0
9

[–] KikeFree 0 points 9 points (+9|-0) ago 

You have to assume it does. It uses CloudFlare which has the private SSL key, and the origin servers are also most likely in the USA somewhere. Even if Voat doesn't log the IP addresses, CloudFlare would, and the NSA would from the CloudFlare feed.

0
1

[–] whisky_cat 0 points 1 points (+1|-0) ago 

Additionally in February 2017 CloudFlare was exposed to have the CloudBleed bug. Anyone using Voat at the time could have had cookies and auth tokens exposed to an exploit.

The CloudFlare Transparency Report is useful as well.

2
1

[–] OmicronX66 [S] 2 points 1 points (+3|-2) ago 

Good thing I'm using a VPN that changes addresses each day. I was hoping for some privacy for once online.

0
9

[–] kjell 0 points 9 points (+9|-0) ago 

Privacy no longer exists.

0
5

[–] 9846442 0 points 5 points (+5|-0) ago 

VPN is useless if your OS is already exploited.

0
0

[–] FreeBreivik 0 points 0 points (+0|-0) ago 

You go through your ISP to the VPN on to CloudFlare from there... NSA would have you on both ends.

0
4

[–] 9846414 0 points 4 points (+4|-0) ago  (edited ago)

Cloudflare has received numerous subpoenas to the point that now they have a 'compliant gateway' for various 5-eye entities to peruse logs at will.

So voat? Cant answer that. But in essence you are not anonymous. Use some new fangled tor like you would use a condom if you want to share your deepest darkest secrets and predilections with us.

1
2

[–] WhiteRonin 1 points 2 points (+3|-1) ago  (edited ago)

Go to GitHub and look at the DB schema. The laat time I looked it had a column for IPs.

[–] [deleted] 0 points 1 points (+1|-0) ago 

[Deleted]

0
0

[–] wodehouse 0 points 0 points (+0|-0) ago 

Source for the fingerprinting?

0
1

[–] door_ 0 points 1 points (+1|-0) ago 

I remember a long time ago (1+ years?) there was an unassuming post that may-or-may-not have been stickied, but it received a fair amount of attention.

When people visited the page, it informed the user that their IP address amongst other stuff had been recorded (or could have been recorded). Apparently this was done through the CSS of a subverse. This was still on Voat. Thankfully, the creator contacted the admin, who allowed it, probably to spread awareness of potential danger and stuff.

Memory's foggy, anyone want to fill in the gaps?

0
4

[–] 9846431 0 points 4 points (+4|-0) ago 

So you are saying the same people who designed a site to run on IIS would make the mistake of allowing inline import embed exploits? The hell you say.

0
1

[–] heygeorge 0 points 1 points (+1|-0) ago 

In times like these, I usually light a candle for @fuzzywords who has a good memory and a proper vocabulary for this sort of thing.

She may even be kind enough to ping you, @RamonaDispatch and @door_ in response, or show similar etiquette.

0
0

[–] door_ 0 points 0 points (+0|-0) ago 

I have no clue what you just said, but I'm going to assume the answer is "sure, why not?"

Either way, I'm just recalling from my memory, might not even be accurate. Your choice to believe.

0
0

[–] 9848103 0 points 0 points (+0|-0) ago 

Doesn't every site? If not you are kinda missing out on some potential income right?

0
0

[–] Moabman 0 points 0 points (+0|-0) ago 

Your only hope is to post so much that you get lost in an ocean of meaningless data.

Once you start going out of your way to go unnoticed somebody notices.

0
0

[–] OricaTonithos 0 points 0 points (+0|-0) ago 

I've wondered this.