Through Tor—and this is not the first time I’ve had this problem:
[...403 error...]
For the downloads problem, if the downloads do not require you to be logged in, accessing the BCT server by its direct IP address and/or a DNS record that resolves to the IP should make it accessible, provided BCT hasn't blacklisted all non-CF IPs.
For the website issue, how about 2FA, that could help the situation? As you know, anytime a CDN has your certificate, they can intercept your traffic if they choose.
You could also make a login URL that is not routed through CF. I don't know how much hacking of SMF it would take to implement that. Actually, cloudflare might have a way to direct certain URLs to directly point to the backend (BCT) servers. I haven't messed with them in a while, since before they started doing their shared SSL service, so I'm not positive about this.
On the other hand, this might not address the problem that putting in a CDN was designed to prevent. If the DDOS attacks were directed to the login URL it would then be vulnerable again.
Thanks for the suggestions, Ben.
Unfortunately, to the best of my knowledge, all of your suggestions would require action by theymos; there’s nothing there which I could do myself, as a workaround to obtain downloads right now. If there’s a legitimate public means to find a direct IP address, I’d appreciate being corrected here. But I rather suspect that theymos wishes to keep his real IP addresses unknown to DDoSers; and if I could find it, so could they.
Same here. Specifically as to Cloudflare, in addition to how they sometimes cavity-search you with Javascript while still failing to keep the site reliably available, see e.g.:
https://trac.torproject.org/24351
Cloudflare intercepts all traffic (and modifies at least HTTP response headers), as a matter of course!
My biggest complaint is that Cloudflare is a MITM attack against TLS on a substantial portion of the whole Internet. From the user end of things, I generally boycott Cloudflared sites insofar as practical. But I support the Bitcoin Forum, out of my respect for how theymos was honest with people when he was effectually forced behind Cloudflare by Internet arsonists:
I really don't believe in willingly putting a man-in-the-middle in your HTTPS like this, [...]
I especially dislike Cloudflare, which I'm almost certain is basically owned by US intelligence agencies. [...]
The Internet is seriously flawed if everyone needs to huddle behind these huge centralized anti-DDoS companies in order to survive...
The security implications are that Cloudflare can read everything you send to or receive from the server, including your cleartext password and any PMs you send or look at. They can't access the database arbitrarily, though: they can only see data that passes over the Internet.
To get a gauge on what independent, no-MITM DDoS protection can require for a(n extremely) high-profile target, I found Protonmail’s experience interesting:
https://protonmail.com/blog/ddos-protection-guide/
How about BitcoinTalk Pro accounts with monthly payments, private proxy without Cloudflare and captchas, bot access?
Though I would be concerned about the affordability of an ongoing subscription, an official .onion proxy would solve many problems. I may even offer to help with such a project, depending on what would be required of me. See my reply to ChipMixer upthread.
You earn coins by posting, and devs & sysadmins are paid with it?
Everything is creating tokens and ICOs... Even without value...
This place here is valuable!
Decentralise the Forums!
That would mad, the whole point of this forum is to have the public have a balanced or neutral stance in the cryptocurrency community.
Creating a token or ICO for BTCtalk is effectively the same as losing net neutrality in the CC industry.
And congratulations, Phash2k reinvented Steem. This sort of nonsense reminds me of one of the earliest posts to which I awarded merit. It spoke of how DHTs...
No, the problem will not be fixed by sprinkling some magical blockchain pixie dust on it.