# Cloudflare Is Harmful For people who don't know Cloudflare, it is a DDoS protection system which 1. Intercepts packets. 2. Decrypts them. 3. Analyzes them. 4. Deanonimyzes people by using the decrypted data. 5. Blocks TOR & VPN users. 6. Spams Captcha. 7. Serves webpages instead of the origin server itself as a CDN. as a middleman. And it controls more traffic than X, Amazon, Apple , Instagram, Bing, Wikipedia combined. For them, there is no difference between HTTP and HTTPS since they just can decrypt it. For more information: https://gitea.slowb.ro/dCF/deCloudflare/src/branch/master/readme/en.md So just don't use it. If you use TOR or VPN, it spams Captcha so you can automatically filter it. Just don't enable JS & cookies and don't fill the Captcha. If you can't use TOR, I recommend an addon to block it. I don't know about Chromium based addons though. https://addons.mozilla.org/en-US/firefox/addon/block-cloudflare It also blocks other Cloudflare type DDoS protection systems. Like DDoS-Guard which is literally a Russian Cloudflare. Though DDoS-Guard is at least not that dominant like Cloudflare and doesn't block TOR. But it's a middleman anyway. Don't forget that it decrypts your traffics. But if you REALLY have to visit a Cloudflared website, I recommend Morty proxy. You can bypass Cloudflare. Here is a nice instance: https://morty.ononoki.org Most webpages just work with the proxy. But you have to directly visit some webpages to open large files. A good thing is that file accesses are usually not Cloudflared. So just copy a download link and visit the link. Or better, yt-dlp it. However, for non-Cloudflare middlemen, it's just better to use TOR than to use the proxy. Since they don't block TOR anyway, using the proxy makes your fingerprint more unique. Note that nyaa.si doesn't work with the proxy. It is one of the major websites which use DDoS-Guard. So if you really want to visit the site, always use TOR and don't connect directly without TOR. But I recommend to ditch it and use Anime Tosho & ACG.RIP instead. Or best, use PaTracker on I2P.