A collection of evidence in support of simulation theory.

302 Redirect

Direct Digital Testimonial Surveillance Man-in-the-middle Manipulation Cloudflare The Case Worker
The Machine fixes a bug that a confidant brought to their attention.

Insecure connections


SIGNAL

On 3/17/2021, The Case Worker sent me the following screenshot:

https

ANALYSIS

Until this point, I hadn’t noticed that Cloudflare’s IPFS gateway did not automatically redirect HTTP connections to HTTPS. That was bad; it means that a malicious actor may be able to snoop on visitors, or even manipulate content!

It appeared as though HTTPS redirection could be enabled for end-to-end encrypted communications. However, this feature requires DNSSEC, which isn’t available for .fm domains.

Thus, I had no good option for redirecting this site to HTTPS.

ACTION

In response, I implemented passive redirection via some Javascript. This isn’t great, because the initial connection is still unencrypted, and thus, can be manipulated. But, it’s better than nothing.

You can see remnants of that code here.

ANALYSIS

Trying to implement this ended up being more trouble that it was worth. This type of redirection breaks IPFS sites. Thus, I disabled redirection entirely.

SIGNAL

Just a few days later, Cloudflare’s IPFS gateway was configured to redirect my website to HTTPS - with no passive redirect configured at all!

ANALYSIS

I strongly suspect that someone was watching. And they fixed my problem with a server-side redirect (which is the best way to do this.)