
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sun, 05 Apr 2026 19:03:49 GMT</lastBuildDate>
        <item>
            <title><![CDATA[UK election day 2024: traffic trends and attacks on political parties]]></title>
            <link>https://blog.cloudflare.com/uk-election-day-2024-traffic-trends-and-attacks-on-political-parties/</link>
            <pubDate>Fri, 05 Jul 2024 13:24:49 GMT</pubDate>
            <description><![CDATA[ Here, we explore the dynamics of Internet traffic and cybersecurity during the UK’s 2024 general election, highlighting late-day traffic changes and a post-vote attack on a political party ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The 2024 <a href="https://en.wikipedia.org/wiki/2024_United_Kingdom_general_election">UK general election</a>, the first since Brexit officially began (January 31, 2020) and after 14 years of Conservative leadership, saw the Labour Party secure a majority. This blog post examines Internet traffic trends and cyberattack activity on election day, highlighting notable declines in traffic during the afternoon and evening as well as a DDoS attack on a political party shortly after polls closed.</p><p>For context, 2024 is considered “the year of elections,” with elections taking place in over 60 countries. We’ve covered elections in <a href="/internet-insights-on-2024-elections-in-the-netherlands-south-africa-iceland-india-and-mexico">South Africa, India, Iceland, Mexico</a>, the <a href="/exploring-the-2024-eu-election-internet-traffic-trends-and-cybersecurity-insights">European Union</a>, <a href="/first-round-of-french-election-2024-party-attacks-and-a-modest-traffic-dip">France</a>, and also the <a href="/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends">2024 US presidential debate</a>. We also continuously update our <a href="https://radar.cloudflare.com/reports/elections-2024">election report</a> on Cloudflare Radar.</p><p>The UK’s snap election on Thursday, July 4, 2024, typical of British <a href="https://www.standard.co.uk/news/politics/why-are-uk-general-elections-always-on-a-thursday-b1168631.html">Thursday weekday</a> elections, contrasts with weekend elections in other countries. Polling stations were open from 07:00 to 22:00.</p><p>Generally, <a href="/tag/election-security">election days</a> do not result in drastic changes to Internet traffic. Traffic typically dips during voting hours but not as sharply as during major events like national holidays, and rises in the evening as results are announced.</p><p>On July 4, 2024, traffic initially rose slightly from the previous week, then fell around noon (-2%). Significant declines began only after 16:00, with noticeable drops at 16:45 and again at 22:00 as polls closed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nVPnLCsLcmzD3wDn3V25f/7fc351422ec00bd0e17e79a6747d7dcf/unnamed-1.png" />
            
            </figure>
    <div>
      <h3>Internet traffic dips across UK countries</h3>
      <a href="#internet-traffic-dips-across-uk-countries">
        
      </a>
    </div>
    <p>Traffic shifts during voting day, compared to the previous week, are more revealing when viewed in detail. The map and table below summarize the traffic changes observed at the country level within the UK, where the greatest impact was observed in Northern Ireland (-10%), followed by Scotland (-6%), Wales (-5%), and England (-3%), all after 16:00.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5EZg9EHhbfyfNHbOWIvZGo/d9dbab218e3ca9f831474194d81f4337/Screenshot-2024-07-05-at-14.17.05.png" />
            
            </figure>
<table><thead>
  <tr>
    <th><span>Country</span></th>
    <th><span>Drop in traffic (%)</span></th>
    <th><span>Time of drop in traffic (local)</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>Northern Ireland</span></td>
    <td><span>-10%</span></td>
    <td><span>July 4, 16:00</span></td>
  </tr>
  <tr>
    <td><span>Scotland</span></td>
    <td><span>-6%</span></td>
    <td><span>July 4, 20:00</span></td>
  </tr>
  <tr>
    <td><span>Wales</span></td>
    <td><span>-5%</span></td>
    <td><span>July 4, 17:00</span></td>
  </tr>
  <tr>
    <td><span>England</span></td>
    <td><span>-3%</span></td>
    <td><span>July 4, 16:00</span></td>
  </tr>
</tbody></table><p>Next, examining the day’s traffic changes, we observed a clear drop in Northern Ireland around 13:00 local time and during off-work hours between 16:00 and 20:00, before it began to increase again.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64J19Hq9vz0t8wa1DNepS1/003fa2ae6a9740c38f346e57f6c2dfb9/unnamed--1-.png" />
            
            </figure><p>In Scotland, traffic fell by about 5% from 16:00 to 21:00 local time compared to the previous week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Ca8jEk9p4vy8IhlRH2cCf/d0e559f7c1b89426756724c7c0c1a510/unnamed--2-.png" />
            
            </figure><p>In Wales, decreases occurred at 07:00 (4% drop), between 16:00 and 18:00 (around 5% drop), and at 21:00.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5XlXJy0tgkDSE4wkYFq7L8/852fdfdfb394e78b1baa339eca517648/unnamed--3-.png" />
            
            </figure><p>And in England, traffic decreased by approximately 3% between 16:00 and 18:00 and about 2% between 20:00 and 22:00.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1UngJodIP8APq42Pj3a5sv/f9b13d94a53e5fe9d3e25f3cacaddf54/unnamed--4-.png" />
            
            </figure><p>In all the countries within the UK, traffic clearly increased after 23:00 local time when the voting polls had already closed and the first results started to arrive. Peak increases were reached at different times: Wales saw a 3% increase at 01:00; Northern Ireland and England experienced their highest increases of 12% and 11% respectively at 02:00; and Scotland had a 9% increase at 02:00 followed by a 12% spike at 04:00.</p>
    <div>
      <h3>DNS trends: news outlets bring results</h3>
      <a href="#dns-trends-news-outlets-bring-results">
        
      </a>
    </div>
    <p>Switching focus to domain trends, our <a href="http://1.1.1.1">1.1.1.1</a> resolver DNS data reveals a more targeted impact from the UK elections. Analyzing the participating parties, DNS traffic significantly increased on election day, peaking at 22:00 and midnight local time (up to 600% growth), and then again at 04:00 (671%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7mt14vLtzle7S6F5vY7QoH/ad43259a968e8b61606d001a8c2ca384/unnamed--5-.png" />
            
            </figure><p>Among the main parties, Labour, led by Keir Starmer, outperformed the Conservative Party on election day. Labour’s DNS traffic spiked at 22:00 local time, with an 866% increase from the previous week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2cKB6KMehHJnLhVdFTyYcL/cd96b716d96ca545b5b93d3e8e0e795c/unnamed--6-.png" />
            
            </figure><p>Analyzing official government and election-related websites, the UK differs from other countries in how results are shared. Official results weren’t continuously updated as they came in. The largest spike in DNS traffic, a 172% increase from the previous week, occurred on election morning around 07:00 local time. This increase likely happened because UK citizens were searching for the correct polling stations and other voting resources.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6j7wLLGkdPEJlh0AO0kQiC/c572a87db0b96e6b3cfebf35bfbd1e96/unnamed--7-.png" />
            
            </figure><p>News sites and microblogging social media platforms in the UK experienced significant increases in usage after the polling stations closed at 22:00 local time. In the UK, news sites not only provide initial projections but also final results. DNS traffic for UK news media outlets surged 74% compared to the previous week, peaking at 104% at midnight and 04:00.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5iKtY8do2QbjccAZRozQ3G/668562480c03ecca16a1c1d905c32d27/unnamed--8-.png" />
            
            </figure><p>For microblogging social media in Great Britain, traffic was already 25% higher than the previous week when the polls closed (22:00), peaking at 27% at midnight and remaining elevated through the night.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3yv7l3F0NrTYwkvNzVRIIW/81f2a840ae43247f3e3e2c0236907b63/unnamed--9-.png" />
            
            </figure><p>We saw last week in the US, during the Biden vs Trump debate, that video streaming social platforms such as YouTube or TikTok, were used to watch through news outlets channels the debate live, with DNS traffic surging. How about the UK? DNS traffic was 10% higher than in the previous week starting at midnight, and at 01:00 local time was 15% higher.</p>
    <div>
      <h3>Attacks: political parties included impact</h3>
      <a href="#attacks-political-parties-included-impact">
        
      </a>
    </div>
    <p>Focusing on attacks, those are usually constant, and aren’t necessarily driven always by elections. But, as we’ve seen at the start of the <a href="/one-year-of-war-in-ukraine">war in Ukraine</a> or more recently in the <a href="/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts">Netherlands</a> or in <a href="/first-round-of-french-election-2024-party-attacks-and-a-modest-traffic-dip">France</a>, specific events do trigger attacks. DDoS (<a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service</a>) attacks remain a common method employed by attackers.</p><p>In recent days, there has been DDoS activity targeting political parties in the UK that participated in these elections. Our data shows that two parties experienced attacks that were blocked by Cloudflare. One party, represented in blue, suffered an attack on June 16, which lasted over four hours and peaked at 60,000 requests per second (rps).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1adSZmNlwTmGPYiPjoSEUb/fe9d8cf3b34f2454516178972bc8bcfa/unnamed--10-.png" />
            
            </figure><p>The party shown in yellow was hit by four DDoS attacks on different days: June 13, 19, 26, and in the early hours of July 5 (UTC), just after the election’s first predictions were broadcast, giving a majority to the Labour Party. This was the most significant attack in recent days, peaking at 156,000 rps. It began at 01:47 local time (00:47 UTC) and ended four minutes later. Here’s a closer look at that July 5, 2024, attack:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4C7S91vR409ztcqCybWl0p/7b4f22ed2fdb6688a6fc747f895c9eac/unnamed--11-.png" />
            
            </figure><p>Although these rates are small on Cloudflare’s scale, they can be devastating for unprotected websites unaccustomed to such levels of traffic.</p>
    <div>
      <h3>Conclusion: high intensity election year</h3>
      <a href="#conclusion-high-intensity-election-year">
        
      </a>
    </div>
    <p>Even if major political events don’t always bring notable changes to Internet traffic, our data shows that in the UK, traffic decreased more significantly in the afternoon and evening, especially as voting stations remained open until 22:00.</p><p>After voting ended, news sites became the go-to resource for UK residents seeking initial predictions and results.</p><p>We also observed attacks targeting political parties in the UK, further highlighting that this election year is marked by cyberattacks aimed at influencing politically related websites.</p><p>If you want to follow more trends and insights about the Internet and elections in particular, you can check <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>, and more specifically our new <a href="https://radar.cloudflare.com/reports/elections-2024">2024 Elections Insights</a> report, which will be updated as elections take place throughout the year.</p> ]]></content:encoded>
            <category><![CDATA[Elections]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Election Security]]></category>
            <guid isPermaLink="false">4BvjhLoLF21kHxvNOIaJdg</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[How the coronation of King Charles III affected Internet traffic]]></title>
            <link>https://blog.cloudflare.com/how-the-coronation-of-king-charles-iii-affected-internet-traffic/</link>
            <pubDate>Wed, 10 May 2023 17:40:13 GMT</pubDate>
            <description><![CDATA[ As the coronation ceremony unfolded, on Saturday morning, May 6, 2023, there were clear spikes and dips in traffic, each coinciding with key moments of the ceremony ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6NPpc8g5EcEpg2ObKEk4G5/03f71ff10a9deb736a867a96b09ba83c/Coronation-1.png" />
            
            </figure><p>When major events in a country happen Internet traffic patterns are often impacted, depending on the type of event. But what about the coronation of a king or queen? There’s no similar precedent, with a worldwide impact, in the Internet age, except maybe the coronation of the king of Thailand, in 2019. The last time it happened in the United Kingdom was 70 years ago (June 2, 1953), with Queen Elizabeth II; it was the first British coronation to be fully televised. Neither the Internet nor <a href="https://en.wikipedia.org/wiki/ARPANET">ARPANET</a> were around at the time.</p><p>Imagine a grand royal event (if you saw the broadcast or the news, there’s no need), filled with pomp and pageantry, that's so captivating it impacts Internet traffic. That's what happened during the <a href="https://en.wikipedia.org/wiki/Coronation_of_Charles_III_and_Camilla">coronation</a> of Charles III and Camilla, the newly crowned king and queen of the United Kingdom and other Commonwealth realms. As the coronation ceremony unfolded, on Saturday morning, May 6, 2023, there were clear spikes and dips in traffic, each coinciding with key moments of the ceremony.</p><p>Then came Sunday, and with it, the Coronation Big Lunch event. As the nation sat down to enjoy a communal meal throughout the country, Internet traffic took a significant nosedive, dropping by as much as 18%. The Sunday trends didn't stop there. As night fell and Prince William took to the stage to deliver a speech during the Coronation Concert, there was a clear drop in Internet traffic. Monday, May 8, was a bank holiday in the UK in honor of the coronation, and after a weekend of outdoor coronation events, Internet traffic was buzzing, noticeably higher than usual.</p><p>In the past, we’ve seen Internet traffic drop when a national televised event is happening — last year, we saw it, including in the UK, during the <a href="/eurovision-2022-internet-trends/">Eurovision</a>, although traffic does increase when results are in. Different types of events and broadcasts yield different Internet patterns.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QPfTB01F1bJqr3pLXhEkW/fd9258364b15418222a7528488d82c4d/Screenshot-2023-05-10-at-18.19.47.png" />
            
            </figure>
    <div>
      <h2>Coronation day: a rollercoaster of Internet traffic</h2>
      <a href="#coronation-day-a-rollercoaster-of-internet-traffic">
        
      </a>
    </div>
    <p>Let's take a closer look at coronation day, May 6, 2023, when Internet traffic in the UK had its own peaks and valleys. There were moments when the digital realm seemed to hold its breath, with traffic dipping to its lowest points. The arrival of the royals and their guests marked one such moment. As the anticipation built and all eyes turned to the grand entrances, Internet traffic dipped to a notable 7% lower than the previous week.</p><p>Here's a play-by-play of the day's traffic trends, compared to the previous week. We’re using a 15-minute granularity, and aligning with key events as <a href="https://www.bbc.com/news/live/uk-65474712/page/3">reported live by the BBC</a>:</p>
    <div>
      <h3>Traffic decreases (Saturday, May 6, 2023)</h3>
      <a href="#traffic-decreases-saturday-may-6-2023">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Rank by drop (compared with previous week)</span></th>
    <th><span>Coronation events (from the </span><a href="https://www.bbc.com/news/live/uk-65474712/page/3"><span>BBC</span></a><span>)</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>#1</span><span> — 10:45-11:00 local time (-7% in traffic)</span></td>
    <td><span>When the royals and guests were arriving at Westminster Abbey. The King and Queen arrived at 11:00.</span></td>
  </tr>
  <tr>
    <td><span>#2</span><span> — 12:00 (-2%)</span></td>
    <td><span>When King Charles III (12:02) was crowned.</span></td>
  </tr>
  <tr>
    <td><span>#3</span><span> — 13:00 (-3%)</span></td>
    <td><span>When King Charles and Queen Camilla left Westminster Abbey. The Coronation Procession started.</span></td>
  </tr>
</tbody>
</table><p>On Saturday, May 6, 2023, a downward trend in traffic began after 06:15, with traffic 5% lower than the previous week. This trend shifted to a traffic increase after 11:15 (+6%), coinciding with the ongoing ceremony. The exceptions were the previously mentioned traffic dips. The following table illustrates clear traffic spikes after significant moments, some of which are represented in the previous table. Here's a list of periods with higher growth:</p>
    <div>
      <h3>Traffic increases (Saturday, May 6, 2023)</h3>
      <a href="#traffic-increases-saturday-may-6-2023">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Rank by increase (compared with previous week)</span></th>
    <th><span>Coronation events (from the </span><a href="https://www.bbc.com/news/live/uk-65474712/page/3"><span>BBC</span></a><span>)</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>#1</span><span> — 14:45 local time (+14% in traffic)</span></td>
    <td><span>This happened after the military flypast (14:35), when the royals were on the balcony of Buckingham Palace.</span></td>
  </tr>
  <tr>
    <td><span>#2</span><span> — 12:30 (+13.7%)</span></td>
    <td><span>After King Charles III was crowned at 12:02 (at which time traffic dropped 2%) and after Queen Camilla (12:16) was crowned, when a choir was singing Agnus Dei (12:30).</span></td>
  </tr>
  <tr>
    <td><span>#3</span><span> — 15:30-16:15 (+13%)</span></td>
    <td><span>During the highlights of the event and reactions from royal fans.</span></td>
  </tr>
  <tr>
    <td><span>#4</span><span> — 14:00 (+13%). </span></td>
    <td><span>When the UK’s national anthem was played in the gardens of Buckingham Palace.</span></td>
  </tr>
  <tr>
    <td><span>#5 —</span><span> 11:30 (+11%). </span></td>
    <td><span>Just after the coronation oath and during the choir’s singing.</span></td>
  </tr>
</tbody>
</table><p>As guests and royals arrived and during moments like the king's crowning, Internet traffic noticeably dropped. However, during parts of the ceremony such as the choir singing, Internet traffic seemed to increase. That was also clear after the military flypast, over the Buckingham Palace balcony.</p><p>The following chart illustrates UK Internet traffic during the weekend, with the purple dotted line representing the previous weekend.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dVVduUFFUoEENCyuZAE5J/c4683fcb610a39b1d8bc93baf928dddd/download-6.png" />
            
            </figure><p>On a daily basis, daily traffic was 4% higher on Saturday, May 6, compared to the previous Saturday.</p>
    <div>
      <h2>The Big Lunch and Prince William’s speech</h2>
      <a href="#the-big-lunch-and-prince-williams-speech">
        
      </a>
    </div>
    <p>Another trend from the coronation weekend relates to the events that took place on Sunday, May 7. Internet trends here align with what we observed almost a year ago during <a href="/queens-platinum-jubilee/">Queen Elizabeth II's Platinum Jubilee</a>. Sunday was a day of celebration with both the Coronation Big Lunch (where neighbors and communities were invited to share food and fun together across the country) and the Coronation Concert taking place.</p><p>Next, we present the percentages of increase/decrease in requests during this past weekend, compared with the previous week (a slightly different perspective from the previous chart):</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XW2TPwR8juBkN37Xznhhc/1ebbd0a06a8fdd7e91f5724606656c62/download--1--3.png" />
            
            </figure><p>On Sunday, May 7, it's clear that UK traffic was lower than usual right after 07:00 local time (-2% in traffic), but it dropped the most after 12:00 (-5%), compared to the previous week. The moment with the biggest drop in traffic, compared to the previous week, was between 14:15 and 15:30, when traffic was around 18% lower. That was still Big Lunch time, given that it’s a multiple hour event full of “food and fun” — there were more than <a href="https://www.royal.uk/news-and-activity/2023-05-07/the-big-coronation-lunch">65,000 Coronation Big Lunch</a> events around the UK. During last year's Queen Elizabeth II's Platinum Jubilee, traffic dropped as much as <a href="/queens-platinum-jubilee/">25%</a> on Sunday, June 5, 2022, at 15:00.</p><p>At night, the Coronation Concert took center stage, broadcast live from Windsor Castle on the BBC after 20:00. The lineup included musical guests such as Take That, Lionel Richie, Katy Perry, and Andrea Bocelli. However, the star of the event, at least in terms of when Internet traffic was at its lowest that evening, was William, Prince of Wales. Cloudflare observed another significant drop in traffic, compared to the previous week, around 21:15-21:30, when traffic was 7% lower than the previous week. At that time, Lionel Richie had just performed, and Prince William was on stage for a special address to the king.</p><p>In terms of daily traffic, if on Coronation Saturday we saw an increase (4%), on Coronation Sunday there was a 6% drop compared to the previous week. On Monday, the coronation bank holiday, there weren't any major coronation events, and traffic was 4% higher than the previous week (May 1, also a bank holiday in the UK).</p>
    <div>
      <h2>Coronation, a mobile devices day</h2>
      <a href="#coronation-a-mobile-devices-day">
        
      </a>
    </div>
    <p>Zooming in on the distribution of traffic from mobile devices, we find that Saturday, May 6, stands out in 2023. On this day, mobile traffic accounted for 61% of total traffic, a figure only matched by April 15 and January 1, 2023. Similarly, Sunday, May 7, was one of the Sundays with the highest percentage of mobile traffic, at 60%. This percentage was only surpassed by Easter Sunday, April 9 (60.4%), and, unsurprisingly, January 1, 2023 (61%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aw7VpmhHKXFshBCl8OiAt/16a9bed265ce42b53dc95971c8f3ff7c/download--2--2.png" />
            
            </figure>
    <div>
      <h2>Wales sees the largest Sunday drop in Internet traffic</h2>
      <a href="#wales-sees-the-largest-sunday-drop-in-internet-traffic">
        
      </a>
    </div>
    <p>Which UK countries were more impacted? Looking at both coronation weekend days, we saw a similar pattern (growth in traffic at around the time of the coronation ceremony on Saturday, and decrease on Sunday) in all of them. Looking at the Sunday drop, England had as much as 16% in traffic at 15:30; Scotland had as much as a 17% drop at around 13:30; Wales had as much as a 19% drop at around 15:00; and Northern Ireland had as much as an 18% drop in traffic, compared to the previous week, at the same time. Wales had the biggest drop.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/t8AquZQa5TLzYqAHzIGYp/e83c7c552eb3ef3740a39c1eb6682fdd/download--3--2.png" />
            
            </figure>
    <div>
      <h2>From Canada to Australia</h2>
      <a href="#from-canada-to-australia">
        
      </a>
    </div>
    <p>Last year, in early June, we observed the impact of <a href="/queens-platinum-jubilee/">Queen Elizabeth II’s Platinum Jubilee</a> on the Internet in the UK. This event, which celebrated the first British monarch to reach a 70th anniversary on the throne, caused a significant drop in traffic, as much as 25% (on Sunday, June 5, 2022). This trend was also noticeable in other <a href="https://en.wikipedia.org/wiki/Commonwealth_of_Nations?ref=blog.cloudflare.com">Commonwealth</a> countries.</p><p>Several Commonwealth countries also held notable events to celebrate both the Queen’s Platinum Jubilee and the recent coronation. In Canada, <a href="https://www.ctvnews.ca/canada/canada-commemorates-king-charles-iii-s-coronation-with-ceremony-in-the-nation-s-capital-1.6387190">events</a> and <a href="https://www.gg.ca/en/media/news/2023/public-invited-rideau-hall-celebrate-coronation-king-charles-iii">activities</a> related to the coronation mirrored those for the Queen’s Platinum Jubilee. Whether related or not, we observed on Saturday, May 6, as much as an ~8% drop in Internet traffic compared to the previous week, between 09:30 and 16:30 Toronto time. On Sunday, the drop was even larger, with about 10% less traffic between 10:30 and 12:00.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73eZ1lyXwvoJMZ2YCLW9lZ/890783dfefa15b4653d59e894d992a6d/download--4--2.png" />
            
            </figure><p>In Australia, the difference in traffic wasn't as pronounced as in Canada. However, traffic was 7% lower than the previous week at 20:00 Sydney time (10:00 UTC), when the coronation ceremony began on May 6. This was the only period over the past weekend when traffic was lower than the previous one.</p>
    <div>
      <h2>Social media and royals trends</h2>
      <a href="#social-media-and-royals-trends">
        
      </a>
    </div>
    <p>And what about the impact on DNS traffic to our <a href="https://1.1.1.1/">1.1.1.1 resolver</a> from UK users? Social media apps certainly felt the ripple. Domains linked to social media platforms, which typically surge in popularity during major events, such as Twitter, experienced a notable uptick. We saw a 33% increase in DNS traffic in those around 14:00 local time on Saturday, May 6, compared to the previous week. By 18:00 on May 7, traffic had soared to 64% higher, and it remained elevated during the Coronation Concert: at 22:00, it was 36% higher.</p><p>Meanwhile, video-centric social media platforms, like TikTok, hit their peak at around 20:00 on May 7, when the Coronation Concert was starting, with a whopping 57% surge in DNS traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6pZmBRHmwJcmBcPnDrkpf5/afe56e01857e82ccd22fee22750f12b3/download--5--2.png" />
            
            </figure><p>During the coronation weekend, the peak period for DNS traffic to domains related to the royal family fell between 11:00 and 12:00 local time. In this hour, traffic was an impressive forty times higher than the same time the previous weekend (that growth is higher, more than 40x, when using a May 2022 baseline, as is seen in the next chart).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vmHelrpVrlkCAYck6Ytdr/08cc7d144b65c9af0d157b85ea2ac064/download--6--3.png" />
            
            </figure><p>If we broaden our view to the past 12 months, we see that the domains associated with the royal family hit their highest point on the day Queen Elizabeth II passed away, September 8. Around 18:00 local time, DNS traffic was 12x higher than the previous week. This was followed by the day of Her Majesty's funeral, September 19, when around 11:00, DNS traffic was 6x higher than usual.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bfKTKzHjGW4HNsjfURMx8/ec16ae3c92918c29d5d6a23bec019465/download--7-.png" />
            
            </figure><p>A similar impact was seen, related to the Queen's death, on British news organizations, in the past 12 months. September 8, around 18:00, was the peak of the whole year in terms of DNS traffic to news organizations, according to our data. At that time, DNS traffic was 263% higher than at the same time in the previous week. During the September 19 funeral, at 11:00, DNS traffic was 24% higher than before.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1CV3064rsr6e7eCliwGOwf/147d40c19def735342cbabf82660d739/download--8-.png" />
            
            </figure><p>During the recent coronation weekend, DNS traffic to UK news organizations on Saturday, May 6, was higher than usual during the morning by as much as 47%, at 11:00, and continued higher than before mostly during that day.</p>
    <div>
      <h2>September 8, 2022: The end of a 70-year reign</h2>
      <a href="#september-8-2022-the-end-of-a-70-year-reign">
        
      </a>
    </div>
    <p>We already mentioned domain trends related to when Queen Elizabeth II <a href="https://en.wikipedia.org/wiki/Death_and_state_funeral_of_Elizabeth_II">passed away</a> on September 8, 2022. But what about the impact on Internet traffic? We saw a 7% decrease in Internet traffic in the UK on that day at around 18:30 local time compared to the previous week, coinciding with the announcement of her death.</p><p>The following weekend, on Saturday, September 10, 2022, traffic was as much as 17% lower at 15:00. This was the day Charles was proclaimed the new king and people flocked to the royal palaces to pay their respects — Prince William and Kate, and Prince Harry and Meghan, paused outside Windsor Castle to <a href="https://apnews.com/article/queen-elizabeth-ii-king-charles-iii-prince-harry-william-6e9d6556188dd5a45d1a5d183a4fd5c5">read messages</a> left by mourners.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EiTIz9sUH4hvQDMfX6PEG/e6bf12bbe076936146ed01b67c368c72/download--9-.png" />
            
            </figure><p>Internet traffic dropped even further compared to the previous week during Queen Elizabeth II’s funeral: on September 19, 2022, traffic was 27% lower at 10:45. According to <a href="https://en.wikipedia.org/wiki/Death_and_state_funeral_of_Elizabeth_II">Wikipedia</a>, this was when the Queen's coffin was transported from Westminster Hall to Westminster Abbey on the State Gun Carriage of the Royal Navy.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5IACGatOEOEcxzlYQzCFEU/261e64b326ec54b2ce8e414fe990a754/download--10-.png" />
            
            </figure>
    <div>
      <h2>Old traditions in a recent medium</h2>
      <a href="#old-traditions-in-a-recent-medium">
        
      </a>
    </div>
    <p>In this blog post, we've seen how a very old tradition, like the British coronation, can impact a very recent innovation, the Internet. Almost 70 years ago, Queen Elizabeth II's coronation was the first ever to be televised, at a time when television in the UK was less than 20 years old. The event, which took place at Westminster Abbey in London (the site of coronations since 1066), was <a href="https://www.royal.uk/50-facts-about-queens-coronation-0">watched</a> by 27 million people in the UK alone and millions more around the world.</p><p>This time around, King Charles III's coronation could be viewed through that now old medium called television, or online, via streaming services. The Internet is much younger than Britain’s former monarch's reign or even Sir <a href="https://en.wikipedia.org/wiki/Tim_Berners-Lee">Tim Berners-Lee</a> (born in 1955), and it was only <a href="https://en.wikipedia.org/wiki/World_Wide_Web">30 years ago</a> that the World Wide Web protocol and code were made available royalty-free, enabling the web's widespread use.</p><p><a href="https://en.wikipedia.org/wiki/Streaming_media">Streaming media</a> events online, on the other hand, at least on a large scale, are a more recent development — YouTube was launched in 2005. Looking at video platforms trends in the UK, we could see how DNS traffic was 13% higher at around 12:00, during the coronation ceremony, on May 6 — it was broadcast on <a href="https://www.youtube.com/watch?v=g8HVnAXZI1I">YouTube</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5KWSZe0G9eqeznORh2nVPC/cea7bdc9065f055ae8684ed97b80c240/download--11-.png" />
            
            </figure><p>British broadcasters, such as the BBC, also included a streaming version of the event. There, the increase in DNS traffic was even higher. Between 11:00 and 12:00, on May 6, DNS traffic was 197% higher than in the previous week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2w91DKCejsspy6ZLhsysaZ/3164a43be1ae6ea65f0603b0863eb93a/download--12-.png" />
            
            </figure><p>The difference in DNS traffic to UK's streaming services was even more pronounced when Queen Elizabeth II passed away on September 8, with a 470% increase in DNS traffic around 18:00 compared to the previous week. During the Queen's funeral on September 19, DNS traffic was 150% higher around 11:00 compared to the previous week.</p><p>You can check Internet trends related to events such as <a href="/sudan-armed-conflict-impact-on-the-internet-since-april-15-2023/">Easter, Ramadan</a>, an ongoing <a href="/sudan-armed-conflict-impact-on-the-internet-since-april-15-2023/">civil war</a> or a relevant <a href="/virgin-media-outage-april-4-2023/">UK outage</a> <a href="/tag/trends/">here</a> in our blog. You can also monitor changes in Internet patterns as they occur on <a href="https://radar.cloudflare.com/?ref=blog.cloudflare.com">Cloudflare Radar</a> or using the <a href="https://developers.cloudflare.com/api/operations/radar_get_AnnotationsOutages?ref=blog.cloudflare.com">Radar API</a>. On social media, we’re at <a href="https://twitter.com/cloudflareradar?ref=blog.cloudflare.com">@CloudflareRadar on Twitter</a> or <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">5zSfDcQefeCVTUcDGFpyjm</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s view of the Virgin Media outage in the UK]]></title>
            <link>https://blog.cloudflare.com/virgin-media-outage-april-4-2023/</link>
            <pubDate>Tue, 04 Apr 2023 18:57:46 GMT</pubDate>
            <description><![CDATA[ UK ISP Virgin Media (AS5089) experienced several outages on April 4, 2023. We examine the impact to Internet traffic, availability of Virgin Media web properties, and how BGP activity may provide insights into the underlying cause ]]></description>
            <content:encoded><![CDATA[ <p>Just after midnight (UTC) on April 4, subscribers to UK ISP Virgin Media (AS5089) began experiencing an Internet outage, with subscriber complaints multiplying rapidly on platforms including <a href="https://twitter.com/search?q=(%40virginmedia)%20until%3A2023-04-05%20since%3A2023-04-04&amp;src=typed_query&amp;f=live">Twitter</a> and <a href="https://www.reddit.com/r/VirginMedia/">Reddit</a>.</p><p>Cloudflare Radar data shows Virgin Media traffic dropping to near-zero around 00:30 UTC, as seen in the figure below. Connectivity showed some signs of recovery around 02:30 UTC, but fell again an hour later. Further nominal recovery was seen around 04:45 UTC, before again experiencing another complete outage between around 05:45-06:45 UTC, after which traffic began to recover, reaching expected levels around 07:30 UTC.</p><p>After the initial set of early-morning disruptions, Virgin Media experienced another round of issues in the afternoon. Cloudflare observed instability in traffic from Virgin Media’s network (called an <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous system</a> in Internet jargon) <a href="https://radar.cloudflare.com/as5089">AS5089</a> starting around 15:00 UTC, with a significant drop just before 16:00 UTC. However in this case, it did not appear to be a complete outage, with traffic recovering approximately a half hour later.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2I8FoTltIjjhXZNyAXHa3g/8747600986328dee7e77006a8d5ef800/image2-2.png" />
            
            </figure><p>Virgin Media’s Twitter account acknowledged the early morning disruption several hours after it began, posting <a href="https://twitter.com/virginmedia/status/1643157411417542656">responses</a> stating <i>“We’re aware of an issue that is affecting broadband services for Virgin Media customers as well as our contact centres. Our teams are currently working to identify and fix the problem as quickly as possible and we apologise to those customers affected.”</i> Further <a href="https://twitter.com/virginmedia/status/1643230963797831682">responses</a> after service restoration noted <i>“We’ve restored broadband services for customers but are closely monitoring the situation as our engineers continue to investigate. We apologise for any inconvenience caused.”</i></p><p>However, the second disruption was acknowledged on Virgin Media’s Twitter account much more rapidly, with a <a href="https://twitter.com/virginmedia/status/1643288614585917450">post</a> at 16:25 UTC stating <i>“Unfortunately we have seen a repeat of an earlier issue which is causing intermittent broadband connectivity problems for some Virgin Media customers. We apologise again to those impacted, our teams are continuing to work flat out to find the root cause of the problem and fix it.”</i></p><p>At the time of the outages, <a href="http://www.virginmedia.com">www.virginmedia.com</a>, which includes the provider’s <a href="https://www.virginmedia.com/help/service-status">status page</a>, was unavailable. As seen in the figure below, a DNS lookup for the hostname resulted in a <a href="/unwrap-the-servfail/">SERVFAIL</a> error, indicating that the lookup failed to return a response. This is because the authoritative nameservers for <code>virginmedia.com</code> are listed as <code>ns{1-4}.virginmedia.net</code>, and these nameservers are all hosted within Virgin Media’s network (AS5089) and thus are not accessible during the outage.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4KfQz1KaMcDIcq9x9Q4btG/e20aa0fc3fea49b7bb771a1f3ef141bc/image3-2.png" />
            
            </figure><p>Although Virgin Media has not publicly released a root cause for the series of disruptions that its network has experienced, looking at <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/">BGP</a> activity can be instructive.</p><p>BGP is a mechanism to exchange routing information between networks on the Internet. The big routers that make the Internet work have huge, constantly updated lists of the possible routes that can be used to deliver each network packet to its final destination. Without BGP, the Internet routers wouldn't know what to do, and the Internet wouldn't exist.</p><p>The Internet is literally a network of networks, or for math fans, a graph, with each individual network a node in it, and the edges representing the interconnections. All of this is bound together by BGP, which allows one network (Virgin Media, for instance) to advertise its presence to other networks that form the Internet. When Virgin Media is not advertising its presence, other networks can’t find its network and it becomes effectively unavailable.</p><p>BGP announcements inform a router of changes made to the routing of a prefix (a group of IP addresses) or entirely withdraws the prefix, removing it from the routing table. The figure below shows aggregate BGP announcement activity from AS5089 with spikes that align with the decreases and increases seen in the traffic graph above, suggesting that the underlying cause may in fact be BGP-related, or related to problems with core network infrastructure.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HfTtqH9be1WsW0r3U3WRu/ac9cfb0854611375c2279e04ddf63b77/image1-5.png" />
            
            </figure><p>We can drill down further to break out the observed activity between BGP announcements (dark blue) and withdrawals (light blue) seen in the figure below, with key activity coincident with the loss and return of traffic. An initial set of withdrawals are seen just after midnight, effectively removing Virgin Media from the Internet resulting in the initial outage.</p><p>A set of announcements occurred just before 03:00 UTC, aligning with the nominal increase in traffic noted above, but those were followed quickly by another set of withdrawals. A similar announcement/withdrawal exchange was observed at 05:00 and 05:30 UTC respectively, before a final set of announcements restored connectivity at 07:00 UTC.</p><p>Things remained relatively stable through the morning into the afternoon, before another set of withdrawals presaged the afternoon’s connectivity problems, with a spike of withdrawals at 15:00 UTC, followed by additional withdrawal/announcement exchanges over the next several hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1g0bxSdA83arYRujZ4O27A/28f024c829e951028c33e23911bd7e40/image4-2.png" />
            
            </figure>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Track ongoing traffic trends for Virgin Media <a href="https://radar.cloudflare.com/as5089">on Cloudflare Radar</a>, and follow us on <a href="https://twitter.com/CloudflareRadar">Twitter</a> and <a href="https://noc.social/@cloudflareradar">Mastodon</a> for regular updates.</p> ]]></content:encoded>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <guid isPermaLink="false">3KOcaG40JM9enTO05YdEJD</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[The truth about Black Friday and Cyber Monday]]></title>
            <link>https://blog.cloudflare.com/the-truth-about-black-friday-and-cyber-monday/</link>
            <pubDate>Tue, 11 Dec 2018 10:50:44 GMT</pubDate>
            <description><![CDATA[ Something we all see and hear a lot about at this time of year are Black Friday (23 November this year) and Cyber Monday (26 November) - but just how important are these days on the Internet? ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare we handle a lot of traffic on behalf of our customers. Something we all see and hear a lot about at this time of year are Black Friday (23 November this year) and Cyber Monday (26 November) - but just how important are these days on the Internet?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2CdCcJWms9KfhkHVoS8obS/938d6625acf464be16dd9b5e7692f685/15894285291_b73d2af904_k-2.jpg" />
            
            </figure><p>Black Friday by <a href="https://www.flickr.com/photos/perolofforsberg/">Per-Olof Forsberg</a>, license: <a href="https://creativecommons.org/licenses/by/2.0/">CC BY 2.0</a></p><p>To try and answer this question, we took a look at anonymised samples of HTTP requests crossing our network. First of all, let’s look at total page views from across our global network from the last few weeks and see if we can spot Black Friday and Cyber Monday:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6FhmseKPIpDhYFvNE0fqOn/cfa7beda1f5fde5b49d4c760d8497f13/all_page_views_black_friday_cyber_monday_utc-1.png" />
            
            </figure><p>All page views</p><p>So this is total page views by day (UTC) from November 19 (a week before Cyber Monday) until Monday December 3. Other than follow-the-sun fluctuations in a repeating daily pattern, each whole day is pretty similar in shape and size compared to the last. Black Friday and Cyber Monday aren’t visible in overall traffic patterns.</p>
    <div>
      <h2>Get specific</h2>
      <a href="#get-specific">
        
      </a>
    </div>
    <p>We have a very diverse set of customers across <a href="https://www.cloudflare.com/products/registrar/">12 million domain names</a> and not all of them are selling products or doing so directly online. To identify those websites that are, I used metadata from the wonderful <a href="https://httparchive.org/">HTTP Archive</a> project to export a list of domains using Cloudflare that were also running ecommerce software.</p><p>Here are the page views for these ecommerce sites over the same time period:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6En6Ly7MNHWzu5zhvLHNzr/763c7a846c0dbc998396b91810a3d070/ecommerce_page_views_black_friday_cyber_monday_utc.png" />
            
            </figure><p>Ecommerce page views</p><p>So we can see clearly that our <a href="https://www.cloudflare.com/ecommerce/">ecommerce customers</a> are seeing a big increase in page views on November 23 and 26. Black Friday and Cyber Monday are most certainly a thing. This year Black Friday was quite a bit busier than Cyber Monday - around 22% busier in terms of page views. If we compare the page views of each day to the week prior, we can see the changes clearly:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7xC7tSp6bWyMWTNXa4C4MI/9bceb6fa2bc3f6d2391b92b73f5d290e/page_views_black_friday_cyber_monday_prior_week_comparison_utc.png" />
            
            </figure><p>% page view change vs previous week</p><p>The uplift starts on Wednesday but really kicks in during Thanksgiving with an increase of more than 100% on Black Friday.</p>
    <div>
      <h2>Browsing vs Buying</h2>
      <a href="#browsing-vs-buying">
        
      </a>
    </div>
    <p>So we’ve established that these shopping days are important in terms of visitor activity. More pages are being viewed on these days - but is anyone buying anything?</p><p>We’re dealing with trillions of requests across a really large data set of different websites without any specific knowledge of what a purchase transaction would look like for each - so to approximate this I took a crude approach, which is to look for successful checkout interactions in the data. If you imagine a typical ecommerce application makes a purchase with a HTTP request like “POST /store/checkout HTTP/1.1” we can look for requests similar to this to understand the activity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/e14XnD1aGOZXbdleVqdo2/95ae4b72b586605876078a33a53cba25/checkout_interaction_black_friday_cyber_monday_prior_week_comparison_utc.png" />
            
            </figure><p>% of checkout interactions vs prior week</p><p>We can see here that Black Friday has an almost 200% increase in checkout interactions compared to the previous Friday.</p><p>Using this raw number of checkout interactions to compare with the page views we have something approximating a conversion %. This is not a true conversion figure - calculating a true conversion figure would require data that identifies individuals and detailed action tracking for each website. What we have is the total number of page views (HTTP requests that return HTML successfully) compared to the total number of POST requests to a checkout. This gives us a baseline to compare changes in “conversion” over these big November shopping days:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/52Mr9YjKoGVvdq2pavrx6A/a48394c8bcb8ce02bed6505677eb881a/checkout_interaction_as_percentage_of_page_views_black_friday_cyber_monday_prior_week_comparison_utc.png" />
            
            </figure><p>% of checkout interactions / page views vs prior week</p><p>Each bar on this chart represents the % change in checkout interactions as a proportion of page views compared to the same day the previous week. We can see this increased by 45% on Black Friday compared to the Friday before (boring old beige Friday November 16). The following Saturday was booming at 60% - because we’re dealing with time in UTC, a UTC Saturday actually includes Black Friday traffic for some parts of the world, the same can be said of Tuesday which contains overlap from Cyber Monday - we’ll break this down a bit later.</p><p>On Cyber Monday, the increase actually beats Black Friday, meaning page views lead to cart interactions 57% more often than the prior Monday (boring old vanilla Monday November 19), albeit from a lower number of transactions.</p>
    <div>
      <h2>What devices are people buying on?</h2>
      <a href="#what-devices-are-people-buying-on">
        
      </a>
    </div>
    <p>What we see here is just how much more browsing people do on mobiles today vs desktop, with mobile winning most days:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SXxZ4SEd2S8TIoAANXeNg/99a1fe2e2ec68a1e5e99debeede1694f/page_views_by_device_type_black_friday_cyber_monday_utc.png" />
            
            </figure><p>Page Views by Device Type</p><p>When it comes to checkout interactions though, we can see the situation is switched with visitors more likely to interact with the checkout on a desktop overall, but even more so on Black Friday (14% more likely) and Cyber Monday (20% more likely).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AT2Ig9vnQWZwgnoRt9iHx/1548111f5f18ebfdb37595c3240513c9/checkout_interaction_by_device_type_as_percentage_of_page_views_black_friday_cyber_monday_utc.png" />
            
            </figure><p>Checkout Interaction as % of Page Views</p><p>Let’s look at a specific region to understand more, starting with the US:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/MNHlkz9LG0NHrjides5bB/e904a148d6e36b5d4ddf6be3d1faa15c/usa_black_friday_cyber_monday_page_views_pst.png" />
            
            </figure><p>USA Page Views (PST)</p><p>We can see a more normal weekday pattern on the prior Thursday &amp; Friday (15 &amp; 16 Nov) whereby desktop page views eclipse mobile during the daytime while people are at their desks. In the evenings and weekends, mobile takes over. What we see from the 21st onward is evidence of people taking time off work and doing more with their mobile devices. Even on Thanksgiving, there is still a big rise in activity as people start gearing up for Friday’s deals or finding ways to avoid political discussion with relatives at home!</p><p>On Cyber Monday, traffic earlier in the day is lower as people return to work, however we are seeing heavy use of desktop devices. As the working day ends, mobile once again dominates. Things begin to settle back into a more regular pattern from Tuesday November 27 onwards.</p><p>Let's take a look at checkout interaction over the Black Friday to Cyber Monday weekend by device type.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/240tKTStoBAVPrvsNPI6ct/5431367a6989f0d836cdacce7821fbd7/usa_black_friday_cyber_monday_checkout_interaction_percentage_by_device_type_pst.png" />
            
            </figure><p>USA Checkout Interaction % (PST)</p><p>Despite all of that mobile browsing activity, desktop devices are more commonly used for checkout actions. People seem to browse more on mobile, committing to buy more often with desktop, it may also just be that mobile users have more distractions both on the device and in the real world and are therefore less likely to complete a purchase. From personal experience, I also think the poor <a href="https://www.cloudflare.com/performance/accelerate-mobile-experiences/">mobile optimisation</a> of some sites’ checkout flows make desktop preferrable - and when customers are incentivised with discounts &amp; deals, they are more likely to switch devices to complete a transaction if they hit an issue.</p>
    <div>
      <h2>Is Black Friday / Cyber Monday international?</h2>
      <a href="#is-black-friday-cyber-monday-international">
        
      </a>
    </div>
    <p>It might be obvious if you’re reading this from the UK, but despite the fact that Thanksgiving is not a holiday here, <a href="https://www.cloudflare.com/retail/">retailers</a> have very much picked up the mantle from US retailers and seized the opportunity to drive sales over this weekend.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10DVGES8qxwWCJRpLktybt/a53651260d0f3748bb89fd7de9f9c485/uk_black_friday_cyber_monday_page_views_utc.png" />
            
            </figure><p>UK Page Views (UTC)</p><p>Page views to ecommerce websites on Cloudflare look very similar in shape to the US on Black Friday. However, mobile is more dominant in the UK, even during working hours. It’s worth noting one big difference here - Cyber Monday in the UK was only 22% up in terms of page views compared to the prior Monday - in the US the increase was more than 4x that.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5uX8Wt5UWFDEYLhEXJ1Htm/fd5253c0919f8aea3805d46c6476c00c/uk_checkout_interaction_as_percentage_of_page_views_utc.png" />
            
            </figure><p>UK Checkout Interaction as % of Page Views</p><p>When it comes to checkout, it also looks like UK visitors to ecommerce sites commit more with their mobile, but desktop is still more likely to lead to more conversion.</p><p>Taking Germany as another example, here’s how page views look:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/18g6BZETsanoJr838h9A3J/05e2cef6eeff99b29eca64ca69e00ade/germany_black_friday_cyber_monday_page_views_cet.png" />
            
            </figure><p>Germany Page Views (CET)</p><p>Desktop use during typical working hours is much more pronounced in Germany. Black Friday and Cyber Monday show higher page views than a normal Friday / Monday but the difference is much smaller than regions such as the US &amp; UK.</p>
    <div>
      <h2>Conclusions</h2>
      <a href="#conclusions">
        
      </a>
    </div>
    <p>Black Friday is spreading internationally despite these still being normal working days for the rest of the world. Cyber Monday is also increasing ecommerce activity internationally but tends to be quieter than Black Friday. Overall, mobile browsing eclipses desktop, but those desktop page views tend to lead to checkout more often.</p><p>Retailers should continue to invest in making their mobile &amp; desktop ecommerce experiences fast &amp; resilient to seize on these key days.</p> ]]></content:encoded>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Holidays]]></category>
            <category><![CDATA[eCommerce]]></category>
            <category><![CDATA[Mobile]]></category>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Germany]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <guid isPermaLink="false">1F38cCJdX8Omxx2IftVfwD</guid>
            <dc:creator>Simon Moore</dc:creator>
        </item>
        <item>
            <title><![CDATA[Copenhagen & London developers, join us for five events this May]]></title>
            <link>https://blog.cloudflare.com/copenhagen-london-developers/</link>
            <pubDate>Thu, 26 Apr 2018 05:32:00 GMT</pubDate>
            <description><![CDATA[ Are you based in Copenhagen or London? Drop by some talks we're hosting about the use of Go, Kubernetes, and Cloudflare’s Mobile SDK. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Photo by <a href="https://unsplash.com/@nickkarvounis?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Nick Karvounis</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></p><p>Are you based in Copenhagen or London? Drop by one or all of these five events.</p><p><a href="https://twitter.com/0xRLG">Ross Guarino</a> and <a href="https://twitter.com/terinjokes">Terin Stock</a>, both Systems Engineers at Cloudflare are traveling to Europe to lead Go and Kubernetes talks in Copenhagen. They'll then join <a href="https://twitter.com/IcyApril">Junade Ali</a> and lead talks on their use of Go, Kubernetes, and Cloudflare’s Mobile SDK at Cloudflare's London office.</p><p>My Developer Relations teammates and I are visiting these cities over the next two weeks to produce these events with Ross, Terin, and Junade. We’d love to meet you and invite you along.</p><p>Our trip will begin with two meetups and a conference talk in Copenhagen.</p>
    <div>
      <h3>Event #1 (Copenhagen): 6 Cloud Native Talks, 1 Evening: Special KubeCon + CloudNativeCon EU Meetup</h3>
      <a href="#event-1-copenhagen-6-cloud-native-talks-1-evening-special-kubecon-cloudnativecon-eu-meetup">
        
      </a>
    </div>
    
            <figure>
            <a href="https://www.meetup.com/GOTO-Nights-CPH/events/249895973/">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3PkIfrgFfKT97ZlXTCkM8N/b29595b25228a344e0c1b66c880d004f/GOTO.jpeg.jpeg" />
            </a>
            </figure><p><b>Tuesday, 1 May</b>: 17:00-21:00</p><p><b>Location</b>: <a href="https://trifork.com/">Trifork Copenhagen</a> - <a href="https://www.google.com/maps/place/Borgergade+24b,+1300+K%C3%B8benhavn,+Denmark/@55.684785,12.5840548,17z/data=!3m1!4b1!4m5!3m4!1s0x46525318dfb3b89d:0x855a7fb57181604f!8m2!3d55.684785!4d12.5862435">Borgergade 24B, 1300 København K</a></p><p>How to extend your Kubernetes cluster</p><p>A brief introduction to controllers, webhooks and CRDs. Ross and Terin will talk about how Cloudflare’s internal platform builds on Kubernetes.</p><p><b>Speakers</b>: Ross Guarino and Terin Stock</p><p><a href="https://www.meetup.com/GOTO-Nights-CPH/events/249895973/">View Event Details &amp; Register Here »</a></p>
    <div>
      <h3>Event #2 (Copenhagen): Gopher Meetup At Falcon.io: Building Go With Bazel &amp; Internationalization in Go</h3>
      <a href="#event-2-copenhagen-gopher-meetup-at-falcon-io-building-go-with-bazel-internationalization-in-go">
        
      </a>
    </div>
    
            <figure>
            <a href="https://www.meetup.com/Go-Cph/events/249830850/">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1YCo27Er0ncIR677a3eKFL/ae8b09422245f7c111d27f23607e16ff/Viking-Gopher.png" />
            </a>
            </figure><p><b>Wednesday, 2 May</b>: 18:00-21:00</p><p><b>Location</b>: <a href="https://www.falcon.io/">Falcon.io</a> - <a href="https://www.google.com/maps/place/H.+C.+Andersens+Blvd.+27,+1553+K%C3%B8benhavn,+Denmark/@55.674143,12.5629923,15z/data=!4m5!3m4!1s0x4652531251d1c86d:0xd1f236f0ffef562e!8m2!3d55.674143!4d12.571747">H.C. Andersen Blvd. 27, København</a></p><p>Talk 1: Building Go with Bazel</p><p>Fast and Reproducible go builds with Bazel. Learn how to remove Makefiles from your repositories.</p><p><b>Speaker</b>: Ross Guarino</p><p>Talk 2: Internationalization in Go</p><p>Explore making effective use of Go’s internationalization and localization packages and easily making your applications world-friendly.</p><p><b>Speaker</b>: Terin Stock</p><p><a href="https://www.meetup.com/Go-Cph/events/249830850/">View Event Details &amp; Register Here »</a></p>
    <div>
      <h3>Event #3 (Copenhagen): Controllers: Lambda Functions for Extending your Infrastructure at KubeCon + CloudNativeCon 2018</h3>
      <a href="#event-3-copenhagen-controllers-lambda-functions-for-extending-your-infrastructure-at-kubecon-cloudnativecon-2018">
        
      </a>
    </div>
    
            <figure>
            <a href="http://sched.co/DqwM">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DfqqwLIbsg89kEglVpmNr/5ee34593d6192c6cdb9bb3bac21da2e9/Screen-Shot-2018-04-25-at-2.41.41-PM.png" />
            </a>
            </figure><p><b>Friday, 4 May</b>: 14:45-15:20</p><p><b>Location</b>: <a href="https://events.linuxfoundation.org/events/kubecon-cloudnativecon-europe-2018/">KubeCon + CloudNativeCon 2018</a> - <a href="https://www.google.com/maps/place/Bella+Center/@55.6385357,12.5433961,13z/data=!3m1!5s0x465254a4eeec0777:0x55f95a7fe9ed3f83!4m13!1m5!2m4!1sBella+Center,+Center+Blvd.+5,+2300+K%C3%B8benhavn!5m2!5m1!1s2018-04-27!3m6!1s0x465254a363269c3d:0x61db300fc92fb898!5m1!1s2018-04-27!8m2!3d55.6375044!4d12.5785932">Bella Center, Center Blvd. 5, 2300 København</a></p><p>If you happen to be attending <a href="https://events.linuxfoundation.org/events/kubecon-cloudnativecon-europe-2018/">KubeCon + CloudNativeCon 2018</a>, check out Terin and Ross’s conference talk as well.</p><p>This session demonstrates how to leverage Kubernetes Controllers and Initializers as a framework for building transparent extensions of your Kubernetes cluster. Using a live coding exercise and demo, this presentation will showcase the possibilities of the basic programming paradigms the Kubernetes API server makes easy.</p><p><b>Speakers</b>: Ross Guarino and Terin Stock</p><p><a href="http://sched.co/DqwM">View Event Details &amp; Register Here »</a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NWrQuZUZgMIy7uJZv0OWr/4fe475faee0e83937f10542f86e6bb4c/photo-1508808402998-ec38e4bf0fd0" />
            
            </figure><p>Photo by <a href="https://unsplash.com/@photobuffs?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Paul Buffington</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></p><p>When <a href="https://events.linuxfoundation.org/events/kubecon-cloudnativecon-europe-2018/">KubeCon + CloudNativeCon 2018</a> concludes, we're all heading to the Cloudflare London office where we are hosting two more meetups.</p>
    <div>
      <h3>Event #4 (London): Kubernetes Controllers: Lambda Functions for Extending your Infrastructure</h3>
      <a href="#event-4-london-kubernetes-controllers-lambda-functions-for-extending-your-infrastructure">
        
      </a>
    </div>
    
            <figure>
            <a href="https://kubernetes-controlers.eventbrite.com">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4RvxFZQ2Thh4N7J4zBOcSu/4c02fcfd43a2fd108b19fac3c0e5aab8/Cloudflare-London.jpg" />
            </a>
            </figure><p><b>Wednesday, 9 May</b>: 18:00-20:00</p><p><b>Location</b>: Cloudflare London - <a href="https://www.google.com/maps/place/25+Lavington+St,+London+SE1+0NZ,+UK/@51.5047963,-0.1024043,17z/data=!3m1!4b1!4m5!3m4!1s0x487604a8a2b9c4f1:0x1126c5560c56cc41!8m2!3d51.5047963!4d-0.1002156">25 Lavington St, Second floor | SE1 0NZ London</a></p><p>This session demonstrates how to leverage Kubernetes Controllers and Initializers as a framework for building transparent extensions of your Kubernetes cluster. Using a live coding exercise and demo, this presentation will showcase the possibilities of the basic programming paradigms the Kubernetes API server makes easy. As an SRE, learn to build custom integrations directly into the Kubernetes API that transparently enhance the developer experience.</p><p><b>Speakers</b>: Ross Guarino and Terin Stock</p><p><a href="https://kubernetes-controlers.eventbrite.com">View Event Details &amp; Register Here »</a></p>
    <div>
      <h3>Event #5 (London): Architecture for Network Failure, Developing for Mobile Performance</h3>
      <a href="#event-5-london-architecture-for-network-failure-developing-for-mobile-performance">
        
      </a>
    </div>
    
            <figure>
            <a href="https://mobilearchitectureandperformance.eventbrite.com">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/atA3RsFZPPZbbHcZKMhZW/1c5d56415e2513375ef5e6db50344910/Screen-Shot-2018-04-25-at-8.59.10-AM.png" />
            </a>
            </figure><p><b>Thursday, 10 May</b>: 18:00-20:00</p><p><b>Location</b>: Cloudflare London - <a href="https://www.google.com/maps/place/25+Lavington+St,+London+SE1+0NZ,+UK/@51.5047963,-0.1024043,17z/data=!3m1!4b1!4m5!3m4!1s0x487604a8a2b9c4f1:0x1126c5560c56cc41!8m2!3d51.5047963!4d-0.1002156">25 Lavington St, Second floor | SE1 0NZ London</a></p><p>Whether you're building an <a href="https://www.cloudflare.com/ecommerce/">e-commerce app</a> or a new mobile game, chances are you'll be needing some network functionality at some point when building a mobile app. Network performance can vary dramatically between carriers, networks, and APIs, but far too often mobile apps are tested inconsistent conditions with the same decent network performance. Fortunately we can iterate on our apps by collecting real-life performance measurements from your users; however, unfortunately existing mobile app analytics platforms only provide visibility into in-app performance but have no knowledge about outgoing network call.</p><p>This talk will cover how you can easily collect vital performance data from your users at no cost and then use this data to improve your apps' reliability and experience, discussing the tips and tricks needed to <a href="https://www.cloudflare.com/solutions/ecommerce/optimization/">boost app performance</a>.</p><p><b>Speaker</b>: Junade Ali</p><p><a href="https://mobilearchitectureandperformance.eventbrite.com">View Event Details &amp; Register Here »</a></p>
    <div>
      <h3>More About the Speakers</h3>
      <a href="#more-about-the-speakers">
        
      </a>
    </div>
    <p><a href="https://twitter.com/0xRLG">Ross Guarino</a> is a Systems Engineer at Cloudflare in charge of the technical direction of the internal platform. He’s determined to improve the lives of developers building and maintaining everything from a simple function to complex globally distributed systems.</p><p><a href="https://twitter.com/terinjokes">Terin Stock</a> is a long-time engineer at Cloudflare, currently working on building an internal Kubernetes cluster. By night, he hacks on building new hardware projects. Terin is also a member of <a href="https://gulpjs.com/">gulp.js</a> core team and the author of the <a href="https://github.com/terinjokes/StickersStandard">Sticker Standard</a>.</p><p><a href="https://twitter.com/IcyApril">Junade Ali</a> is a software engineer who is specialised in computer security and software architecture. Currently, Junade works at Cloudflare as a polymath, and helps make the Internet more secure and faster; prior to this, he was a technical lead at some of the UK's leading digital agencies before moving into architecting software for mission-critical road-safety systems.</p><p>We'll hope to meet you soon!</p> ]]></content:encoded>
            <category><![CDATA[Events]]></category>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Kubernetes]]></category>
            <category><![CDATA[Go]]></category>
            <category><![CDATA[Mobile SDK]]></category>
            <category><![CDATA[Cloudflare Meetups]]></category>
            <category><![CDATA[MeetUp]]></category>
            <guid isPermaLink="false">4KmQqQHsaL4hmb1fHLo2VX</guid>
            <dc:creator>Andrew Fitch</dc:creator>
        </item>
        <item>
            <title><![CDATA[An overview of TLS 1.3 and Q&A]]></title>
            <link>https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/</link>
            <pubDate>Fri, 23 Sep 2016 16:01:18 GMT</pubDate>
            <description><![CDATA[ The CloudFlare London office hosts weekly internal Tech Talks (with free lunch picked by the speaker). My recent one was an explanation of the latest version of TLS, 1.3, how it works and why it's faster and safer. ]]></description>
            <content:encoded><![CDATA[ <p>The CloudFlare London office hosts weekly internal Tech Talks (with free lunch picked by the speaker). My recent one was an explanation of the latest version of <a href="https://www.cloudflare.com/ssl/">TLS, 1.3</a>, how it works and why it's faster and safer.</p><p>You can <a href="https://vimeo.com/177333631">watch the complete talk</a> below or just read my summarized transcript.</p><p><i>Update: you might want to watch my more recent and extended </i><a href="/tls-1-3-explained-by-the-cloudflare-crypto-team-at-33c3/"><i>33c3 talk</i></a><i> instead.</i></p><p><b>The Q&amp;A session is open!</b> Send us your questions about TLS 1.3 at <a>tls13@cloudflare.com</a> or leave them in the Disqus comments below and I'll answer them in an upcoming blog post.</p><p>.post-content iframe { margin: 0; }</p>
    <div>
      <h4>Summarized transcript</h4>
      <a href="#summarized-transcript">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Bq6YFjnvg3SB2kKRjfNsr/4be9ff4c51df8eb9b9dbd9eb6f499f13/TLS-1.3.003.png" />
            
            </figure><p>To understand why TLS 1.3 is awesome, we need to take a step back and look at how TLS 1.2 works. In particular we will look at modern TLS 1.2, the kind that a recent browser would use when connecting to the CloudFlare edge.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8ohjI9yrzu2eEm0U6iOu9/654853ffc8128cef9c4f17ac6dfb28cb/TLS-1.3.004.png" />
            
            </figure><p>The client starts by sending a message called the <code>ClientHello</code> that essentially says "hey, I want to speak TLS 1.2, with one of these cipher suites".</p><p>The server receives that and answers with a <code>ServerHello</code> that says "sure, let's speak TLS 1.2, and I pick <i>this</i> cipher suite".</p><p>Along with that the server sends its <i>key share</i>. The specifics of this key share change based on what cipher suite was selected. When using ECDHE, key shares are mixed with the <a href="/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/">Elliptic Curve Diffie Hellman</a> algorithm.</p><p>The important part to understand is that for the client and server to agree on a cryptographic key, they need to receive each other's portion, or share.</p><p>Finally, the server sends the website certificate (signed by the CA) and a signature on portions of <code>ClientHello</code> and <code>ServerHello</code>, including the key share, so that the client knows that those are authentic.</p><p>The client receives all that, and <i>then</i> generates its own key share, mixes it with the server key share, and thus generates the encryption keys for the session.</p><p>Finally, the client sends the server its key share, enables encryption and sends a <code>Finished</code> message (which is a hash of a transcript of what happened so far). The server does the same: it mixes the key shares to get the key and sends its own <code>Finished</code> message.</p><p>At that point we are done, and we can finally send useful data encrypted on the connection.</p><p>Notice that this takes two round-trips between the client and the server before the HTTP request can be transferred. And <a href="https://www.cloudflare.com/learning/cdn/glossary/round-trip-time-rtt/">round-trips on the Internet</a> can be slow.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3d2jAu0W5lMg2PQm8zrdtz/221af7783bc17706e2d3a2587ecf1312/TLS-1.3.006.png" />
            
            </figure><p>Enter TLS 1.3. While TLS 1.0, 1.1 and 1.2 are not that different, 1.3 is a big jump.</p><p>Most importantly, establishing a TLS 1.3 connection takes <b>one less round-trip</b>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hr3R0qLxh2XIklK8lNJdh/8b4cbbea91b113ba182294c1bef64695/TLS-1.3.007.png" />
            
            </figure><p>In TLS 1.3 a client starts by sending not only the <code>ClientHello</code> and the list of supported ciphers, but it also makes a guess as to which key agreement algorithm the server will choose, and <b>sends a key share for that</b>.</p><p>(<i>Note: the video calls the key agreement algorithm "cipher suite". In the meantime the specification has been changed to disjoin supported cipher suites like AES-GCM-SHA256 and supported key agreements like ECDHE P-256.</i>)</p><p>And that saves us a round trip, because as soon as the server selects the cipher suite and key agreement algorithm, it's ready to generate the key, as it already has the client key share. So it can switch to encrypted packets one whole round-trip in advance.</p><p>So the server sends the <code>ServerHello</code>, its key share, the certificate (now encrypted, since it has a key!), and already the <code>Finished</code> message.</p><p>The client receives all that, generates the keys using the key share, checks the certificate and <code>Finished</code>, and it's immediately ready to send the HTTP request, after only one round-trip. Which can be hundreds of milliseconds.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Uvkj3F2TDTPupYTuJOCdE/03d16a27196bb78a5cafebecf12e9b34/TLS-1.3.009.png" />
            
            </figure><p>One existing way to speed up TLS connections is called resumption. It's what happens when the client has connected to that server before, and uses what they remember from the last time to cut short the handshake.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Kb8uoWeYCfHtOsR4jKTig/4e5ea4f6cdd0fd2498db35e1c51ecdac/TLS-1.3.010.png" />
            
            </figure><p>How this worked in TLS 1.2 is that servers would send the client either a <a href="/tls-session-resumption-full-speed-and-secure/">Session ID or a Session Ticket</a>. The former is just a reference number that the server can trace back to a session, while the latter is an encrypted serialized session which allows the server not to keep state.</p><p>The next time the client would connect, it would send the Session ID or Ticket in the <code>ClientHello</code>, and the server would go like "hey, I know you, we have agreed on a key already", skip the whole key shares dance, and jump straight to <code>Finished</code>, saving a round-trip.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3T989Gfy9u4y0b5WlC2YyJ/926f71e94f528ae25d275bad8399e0fd/TLS-1.3.011.png" />
            
            </figure><p>So, we have a way to do 1-RTT connections in 1.2 if the client has connected before, which is very common. Then what does 1.3 gain us? When resumption is available, <b>1.3 allows us to do 0-RTT connections</b>, again saving one round trip and ending up with no round trip at all.</p><p>If you have connected to a 1.3 server before you can immediately start sending encrypted data, like an HTTP request, without any round-trip at all, making TLS essentially <b>zero overhead</b>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4x3MsWrJJB60co3tWBTcfD/cc3976fa1688d6bcb39f4fdae04c06ae/TLS-1.3.012.png" />
            
            </figure><p>When a 1.3 client connects to a 1.3 server they agree on a resumption key (or PSK, pre-shared key), and the server gives the client a Session Ticket that will help it remember it. The Ticket can be an encrypted copy of the PSK—to avoid state—or a reference number.</p><p>The next time the client connects, it sends the Session Ticket in the <code>ClientHello</code> and then immediately, without waiting for any round trip, sends the HTTP request encrypted with the PSK. The server figures out the PSK from the Session Ticket and uses that to decrypt the 0-RTT data.</p><p>The client also sends a key share, so that client and server can switch to a new fresh key for the actual HTTP response and the rest of the connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3bxXx5kuJvmtOYmxa1JNcy/1cdbfb3ee46d508d6eabcafd44e043b7/TLS-1.3.013.png" />
            
            </figure><p>0-RTT comes with a couple of caveats.</p><p>Since the PSK is not agreed upon with a fresh round of Diffie Hellman, it does not provide Forward Secrecy against a compromise of the Session Ticket key. That is, if in a year an attacker somehow obtains the Session Ticket key, it can decrypt the Session Ticket, obtain the PSK and decrypt the 0-RTT data the client sent (but not the rest of the connection).</p><p>This is why it's important to rotate often and not persist Session Ticket keys (CloudFlare rotates these keys hourly).</p><p>TLS 1.2 has never provided any Forward Secrecy against a compromise of the Session Ticket key at all, so even with 0-RTT 1.3 is an improvement upon 1.2.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79qHz08hcnfJAk8ogogTfH/1822898b0fc6f0262a2b9c7ae9df0eba/TLS-1.3.014.png" />
            
            </figure><p>More problematic are replay attacks.</p><p>Since with Session Tickets servers are stateless, they have no way to know if a packet of 0-RTT data was already sent before.</p><p>Imagine that the 0-RTT data a client sent is not an HTTP GET ("hey, send me this page") but instead an HTTP POST executing a transaction like "hey, send Filippo 50$". If I'm in the middle I can intercept that <code>ClientHello</code>+0-RTT packet, and then re-send it to the server 100 times. No need to know any key. I now have 5000$.</p><p>Every time the server will see a Session Ticket, unwrap it to find the PSK, use the PSK to decrypt the 0-RTT data and find the HTTP POST inside, with no way to know something is fishy.</p><p>The solution is that servers must not execute operations that are not <i>idempotent</i> received in 0-RTT data. Instead in those cases they should force the client to perform a full 1-RTT handshake. That protects from replay since each <code>ClientHello</code> and <code>ServerHello</code> come with a Random value and connections have sequence numbers, so there's no way to replay recorded traffic verbatim.</p><p>Thankfully, most times the first request a client sends is not a state-changing transaction, but something idempotent like a GET.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2oeeDc9HROItV41GXxqggs/12f35c007af3f031ab681968ff807dad/TLS-1.3.016.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4u8bypRISwPgvFeXhAZfuU/bbcdaf44a4b89aa05390b5e85a4a1a5a/TLS-1.3.017.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/45Ejce1oMIH6MiWRDtalo3/537497589b0bf99b28ec8b8488c8279e/TLS-1.3.018.png" />
            
            </figure><p>TLS 1.3 is not only good for cutting a round-trip. It's also better, more robust crypto all around.</p><p>Most importantly, many things were removed. 1.3 marked a shift in the design approach: it used to be the case that the TLS committee would accept any proposal that made sense, and implementations like OpenSSL would add support for it. Think for example Heartbeats, the rarely used feature that cause <a href="/the-results-of-the-cloudflare-challenge/">Heartbleed</a>.</p><p>In 1.3, everything was scrutinized for being really necessary and secure, and scrapped otherwise. A lot of things are gone:</p><ul><li><p>the old <a href="/keyless-ssl-the-nitty-gritty-technical-details/">static RSA handshake without Diffie Hellman</a>, which doesn't offer Forward Secrecy</p></li><li><p>the <a href="/padding-oracles-and-the-decline-of-cbc-mode-ciphersuites/">CBC MAC-then-Encrypt modes</a>, which were responsible for Vaudenay, Lucky13, POODLE, <a href="/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/">LuckyMinus20</a>... replaced by <a href="/go-crypto-bridging-the-performance-gap/">AEADs</a></p></li><li><p>weak primitives like <a href="/killing-rc4-the-long-goodbye/">RC4</a>, SHA1, MD5</p></li><li><p>compression</p></li><li><p>renegotiation</p></li><li><p>custom FFDHE groups</p></li><li><p>RSA PKCS#1v1.5</p></li><li><p>explicit nonces</p></li></ul><p>We'll go over these in more detail in future blog posts.</p><p>Some of these were not necessarily broken by design, but they were dangerous, hard to implement correctly and easy to get wrong. The new excellent trend of TLS 1.3 and cryptography in general is to make mistakes less likely at the design stage, since humans are not perfect.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56pPwUsCFfumH2fYMeL8FN/35aa6d17ae21394702ce0122e6bdfb5c/TLS-1.3.019.png" />
            
            </figure><p>A new version of a protocol obviously can't dictate how older implementations behave and 1.3 can't improve the security of 1.2 systems. So how do you make sure that if tomorrow TLS 1.2 is completely broken, a client and server that both support 1.2 and 1.3 can't be tricked into using 1.2 by a proxy?</p><p>A MitM could change the <code>ClientHello</code> to say "I want to talk at most TLS 1.2", and then use whichever attack it discovered to make the 1.2 connection succeed even if it tampered with a piece of the handshake.</p><p>1.3 has a clever solution to this: if a 1.3 server has to use 1.2 because it looks like the client doesn't support 1.3, it will "hide a message" in the Server Random value. A real 1.2 will completely ignore it, but a client that supports 1.3 would know to look for it, and would discover that it's being tricked into downgrading to 1.2.</p><p>The Server Random is signed with the certificate in 1.2, so it's impossible to fake even if pieces of 1.2 are broken. This is very important because it will allow us to keep supporting 1.2 in the future even if it's found to be weaker, unlike we had to do with <a href="/sslv3-support-disabled-by-default-due-to-vulnerability/">SSLv3 and POODLE</a>. With 1.3 we will know for sure that clients that can do any better are not being put at risk, allowing us to make sure <a href="/ensuring-that-the-web-is-for-everyone/">the Internet is for Everyone</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Q7LYbjQBvS2WP0PUvkmdk/6fb34646631b248c2d3750b4b2c198c5/TLS-1.3.020.png" />
            
            </figure><p>So this is TLS 1.3. Meant to be a solid, safe, robust, simple, essential foundation for Internet encryption for the years to come. And it's faster, so that no one will have performance reasons not to implement it.</p><p>TLS 1.3 is still a draft and it might change before being finalized, but at CloudFlare we are actively developing a 1.3 stack compatible with current experimental browsers, so <a href="/introducing-tls-1-3/">everyone can get it today</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3xQPlSJ4uBQaS60OpFogxD/7967fae7cd0f8766658a02c0534b95c5/TLS-1.3.023.png" />
            
            </figure><p>The TLS 1.3 spec is <a href="https://github.com/tlswg/tls13-spec">on GitHub</a>, so anyone can contribute. Just while making the slides for this presentation I noticed I was having a hard time understanding a system because a diagram was missing some details, so I submitted a PR to fix it. How easy is that!?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Ecgvi8YtzFKhcoQjoPLzU/cb6a281fbd8246c453bc145ca36a7b56/TLS-1.3.026.png" />
            
            </figure><p>Like any talk, at the end there's the Q&amp;A. Send your questions to <a>tls13@cloudflare.com</a> or leave them in the Disqus comments below and I'll answer them in an upcoming blog post!</p> ]]></content:encoded>
            <category><![CDATA[TLS]]></category>
            <category><![CDATA[TLS 1.3]]></category>
            <category><![CDATA[Events]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cryptography]]></category>
            <guid isPermaLink="false">6CKPHn0MEFqMdmC3vvaDvo</guid>
            <dc:creator>Filippo Valsorda</dc:creator>
        </item>
        <item>
            <title><![CDATA[Manchester, UK: CloudFlare's 63rd data center]]></title>
            <link>https://blog.cloudflare.com/manchester-uk-cloudflares-63rd-data-center/</link>
            <pubDate>Tue, 06 Oct 2015 17:34:17 GMT</pubDate>
            <description><![CDATA[ Our new point of presence in Manchester, UK brings the CloudFlare network to 63 points of presence across 33 countries. In other words, the sun never sets across the CloudFlare network.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p><i>Photo source: </i><a href="https://www.flickr.com/photos/ambroo/"><i>Andy B</i></a><i>; images used under creative commons license.</i></p><p>Our new point of presence in Manchester, UK brings the <a href="https://www.cloudflare.com/network-map">CloudFlare network</a> to 63 points of presence across 33 countries. In other words, the sun never sets across the CloudFlare network. Our data center in Manchester also admits the United Kingdom into a small club of countries with more than one CloudFlare data center, including the US, China, Japan, Australia, Germany, and France.</p><p>As of yesterday, traffic from the majority of Internet users in Northern England is now mere milliseconds away. More importantly, our Manchester and <a href="/groovy-baby-cloudflares-london-data-center-no/">London</a> data centers allow for redundancy and content localization within the UK for all of our customers.</p>
    <div>
      <h3>In homage</h3>
      <a href="#in-homage">
        
      </a>
    </div>
    <p>The city of Manchester has made more than its fair share of technical contributions over the years. It is the city where Rolls met Royce (their first car drove off the line of their Manchester factory in 1904), and is also home to the first modern computer. The computer, nicknamed "Baby", was built at The University of Manchester using technology developed for WWII communications equipment, and ran the world's first stored program at 11am on Monday 21st June, 1948.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/S0CiTzzzGhp4PRI5MRqQ4/5d41f609be630d145a6b87284203750f/SSEM.jpg" />
            
            </figure><p>It is fitting, then, that in the last three years there has been a concerted effort to turn Manchester into a second hub for Internet traffic outside of London. We are proud to join this effort, and announce that we are the latest members of <a href="https://www.linx.net/lans/man/service/publicpeering/index.html">IX Manchester</a>, a rapidly growing peering exchange serving the North of England. IX Manchester marks the 11th peering exchange we've turned up in just the past 3 months (to learn more about peering read our post <a href="/cloudflare-joins-three-more-peering-exchanges-in-australia/">here</a>).</p>
    <div>
      <h3>A better web for everyone</h3>
      <a href="#a-better-web-for-everyone">
        
      </a>
    </div>
    <p>What does this mean for you? If you are a CloudFlare customer, it means that your web site is faster (your content is served closer to your visitors), safer (another facility to mitigate attacks), and always online (yet another redundant data center to serve your traffic). Best of all, you don't have to do anything! The benefits are free, automatic, and constantly growing. If you'd like to help us build a better web for everyone, consider signing up <a href="https://www.cloudflare.com/a/sign-up">here</a>.</p><p><i>— The CloudFlare team</i></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Network]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Data Center]]></category>
            <category><![CDATA[Europe]]></category>
            <guid isPermaLink="false">79qMBgbpIhVdZrhEzSWT11</guid>
            <dc:creator>Joshua Motta</dc:creator>
        </item>
        <item>
            <title><![CDATA[CloudFlare hiring Go programmers in London and San Francisco]]></title>
            <link>https://blog.cloudflare.com/cloudflare-needs-go-programmers-in-london-and-san-francisco/</link>
            <pubDate>Tue, 19 Aug 2014 04:32:00 GMT</pubDate>
            <description><![CDATA[ Are you familiar with the Go programming language and looking for a job in San Francisco or London? Then think about applying to CloudFlare. We're looking for people with experience writing Go in both locations. ]]></description>
            <content:encoded><![CDATA[ <p>Are you familiar with the <a href="http://golang.org/">Go</a> programming language and looking for a job in San Francisco or London? Then think about <a href="https://www.cloudflare.com/join-our-team">applying</a> to CloudFlare. We're looking for people with experience writing Go in both locations.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4W517sORRfjpcKf7B3ikEH/5e5af3c7efb1aef0f0c3a74ac1415ed0/6779040884_3f7bfeaf89_z_1.jpg" />
            
            </figure><p>CC BY-SA 2.0 by <a href="https://www.flickr.com/photos/yukop/">Yuko Honda</a> (cropped, resized)</p><p>CloudFlare uses Go extensively to build our service and we need to people to build and maintain those systems. We've written a complete <a href="/what-weve-been-doing-with-go/">DNS server</a> in Go, our <a href="/go-at-cloudflare">Railgun</a> service is all Go and we're moving more and more systems to Go programs.</p><p>We've recently written about our open source <a href="/red-october-cloudflares-open-source-implementation-of-the-two-man-rule/">Red October</a> Go project for securing secrets, and open-sourced our <a href="/introducing-cfssl/">CFSSL</a> Go-based PKI package. Go is now making its way into our data pipeline and be used for processing huge amounts of data.</p><p>We even have a <a href="http://cloudflare.github.io/#cat-Go">Go-specific section</a> on our GitHub.</p><p>If you're interested in working in Go on a high-performance global network like CloudFlare, send us an <a>email</a>.</p><p>Not into Go? We're hiring for <a href="https://www.cloudflare.com/join-our-team">all sorts</a> of other positions and technologies.</p> ]]></content:encoded>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Life at Cloudflare]]></category>
            <category><![CDATA[Go]]></category>
            <category><![CDATA[Programming]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[Railgun]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Reliability]]></category>
            <guid isPermaLink="false">7FVhXIqx7osQOAw1Rup2yQ</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
        <item>
            <title><![CDATA[New .uk domains now supported]]></title>
            <link>https://blog.cloudflare.com/new-uk-domains-now-supported/</link>
            <pubDate>Fri, 13 Jun 2014 05:40:00 GMT</pubDate>
            <description><![CDATA[ On the 10th of June, the UK domain registry Nominet made available second-level domain namespace to the public, allowing anyone to register a domain ending with simply .uk ]]></description>
            <content:encoded><![CDATA[ <p>On the 10th of June, the UK domain registry Nominet <a href="http://www.agreatplacetobe.uk/our-domains/uk/#intro">made available</a> second-level domain namespace to the public, allowing anyone to <a href="https://www.cloudflare.com/products/registrar/">register a domain</a> ending with simply <code>.uk</code> This is something the members of the UK CloudFlare team have been looking forward to since the initial announcement at the beginning of this year, and as such are happy to announce that CloudFlare now has full support for .uk domains.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2KPBbTf57qUzOsAi4VXz4n/ea24b88110bbfed394bd09a747613c03/uk.jpg" />
            
            </figure><p>Previously, only third-level domains have been available to the public, in the form <code>.co.uk</code> and <code>.org.uk</code> This is in contrast to other countries such as France and Germany who have always been able to register second-level <code>.fr</code> and <code>.de</code> domains.</p><p>According to Nominet, within the first 24 hours of .uk domains becoming available, 50,000 have been registered. Owners of a <code>.co.uk</code> address are given the option to also register the shorter <code>.uk</code> version of their domain for the next 5 years, allowing businesses and personal users to register the shorter version without fear that the domain would be taken by someone else. The third-level UK domains can be used alongside <code>.uk</code>, and will continue to work as before.</p><p>As of now, CloudFlare users can set up <code>.uk</code> domain names with CloudFlare in the usual way through their accounts, from within the <a href="https://www.cloudflare.com/my-websites">My websites</a> section.</p> ]]></content:encoded>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[Reliability]]></category>
            <guid isPermaLink="false">rnw0Hql57t13uCF3r5IOd</guid>
            <dc:creator>Sam Howson</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Day in the Life of a Technical Support Engineer at CloudFlare - Marty Strong, London]]></title>
            <link>https://blog.cloudflare.com/a-day-in-the-life-of-a-technical-support-engineer-at-cloudflare-marty-strong-london/</link>
            <pubDate>Thu, 16 Jan 2014 12:00:00 GMT</pubDate>
            <description><![CDATA[ As a Technical Support Engineer I get to work with many different members of the CloudFlare family and with customers from all around the world. Each day is very different to the next, and of course, some days stand out more than others. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog post is the first in a series from the CloudFlare support team. Over the next few months, engineers from our support team will write posts about working with customers and with other members of the CloudFlare team.</i></p><p>As a Technical Support Engineer I get to work with many different members of the CloudFlare family and with customers from all around the world. Each day is very different to the next, and of course, some days stand out more than others.</p><p>Recently, I spent a bit of time working with a customer on an issue that was causing severe performance degradation on their website. The initial inquiry described a website that was yet to be publicised so it wasn’t seeing very much traffic. However, pages on the site were taking almost a minute to load. Throughout the day I worked with both the customer and other members of the support team to eliminate all the possible causes of the performance degradation. The main areas we looked at were:</p><ul><li><p>Did the customer’s server run out of resources?</p></li><li><p>Was there anything preventing assets from being cached?</p></li><li><p>Had the ISP of the customer caused traffic to be routed strangely?</p></li><li><p>Were there any parts of the site that were noticeably slower than others?</p></li><li><p>Did performance change when browsing the customer’s server directly?</p></li></ul><p>After eliminating each of those points, it was unclear to us what was causing the issue. At this point we decided to make some configuration changes within the customer’s CloudFlare account. The main thing we did was to set up a few <a href="/introducing-pagerules-fine-grained-feature-co">Page Rules</a> to force everything under a certain URL pattern to be cached. The motivation for doing this was to ensure the site was fast for visitors while we continued to work on the performance issue behind the scenes. Another feature enabled for this CloudFlare Business customer was <a href="https://www.cloudflare.com/railgun">Railgun</a>, to improve performance on any pages that we couldn’t set a Cache Everything page rule on.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5HW3LrJHPsbJ2pXxisRo1A/91e92b12b4740c907f1efc3010b217f2/illustration-support-blog.png" />
            
            </figure><p>After a careful examination of exactly what was running on the customer’s server we managed to find what was causing the issues — it was an installation of a caching programme on the origin that was taking up too much CPU, causing the web server to have to wait a long time before it could respond to any incoming requests. Upon disabling the programme the CPU load on the server dropped dramatically, this hugely improved performance.</p><p>By the end of the day the issue was solved and the customer had some extra CloudFlare features enabled to fully optimise the performance of their website — a great day working with a customer.</p><hr /><p><b><i>About Marty</i></b></p><p><i>Though he’d love to be at a Formula 1 race track any day of the week, we have convinced Marty to hang out in our UK office and help our customers. Previously a developer, Marty came to CloudFlare in the most awesome of ways: he was a customer. He’s now excited to be behind the scenes making the CloudFlare experience better for everyone. On his off days, he’ll be traveling between Formula 1 race tracks throughout the world.</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3AZL1CgHWakcTdedwUJeWT/143197e69ea09f10645b4f26fdaf3273/2014-01-15_14.03.20.jpg" />
            
            </figure><p> The London Support Team (Marty is on the far left)</p><p>Do you have the enthusiasm to work with a technically motivated team? Do you enjoy working with a diverse global customer base? Are you somebody who uses their intuition to solve problems? CloudFlare is hiring Technical Support Engineers in <a href="https://www.cloudflare.com/join-our-team">London and San Francisco</a>.</p> ]]></content:encoded>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Customers]]></category>
            <category><![CDATA[Support]]></category>
            <category><![CDATA[Page Rules]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <guid isPermaLink="false">7tZhepYTRVBWQzXZgqsFJQ</guid>
            <dc:creator>Marty Strong</dc:creator>
        </item>
        <item>
            <title><![CDATA[Go London User Group]]></title>
            <link>https://blog.cloudflare.com/go-london-user-group/</link>
            <pubDate>Thu, 07 Mar 2013 16:45:00 GMT</pubDate>
            <description><![CDATA[ We've mentioned before that we're using Go internally for projects such as Railgun (and a new DNS server and SSL infrastructure amongst other things).  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Photo by <a href="https://unsplash.com/@sonance?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Viktor Forgacs</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></p><p>We've mentioned before that we're using <a href="/go-at-cloudflare">Go</a> internally for projects such as Railgun (and a new DNS server and SSL infrastructure amongst other things). And we've mentioned that we are <a href="/cloudflare-london-were-hiring">opening an office in London</a>.</p><p>Now we're putting those two things together by sponsoring and helping to organize a new <a href="http://www.meetup.com/Go-London-User-Group/">Go London User Group</a>. The first meeting is on <a href="http://www.meetup.com/Go-London-User-Group/events/108066652/">March 27</a> at Makers Academy. CloudFlare will be providing food and drink. Speakers will be announced closer to the date. Be sure to sign up as we have limited space (and if it's full please put yourself on the waiting list so we can gauge how large the interest is).</p><p>Feel free to suggest speakers and talks of interest in the comments.</p><p>We're also actively <a href="/do-you-want-to-work-with-go">hiring Go</a> (and other) programmers in London and San Francisco.</p> ]]></content:encoded>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Go]]></category>
            <category><![CDATA[Events]]></category>
            <guid isPermaLink="false">VrhaFupA2y3RV5Jiz4xO5</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
        <item>
            <title><![CDATA[CloudFlare London: We're hiring]]></title>
            <link>https://blog.cloudflare.com/cloudflare-london-were-hiring/</link>
            <pubDate>Thu, 28 Feb 2013 17:47:00 GMT</pubDate>
            <description><![CDATA[ When we talk about international expansion we're usually talking about adding data centers around the world. The last one we added was in Seoul, South Korea. ]]></description>
            <content:encoded><![CDATA[ <p>When we talk about international expansion we're usually talking about adding data centers around the world. The last one we added was in <a href="/seoul-korea-cloudflares-23rd-data-center">Seoul, South Korea</a>. And we've had a data center in London for a very long time. But now we're adding something different: people.</p><p>As CloudFlare's customer base and network have grown our need for 24 hour operations and technical support has grown. At the moment keeping things running means keeping people awake in California. With data centers in <a href="http://www.cloudflare.com/network-map">23 locations</a> around the world and customers in every country CloudFlare staff have to keep things humming day and night.</p><p>And so CloudFlare will expand in the next couple of months with an office in London.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/bTggdZuVe1oELsq2li9bA/4f5677248cedbf2af6b06d89df403aef/_65027163_65027162.jpeg.scaled500.jpg" />
            
            </figure><p>We believe that London will make an ideal base for operations and technical support to complement our San Francisco office, and we can dip into the rich London talent pool to find people.</p><p>We keep our <a href="http://www.cloudflare.com/join-our-team">Join Our Team</a> page updated with positions on in London. These include <a href="http://www.jobscore.com/jobs/cloudflare/technical-customer-support/cNW2NomN0r4QnGeJe4efaV?ref=rss&amp;sid=68">Technical Customer Support</a> and<a href="http://www.jobscore.com/jobs/cloudflare/technical-operations-engineer/bcCGgQkAmr4lnoeJe4bk1X?ref=rss&amp;sid=68">Technical Operations Engineer</a>.</p><p>Keep an eye out for new openings as we expand into London.</p> ]]></content:encoded>
            <category><![CDATA[Life at Cloudflare]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <guid isPermaLink="false">58ynO2FsAS2EMbSQdofRU4</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
        <item>
            <title><![CDATA[WordPress London Meetup January 2013]]></title>
            <link>https://blog.cloudflare.com/wordpress-london-meetup-january-2013/</link>
            <pubDate>Fri, 18 Jan 2013 09:23:00 GMT</pubDate>
            <description><![CDATA[ Last night I gave a short presentation about how to use CloudFlare with WordPress sites to about 60 people attending the WordPress London Meetup. CloudFlare was happy to be sponsor of the event providing drinks, beers and lots and lots of pizza. The meetup was held at the Google Campus. ]]></description>
            <content:encoded><![CDATA[ <p>Last night I gave a short presentation about how to use CloudFlare with WordPress sites to about 60 people attending the <a href="http://www.meetup.com/London-WordPress/events/81910532/">WordPress London Meetup</a>. CloudFlare was happy to be sponsor of the event providing drinks, beers and lots and lots of pizza. The meetup was held at the <a href="http://www.campuslondon.com">Google Campus</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2bdYQMglHyT6gy21JAG1Q/9c2bd44b605eb215f9d3e5ce99a3cf0f/IMG_4277.JPG.scaled500.jpg" />
            
            </figure><p>There were two talks: I was preceded by designer <a href="http://laurakalbag.com/">Laura Kalbag</a> who talked about designing icons for WordPress sites. This is something that she made look incredibly easy using a tool called <a href="http://www.bohemiancoding.com/sketch/">Sketch</a>. I suspect that however good Sketch is, I'd end up drawing icons that looked awful!</p><p>My talk was about using WordPress and CloudFlare together. CloudFlare has a ton of features and I highlighted some that are of great interest to WordPress users including the <a href="http://wordpress.org/extend/plugins/cloudflare/">CloudFlare WordPress Plugin</a> and our integration with <a href="/w3-total-cache-w3tc-total-cloudflare-integrat">W3TC</a>.</p><p>The other features that people found most interesting were:</p><ol><li><p><a href="/always-online-v2">Always Online</a>: CloudFlare crawls the WordPress site and keeps a copy in a special cache. If the original site goes down CloudFlare serves up the most recent version from the crawler cache with a banner indicating that it is old content. This helps keep sites online when things go badly wrong.</p></li><li><p><a href="/an-all-new-and-improved-autominify">Auto-minify</a>: many WordPress sites have large amount of HTML, <a href="https://www.cloudflare.com/learning/performance/how-to-minify-css">CSS</a>, and JavaScript (especially if they use lots of plugins). Auto-minify helps shrink those resources so that sites are delivered faster to web browsers.</p></li><li><p><a href="/how-cloudflare-rocket-loader-redefines-the-modern-cdn/">Rocket Loader</a>: a tool that reorganizes the loading of resources such as CSS and JavaScript to that they are downloaded to web browsers quickly by bundling them.</p></li><li><p>A new, unannounced feature that I'm calling "Help, I've gone viral!" which allows any web site owner to instantly tell CloudFlare to start completely caching a URL (overriding any caching headers set by the site) to cope with load. With this if a URL goes viral and is overloading a WordPress site it's possible to just paste in its URL and ask CloudFlare to take the load of that page. We'll be writing more about that feature when it's released.</p></li></ol><p>And, of course, other CloudFlare features like <a href="/easiest-ssl-ever-now-included-automatically-w">Easy SSL</a>, <a href="/spdy-now-one-click-simple-for-any-website">SPDY</a>, and <a href="/introducing-cloudflares-automatic-ipv6-gatewa">IPv6</a> help everyone get the latest technology onto their site quickly.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Meetups]]></category>
            <category><![CDATA[WordPress]]></category>
            <category><![CDATA[Always Online]]></category>
            <category><![CDATA[Rocket Loader]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Community]]></category>
            <guid isPermaLink="false">5Pz6V8TXfn781DSko28qnf</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
        <item>
            <title><![CDATA[CloudFlare London Meetup]]></title>
            <link>https://blog.cloudflare.com/cloudflare-london-meetup/</link>
            <pubDate>Wed, 07 Nov 2012 11:06:00 GMT</pubDate>
            <description><![CDATA[ We're having a CloudFlare London Meetup tomorrow night (Thursday, November 8). Three CloudFlare employees will be there: Dane, John and Ian. Come have a beer and exchange ideas with the CloudFlare crew at the Old Coffee House on Beak St. ]]></description>
            <content:encoded><![CDATA[ <p>We're having a CloudFlare London Meetup tomorrow night (Thursday, November 8). Three CloudFlare employees will be there: Dane, John and Ian. Come have a beer and exchange ideas with the CloudFlare crew at the Old Coffee House on Beak St.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7exq6ic1zhJPywPbPlBIXI/4a23e0bc3e93e456be3404110b1f6163/4232756.jpg.scaled500.jpg" />
            
            </figure><p>You don't need to be a CloudFlare customer to take part, but <a href="http://www.meetup.com/CloudFlare-Meetups/events/90076182/">sign up here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[MeetUp]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <guid isPermaLink="false">660cmSL4aLNUrGhAqKZe1f</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
        <item>
            <title><![CDATA[Groovy Baby! CloudFlare's London Data Center Now Online]]></title>
            <link>https://blog.cloudflare.com/groovy-baby-cloudflares-london-data-center-no/</link>
            <pubDate>Thu, 10 Nov 2011 20:29:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare's London data center is now online. We're already doing more than 1 Gbps of traffic through LHR, most of which would previously have been routed to Amsterdam. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>As our <a href="https://www.cloudflare.com/network-map">network map will soon indicate</a>, CloudFlare's London (LHR) data center is now online. The team started routing traffic through it this beginning at 12:13 GMT. We're already doing more than 1Gbps of traffic through LHR, most of which would previously have been routed to Amsterdam.</p><p>London was one of the most requested regions for us to support from users and <a href="https://www.cloudflare.com/cloudflare-partners-self-serve-program-open-beta/">hosting partners</a> alike. We're up to 13 data centers worldwide, and London is our fourth European data center — joining Amsterdam (AMS), Paris (CDG), and Frankfurt (FRA) — continuing to expand CloudFlare's global reach. One of our core benefits is that CloudFlare allows a business to host anywhere and ensure their site is fast for all their customers worldwide. In an increasingly global world, that's important for companies large and small.</p><p>Our goal is to make the Internet fast and safe for everyone, regardless of where they're located. We will continue to expand our network and plan on rolling out another new data center in about three weeks to help service one of our fastest growing regions. Let the speculation begin!</p> ]]></content:encoded>
            <category><![CDATA[Europe]]></category>
            <category><![CDATA[Data Center]]></category>
            <category><![CDATA[United Kingdom]]></category>
            <category><![CDATA[Cloudflare Network]]></category>
            <guid isPermaLink="false">7D0Un6rHP1erCp3N1g6oOg</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
    </channel>
</rss>