How are the user credentials, keys and all the secrets are exposed? Proton has their nameservers on Cloudflare too. Are they exposing your secrets too?
Asymmetric cryptography protocols like Wireguard assume that private keys should remain private to keep the communication secure from eavesdropping and manipulation, not shared with big tech third parties like Cloudflare. Allowing a third party to intercept plaintext account credentials and Wireguard private keys is not the way for a VPN provider serious on privacy.
Such practices should disqualify a VPN provider from being considered a primary VPN for privacy-seeking users. It may be suitable for location spoofing when used over a more privacy-focused VPN if the latter does not provide desired exit server locations.
I wonder how other VPN providers manage to survive without Cloudflare.
Couldn’t have said it better myself.
But they are available as plaintext to Cloudflare in-transit. Oh, we just have to think of it as trusted.
Cloudflare can reuse plaintext username and password. Ties to device fingerprints also isn’t something that sounds desired from privacy-focused services.
Account username and password are neither hashed, nor short-lived. Wireguard configs containing private keys are also neither hashed, nor short-lived.
Thanks for countering those arguments, I think you’re absolutely right. I’m hoping yegor could shed some light on this in order to discuss this further, otherwise I’ll open a ticket at Windscribe.