the free flow of data by upholding consumer privacy across participating members, despite each jurisdiction having their own individual data protection laws.</p><p>The CBPR System was developed by the <a href="https://www.globalcbpr.org/about/membership/"><u>Global CBPR Forum</u></a>, an intergovernmental forum between the governments of Australia, Canada, Japan, Republic of Korea, Mexico, Philippines, Singapore, Chinese Taipei, and the United States. The United Kingdom is also an associate member of the CBPR Forum, as are Bermuda, Mauritius, and the Dubai IFC, signifying their intent to join as full members in the future.</p><p>Over the last year, we have been busy preparing for the launch of the Global CBPR System. On May 1, 2024 — the very first day after the establishment of the system — Cloudflare applied to join. And we have now achieved the major milestone of successfully completing audits against the requirements, meaning we expect to be the first organization in the world to be newly certified to the Global CBPR system, as well as the related Global Privacy Recognition for Processors, when companies can officially be certified, which is expected later in 2025.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5F7HXXU071UJtx68KHGn41/0228087d6420c26802d77c13fafe935c/image1.png" />
          </figure>
    <div>
      <h3>What the Global CBPR System covers</h3>
      <a href="#what-the-global-cbpr-system-covers">
        
      </a>
    </div>
    <p>The Global CBPR System contains a detailed list of fifty requirements that organizations must meet in order to be certified under the scheme. The requirements derive from the nine <b>Global CBPR Privacy Principles</b>, which are consistent with the core principles of the <a href="https://www.oecd.org/"><u>Organisation for Economic Co-operation and Development (OECD)</u></a> <a href="https://www.oecd.org/en/publications/2002/02/oecd-guidelines-on-the-protection-of-privacy-and-transborder-flows-of-personal-data_g1gh255f.html"><u>Guidelines on the Protection of Privacy and Trans-Border Flows of Personal Data</u></a>. The fifty requirements cover how organizations should collect, manage, and safeguard personal information in their custody. Organizations must meet every one of the fifty requirements in order to be Global CBPR certified. The nine principles underlying the requirements are:</p><table><tr><td><p>Preventing Harm</p></td><td><p>Notice</p></td><td><p>Collection Limitation</p></td></tr><tr><td><p>Uses of Personal Information</p></td><td><p>Choice</p></td><td><p>Integrity of Personal Information</p></td></tr><tr><td><p>Security Safeguards</p></td><td><p>Access and Correction</p></td><td><p>Accountability</p></td></tr></table><p><sup><i>The nine Global CBPR Privacy Principles</i></sup></p><p>The Global CBPR certification covers the handling of personal information controlled by the organization, such as the personal details of customers, employees, and job applicants. For Cloudflare, this also includes network information — our observations about how our global cloud platform handles server, network, or traffic data generated by Cloudflare in the course of providing our services.</p><p>The related Global Privacy Recognition for Processors (PRP) certification covers the handling of personal information processed by the organization on behalf of a different organization, usually their customer. The eighteen requirements of the PRP relate to the two privacy principles most relevant when processing this information on behalf of another organization: <i>Security Safeguards and Accountability</i>. For Cloudflare, this covers the processing of data pursuant to the <a href="https://www.cloudflare.com/cloudflare-customer-dpa/"><u>Data Processing Addendum</u></a> we sign with all of our customers, chiefly, the Customer Content flowing across our network and the Customer Logs generated by those data flows. Organizations must meet every one of the eighteen requirements in order to be Global PRP certified.</p>
    <div>
      <h3>A deeper dive into some of the requirements of the Global CBPRs</h3>
      <a href="#a-deeper-dive-into-some-of-the-requirements-of-the-global-cbprs">
        
      </a>
    </div>
    <p>As noted, the key requirements of the Global CBPRs and the Global PRP cover the well-known data protection principles of notice, choice, collection limitation (data minimization), the right of data subject access and correction, providing adequate security, preventing harm, integrity of personal information, accountability, and uses of personal information. There are dozens of requirements that cover these principles, so we’ll just touch on a few of them here.</p><p>Let’s first look at the principle of notice. One of the more obvious requirements from the CBPRs is question 1:</p><p><i>Do you provide clear and easily accessible statements about your practices and policies that govern the personal information described above (a privacy statement)?</i></p><p>Being transparent about the collection and use of personal information is a key principle of privacy and data protection, and transparency is one of Cloudflare’s core commitments. Documenting our practices and policies in regard to how we use personal information allows individuals to decide if they want to provide their information, and that’s why it’s best practice for the privacy notice to be available and visible at the time the information is being collected. Indeed, this concept of providing notice is clear from <a href="https://eur-lex.europa.eu/eli/reg/2016/679/oj/eng#art_13"><u>Article 13 of the EU’s GDPR</u></a>. Cloudflare meets this CBPR requirement by providing a clear and accessible privacy notice visible from the footer of each page on our website. We also provide a link to the notice when we collect personal data such as through a form on a webpage.</p><p>In terms of how we use personal information, question 8 asks:</p><p><i>Do you limit the use of the personal information you collect (whether directly or through the use of third parties acting on your behalf) as identified in your privacy statement?</i></p><p>It has long been a commitment of Cloudflare’s that we only use the personal information we collect for the purposes of providing the services we offer. Our business is built on providing customers with the tools to protect their network applications and to make them faster, more secure, more reliable, and more private. In our <a href="https://www.cloudflare.com/privacypolicy/"><u>Privacy Policy</u></a>, we commit that we will “only share or otherwise disclose your personal information as necessary to provide our Services or as otherwise described in this Policy, except in cases where we first provide you with notice and the opportunity to consent.” And we maintain internal documentation (in keeping with the CBPR’s accountability principle) to document the data we are processing and the purposes for which we process it.</p><p>Another key set of requirements in both the Global CBPRs and the Global PRP have to do with security safeguards. CBPR requirement question 27 asks:</p><p><i>Describe the physical, technical and administrative safeguards you have implemented to protect personal information against risks such as loss or unauthorized access, destruction, use, modification or disclosure of information or other misuses?</i></p><p>The similar requirement in the Global PRP is question 2: </p><p><i>Describe the physical, technical and administrative safeguards that implement your organization’s information security policy.</i></p><p>Cloudflare has implemented an information security program in accordance with the ISO/IEC 27000 family of standards. Details of Cloudflare’s security program are documented in Annex 2 (“Technical and Organizational Security Measures”) of Cloudflare's <a href="https://www.cloudflare.com/cloudflare-customer-dpa/"><u>Customer Data Processing Addendum</u></a>, including the physical, technical and administrative safeguards implemented to protect personal information.</p><p>Related to the Accountability principle, question 46 asks:</p><p><i>Do you have mechanisms in place with personal information processors, agents, contractors, or other service providers pertaining to personal information they process on your behalf, to ensure that your obligations to the individual will be met? </i></p><p>When we have vendors who handle any of our, or our customers’, personal information, we require them to sign a Data Processing Addendum with us. This ensures the commitments we make to our customers in our customer agreements in turn flow through to our vendors, including the security requirements — holding them, and us, accountable.</p>
    <div>
      <h3>More information</h3>
      <a href="#more-information">
        
      </a>
    </div>
    <p>We are excited about the launch of the Global CBPR certifications, expected later in 2025, and we are proud that on this Data Privacy Day, we can yet again demonstrate our commitment to universally held principles for protecting the privacy of personal data.</p><p>You can find more about the Global CBPR System, the Global PRP, download a full copy of the requirements, and keep up to date with related news at <a href="https://www.globalcbpr.org/"><u>globalcbpr.org</u></a>.</p><p>For the latest information about our certifications, please visit our <a href="https://www.cloudflare.com/trust-hub/compliance-resources/"><u>Trust Hub</u></a>. Customers can also find out how to download a copy of Cloudflare’s certifications and reports from the <a href="https://developers.cloudflare.com/fundamentals/get-started/basic-tasks/access-compliance-docs/"><u>Cloudflare dashboard</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/36LV7CkbF5b5IuXN4ZVXZC/77775c3e2791418d87c36d46e755fbbc/image2.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">63yGQGTniOUOFneFLwTb7a</guid>
            <dc:creator>Rory Malone</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Demonstrating reduction of vulnerability classes: a key step in CISA’s “Secure by Design” pledge]]></title>
            <link>https://blog.cloudflare.com/cisa-pledge-commitment-reducing-vulnerability/</link>
            <pubDate>Tue, 14 Jan 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare strengthens its commitment to cybersecurity by joining CISA's "Secure by Design" pledge. In line with this, we're reducing the prevalence of vulnerability classes across our products. ]]></description>
            <content:encoded><![CDATA[ <p>In today’s rapidly evolving digital landscape, securing software systems has never been more critical. Cyber threats continue to exploit systemic vulnerabilities in widely used technologies, leading to widespread damage and disruption. That said, the <a href="https://www.cisa.gov/"><u>United States Cybersecurity and Infrastructure Agency (CISA)</u></a> helped shape best practices for the technology industry with their <a href="https://www.cisa.gov/securebydesign/pledge"><u>Secure-by-Design pledge</u></a>. <a href="https://blog.cloudflare.com/secure-by-design-principles/"><u>Cloudflare signed this pledge</u></a> on May 8, 2024, reinforcing our commitment to creating resilient systems where security is not just a feature, but a foundational principle.</p><p>We’re excited to share an update aligned with one of CISA’s goals in the pledge: <i>To reduce entire classes of vulnerabilities</i>. This goal aligns with the Cloudflare Product Security program’s initiatives to continuously automate proactive detection and vigorously prevent vulnerabilities at scale.   </p><p>Cloudflare’s commitment to the CISA pledge reflects our dedication to transparency and accountability to our customers. This blog post outlines why we prioritized certain vulnerability classes, the steps we took to further eliminate vulnerabilities, and the measurable outcomes of our work.</p>
    <div>
      <h3>The core philosophy that continues: prevent, not patch</h3>
      <a href="#the-core-philosophy-that-continues-prevent-not-patch">
        
      </a>
    </div>
    <p>Cloudflare’s core security philosophy is to prevent security vulnerabilities from entering production environments. One of the goals for Cloudflare’s Product Security team is to champion this philosophy and ensure secure-by-design approaches are part of product and platform development. Over the last six months, the Product Security team aggressively added both new and customized rulesets aimed at completely eliminating secrets and injection code vulnerabilities. These efforts have enhanced detection precision, reducing false positives, while enabling the proactive detection and blocking of these two vulnerability classes. Cloudflare’s security practice to block vulnerabilities before they are introduced into code at merge or code changes serves to maintain a high security posture and aligns with CISA’s pledge around proactive security measures.</p><p>Injection vulnerabilities are a critical vulnerability class, irrespective of the product or platform. These occur when code and data are improperly mixed due to lack of clear boundaries as a result of inadequate validation, unsafe functions, and/or improper sanitization. Injection vulnerabilities are considered high impact as they lead to compromise of confidentiality, integrity, and availability of the systems involved. Some of the ways Cloudflare continuously detects and prevents these risks is through security reviews, secure code scanning, and vulnerability testing. Additionally, ongoing efforts to institute improved precision serve to reduce false positives and aggressively detect and block these vulnerabilities at the source if engineers accidentally introduce these into code.</p><p>Secrets in code is another vulnerability class of high impact, as it presents significant risk related to confidential information leaks, potentially leading to unauthorized access and insider threat challenges. In 2023, Cloudflare prioritized tuning our security tools and systems to further improve the detection and reduction of secrets within code. Through audits and usage patterns analysis across all Cloudflare repositories, we further decreased the probability of the reintroduction of these vulnerabilities into new code by writing and enabling enhanced secrets detection rules.</p><p>Cloudflare is committed to elimination of these vulnerability classes regardless of their criticality. By addressing these vulnerabilities at their source, Cloudflare has significantly reduced the attack surface and the potential for exploitation in production environments. This approach established secure defaults by enabling developers to rely on frameworks and tools that inherently separate data or secrets from code, minimizing the need for reactive fixes. Additionally, resolving these vulnerabilities at the code level “future-proofs” applications, ensuring they remain resilient as the threat landscape evolves. </p>
    <div>
      <h3>Cloudflare’s techniques for addressing these vulnerabilities</h3>
      <a href="#cloudflares-techniques-for-addressing-these-vulnerabilities">
        
      </a>
    </div>
    <p>To address both injection and embedded secrets vulnerabilities, Cloudflare focused on building secure defaults, leveraging automation, and empowering developers. To establish secure default configurations, Cloudflare uses frameworks designed to inherently separate data from code. We also increased reliance on secure storage systems and secret management tools, integrating them seamlessly into the development pipeline.</p><p><i>Continuous automation played a critical role in our strategy.</i> Static analysis tools integration with DevOps process were enhanced with customized rule sets to block issues based on observed patterns and trends. Additionally, along with security scans running on every pull and merge request, software quality assurance measures of “build break”  and “stop the code” were enforced. This prevented risks from entering production when true positive vulnerabilities were detected across all Cloudflare development activities, irrespective of criticality and impacted product. This proactive approach has further reduced the likelihood of these vulnerabilities reaching production environments. </p><p><i>Developer enablement was another key pillar</i>. Priority was placed on bolstering existing continuous education and training for engineering teams by providing additional guidance and best practices on preventing security vulnerabilities, and leveraging our centralized secrets platform in an automated way. Embedding these principles into daily workflows has fostered a culture of shared responsibility for security across the organization.</p>
    <div>
      <h3>The role of custom rulesets and “build break” </h3>
      <a href="#the-role-of-custom-rulesets-and-build-break">
        
      </a>
    </div>
    <p>To operationalize the more aggressive detection and blocking capabilities, Cloudflare’s Product Security team wrote new detection rulesets for its <a href="https://en.wikipedia.org/wiki/Static_application_security_testing"><u>static application security testing (SAST)</u></a> tool integrated in <a href="https://www.cloudflare.com/learning/serverless/glossary/what-is-ci-cd/">CI/CD workflows</a> and hardened the security criteria for code releases to production. Using the SAST tooling with both default and custom rulesets allows the security team to perform comprehensive scans for secure code, secrets, and software supply chain vulnerabilities, virtually eliminating injection vulnerabilities and secrets from source code. It also enables the security team to identify and address issues early while systematically enforcing security policies.</p><p>Cloudflare’s expansion of the security tool suite played a critical role in the company’s secure product strategy. Initially, rules were enabled in “monitoring only” mode to understand trends and potential false positives. Then rules were fine-tuned to enforce and adjust priorities without disrupting development workflows. Leveraging internal threat models, the team writes custom rules tailored to Cloudflare’s infrastructure. Every <a href="https://docs.github.com/en/pull-requests/collaborating-with-pull-requests/proposing-changes-to-your-work-with-pull-requests/about-pull-requests"><u>pull request (PR)</u></a> and <a href="https://github.com/diffblue/gitlab/blob/master/doc/user/project/merge_requests/creating_merge_requests.md"><u>merge request (MR)</u></a> was scanned against these specific rule sets, including those targeting injection and secrets. The fine-tuned rules, optimized for high precision, are then activated in blocking mode, which leads to breaking the build when detected. This process provides vulnerability remediation at the PR/MR stage.</p><p>Hardening these security checks directly into the CI/CD pipeline enforces a proactive security assurance strategy in the development lifecycle. This approach ensures vulnerabilities are detected and addressed early in the development process before reaching production. The detection and blocking of these issues early reduces remediation efforts, minimizes risk, and strengthens the overall security of our products and systems.</p>
    <div>
      <h3>Outcomes</h3>
      <a href="#outcomes">
        
      </a>
    </div>
    <p>Cloudflare continues to follow a culture of transparency as it provides increased visibility into the root cause of an issue and consequently allowing us to improve the process/product at scale. As a result, these efforts have yielded tangible results and continue to strengthen the security posture of all Cloudflare products.</p><p>In the second half of 2024, the team aggressively added new rulesets that helped detect and remove new secrets introduced into code repositories. This led to a 79% reduction of secrets in code over the previous quarter, underscoring Cloudflare’s commitment to safeguarding the company's codebase and protecting sensitive information. Following a similar approach, the team also introduced new rulesets in blocking mode, irrespective of the criticality level for all injection vulnerabilities. These improvements led to an additional 44% reduction of potential SQL injection and code injection vulnerabilities.</p><p>While security tools may produce false positives, customized rulesets with high-confidence true positives remain a key step in order to methodically evaluate and address the findings. These reductions reflect the effectiveness of proactive security measures in reducing entire vulnerability classes at scale. </p>
    <div>
      <h3>Future plans</h3>
      <a href="#future-plans">
        
      </a>
    </div>
    <p>Cloudflare will continue to mature the current practices and enforce secure-by-design principles. Some other security practices we will continue to mature include: providing secure frameworks, threat modeling at scale, integration of automated security tooling in every stage of the software development lifecycle (SDLC), and ongoing role based developer training on leading edge security standards. All of these strategies help reduce, or eliminate, entire classes of vulnerabilities.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Irrespective of the industry, if your organization builds software, we encourage you to familiarize yourself with <a href="https://www.cisa.gov/securebydesign"><u>CISA’s ‘Secure by Design’ principles</u></a> and create a plan to implement them in your company. The commitment is built around seven security goals, prioritizing the security of customers.</p><p>The CISA Secure by Design pledge challenges organizations to think differently about security. By addressing vulnerabilities at their source, Cloudflare has demonstrated measurable progress in reducing systemic risks.</p><p>Cloudflare’s continued focus on addressing vulnerability classes through prevention mechanisms outlined above serves as a critical foundation. These efforts ensure the security of Cloudflare systems, employees, and customers. Cloudflare is invested in continuous innovation and building a safe digital world. </p><p>You can also find more updates on our <a href="https://blog.cloudflare.com/"><u>blog</u></a> as we build our roadmap to meet all seven CISA Secure by Design pledge goals by May 2025, such as our post about reaching <a href="https://blog.cloudflare.com/cisa-pledge-commitment-bug-bounty-vip/"><u>Goal #5 of the pledge</u></a>.</p><p>As a cybersecurity company, Cloudflare considers product security an integral part of its DNA. We strongly believe in CISA’s principles issued in the <a href="https://www.cisa.gov/securebydesign/pledge"><u>Secure by Design pledge</u></a>, and will continue to uphold these principles in the work we do.</p> ]]></content:encoded>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4j7FBBC7QJi59ZFzmAG5Sx</guid>
            <dc:creator>Sri Pulla</dc:creator>
            <dc:creator>Trishna</dc:creator>
            <dc:creator>Jordan Lilly</dc:creator>
        </item>
        <item>
            <title><![CDATA[Exploring Internet traffic shifts and cyber attacks during the 2024 US election]]></title>
            <link>https://blog.cloudflare.com/exploring-internet-traffic-shifts-and-cyber-attacks-during-the-2024-us-election/</link>
            <pubDate>Wed, 06 Nov 2024 08:00:00 GMT</pubDate>
            <description><![CDATA[ Election Day 2024 in the US saw a surge in cyber activity. Cloudflare blocked several DDoS attacks on political and election sites, ensuring no impact. In this post, we analyze these attacks, as well ]]></description>
            <content:encoded><![CDATA[ <p>Elections are not just a matter of casting ballots. They depend on citizens being able to register to vote and accessing information about candidates and the election process, which in turn depend on the strength and security of the Internet. Despite the risks posed by potential cyberattacks aimed to disrupt democracy, Cloudflare did not observe any significant disruptions to campaigns or local government websites from cyberattack.</p><p>Tuesday, November 5, 2024 was <a href="https://en.wikipedia.org/wiki/2024_United_States_presidential_election"><u>Election Day in the United States</u></a>. It not only decided the next president and vice president but also included elections for the US Senate, House of Representatives, state governorships, and state legislatures. Results confirm that Republican Donald Trump won the presidential election.</p><p>In this blog post, we examine online attacks against election-related sites — some of which were notable but none were disruptive — and how initial election results impacted Internet traffic across the US at both national and state levels, with increases in traffic as much as 15% nationwide. We’ll also explore email phishing trends and general DNS data around news interest, the candidates, and election-related activity.</p><p>We’ve been tracking 2024 elections globally through our <a href="https://blog.cloudflare.com/tag/election-security/"><u>blog</u></a> and <a href="https://radar.cloudflare.com/reports/elections-2024"><u>election report on Cloudflare Radar</u></a>, covering some of the more than 60 national elections around the globe this year. At Cloudflare, we support many of these efforts to ensure a secure and trustworthy election process. We worked closely with election officials, government agencies, and civil society groups across the country to ensure that groups working in the election space had the tools they needed to stay online. </p><p>Regarding the US elections, we have previously reported on trends surrounding the first <a href="https://blog.cloudflare.com/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends"><u>Biden vs. Trump debate</u></a>, the <a href="https://blog.cloudflare.com/exploring-internet-traffic-during-the-2024-us-republican-national-convention"><u>attempted assassination of Trump and the Republican National Convention</u></a>, the <a href="https://blog.cloudflare.com/internet-security-trends-2024-us-democratic-convention"><u>Democratic National Convention</u></a>, and the <a href="https://blog.cloudflare.com/how-the-harris-trump-us-presidential-debate-influenced-internet-traffic"><u>Harris-Trump presidential debate</u></a>.</p><p>Key takeaways:</p><ul><li><p>In the 24 hour period from October 31 - November 1, Cloudflare automatically mitigated over 6 billion HTTP DDoS requests that targeted US election-related websites–such as state and local government election sites and political campaigns. There were no significant disruptions to the targeted websites during this time period.</p></li><li><p>The day before the election, DNS traffic to Trump/Republican and Harris/Democrat websites peaked, with daily DNS traffic rising 59% and 4% respectively.</p></li><li><p>On election day, states in the midwest saw the highest traffic growth across the US, as compared to the previous week. </p></li><li><p>Internet traffic in the US peaked after the first polling stations closed, with a 15% increase over the previous week. </p></li><li><p>DNS traffic to news, polling, and election websites also saw large traffic jumps. Polling services were up 756% near poll closures and news sites were up 325% by late evening.</p></li></ul>
    <div>
      <h2>How Cloudflare assists with election infrastructure </h2>
      <a href="#how-cloudflare-assists-with-election-infrastructure">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3tqSzKOhzUbLTgnwfP4cIU/8a433526fab8fbebf0aa3ae8633e78dc/BLOG-2618_2.png" />
          </figure><p>Cloudflare’s goal is to ensure that sites that enable democracy — such as voter registration sites, election information portals, campaign websites, and results reporting platforms — remain secure and accessible, especially under heavy traffic periods or cyberattacks. Through our Impact programs, we provide essential cybersecurity resources to more than 800 websites that work on election infrastructure. </p><ul><li><p><a href="https://www.cloudflare.com/galileo/"><b><u>Project Galileo</u></b></a><b>:</b> Launched in 2014, Project Galileo provides free Business level services to media organizations, human rights defenders and non-profit organizations around the world. We protect more than 65 Internet properties related to elections in the United States that work on a range of topics related to voting rights, promoting free and fair elections, and posting election results. These organizations include <a href="https://www.cloudflare.com/case-studies/voteamerica/"><u>Vote America</u></a>, <a href="https://www.cloudflare.com/case-studies/decision-desk-hq/"><u>Decision Desk HQ</u></a>, <a href="https://www.cloudflare.com/case-studies/us-vote-foundation/"><u>US Vote Foundation</u></a>, and <a href="https://www.cloudflare.com/case-studies/us-vote-foundation/"><u>Electionland</u></a>.</p></li><li><p><a href="https://www.cloudflare.com/athenian/"><b><u>Athenian Project</u></b></a><b>: </b>Launched in 2017, the Athenian Project provides state and local governments that run elections with free Enterprise level services to ensure that voters can access accurate and up-to-date information about voter registration, polling places, and election results without interruption. We currently protect 423 websites in 33 states under the project.</p></li><li><p><a href="https://www.cloudflare.com/campaigns/usa/"><b><u>Cloudflare for Campaigns</u></b></a><b>:</b> Launched in 2020, in partnership with <a href="https://defendcampaigns.org/"><u>Defending Digital Campaigns</u></a>, Cloudflare for Campaigns provides a package of products to address the increasing risks posed by cyberattacks on political campaigns and state parties. We currently protect more than 354 campaigns and 34 state-level political parties in the United States. </p></li></ul><p>Since 2020, we’ve strengthened our partnerships with election officials, government agencies, and nonprofits to provide essential protections. Throughout 2024, we’ve collaborated with <a href="https://www.cisa.gov/"><u>CISA</u></a> (Cybersecurity and Infrastructure Security Agency) and the <a href="https://www.cisa.gov/topics/partnerships-and-collaboration/joint-cyber-defense-collaborative"><u>Joint Cyber Defense Collaborative</u></a>, briefing over 300 election officials on emerging threats and conducting 50+ calls with state and local governments to review security practices. Additionally, we held webinars on cyber threats to election groups and strategies for protecting election infrastructure.</p><p>With Defending Digital Campaigns, we worked to onboard more than 90 campaigns and parties weeks before election day. As part of this, we also worked with political vendors managing campaign infrastructure to provide insight on emerging threats and how to mitigate. Under Project Galileo, we onboarded more than 60 local media and journalism sites reporting on elections to ensure they can provide timely, accurate information on voting processes, candidate platforms, and election results.</p>
    <div>
      <h2>Political and election-related cyber attacks </h2>
      <a href="#political-and-election-related-cyber-attacks">
        
      </a>
    </div>
    <p>As we've seen several times this year, specific DDoS (<a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>Distributed Denial of Service</u></a>) attacks often target political party or candidate websites around election day. While online attacks are frequent and not always election-related, we saw recent DDoS incidents in <a href="https://blog.cloudflare.com/first-round-of-french-election-2024-party-attacks-and-a-modest-traffic-dip"><u>France</u></a>, the <a href="https://blog.cloudflare.com/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts"><u>Netherlands</u></a>, and <a href="https://blog.cloudflare.com/uk-election-day-2024-traffic-trends-and-attacks-on-political-parties"><u>the U.K.</u></a> focused on political parties during election periods. </p><p>In the US, we saw a similar uptick in attacks immediately prior to the election. Cloudflare blocked  cyberattacks targeting websites affiliated with both parties, attempting to take the sites offline. Although some attacks had high volumes of traffic, the targeted websites remained online.</p><p>DDoS attacks targeting US political or elections-related Internet properties in particular clearly picked up starting in September, with the more than 6 billion HTTP DDoS requests seen during the first six days of November exceeding the volume seen during all of September and October.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hYmLIj3qjBvrUxtasPJwy/e247cfbd6c546a52025bbefbfe37d503/BLOG-2618_3.png" />
          </figure><p> </p><p>Some campaign websites drove most of the malicious HTTP request traffic as part of DDoS attacks, with a clear increase since October 1, compared to minimal DDoS activity earlier in 2024. </p><p>Let’s look at a few examples of specific DDoS attacks, as these are easier to track.</p>
    <div>
      <h3>High-profile campaign website, October 29 - November 6 </h3>
      <a href="#high-profile-campaign-website-october-29-november-6">
        
      </a>
    </div>
    <p>Cloudflare blocked a series of DDoS attacks targeting a high-profile campaign website. The attacks began on October 29, with a four-minute spike reaching 345,000 requests per second. On October 31, more intense attacks followed, with the first lasting over an hour, peaking at 213,000 requests per second. Hours later, on November 1, a larger attack reached 700,000 requests per second, followed by two more waves at 311,000 and 205,000 requests per second.</p><p>Over 16 hours, Cloudflare blocked more than 6 billion malicious HTTP requests between October 31 and November 1. Additional attacks continued on November 3, with peaks at 200,000 requests per second (rps); on November 4, at 352,000; on Election Day, November 5, at 271,000 around 14:33 ET (11:33 PT); and on November 6, at 108,000.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7a7BGcwhBRbIppTPwGeMEM/70a460bbb3a37db416bf991324f79773/BLOG-2618_4.png" />
          </figure><p>Our data shows that the attacker(s) randomized user agents, attempted cache-busting techniques (methods to bypass cached content and overload servers with unique requests), and employed a geodiverse approach.</p><p>The DDoS attack on November 1 reached peak bandwidth of over 16 Gbps sent to Cloudflare and maintained over 8 Gbps throughout the main attack, which lasted more than two hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WVwTuYycGskegN4Bj6GyC/e0d0a39516f2097fa98e1c6d9771244f/BLOG-2618_5.png" />
          </figure>
    <div>
      <h3>US campaign infrastructure website, November 3</h3>
      <a href="#us-campaign-infrastructure-website-november-3">
        
      </a>
    </div>
    <p>Attackers also expanded their attacks beyond campaign sites, to political parties and their infrastructure, attempting — unsuccessfully — to disrupt services.  For example, on November 3, 2024, a DDoS attack targeted infrastructure associated with a major campaign, lasting two minutes and reaching 260,000 malicious HTTP requests per second. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QEogge3prSiTXFHHV9SZx/752b1ffda3d559c577c0fc8110bb00d7/BLOG-2618_7.png" />
          </figure>
    <div>
      <h3>US state political party, October 29</h3>
      <a href="#us-state-political-party-october-29">
        
      </a>
    </div>
    <p>On October 29, 2024, a high-volume DDoS attack targeted a U.S. political party website from a specific state. The attack lasted over four hours, from 12:00 to 17:29 ET (09:00 to 14:29 PT), and peaked at 206,000 requests per second. In total, over 2 billion malicious HTTP requests were blocked that day as part of this DDoS attack.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5zE45tcuR8ejFHGdNddc7L/ed8093200c0a1a571a2f8f665dc9edd6/BLOG-2618_8.png" />
          </figure><p>The same method used in the November 1 attack on one of the main campaign websites, mentioned above, was also used in this case. Here, the DDoS attack reached a peak of 5.7 Gbps sent to Cloudflare by the attacker, and sustained over 3 Gbps for most of its four-and-a-half-hour duration.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2v9kxcUtFVGQFwzJU6XkOp/390188c9f24fda8b89cbf020d4d89d87/BLOG-2618_9.png" />
          </figure>
    <div>
      <h3>US counties as a target, September 13</h3>
      <a href="#us-counties-as-a-target-september-13">
        
      </a>
    </div>
    <p>Since September, US state and local websites protected by Cloudflare under the Athenian Project have experienced increased DDoS attacks, particularly targeting specific counties. These types of sites have seen over 290 million malicious HTTP requests since September 1, with 4% of all requests blocked as threats. These attacks were less frequent and intense than those on US political campaigns infrastructure. </p><p>On September 13, 2024, a DDoS attack targeted a county website from 19:29 UTC to 22:32 UTC (15:29 to 18:32 ET), lasting three hours and peaking at 46,000 of malicious HTTP requests per second.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8S5AmvI1llskUuUiZ3JvR/6cb636695b8682170bd8e2f1f7bece7b/BLOG-2618_10.png" />
          </figure><p>These rates of DDoS attacks are already significant, even more so when we compare it with the 2020 US presidential election. In 2020, we <a href="https://blog.cloudflare.com/2020-us-election-cybersecurity-analysis/"><u>saw</u></a> more varied blocked cyberattack HTTP requests, split between WAF (Web Application Firewall) and firewall rules, and DDoS attacks. There were also significantly fewer blocked requests related to DDoS and WAF, with nearly 100 million in the whole month of October 2020 and close to 25 million in November 2020, the month of the election. In contrast, during November 1-6, 2024, alone, we observed over 6 billion malicious HTTP requests in DDoS attacks targeting campaigns.</p><p>It’s also important to note that even smaller attacks can be devastating for websites not well-protected against such high levels of traffic. DDoS attacks not only overwhelm systems but also serve, if successful, as a <a href="https://cloudflare.tv/shows/this-week-in-net/d-do-s-report-certificate-changes-qr-phishing-and-more/oZK6nra4"><u>distraction for IT teams</u></a> while attackers attempt other types of breaches.</p>
    <div>
      <h2>Internet traffic in the US grows after polls closed</h2>
      <a href="#internet-traffic-in-the-us-grows-after-polls-closed">
        
      </a>
    </div>
    <p>Generally, <a href="https://blog.cloudflare.com/tag/election-security"><u>election days</u></a> do not lead to drastic changes in Internet traffic. Traffic usually slightly dips during voting hours, though not as sharply as on national holidays, and rises in the evening as results are announced. </p><p>In the US, a similar pattern was observed on November 5, 2024, with increased Internet traffic at night. However, traffic throughout the day was generally 6% higher than the previous week, starting as early as 09:15 ET (06:15 PT). This may also be because, unlike in other countries, Election Day in the US is on a weekday rather than a weekend and is not a national holiday. Internet traffic peaked after the first polls closed, around 21:15 ET (18:15 PT), as TV news stations displayed countdown clocks. At that moment, traffic was 15% higher than the previous week.</p><p><i>Note: The previous 7 days line that appears in the next chart is one hour behind due to the Daylight Saving Time change over the weekend in the US. All growth calculations in this post take that change into account.</i></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4gShhxZxAddFNz0pBRHR0s/ecb6986c4665410f55988b2045d2362c/BLOG-2618_11.png" />
          </figure><p>The biggest spike in traffic growth (compared to the previous week) of Election Day occurred at around 01:30 am ET (22:30 PT), when <a href="https://x.com/PpollingNumbers/status/1854046880574980484"><u>projections</u></a> began to favor Trump for the presidential victory and <a href="https://x.com/FoxNews/status/1854046899155660983"><u>Fox News</u></a> called Pennsylvania in his favor, with traffic rising 32% compared to the previous week. Later, during Donald Trump's speech between 02:30 and 02:45 am ET (23:30 and 23:45 PT), Internet traffic was 31% higher than the previous week. </p><p>On Election Day, daily Internet traffic in the US reached its highest level of 2024 in terms of requests, showing a 6% increase compared to the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7bTq4tRaszFIMNXTLwgWPw/6aa76a2986bb474a042fc72c6188bc53/BLOG-2618_12.png" />
          </figure><p>As expected for a typical election day, considering what we observed in other countries, the share of traffic from mobile devices was also slightly higher on Election Day at 43%, compared to 42% the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5kKIYDj8eglPtj0zffHXOA/76c7367b1e7af4abe2f74b712834fb00/BLOG-2618_13.png" />
          </figure>
    <div>
      <h3>State-level traffic growth peaks at 21:00 ET (18:00 PT) </h3>
      <a href="#state-level-traffic-growth-peaks-at-21-00-et-18-00-pt">
        
      </a>
    </div>
    <p>State-level traffic shifts on Election Day, compared to the previous week, reveal more detail than country-level data. The map below highlights the biggest traffic changes, peaking at 21:00 ET (18:00 PT) after polling stations began to close. Notably, traffic increased nationwide and at the state level on Election Day, unlike during the two-hour presidential debates, which were broadcast on nationwide TV.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GyyxpTCD4ADVIk21R2pOQ/03ea8617b81cd317d14afa17cdd680e1/BLOG-2618_14.png" />
          </figure><p>The most significant traffic increases were observed in Maine (44%), South Dakota (44%), and Montana (44%). Interestingly, central states saw higher percentages of Internet traffic growth than coastal ones. More populous states, such as California (8%), Texas (19%), New York (22%), and Florida (23%), also experienced notable traffic increases.</p><p>The seven swing states that are <a href="https://www.bbc.com/news/articles/c511pyn3xw3o"><u>considered</u></a> to have been decisive in the election — Georgia, Michigan, Nevada, North Carolina, Pennsylvania, and Wisconsin (we’re not considering Arizona due to data issues) — each saw traffic growth between 17% and 36%. Here’s a more focused view of those swing states for easier consumption:</p><table><tr><td><p><b>State</b></p></td><td><p><b>Growth in traffic</b></p></td><td><p><b>Local time 
(in each state)</b></p></td></tr><tr><td><p>Georgia</p></td><td><p>25%</p></td><td><p>21:15</p></td></tr><tr><td><p>Michigan</p></td><td><p>34%</p></td><td><p>21:15</p></td></tr><tr><td><p>Nevada</p></td><td><p>17%</p></td><td><p>18:15</p></td></tr><tr><td><p>North Carolina</p></td><td><p>14%</p></td><td><p>21:15</p></td></tr><tr><td><p>Pennsylvania</p></td><td><p>33%</p></td><td><p>21:15</p></td></tr><tr><td><p>Wisconsin</p></td><td><p>36%</p></td><td><p>20:15</p></td></tr></table>
    <div>
      <h2>DNS trends: from news outlets to polling services</h2>
      <a href="#dns-trends-from-news-outlets-to-polling-services">
        
      </a>
    </div>
    <p>Switching our focus to domain trends, our <a href="http://1.1.1.1/"><u>1.1.1.1</u></a> resolver DNS data reveals a clear impact during the US elections when analyzing specific categories.</p><p>Analysis of DNS traffic for <b>US news media outlets</b> shows that traffic from the United States rose significantly right after 09:00 ET (06:00 PT), increasing around 15%, compared to the previous week. Traffic continued to climb throughout the day, peaking between 22:00 and 23:00 ET (19:00 and 20:00 PT) with DNS request traffic volume 325% higher than the previous week. There was also a brief spike on Wednesday, November 6, at 05:00 ET (02:00 PT), showing a 117% increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3eoBJOHz37gSZYFdbuapSY/c5fe40345d841ebb5ed69ed4c7f67a8a/BLOG-2618_15.png" />
          </figure><p>We observed significantly higher DNS traffic for <b>polling services </b>websites — websites of platforms or organizations that conduct and publish polls — on Election Day, peaking at 13:00 ET (10:00 PT) with a 206% increase from the previous week, and again at 22:00 ET (19:00 PT), after the polls started to close, with a 756% increase. Daily traffic to this category was up 145% on Election Day, and 36% the day prior.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1IOBseQF9hWO2vLGCUOu2A/b6f0b628b23ea1d82f1d98667706ab00/BLOG-2618_16.png" />
          </figure><p><b>Election and voting information-related </b>websites also saw a notable rise in DNS traffic around Election Day. Traffic clearly began to increase the day before the election, and peaked on November 5, 2024, at 12:00 ET (09:00 PT), with a 313% increase from the previous week. Daily traffic was 139% higher on Election Day, and 68% higher the day before.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gXUO3FvfuPf9QvUrJ7C7a/c2eaf29a518306b2f783ecd1847edae9/BLOG-2618_17.png" />
          </figure><p>Social media sites/applications, especially <b>microblogging platforms</b> like X and Threads, were also impacted during Election Day. DNS traffic for these microblogging platforms peaked at 22:00 ET (19:00 PT), aligning with spikes for news organizations and polling services, showing a 91% increase compared to the previous week. In this microblogging category, daily DNS traffic on Election Day rose by 12% from the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2LUkx7e6abYPbqWH9vpXs1/bd9da044ebafafffa22d22fbf26e34f3/BLOG-2618_18.png" />
          </figure><p>Regarding the two main presidential candidates, DNS traffic for their websites and their parties’ websites was much higher the day before the election than on Election Day. On November 4, 2024, daily DNS traffic to <b>Trump and Republican</b> websites was up 59% compared to the previous week, while traffic to <b>Harris and Democrat</b> websites, which had a more significant increase in DNS traffic the previous week, rose by 4%. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jZy22GPey40FDg3gxjBg1/a99412b55d6b032117051d6f3f1f38f3/BLOG-2618_19.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2sDIbWHfRmyt0vqifwl72F/4f61cf9c1d5186cde5e611ec2f9a3028/BLOG-2618_20.png" />
          </figure>
    <div>
      <h2>Candidate-related email phishing trends</h2>
      <a href="#candidate-related-email-phishing-trends">
        
      </a>
    </div>
    <p>From a cybersecurity perspective, trending <a href="https://blog.cloudflare.com/paris-2024-olympics-recap"><u>events</u></a>, topics, and individuals often attract more emails, including malicious, phishing, and spam messages. Our <a href="https://blog.cloudflare.com/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends"><u>earlier</u></a> analysis covered email trends involving “Joe Biden” and “Donald Trump” since January. We’ve since updated it to include Kamala Harris after the <a href="https://blog.cloudflare.com/internet-security-trends-2024-us-democratic-convention/"><u>Democratic Convention</u></a> and the <a href="https://blog.cloudflare.com/how-the-harris-trump-us-presidential-debate-influenced-internet-traffic/"><u>Harris-Trump debate</u></a>.</p><p>From June 1 through November 4, 2024, <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare’s Cloud Email Security</u></a> service processed over 19 million emails with “Donald Trump” or “Kamala Harris” in the subject line — 13.9 million for Trump and 5.3 million for Harris. Nearly half of these emails (49%) were sent since September. In the last 10 days of the campaign (since October 24), Harris was named in 800,000 email subject lines and Trump in 1.3 million.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21O0KXy0aKPf5zX8KI186y/60c89b6c9d0cedc8f2791943fc50f2ff/BLOG-2618_21.png" />
          </figure><p>Since June 1, 12% of emails mentioning Trump were marked as spam, and 1.3% were flagged as malicious or phishing. This rate has dropped since September 1, with only 3% marked as spam and 0.3% as malicious. For emails mentioning Harris, the rates were lower: 0.6% were marked as spam and 0.2% as malicious since June, increasing slightly to 1.2% spam and 0.2% malicious since September 1. Trump was mentioned more frequently in email subjects than Harris and was found in higher overall percentages of spam and malicious emails.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MeF2avFWsQhJiq1emyBtr/2e9f3b785c1bed52394b52f720f8c84b/BLOG-2618_22.png" />
          </figure>
    <div>
      <h2>Conclusion: keeping track of elections</h2>
      <a href="#conclusion-keeping-track-of-elections">
        
      </a>
    </div>
    <p>Although Cloudflare observed a notable increase in DDoS attacks on political and election-related sites, blocking billions of malicious requests, these attacks resulted in no significant disruption due to planning and proactive defenses. We share the Cybersecurity and Infrastructure Security Agency’s <a href="https://www.cisa.gov/news-events/news/statement-cisa-director-easterly-security-2024-elections"><u>view</u></a> that “our election infrastructure has never been more secure” and concur with their conclusion that  “We have no evidence of any malicious activity that had a material impact on the security or integrity of our election infrastructure." Keeping our elections secure and resilient is critical to the functioning of democracy, and Cloudflare is proud to have played our part. </p><p>If you want to follow more trends and insights about the Internet and elections in particular, you can check <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a>, and more specifically our new <a href="https://radar.cloudflare.com/reports/elections-2024"><u>2024 Elections Insights</u></a> report, which will be updated as elections take place throughout the year.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Elections]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Cloudflare for Campaigns]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1YyA4YHY9p5HoeHCrgO3L5</guid>
            <dc:creator>João Tomé</dc:creator>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[Patent troll Sable pays up, dedicates all its patents to the public!]]></title>
            <link>https://blog.cloudflare.com/patent-troll-sable-pays-up/</link>
            <pubDate>Wed, 02 Oct 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ We’re pleased to announce that the litigation against Sable has finally concluded on terms that we believe send a strong message to patent trolls everywhere — if you bring meritless patent claims against Cloudflare, we will fight back and we will win.
 ]]></description>
            <content:encoded><![CDATA[ <p>Back in February, we celebrated our <a href="https://blog.cloudflare.com/cloudflare-defeats-patent-troll-sable-at-trial"><u>victory at trial</u></a> in the U.S. District Court for the Western District of Texas against patent trolls Sable IP and Sable Networks. This was the culmination of nearly three years of litigation against Sable, but it wasn’t the end of the story. </p><p>Today we’re pleased to announce that the litigation against Sable has finally concluded on terms that we believe send a strong message to patent trolls everywhere — if you bring meritless patent claims against Cloudflare, we will fight back and we will win.</p><p>We’re also pleased to announce additional prizes in <a href="https://www.cloudflare.com/jengo/sable-prior-art-search/"><u>Project Jengo</u></a>, and to make a final call for submissions before we determine the winners of the Final Awards. As a reminder, Project Jengo is Cloudflare’s effort to fight back against patent trolls by flipping the incentive structure that has encouraged the growth of patent trolls who extract settlements out of companies using frivolous lawsuits. We do this by asking the public to help identify prior art that can invalidate any of the patents that a troll holds, not just the ones that are asserted against Cloudflare. We’ve already given out over $125,000 to individuals since the <a href="https://blog.cloudflare.com/project-jengo/"><u>launch of Project Jengo in 2017</u></a>, and we’re looking forward to celebrating the successful end of the Sable iteration of Project Jengo with our Final Awards!</p><p>To learn more about how things concluded with Sable and next steps in Project Jengo, read on.  </p>
    <div>
      <h3>Background</h3>
      <a href="#background">
        
      </a>
    </div>
    <p>For anyone just joining us on this odyssey, here is a little background on how we got here:</p><p>Sable sued Cloudflare back in March 2021. Sable is a patent troll. It doesn’t make, develop, innovate, or sell anything. Sable IP is merely a shell entity formed to monetize (make money from) an ancient patent portfolio acquired by Sable Networks from Caspian Networks in 2006. <a href="https://www.lightreading.com/cable-technology/caspian-closes-its-doors"><u>Caspian Networks was a router company that went out of business nearly 20 years ago</u></a>. Using Caspian’s old patents, Sable sued Cloudflare and many other companies, including Cisco, Fortinet, Check Point, SonicWall, and Juniper Networks, alleging patent infringement. While these other companies resolved their disputes with Sable out of court, Cloudflare fought back. </p><p>Sable initially asserted around 100 claims from four different patents against Cloudflare, accusing multiple Cloudflare products and features of infringement. Sable’s patents — the old Caspian Networks patents — related to hardware-based router technologies common over 20 years ago. Sable’s infringement arguments stretched these patent claims to their limits (and beyond) as Sable tried to apply Caspian’s hardware-based technologies to Cloudflare’s modern software-defined services delivered on the cloud.</p><p>Cloudflare fought back against Sable by launching a <a href="https://www.cloudflare.com/jengo/sable-prior-art-search/"><u>new round of Project Jengo</u></a>, Cloudflare’s prior art contest, seeking prior art to invalidate all of Sable’s patents.</p><p>After years of Cloudflare aggressively litigating against Sable’s patents before the U.S. Patent and Trademark Office and the district court, Sable was left with only one claim from one patent to assert against Cloudflare at trial. If you’d like to know more, we described those battles, in which Cloudflare successfully eliminated around 99% of Sable’s claims, in more detail in a <a href="https://blog.cloudflare.com/cloudflare-defeats-patent-troll-sable-at-trial/"><u>prior blog post</u></a>.</p><p>Sable and Cloudflare came together in a five-day jury trial in Waco, Texas in February 2024. At trial, Sable did its best to try to map its decades-old router technology onto Cloudflare’s modern software-based architecture. But Sable’s case was riddled with technical issues and its efforts backed only by the desire for a payout.</p>
    <div>
      <h3>The jury agrees: Cloudflare <u>does not infringe</u></h3>
      <a href="#the-jury-agrees-cloudflare-does-not-infringe">
        
      </a>
    </div>
    <p>To defeat Sable’s claim of infringement we needed to explain to the jury — in clear and understandable terms — why what Cloudflare does is different from what was covered by claim 25 of Sable’s remaining patent, U.S. Patent No. <a href="https://patents.google.com/patent/US7012919B1/en?oq=7012919"><u>7,012,919</u></a> (the ’919 patent). To do this, we enlisted the help of one of our talented Cloudflare engineers, Eric Reeves, as well as <a href="https://engineering.washu.edu/faculty/Paul-Min.html"><u>Dr. Paul Min, Senior Professor of Electrical &amp; Systems Engineering at Washington University</u></a>, an expert in the field of computer networking. Eric and Dr. Min helped us explain to the jury the multiple reasons we didn’t infringe.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XWCN4456ulrVi0xmCMfbb/cf2c4bad630ce72b45f978556aa4f1a5/BLOG-2579_2.png" />
          </figure><p><sup><i>From slide deck presented by Cloudflare to the jury during the trial</i></sup></p><p>First, we explained that the accused Cloudflare products (<a href="https://developers.cloudflare.com/magic-transit/"><u>Magic Transit</u></a> and <a href="https://developers.cloudflare.com/argo-smart-routing/argo-for-packets/"><u>Argo for Packets</u></a>) do not route “flows” or “micro-flows” as required by claim 25. Instead, they handle packets individually, on a packet-by-packet basis. Indeed, processing each packet individually is important to the functioning of these products and Cloudflare’s DDoS and security services as a whole.</p><p>Eric also helped to tell our invention story to the jury. He explained how the Cloudflare team saw problems that needed to be solved, and built unique and innovative new products to solve them. He described the work that went into developing Magic Transit and Argo for Packets, and how these products are part of Cloudflare’s modern software-based approach, which is fundamentally different from the hardware-based technology of the ’919 patent. Together, Eric and Dr. Min explained how the benefits of Magic Transit and Argo for Packets enjoyed by Cloudflare’s customers are not attributable to any technology claimed by the ’919 patent.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/mYelecmdKiTa0Nm76ziHY/8fe3a34620e9ee0b10771055124bacb8/BLOG-2579_3.png" />
          </figure><p><sup><i>From slide deck presented by Cloudflare to the jury during the trial</i></sup></p><p>Second, we explained that Cloudflare doesn’t infringe because claim 25 of the ’919 patent requires certain processes to occur “at” ingress and egress line cards, and Cloudflare’s accused servers do not include line cards.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2BDR7faD5Y8xCnbMn43VLP/f853af7ab6d428bd6cd289c64f2e0460/BLOG-2579_4.png" />
          </figure><p><sup><i>From slide deck presented by Cloudflare to the jury during the trial</i></sup></p><p>As Dr. Min explained, “line cards” are a specific type of hardware — a physical hardware “card” — that are commonly used in routers. Sable’s witnesses could not deny that the technology of the ’919 patent was tied to old router technology. After all, Caspian Networks Inc. (where the ’919 patent inventors worked) was a router company. Caspian’s core products were routers, and we showed the jury documents describing Caspian’s routers, which used “flow-based” technology on physical hardware line cards.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2So3SbVAhV4bR7Mtcgd1ys/b64f35b75c1764cf74b35a4baba010b5/Screenshot_2024-10-01_at_11.54.29_AM.png" />
          </figure><p><sup><i>Trial exhibit, image of sample line card</i></sup></p><p>While Sable’s technical expert tried his hardest to convince the jury that various software and hardware components of Cloudflare’s servers constitute “line cards,” his explanations defied credibility. The simple fact is that Cloudflare’s servers do not have line cards.</p><p>Ultimately, the jury understood, returning a verdict that Cloudflare does not infringe claim 25 of the ‘919 patent.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/RvaSu6DljUohL3bWZEZAa/674eb5122e1c9f3d246cd51407c31fa3/BLOG-2579_6.png" />
          </figure><p><sup><i>Excerpt from Verdict Form completed by the jury</i></sup></p>
    <div>
      <h3>The jury agrees: Sable’s patent claim is <u>invalid</u></h3>
      <a href="#the-jury-agrees-sables-patent-claim-is-invalid">
        
      </a>
    </div>
    <p>In addition to proving that we do not infringe, we also took on the challenge of proving to the jury that claim 25 of the ’919 patent is invalid and never should have been issued.</p><p>Proving invalidity to a jury is hard. The burden on the defendant is high: Cloudflare needed to prove by clear and convincing evidence that claim 25 is invalid.  And, proving it by describing how the claim is obvious in light of the prior art is complicated.</p><p>To do this, we again relied on our technical expert, Dr. Min, to explain how two prior art references, U.S. Patent No. <a href="https://patents.google.com/patent/US6584071B1/en?oq=6584071"><u>6,584,071</u></a> (Kodialam) and U.S. Patent No. <a href="https://patents.google.com/patent/US6680933B1/en?oq=6680933"><u>6,680,933</u></a> (Cheeseman) together render claim 25 of the ’919 patent obvious. Kodialam and Cheeseman are patents from <a href="https://en.wikipedia.org/wiki/Nortel"><u>Nortel Networks</u></a> and <a href="https://en.wikipedia.org/wiki/Lucent_Technologies"><u>Lucent</u></a> relating to router technology developed in the late 1990s. Both are prior art to the ’919 patent (i.e., they pre-date the priority date of the ’919 patent), and when considered together by a person skilled in the area of computer engineering and computer networking technology, they rendered obvious the so-called invention of claim 25.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2AwZ3KBpPNQ6Hvfu7I3myv/46d9bdbf9a8479d694e62b4a4daee6a6/BLOG-2579_7.png" />
          </figure><p><sup><i>Excerpt from Verdict Form completed by the jury</i></sup><sup> </sup></p>
    <div>
      <h3>Sable does not get its payday …</h3>
      <a href="#sable-does-not-get-its-payday">
        
      </a>
    </div>
    <p>Sable’s real motivation for suing Cloudflare — its desire for a payout — was made clear by Sable’s trial witnesses, who were unified only by their desire to present a wildly inflated view of the alleged “value” of the Sable patent and the damages allegedly owed by Cloudflare. </p><p>Sable’s attorneys tried their best to present their clients as reasonable businessmen, just trying to get what they’re owed for Cloudflare’s purported use of Sable’s patent. But Sable couldn’t hide its true colors from the jury. When Sable presented testimony from Brooks Borchers, the founder of Sable IP, Mr. Borchers was forced to admit that Sable IP is in the “business” of filing lawsuits.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/33xEZlojjm1nvnjnV4H7UC/451ed3c6533438de61ef6c103ace865d/Screenshot_2024-10-01_at_11.37.17_AM.png" />
          </figure><p><sup><i>Excerpt from Borchers trial testimony</i></sup></p><p> In fact, Mr. Borchers was forced to admit that Sable’s approach is to sue first and ask questions later. Even among patent trolls, this is hardly a noble business practice.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Dr73QwC1urT9QNZYTzYK7/e2da47826767ef04afd9711915341873/BLOG-2579_9.png" />
          </figure><p><sup><i>Excerpts from Borchers trial testimony</i></sup></p><p>What's more, Mr. Borchers and his lawyers have teamed up on cases like this before, following the same sue-first-and-ask-questions-later playbook in hopes of a payout. Sable’s true motivations for suing Cloudflare were on full display after this testimony, making Sable’s damages demand all the more galling.</p><p>Sable’s damages expert, Stephen Dell, told the jury that Sable was owed somewhere between <span>$</span>25 million and $94.2 million in damages. But, Mr. Dell was forced to admit to multiple flaws in his damages calculation, and Cloudflare’s damages expert Chris Bakewell explained to the jury how bad inputs and faulty assumptions led Mr. Dell to a wildly inflated damages figure. Indeed, after hearing Sable’s expert’s testimony, Judge Albright said he was “very skeptical” of Mr. Dell’s opinions, explaining that he was “very concerned that there’s not support for his methodology.”</p><p>In the end, Mr. Dell’s outsized damages demand didn’t matter because the jury found that Cloudflare did not infringe and that the asserted patent claim is invalid. But, it was revealing of Sable’s motivation (greed) and the lengths that it would go to try to get a payout.</p><p>When all was said and done, after all the testimony and argument, we were thrilled when the jury returned its verdict — after less than two hours of deliberations — finding across the board for Cloudflare. The jury’s verdict is truly a validation of our strong belief in the importance of standing up to patent trolls like Sable, and we are grateful for the jury’s time, attention and consideration!</p>
    <div>
      <h3>Sable admits defeat, and agrees to pay Cloudflare!</h3>
      <a href="#sable-admits-defeat-and-agrees-to-pay-cloudflare">
        
      </a>
    </div>
    <p>A jury verdict is not the end of the road in a patent case ... there are post-trial motions, appeals, and other procedural hurdles to jump through before a case is truly over. Tired from the fight, and smarting from its loss, Sable decided it wanted to throw in the towel and end the fight once and for all.</p><p>In the end, Sable agreed to pay Cloudflare $225,000, grant Cloudflare a royalty-free license to its entire patent portfolio, and to dedicate its patents to the public, ensuring that Sable can never again assert them against another company.</p><p>Let’s repeat that first part, just to make sure everyone understands: </p><p>Sable, the patent troll that sued Cloudflare back in March 2021 asserting around 100 claims across four patents, in the end wound up paying Cloudflare. While this $225,000 can’t fully compensate us for the time, energy and frustration of having to deal with this litigation for nearly three years, it does help to even the score a bit. And we hope that it sends an important message to patent trolls everywhere to beware before taking on Cloudflare.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/N9m8NlHvXQxDqPyeKVkvW/1b7a8505d3d99153848e3762885a5626/BLOG-2579_10.png" />
          </figure><p><sup> </sup><sup><i>Excerpt from the Dedication to the Public and Royalty Free License Agreement between Sable and Cloudflare</i></sup></p><p>And, let’s talk a bit more about that final part:</p><p>Sable has agreed to dedicate its entire patent portfolio to the public. This means that Sable will tell the U.S. Patent and Trademark Office that it gives up all of its legal rights to its patent portfolio. Sable can never again use these patents to sue for infringement; they can never again use these patents to try to make a quick buck.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rpPZkNJBZYB7t69g1YssH/ba8aa5495359afe060b215cf8fb942df/BLOG-2579_11.png" />
          </figure><p><sup><i>Excerpt from the Dedication to the Public and Royalty Free License Agreement between Sable and Cloudflare</i></sup></p>
    <div>
      <h3>To sum it up …</h3>
      <a href="#to-sum-it-up">
        
      </a>
    </div>
    <p>Cloudflare fought back against the patent troll and we won. We not only defeated Sable's claims in court, we forced Sable to pay Cloudflare for the trouble, and we got Sable's patents dedicated to the public, ensuring that it can never assert these patents against any other company ever again. It was admittedly a lot of work for Cloudflare, but totally worth it.</p>
    <div>
      <h3>Project Jengo for Sable: Conclusion of the Case</h3>
      <a href="#project-jengo-for-sable-conclusion-of-the-case">
        
      </a>
    </div>
    <p>A crucial part of our efforts to secure this across-the-board win are our Project Jengo participants.</p><p>Since the <a href="https://blog.cloudflare.com/project-jengo-redux-cloudflares-prior-art-search-bounty-returns/"><u>launch of the Project Jengo for the Sable case</u></a>, we’ve received hundreds of prior art references from dedicated Project Jengo participants. So far we have awarded <span>$</span>70,000 in prizes to the winners of Chapters 1 through 8. And we still have $30,000 in prizes to award in the Final Awards.</p><p>This blog post marks the official “Conclusion of the Case” under the <a href="https://www.cloudflare.com/jengo/sable-rules/"><u>Project Jengo Sable Rules</u></a>. We will continue to accept submissions during the 30-day Grace Period, which lasts until November 2, 2024, and then will move on to selecting winners of the Final Awards.</p>
    <div>
      <h3>We are thrilled to announce the winners of Chapters 7 and 8</h3>
      <a href="#we-are-thrilled-to-announce-the-winners-of-chapters-7-and-8">
        
      </a>
    </div>
    <p>We publicly celebrated the <a href="https://blog.cloudflare.com/project-jengo-2-first-three-winners/"><u>Chapter 1</u></a>, <a href="https://blog.cloudflare.com/former-rd-engineer-wins-round-2-of-project-jengo-and-cloudflare-wins-at-the-patent-office/"><u>Chapter 2</u></a>, <a href="https://blog.cloudflare.com/arkansas-engineer-wins-round-3-of-project-jengo-and-cloudflare-continues-to-win-at-the-patent-office/"><u>Chapter 3</u></a> and <a href="https://blog.cloudflare.com/three-new-winners-of-project-jengo-and-more-defeats-for-the-patent-troll/"><u>Chapters 4-6</u></a> winners in previous blog posts. However, as the trial approached in the Sable case, we chose not to make public announcements for the Chapter 7 and 8 winners out of respect for the judicial process. Now that the case is over, we are delighted to give a big public shout out to the winners of Project Jengo Chapters 7 and 8!</p><p>We selected four total winners in Chapters 7 and 8, each receiving prizes of <span>$</span>5,000, for a grand total of $20,000. Our Chapter 7 winners, George W. and Madhu, each provided helpful and detailed charts containing element-by-element comparisons of the prior art to the relevant Sable patents. George W. is an electrical engineer and lawyer, who is active in the intellectual property community. He learned about Project Jengo in an article posted online, and thought it was a clever idea. The Chapter 8 winners, Jatin and Ketan, also provided thoughtful and detailed submissions. Jatin submitted two pieces of prior art that were particularly good references for Sable’s U.S. Patent No. 7,012,919, which contains the one claim that remained asserted against Cloudflare at trial.</p><p>We also want to again thank our prior chapter winners and everyone who participated in Project Jengo! We look forward to selecting the Final Awards winners — it will be fun to take a walk down memory lane re-reviewing the fantastic prior art submitted by our prior winners, and we can’t wait to check out the new submissions, too! Please use the “Submit Prior Art” link on <a href="https://www.cloudflare.com/jengo/sable-prior-art-search/"><u>this page</u></a> for your final entries. Once we’ve announced our Final Awards, we will also update the <a href="https://www.cloudflare.com/jengo/priorart/"><u>Sable patents prior art listing</u></a> on our website, to share all the prior art submitted by our Project Jengo participants.</p> ]]></content:encoded>
            <category><![CDATA[Jengo]]></category>
            <category><![CDATA[Patents]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">0B7FSzdpWp0xwOchgrEAA</guid>
            <dc:creator>Emily Terrell</dc:creator>
            <dc:creator>Patrick Nemeroff</dc:creator>
        </item>
        <item>
            <title><![CDATA[Celebrating one year of Project Cybersafe Schools]]></title>
            <link>https://blog.cloudflare.com/celebrating-one-year-of-project-cybersafe-schools/</link>
            <pubDate>Thu, 08 Aug 2024 14:00:00 GMT</pubDate>
            <description><![CDATA[ August 8, 2024, marks the first anniversary of Project Cybersafe Schools, Cloudflare’s initiative to provide small K-12 public school districts in the United States with a package of Zero Trust  ]]></description>
            <content:encoded><![CDATA[ <p>August 8, 2024, is the first anniversary of <a href="https://blog.cloudflare.com/project-cybersafe-schools">Project Cybersafe Schools</a>, Cloudflare’s initiative to provide free security tools to small school districts in the United States.</p><p>Cloudflare announced Project Cybersafe Schools at the White House on August 8, 2023 as part of the <a href="https://www.youtube.com/watch?v=GaH9oJdbQZk&amp;themeRefresh=1">Back to School Safely: K-12 Cybersecurity Summit</a> hosted by First Lady Dr. Jill Biden. The<a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/07/biden-harris-administration-launches-new-efforts-to-strengthen-americas-k-12-schools-cybersecurity/"> White House highlighted</a> Cloudflare’s commitment to provide free resources to small school districts in the United States. Project Cybersafe Schools supports eligible K-12 public school districts with a package of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> cybersecurity solutions – for free, and with no time limit. These tools help eligible school districts minimize their exposure to common cyber threats.</p><p>Cloudflare’s mission is to help build a better Internet. One way we do that is by supporting organizations that are particularly vulnerable to cyber threats and lack the resources to protect themselves through projects like <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, the <a href="https://www.cloudflare.com/athenian/">Athenian Project</a>, the <a href="https://blog.cloudflare.com/announcing-critical-infrastructure-defense/">Critical Infrastructure Defense Project</a>, <a href="https://blog.cloudflare.com/project-safekeeping/">Project Safekeeping</a>, and most recently, <a href="https://blog.cloudflare.com/heeding-the-call-to-support-australias-most-at-risk-entities">Project Secure Health</a>.</p>
    <div>
      <h3>Schools are vulnerable to cyber attacks</h3>
      <a href="#schools-are-vulnerable-to-cyber-attacks">
        
      </a>
    </div>
    <p>In Q2 2024, education ranked 4th on the list of <a href="https://radar.cloudflare.com/reports/ddos-2024-q2#id-8-most-attacked-industries">most attacked industries</a>. Between 2016 and 2022, there were <a href="https://statescoop.com/department-education-k12-cyberattacks/">1,619 K-12 cyber incidents</a>. Since we launched Project Cybersafe Schools in August 2023, there have been a number of cyber attacks targeting hundreds of thousands of students. In August 2023, Prince George’s County Public Schools in Maryland <a href="https://therecord.media/md-school-system-says-people-affected-ransomware">fell victim</a> to a ransomware attack that affected the personal data of more than 100,000 people. Then, in December 2023, a Cincinnati area school district suffered a cyber attack that <a href="https://www.wvxu.org/education/2024-06-25/west-clermont-schools-loses-million-cyber-attack">resulted in the loss of $1.7M</a>. In 2024, there have been numerous incidents affecting K-12 schools across the U.S., including in <a href="https://www.bostonglobe.com/2024/05/07/metro/report-concord-schools-hit-with-cyber-attack/">Massachusetts</a>, <a href="https://www.govtech.com/education/k-12/new-jersey-hit-by-cyber-attacks-on-schools-hospitals">New Jersey</a>, and <a href="https://www.govtech.com/education/k-12/cyber-attack-takes-richland-wash-schools-offline">Washington state</a>. The smallest school districts are often the most vulnerable because of a lack of resources or capacity. Sometimes, the person responsible for cybersecurity does so in addition to another primary role, whether as a teacher, coach or administrator.</p>
    <div>
      <h3>We are proud of our impact, but we can do more</h3>
      <a href="#we-are-proud-of-our-impact-but-we-can-do-more">
        
      </a>
    </div>
    <p>There are about 14,000 school districts in the United States, and about 9,800 of them have fewer than 2,500 students. All 9,800 of those small public school districts are eligible for Project Cybersafe Schools (for free, and with no time limit – see below for all the details), and we want to help as many as possible. We are proud of the number of school districts that we have onboarded since August 2023, but it is not enough. We want to do more, and we can onboard more school districts by getting the word out about Project Cybersafe Schools. When we <a href="https://blog.cloudflare.com/project-cybersafe-schools-update">published an update </a>in December 2023 encouraging school districts to sign up before the holiday break, we saw a noticeable bump in the number of inquiries from eligible school districts. If you work at a small school district in the United States, we encourage you to see if you qualify for this program.</p><p>Nearly 30 states have school districts now enrolled in Project Cybersafe Schools, representing every region of the country. Since we launched the program, we have onboarded nearly 120 qualifying school districts. As a result, more than 160,000 students, teachers, and staff are protected by Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">cloud email security</a> to protect against a broad spectrum of threats including <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise</a>, multichannel phishing, credential harvesting, and other targeted attacks. These school districts are also receiving protection against Internet threats with DNS filtering by preventing users from reaching unwanted or harmful online content like ransomware or phishing sites.</p>
    <div>
      <h3>Attacks prevented by Project Cybersafe Schools in 2024</h3>
      <a href="#attacks-prevented-by-project-cybersafe-schools-in-2024">
        
      </a>
    </div>
    <p>When the White House launched its National Cybersecurity Strategy in March 2023, Acting National Cyber Director <a href="https://www.whitehouse.gov/oncd/briefing-room/2023/03/02/national-cybersecurity-strategy-launch-remarks-acting-national-cyber-director-kemba-walden/">Kemba Walden noted in her remarks</a> that “<i>we expect school districts to go toe-to-toe with transnational criminal organizations largely by themselves. This isn’t just unfair; it’s ineffective.</i>” Cloudflare agrees, and this is one of the reasons we launched Project Cybersafe Schools after conversations with officials from the <a href="https://www.cisa.gov/">Cybersecurity &amp; Infrastructure Security Agency (CISA)</a>, the <a href="https://www.ed.gov/">Department of Education</a>, and the <a href="https://www.whitehouse.gov/">White House</a> about how we could help to protect small school districts in the United States from cyber threats.</p><p>Year to date, Cloudflare’s cloud email security solution has identified and blocked more than 2 million malicious emails targeting the school districts enrolled in Project Cybersafe Schools. This represents roughly 3.5% of their total email traffic, though certain school districts are attacked at a far higher rate. In one district, malicious emails blocked by Cloudflare represented more than 15% of all email traffic.</p><p>Another challenge facing these schools is the large volume of spam emails sent their way. While some of this spam is promotional and not overtly malicious, it can often be used in a variety of attacks. Project Cybersafe Schools has prevented more than 2.2 million spam emails from clogging the inboxes of the school districts who have enrolled.</p><p><a href="https://www.cisa.gov/shields-guidance-families">According to CISA</a>, more than 90% of all cyber attacks begin with a phishing email. So helping these school districts secure their email inboxes is a critical factor in reducing their cyber risk. With email providing a relatively high success rate for gaining initial access, it’s no surprise that attackers continue to exploit email users with increasingly sophisticated and evasive techniques that bypass native security controls. And the consequences of these attacks can be severe: ​​Recovery time can extend from two all the way up to nine months – that’s almost an entire school year.</p>
    <div>
      <h3>Here’s what a few Project Cybersafe Schools participants have to say about the impact of the program on their school district:</h3>
      <a href="#heres-what-a-few-project-cybersafe-schools-participants-have-to-say-about-the-impact-of-the-program-on-their-school-district">
        
      </a>
    </div>
    <blockquote><p>“<i>What Cloudflare's Project Cybersafe Schools has allowed us to do as a rural district is add a missing layer of protection to our devices, providing a previously missing and unique layer of security even off our secure network. Where other options would cost us somewhere in the thousands, we are now able to secure devices for free using one of the simplest and scalable platforms, featuring one of the easiest learning curves I've worked with. Cloudflare's feature set as a whole for districts are unparalleled and integration is a must for schools looking to add an additional layer of protection to their network architecture, which by my estimation should be everyone.</i>” - <b>Wyatt Determan</b>, Technology Specialist (HLWW Public School District, Minnesota)</p></blockquote><blockquote><p><i>“Since implementing the Cybersafe Schools program as our secure email gateway, we've saved over $5,000 per year compared to similar solutions. The program has effectively filtered out numerous malicious emails, greatly enhancing our security posture. Its seamless integration and user-friendly interface make it easy for our IT team to manage. Cybersafe Schools has become a critical part of our IT infrastructure, ensuring a safe and secure educational environment.” </i>- <b>Paul Strout</b>, Network Manager (Regional School Unit RSU71, Belfast, Maine)</p></blockquote>
    <div>
      <h3>What Zero Trust services are available?</h3>
      <a href="#what-zero-trust-services-are-available">
        
      </a>
    </div>
    <p>Eligible K-12 public school districts in the United States have access to a package of <a href="https://www.cloudflare.com/zero-trust/solutions/">enterprise-level Zero Trust cybersecurity services</a> <i>for free and with no time limit </i>– there is no catch and no underlying obligations. Eligible organizations will benefit from:</p><ul><li><p>Email Protection: Safeguards inboxes with cloud email security by protecting against a broad spectrum of threats including malware-less Business Email Compromise, multichannel phishing, credential harvesting, and other targeted attacks.</p></li><li><p>DNS Filtering: Protects against Internet threats with DNS filtering by preventing users from reaching unwanted or harmful online content like ransomware or phishing sites and can be deployed to comply with the Children’s Internet Protection Act (CIPA).</p></li></ul>
    <div>
      <h3>Who can apply?</h3>
      <a href="#who-can-apply">
        
      </a>
    </div>
    <p>To be eligible, Project Cybersafe Schools participants must be:</p><ul><li><p>K-12 public school districts located in the United States</p></li><li><p>Up to 2,500 students in the district</p></li></ul><p>If you think your school district may be eligible, we welcome you to contact us to learn more. Please <a href="https://www.cloudflare.com/lp/cybersafe-schools/">fill out the form today</a>.</p><p>For schools or school districts that do not qualify for Project Cybersafe Schools, Cloudflare has other packages available with educational pricing. If you do not qualify for Project Cybersafe Schools, but are interested in our educational services, please contact us at k-12@cloudflare.com.</p> ]]></content:encoded>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Education]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[DNS Filtering]]></category>
            <category><![CDATA[Cloudflare Area 1]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">2ixCItIthHYFuckkX3DMb0</guid>
            <dc:creator>Zaid Zaid</dc:creator>
            <dc:creator>Caroline Hendrickson</dc:creator>
            <dc:creator>Ryan Kiernan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Exploring Internet traffic during the 2024 U.S. Republican National Convention]]></title>
            <link>https://blog.cloudflare.com/exploring-internet-traffic-during-the-2024-us-republican-national-convention/</link>
            <pubDate>Fri, 19 Jul 2024 15:07:04 GMT</pubDate>
            <description><![CDATA[ This week, the Republican National Convention was hosted in Milwaukee, Wisconsin from July 15 to 18, 2024. We examined traffic shifts and cyberattacks since June 2024 to see how these events have ]]></description>
            <content:encoded><![CDATA[ <p>Internet traffic typically mirrors human behavior, with significant fluctuations during large political events. This comes during a time when the United States is in election mode, as political campaigns are in full swing and candidates for various offices, primaries and caucuses make their case to voters and debates are being held. This week, the Republican National Convention was hosted in Milwaukee, Wisconsin from July 15 to 18, 2024. We examined traffic shifts and cyberattacks since June 2024 to see how these events have impacted the Internet. </p>
    <div>
      <h3>Attacks on political related websites</h3>
      <a href="#attacks-on-political-related-websites">
        
      </a>
    </div>
    <p>Cyberattacks are a constant threat, and aren't necessarily driven by elections. With that said, notable trends can often be observed, and we’ve seen before how specific geopolitical events can trigger online attacks. For example, we saw cyberattacks at the start of the <a href="/one-year-of-war-in-ukraine">war in Ukraine</a> to more <a href="/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts">recently in the Netherlands</a>, when the June 2024 European elections coincided with cyberattacks on Dutch political-related websites that lasted two days — June 5th and 6th. The main DDoS (<a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service attack</a>) attack on June 5, the day before the Dutch election, reached 73,000 requests per second (rps).</p><p>Shifting our focus to the United States in particular, in the weeks since April 2024, we’ve seen several DDoS attacks targeting both federal and state government and political-related websites in the United States. In recent days Cloudflare has also blocked DDoS attacks targeting two political-related websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hDTUPDdqg9h211ZAH1ACm/97a734072e91d581b17e260251ca3807/unnamed--1--6.png" />
            
            </figure><p>One of those is related to a political campaign, represented by the yellow line on the chart below. The first spike was a DDoS attack on July 2, 2024, peaking at 56,000 rps and lasting around 10 minutes. The same political-related site was attacked later on July 14, with a 34,000 rps peak, lasting four minutes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5jHkOfpp03Y2u1IiMXSMjt/e79c60ea259c5e1bb39d79b1806dadc1/unnamed-15.png" />
            
            </figure><p>The other political-related site under attack, in green on the previous chart, is a think tank website that does policy advocacy related to presidential politics. It was already attacked before, around the time of the Biden vs Trump debate, as we’ve published at the time in a <a href="/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends">related blog post</a>. The main attack was on July 11, with a 137,000 rps peak, lasting a few minutes, and was repeated, with slightly lower intensity, a few hours later on July 12.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/suW2ypFdXlSNlqNae05c8/df3bdfd8909ede83db8b10cff1da14f0/unnamed--2--5.png" />
            
            </figure><p>As we’ve seen in our recent <a href="/ddos-threat-report-for-2024-q2">DDoS report</a>, the vast majority of DDoS attacks are short. This emphasizes the need for automated, in-line detection and mitigation systems. Ten minutes are hardly enough time for a human to respond to an alert, analyze the traffic, and apply manual mitigations.</p>
    <div>
      <h3>Trump assassination attempt impact</h3>
      <a href="#trump-assassination-attempt-impact">
        
      </a>
    </div>
    <p>The <a href="https://en.wikipedia.org/wiki/Attempted_assassination_of_Donald_Trump">attempted assassination</a> of former President Trump at a campaign rally near Butler, Pennsylvania precipitated an increase in Internet traffic within the United States, particularly to news-related media outlets. As news broke of shots fired at a Trump rally, injuring the former president, Internet traffic in the United States (in bytes) increased around 22:30 - 23:00 UTC (18:30-19:00 EST) by 10% to 12%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5naPErSK3RLbucviBgKnWl/18a2b424e81d529751539a08053425e1/unnamed--3--5.png" />
            
            </figure><p>HTTP requests in the United States saw up to an 8% increase on July 13th compared to the previous week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5XX4YF3qVLCmFn586kuHb8/e75bd981a2537b193f779a7829e2c934/unnamed--4--4.png" />
            
            </figure><p>At the same time, DNS traffic to TV news sites, via our 1.1.1.1 resolver, surged by as much as 215%, and to general news sites by 141%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/386tpXBWJIWnXhy0eMgGzo/3968cbf79c4f215136735eee0ae59b81/unnamed--5--4.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/29HRGjIhBaRCMI3wcFdX8e/35838c844ad7168e46aa30f3a5e31521/unnamed--6--4.png" />
            
            </figure>
    <div>
      <h3>Republican National Convention</h3>
      <a href="#republican-national-convention">
        
      </a>
    </div>
    <p><a href="https://gopconvention2024.com/">The Republican National Convention</a> is an important political event as delegates of the United States Republican Party choose the party's nominees for president and vice president in the 2024 United States presidential election. Over the four-day event, convention delegates formally nominate the party’s presidential and vice presidential candidates and adopt the party's platform, which outlines its policies and positions on various issues. The convention features speeches from prominent party members, including the nominees, party leaders, and other influential figures.</p><p>This year’s convention was held in Milwaukee, Wisconsin. During this time, we didn’t identify any noticeable traffic spikes from Milwaukee or from Wisconsin in general.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/376nbfhHhurC5nLog96Hhd/b4398d5c1d7654746843463d93c951b1/unnamed--7--4.png" />
            
            </figure><p>Compared to the previous week, there was an increase in DNS traffic to Republican political party and fundraising websites. On July 18th, the last day of the convention, we saw two considerable increases in hourly traffic compared to a week prior. The first at 14:00 EDT, an increase of 268% in traffic to these sites. The second, at 23:00 EDT with another increase at 266%. The daily aggregation on this day was an increase of 90.48% compared to daily traffic aggregations in the previous week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YgNARX7ttperGn62xDOCc/f0e73477e4b55a0dd5f79e07cf5cbc16/unnamed--8--2.png" />
            
            </figure><p>For DNS traffic during the convention for TV news channels, we see steady traffic numbers with the highest peaking days before the convention on July 14, then during the late hours of July 15th.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/35jThqt2vulNEcfMJYadEi/565c7533d9ac0a1917d25cd431b80d22/unnamed--9--2.png" />
            
            </figure><p>For political news websites covering the RNC, traffic numbers tend to decrease slightly as the event progresses.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1YwyzkmGyG0TEA1y5RZgDU/d2ceb1aa3a73184e67de4035dfdc20fd/unnamed--10--2.png" />
            
            </figure><p>We identified an attack against a think-tank based in Washington D.C. that does policy advocacy related to presidential politics. The attack itself lasted around 3 minutes, from July 18th 13:18 to 13:22 exclusive (EDT) with a total of 3.12 million DDoS requests mitigated. The attack peaked at around 30.33k rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ZsVBFxTICDrKq9W51OHuP/a1ca807065516816541e4b6c17aa8940/unnamed--11--2.png" />
            
            </figure><p>We see that major political events may not always cause significant shifts in Internet traffic. Our data indicates increases in traffic primarily to news and media organizations from July 13th onward. When it comes to cyber attacks, a majority of activity we see targets political campaigns and policy organizations.</p><p>If you want to follow more trends and insights about the Internet and elections in particular, you can check <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>, and more specifically our new <a href="https://radar.cloudflare.com/reports/elections-2024">2024 Elections Insights</a> report, which will be updated as elections take place throughout the year.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Elections]]></category>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Politics]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">6Sq2pGkmj4avfRrQgXAqZ9</guid>
            <dc:creator>João Tomé</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
    </channel>
</rss>