itsdrike.com/content/privacy-policy.md

155 lines
11 KiB
Markdown
Raw Permalink Normal View History

2022-04-08 18:03:03 +00:00
---
title: Privacy Policy
hidden_from_navbar: true
---
As most services nowadays, it's hard to keep something running without **any** data collection at all, however I do
take privacy very seriously and I'm doing my best to minimize the amount of collected data, or even the data that's
available to me if I can and I try to only keep what's absolutely necessary, for as little time as necessary, while
still allowing me to properly maintain the service long-term, and catch any malicious activity.
## How I collect data
I'm completely against having any 3rd party service having access to any info about the users which visit my webpage
and you won't find any such data-collection platforms attached to my websites (things like google analytics). The data
which I do collect is purely 1st party data, there's no middle man peeking at the requests.
I should however point out that I do use Cloudflare, mainly because of the incredibly quick DNS that they provide for
2024-08-23 01:08:43 +00:00
free, and for their DDoS protections which I simply couldn't handle on my own with my small home network. Note that
this means Cloudflare can read all HTTP/HTTPS traffic you send over. (TLS/SSL connection is only encrypted between you
and Cloudflare, not the whole way back to my servers. Sadly, Cloudflare doesn't offer this kind of end-to-end
encryption for non-enterprise customers. That said, the connection between my server and Cloudflare is also encrypted
during transit, so man-in-the-middle attacks are possible, unless that middle man is Cloudflare itself.)
2022-04-08 18:03:03 +00:00
As for the data I do collect on my own servers from the reverse proxy, all of it is being collected by an open-source
tool called [Prometheus](https://github.com/prometheus/prometheus), which is living on an isolated network not
connected to the internet and only having access to the services it monitors (most notably the reverse proxy) since
even though I do trust that this service isn't sending any of my data anywhere, even if it did try, this setup ensures
2024-08-23 01:08:43 +00:00
that it won't succeed and gives me some more peace of mind.
2022-04-08 18:03:03 +00:00
## What I collect
Specifically, these are the all of the data I'm storing, along with explanation why, exact info on what is stored and
for how long it's stored.
### The raw amount of HTTP requests and their response codes
I'm logging the each HTTP request along with a timestamp at which it occurred. This information is necessary to know
how much traffic is going through my server so that I can know about higher demand and easily handle it before it gets
out of bounds. I'm also collecting the [HTTP response codes](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status)
which I'm using to ensure there aren't too many of 4XX errors, most notably things like 404s likely pointing to having
invalid links on my webpage which should be fixed.
This request information will be stored on my server for about 1 month. Specifically, this information will only
include the timestamp, HTTP response code, and a category (that this is an HTTP request). There are no other captured
information, such as an IP address, User-Agent or anything else that's stored along with this specific category.
### The connecting IP addresses
I'm also logging the IP addresses belonging to each request along with what internal service at what URL was accessed
over them. I'm doing this to immediately detect brute-force attacks and prevent people from attempting to crack
passwords on some of my other self-hosted services. If I do detect such activity, I proceed to ban all requests from
that IP for a certain amount of time (this time depends on many factors, and can vary from service to service). This
means that if you've made more than the maximum amount of requests over certain time, your IP will be stored for at
least the time it will be blocked for, but more likely for much longer, due to security concerns, so I can monitor if
something like that happens again, and perhaps issue a permanent ban on that IP.
If you haven't gone over these limits though, all logs containing IPs are being consistently rotated and should be gone
2024-08-23 01:08:43 +00:00
in at most a week, I have no intention of storing IP addresses for any longer than I need to.
2022-04-08 18:03:03 +00:00
### Cloudflare data
Along with data collected and stored on my servers directly, I should also point out that cloudflare is, by design,
also storing some user data from the requests going through it. I can't speak for how much data cloudflare is
2024-08-23 01:08:43 +00:00
collecting and keeping on their servers for them, however you can check their
2022-04-08 18:03:03 +00:00
[privacy policy](https://www.cloudflare.com/privacypolicy/).
What I can comment on however is that data that's made available to me on the dashboard, and this includes:
2024-08-23 01:08:43 +00:00
2022-04-08 18:03:03 +00:00
- Number of unique visitiors over last 30 days
- Number of total requests over last 30 days
- Traffic by country/region over last 30 days
- DNS Queries by respones code over last 30 days
### That's it!
As I said, I take privacy very seriously, and I'm trying to do my best in protecting the privacy of others, if I can,
2024-08-23 01:08:43 +00:00
so while I can't afford to just stop collecting everything for the sake of security of my services, I try not to
collect anything more.
## Don't actually trust me on any of this
As with any privacy policy, I can say whatever I want in here, even if it's a complete lie and sadly providing some
proof that what I say isn't a lie is incredibly hard, and often just impossible. The simple fact is that no matter how
much I may be claiming that I don't collect more than I say and that I don't keep logs for longer than I claim to,
that's all it is, my claim, and it's up to you whether you will trust me with it, or not. (Hint: I wouldn't)
That said, you can fact check some of my claims I mention here, for your own peace of mind. In this section, I will try
to provide you with some information on how to perform such a check on some of the claims I made. As usual though, do
your own research, fact-check that these methods really do prove what I'm saying that they do. Blindly following my
guide on how to fact-check that I'm not tracking you can be dangerous.
### Third party tracking platforms
One of the easiest things you can check is that there's no direct connection being made from your browser to any 3rd
party data collection platforms. You can (and always should) verify this claim very easily from pretty much any modern
browser. With Firefox, this can be done by opening the developer tools (Ctrl+Shift+I), going to the Network tab and
checking all of the requests being made. From there, you should inspect all of the 3rd party URLs you see there and
make sure that none of these URLs are pointing to platforms for such data collection. This process can be pretty
tedious though, and I'd recommend using tools such as uBlock Origin's plugin in advanced mode, which can show you each
domain a site tried to contact and even give you an easy way to block requests being made to that domain.
However direct 3rd party data collection, while being the most common way website owners track their users, certainly
isn't the only way to do that. After all, everything that a 3rd party website can track can also be done directly as a
1st party, and even worse, some 3rd party services provide tools to do this collection, only for that 1st party
back-end server to then send it right back to the data collection website without the user ever even having a way to
find out, since it wouldn't be your browser that will be making that connection now, it's the 1st party server with
your data.
### First party JavaScript
Luckily though, it is in fact possible to prove, that the 1st party tracking is at least not using any intrusive
JavaScript, that would be collecting information that the browser's JavaScript engine makes available, which is
a lot. To demonstrate just how much a data can be collected purely with JavaScript, you can check the
[Creep.js](https://github.com/abrahamjuliot/creepjs/) project.
Proving that there's no such JavaScript code is technically very easy, all you need to do is go through every linked
JavaScript and every `<script>` tag on the webpage and check what is it doing. In practice though, this is actually
very hard, because websites often obfuscate their JavaScript code to hide what's it actually doing and turn it into
gibberish which the JavaScript interpreter can understand, but it's very hard to read and understand it by just reading
it. (This isn't always done with malicious intent, it's usually just to make the code smaller to take up less bandwidth
and hence be quicker to load, that's why this is often called "minifying")
In my case, I'm only including jquery and bootstrap (for now) which provide functionalities for things like
the navigation bar, and some other interactive elements on the site. If you take a look at the included javascript
files, these should be the only ones you will find (unless I added something new and forgot to update this - very
possible). There may also be some more javascript on page-to-page basis to handle some special functionalities, but for
the most part, I tried to make as little use of JavaScript as I could.
Since my use of JavaScript on the site is pretty minimal, it should actually be quite fine to simply disable javascript
execution on your browser and still have a mostly good experience on the site, without loosing too many
functionalities. That said, javascript is important and you will definitely experience some issues, but I will try to
do my best to ensure that the site will at least remain properly formatted (unlike many other websites, which break
completely if you don't enable JS).
### Tracking from raw HTTP Requests
After all that, there is still some information that I can be collecting directly from the HTTP requests you're making.
These requests often contain the so called "User-Agent" header, which is a string containing things like what browser
you use along with it's version, the version of the Operating System used, etc. Additionally, you're of course going to
be making those requests from a certain IP address. There are several more data-points in these requests, and you
should check what those are for yourself. You can check the
[Mozilla's docs](https://developer.mozilla.org/en-US/docs/Web/HTTP/Messages) for more info about all of the things
contained in an HTTP request and most browsers do allow you to inspect the requests you're making and see the sent data
along with all of the headers and other data within each request.
You should assume that I collect all of this data, because this time, there's indeed no way to verify that I'm not, and
you can be certain that I'm getting those data, because it's simply how HTTP communication over the internet works. To
easily demonstrate all of the data that a request like this holds, along with all additional data (mostly forward
headers) included by my reverse proxy and Cloudflare, you can visit <https://whoami.itsdrike.xyz>, which houses a
[Traefik's whoami service](https://github.com/traefik/whoami). This service is an easy way to print back all of the
captured information it got from the HTTP request that was made when connecting to the page. But of course, this is
purely for demonstration and you shouldn't trust me that I haven't edited this service to show less info than what I'm
actually getting, but again, you can see exactly what you're sending yourself by inspecting the requests in your
browser.