Update privacy policy

This commit is contained in:
ItsDrike 2024-08-23 03:08:43 +02:00
parent d3b09abb5a
commit 26a1bf83ff
Signed by: ItsDrike
GPG key ID: FA2745890B7048C0

View file

@ -15,86 +15,17 @@ and you won't find any such data-collection platforms attached to my websites (t
which I do collect is purely 1st party data, there's no middle man peeking at the requests.
I should however point out that I do use Cloudflare, mainly because of the incredibly quick DNS that they provide for
free, and for their DDoS protections which I simply couldn't handle on my own with my small servers. I do however use
TLS/SSL on every publicly exposed service that I host, and the traffic from the website is end-to-end encrypted between
you, and my servers. This means that all Cloudflare would be able to see is the raw HTTP request data.
free, and for their DDoS protections which I simply couldn't handle on my own with my small home network. Note that
this means Cloudflare can read all HTTP/HTTPS traffic you send over. (TLS/SSL connection is only encrypted between you
and Cloudflare, not the whole way back to my servers. Sadly, Cloudflare doesn't offer this kind of end-to-end
encryption for non-enterprise customers. That said, the connection between my server and Cloudflare is also encrypted
during transit, so man-in-the-middle attacks are possible, unless that middle man is Cloudflare itself.)
As for the data I do collect on my own servers from the reverse proxy, all of it is being collected by an open-source
tool called [Prometheus](https://github.com/prometheus/prometheus), which is living on an isolated network not
connected to the internet and only having access to the services it monitors (most notably the reverse proxy) since
even though I do trust that this service isn't sending any of my data anywhere, even if it did try, this setup ensures
that completely and gives me some more peace of mind.
## Don't actually trust me on any of this
As with any privacy policy, I can say whatever I want in here, even if it's a complete lie and sadly providing some
proof that what I say isn't a lie is incredibly hard, and often just impossible. The simple fact is that no matter how
much I may be claiming that I don't collect more than I say and that I don't keep logs for longer than I claim to,
that's all it is, my claim, and it's up to you whether you will trust me with it, or not. (Hint: I wouldn't)
I will try and mention some things which are provable and I'll of course show you a way to prove these claims, but know
that even with all of those taken into consideration, there is still a lot of data I could be collecting and it's
basically impossible to prove that I'm not.
### Third party tracking platforms
One of these provable things is that there's no direct connection being made from your browser to any 3rd party data
collection platforms. You can (and always should) verify this claim, and you can do so from pretty much any modern
browser. With Firefox, this can be done by opening the developer tools (Ctrl+Shift+I), going to the Network tab and
checking all of the requests being made. From there, you should inspect all of the 3rd party URLs you see there and
make sure that none of these URLs are pointing to platforms for such data collection. This process can be pretty
tedious though, and I'd recommend using tools such as uBlock Origin's plugin in advanced mode, which can show you
each domain, and even give you an easy way to block requests being made to that domain.
However direct 3rd party data collection, while being the most common way website owners track their users, certainly
isn't the only way to do that. In fact, all of what a 3rd party website can track can also be done directly as a 1st
party, and even worse, some 3rd party services provide tools to do this collection and send the data back as a first
party, only for that 1st party server to then send it over to the data collection website without the user ever even
having a way to find out.
### First party JavaScript tracking
Luckily though, it is in fact possible to prove, that the 1st party tracking is at least not using any intrusive
JavaScript, that would be collecting information that the browser's JavaScript engine makes available, which is
a lot. To demonstrate just how much a data can be collected purely with JavaScript, you can check the
[Creep.js](https://github.com/abrahamjuliot/creepjs/) project, made to demonstrate this.
Proving that there's no such JavaScript code is technically very easy, all you need to do is go through every linked
JavaScript and every `<code>` tag on the webpage and check what is it doing. In practice though, this is actually very
hard, because websites often obfuscate their JavaScript code to hide what's it actually doing and turn it into
gibberish which the JavaScript interpreter can understand, but it's very hard to read and understand it by just reading
it.
For my case though, I'm only including jquery and bootstrap (for now) which provide functionalities for things like
the navigation bar, and you can check that the included files do match the released jquery and bootstrap JS scripts and
there's nothing more hiding in those. There may also be some more javascript on page-to-page basis to handle some
special functionalities, but for the most part, I tried to make as little use of JavaScript as I could, and this also
means that if you really want to be safe from me having any chance to collect such data, it should be mostly fine to
just turn javascript off completely and the website will be almost completely the same without too many lost
functionalities. That said though, I can't promise on every little thing actually working if you go this route, and
it's likely that you will loose some functionalities, but I will do my best to at least keep the site properly
formatted and avoid having it completely break (which is the case with many other websites if you don't allow JS).
### Tracking from raw HTTP Requests
After all that, there is still some information that I can be collecting directly from the HTTP requests you're making.
These requests often contain the so called "User-Agent" header, which is a string containing things like what browser
you use along with it's version, the version of the Operating System used, etc. Additionally, you're of course going to
be making those requests from a certain IP address. There are several more data-points in these requests, and you
should check what those are for yourself. You can check the
[Mozilla's docs](https://developer.mozilla.org/en-US/docs/Web/HTTP/Messages) for more info about all of the things
contained in an HTTP request and most browsers do allow you to inspect the requests you're making and see the sent data
along with all of the headers and other data within each request.
You should assume that I collect all of this data, because this time, there's indeed no way to verify that I'm not, and
you can be certain that I'm getting those data, because it's simply how HTTP communication over the internet works. To
easily demonstrate all of the data that a request like this holds, along with all additional data (mostly forward
headers) included by my reverse proxy and Cloudflare, you can visit <https://whoami.itsdrike.com>, which houses a
[Traefik's whoami service](https://github.com/traefik/whoami). This service is an easy way to print back all of the
captured information it got from the HTTP request that was made when connecting to the page. But of course, this is
purely for demonstration and you shouldn't trust me that I haven't edited this service to show less info than what I'm
actually getting, but again, you can see exactly what you're sending yourself by inspecting the requests in your
browser.
that it won't succeed and gives me some more peace of mind.
## What I collect
@ -124,7 +55,7 @@ least the time it will be blocked for, but more likely for much longer, due to s
something like that happens again, and perhaps issue a permanent ban on that IP.
If you haven't gone over these limits though, all logs containing IPs are being consistently rotated and should be gone
in at most a week, but likely much sooner as I have no intention of storing IP addresses for any longer than I need to.
in at most a week, I have no intention of storing IP addresses for any longer than I need to.
### Cloudflare data
@ -134,16 +65,90 @@ collecting and keeping on their servers for them, however you can check their
[privacy policy](https://www.cloudflare.com/privacypolicy/).
What I can comment on however is that data that's made available to me on the dashboard, and this includes:
- Number of unique visitiors over last 30 days
- Number of total requests over last 30 days
- Traffic by country/region over last 30 days
- DNS Queries by respones code over last 30 days
There is some more data that I can access, however that isn't connected with the user data so I didn't mention that
(things like how much data came from cloudflare cache and how much came from my server, etc.)
### That's it!
As I said, I take privacy very seriously, and I'm trying to do my best in protecting the privacy of others, if I can,
so while I can't afford to just stop collecting everything for the sake of security of my services, I refuse to collect
anything more.
so while I can't afford to just stop collecting everything for the sake of security of my services, I try not to
collect anything more.
## Don't actually trust me on any of this
As with any privacy policy, I can say whatever I want in here, even if it's a complete lie and sadly providing some
proof that what I say isn't a lie is incredibly hard, and often just impossible. The simple fact is that no matter how
much I may be claiming that I don't collect more than I say and that I don't keep logs for longer than I claim to,
that's all it is, my claim, and it's up to you whether you will trust me with it, or not. (Hint: I wouldn't)
That said, you can fact check some of my claims I mention here, for your own peace of mind. In this section, I will try
to provide you with some information on how to perform such a check on some of the claims I made. As usual though, do
your own research, fact-check that these methods really do prove what I'm saying that they do. Blindly following my
guide on how to fact-check that I'm not tracking you can be dangerous.
### Third party tracking platforms
One of the easiest things you can check is that there's no direct connection being made from your browser to any 3rd
party data collection platforms. You can (and always should) verify this claim very easily from pretty much any modern
browser. With Firefox, this can be done by opening the developer tools (Ctrl+Shift+I), going to the Network tab and
checking all of the requests being made. From there, you should inspect all of the 3rd party URLs you see there and
make sure that none of these URLs are pointing to platforms for such data collection. This process can be pretty
tedious though, and I'd recommend using tools such as uBlock Origin's plugin in advanced mode, which can show you each
domain a site tried to contact and even give you an easy way to block requests being made to that domain.
However direct 3rd party data collection, while being the most common way website owners track their users, certainly
isn't the only way to do that. After all, everything that a 3rd party website can track can also be done directly as a
1st party, and even worse, some 3rd party services provide tools to do this collection, only for that 1st party
back-end server to then send it right back to the data collection website without the user ever even having a way to
find out, since it wouldn't be your browser that will be making that connection now, it's the 1st party server with
your data.
### First party JavaScript
Luckily though, it is in fact possible to prove, that the 1st party tracking is at least not using any intrusive
JavaScript, that would be collecting information that the browser's JavaScript engine makes available, which is
a lot. To demonstrate just how much a data can be collected purely with JavaScript, you can check the
[Creep.js](https://github.com/abrahamjuliot/creepjs/) project.
Proving that there's no such JavaScript code is technically very easy, all you need to do is go through every linked
JavaScript and every `<script>` tag on the webpage and check what is it doing. In practice though, this is actually
very hard, because websites often obfuscate their JavaScript code to hide what's it actually doing and turn it into
gibberish which the JavaScript interpreter can understand, but it's very hard to read and understand it by just reading
it. (This isn't always done with malicious intent, it's usually just to make the code smaller to take up less bandwidth
and hence be quicker to load, that's why this is often called "minifying")
In my case, I'm only including jquery and bootstrap (for now) which provide functionalities for things like
the navigation bar, and some other interactive elements on the site. If you take a look at the included javascript
files, these should be the only ones you will find (unless I added something new and forgot to update this - very
possible). There may also be some more javascript on page-to-page basis to handle some special functionalities, but for
the most part, I tried to make as little use of JavaScript as I could.
Since my use of JavaScript on the site is pretty minimal, it should actually be quite fine to simply disable javascript
execution on your browser and still have a mostly good experience on the site, without loosing too many
functionalities. That said, javascript is important and you will definitely experience some issues, but I will try to
do my best to ensure that the site will at least remain properly formatted (unlike many other websites, which break
completely if you don't enable JS).
### Tracking from raw HTTP Requests
After all that, there is still some information that I can be collecting directly from the HTTP requests you're making.
These requests often contain the so called "User-Agent" header, which is a string containing things like what browser
you use along with it's version, the version of the Operating System used, etc. Additionally, you're of course going to
be making those requests from a certain IP address. There are several more data-points in these requests, and you
should check what those are for yourself. You can check the
[Mozilla's docs](https://developer.mozilla.org/en-US/docs/Web/HTTP/Messages) for more info about all of the things
contained in an HTTP request and most browsers do allow you to inspect the requests you're making and see the sent data
along with all of the headers and other data within each request.
You should assume that I collect all of this data, because this time, there's indeed no way to verify that I'm not, and
you can be certain that I'm getting those data, because it's simply how HTTP communication over the internet works. To
easily demonstrate all of the data that a request like this holds, along with all additional data (mostly forward
headers) included by my reverse proxy and Cloudflare, you can visit <https://whoami.itsdrike.xyz>, which houses a
[Traefik's whoami service](https://github.com/traefik/whoami). This service is an easy way to print back all of the
captured information it got from the HTTP request that was made when connecting to the page. But of course, this is
purely for demonstration and you shouldn't trust me that I haven't edited this service to show less info than what I'm
actually getting, but again, you can see exactly what you're sending yourself by inspecting the requests in your
browser.