
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 14 Apr 2026 11:28:21 GMT</lastBuildDate>
        <item>
            <title><![CDATA[The Internet is a cooperative system: CNAME to Dyn DNS outage of 6 July 2015]]></title>
            <link>https://blog.cloudflare.com/the-internet-is-a-cooperative-system-dns-outage-of-6-july-2015/</link>
            <pubDate>Mon, 06 Jul 2015 21:30:46 GMT</pubDate>
            <description><![CDATA[ Today, shortly after 21:00 UTC, on our internal operations chat there was a scary message from one of our senior support staff: "getting DNS resolution errors on support.cloudflare.com", at the same time as automated monitoring indicated a problem. ]]></description>
            <content:encoded><![CDATA[ <p>Today, shortly after 21:00 UTC, on our internal operations chat there was a scary message from one of our senior support staff: "getting DNS resolution errors on support.cloudflare.com", at the same time as automated monitoring indicated a problem. Shortly thereafter, we saw alarms and feedback from a variety of customers (but not everyone) reporting "1001 errors", which indicated a DNS resolution error on the CloudFlare backend. Needless to say, this got an immediate and overwhelming response from our operations and engineering teams, as we hadn't changed anything and had no other indications of anomaly.</p><p>In the course of debugging, we were able to identify common characteristics of affected sites—CNAME-based users of CloudFlare, rather than complete domain hosted entirely on CloudFlare, which, ironically, included our own support site, support.cloudflare.com. When users point (via CNAME) to a domain instead of providing us with an IP address, our network resolves that name —- and is obviously unable to connect if the DNS provider has issues. (Our status page <a href="https://www.cloudflarestatus.com/">https://www.cloudflarestatus.com/</a> is off-network and was unaffected). Then, we were investigating why only certain domains were having issues—was the issue with the upstream DNS? Testing whether their domains were resolvable on the Internet (which they were) added a confounding data point.</p><p>Ultimately, the outage was identified as Dyn, another major DNS operator, having issues with their own DNS configuration. (<a href="https://www.dynstatus.com/incidents/4sbm48rdsdbq">https://www.dynstatus.com/incidents/4sbm48rdsdbq</a>)</p><p>The Internet is made up of many networks, operated by companies, organizations, governments, and individuals around the world, all cooperating using a common set of protocols and agreed policies and behaviors. These systems interoperate in a number of ways, sometimes entirely non-obviously. The mutual goal is to provide service to end users, letting them communicate, enjoy new services, and explore together. When one provider has a technical issue, it can cascade throughout the Internet and it isn’t obvious to users exactly which piece is broken.</p><p>Fortunately, even when companies are competitors, the spirit of the Internet is to work together for the good of the users. Once we identified this issue, we immediately contacted Dyn and relayed what we knew, and worked with them to resolve the issue for everyone’s benefit. We have temporarily put in workarounds to address this issue on our side, and hope the underlying difficulties will be resolved shortly.</p><p><b>Update</b>: The good folks at Dyn have posted <a href="http://hub.dyn.com/h/i/104223007-update-managed-dns-issue-july-6-2015/87989">a short explanation</a> of what happened on their nameservers.</p> ]]></content:encoded>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[Post Mortem]]></category>
            <guid isPermaLink="false">1jQwZ5wKBzX0yyOr1zgrmz</guid>
            <dc:creator>Ryan Lackey</dc:creator>
        </item>
        <item>
            <title><![CDATA[Contributing back to the security community]]></title>
            <link>https://blog.cloudflare.com/contributing-back-to-the-security-community/</link>
            <pubDate>Tue, 21 Apr 2015 22:14:26 GMT</pubDate>
            <description><![CDATA[ This Friday at the RSA Conference in San Francisco, along with Marc Rogers, Principal Security Researcher at CloudFlare, I'm speaking about a version of The Grugq's PORTAL, an open source network security device designed to make life easier and safer. ]]></description>
            <content:encoded><![CDATA[ <p>This <a href="https://www.rsaconference.com/events/us15/agenda/sessions/1689/portal-open-source-secure-travel-router-for">Friday at the RSA Conference</a> in San Francisco, along with <a href="https://marcrogers.org/">Marc Rogers, Principal Security Researcher at CloudFlare</a>, I'm speaking about a version of <a href="https://github.com/grugq/portal">The Grugq's PORTAL</a>, an open source network security device designed to make life easier and safer for anyone traveling, especially internationally, with phones, tablets, laptops, and other network-connected devices.</p><p>Portal uses open-source software and services to take inexpensive, commodity travel routers and turn them into powerful security devices. Since this is pretty far from CloudFlare's core business, it warrants a brief digression into why we support projects like this.</p><p>Computer security was for a very long time only of interest to hobbyists, academics, and obscure government agencies. Cryptography was an interesting offshoot of number theory, a foundational but very abstract part of mathematics, and many of the early infrastructure components of the Internet didn't include security at all -- there was an assumption that anyone who could gain access would be responsible and well-intentioned, a consequence of the academic origins; after all, why would they want to break or steal things which were freely available.</p><p>Before the "cambrian explosion" of commercial computer security, there was still a lot of great security research -- it was just done by academics and by individuals in the "security community", who were motivated by a desire to understand how things worked, and to make tools because they loved the technology and wanted to solve their own problems. Some of the most interesting and powerful security tools available today trace their origins to rather humble open-source, hobbyist, or academic beginnings -- <a href="http://www.openpgp.org/">PGP</a>, <a href="https://www.torproject.org/">Tor</a>, <a href="https://otr.cypherpunks.ca/">OTR</a>, various forms of <a href="https://books.google.com/books?id=QKjhgCNu1D4C&amp;pg=PA239&amp;lpg=PA239&amp;dq=electronic+cash+cypherpunks&amp;source=bl&amp;ots=2tCBInnMLD&amp;sig=9cH2JVoStquYxVQQbMvO9xujO_0&amp;hl=en&amp;sa=X&amp;ei=QEk2Va_TGM_2oATVtYCgDQ&amp;ved=0CEwQ6AEwCA#v=onepage&amp;q=electronic%20cash%20cypherpunks&amp;f=false">electronic cash</a>, and many others. Many of today's most respected people in computer security entered the field during this period, out of personal curiosity or academic interest.</p><p>While CloudFlare is an eager participant in the commercial security world (we're the easiest and fastest way to set up TLS for any website, and we provide edge security and performance to millions of sites, including some of the largest sites on the Internet -- both with free service and paid services in various tiers), we are also very aware of the broad and deep foundation of security tools and research on which we're built.</p><p>CloudFlare makes extensive use of open source software, such as the <a href="http://wiki.nginx.org/Main">Nginx</a> web server, community collections of Web Application Firewall (WAF) rules originally generated by <a href="https://www.owasp.org/index.php/Main_Page">OWASP</a>, and powerful cryptographic algorithms developed in academia and implemented by open source efforts such as the OpenSSL Project.</p><p>Where possible, CloudFlare also contributes back to the community in those areas. We contribute bugfixes and new functionality back to open source packages, and we employ developers who in their spare time make additional contributions to open source software. <a href="https://cloudflare.github.io/">CloudFlare's GitHub Open Source</a> page is a great collection of many of our contributions to open source.</p><p>One of our biggest contributions to date has been <a href="https://github.com/cloudflare/cfssl">CFSSL</a>, CloudFlare's PKI toolkit. We're constantly hearing from various projects and companies how CFSSL has been helpful to them -- one of the most exciting being the <a href="https://letsencrypt.org/">Let's Encrypt</a> community Certificate Authority project. Nick Sullivan has written in the <a href="/introducing-cfssl/">CloudFlare blog announcing CFSSL</a>, and exciting things are continuing to happen with that software.</p><p>CloudFlare, like many other companies in computer security, makes other contributions to the security community. One of the most interesting is that we, like some other companies, values having employees participate in the security community in a variety of ways. Encouraging side projects independent of work -- research, finding new vulnerabilities and responsibly disclosing them, creating new tools, participating in conferences or working groups, running tutorials, and being active in standards bodies -- sometimes doesn't have a direct connection to the company's products, but contributes to a vibrant security ecosystem. There are often unforeseen benefits of these collaborations -- learning about new tools, finding great engineers -- <a href="https://www.cloudflare.com/join-our-team">we're actively hiring for a variety of roles</a> -- and many others.</p><p>Marc and I are grateful to CloudFlare for the time to work on this open source tool and to present it to the world, and we're looking forward to presenting at RSA.</p> ]]></content:encoded>
            <category><![CDATA[CFSSL]]></category>
            <category><![CDATA[RSA]]></category>
            <category><![CDATA[Events]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1xwrvpki4ppkGolv6DWRvc</guid>
            <dc:creator>Ryan Lackey</dc:creator>
        </item>
        <item>
            <title><![CDATA[OpenSSL Security Advisory of 19 March 2015]]></title>
            <link>https://blog.cloudflare.com/openssl-security-advisory-of-19-march-2015/</link>
            <pubDate>Thu, 19 Mar 2015 15:15:54 GMT</pubDate>
            <description><![CDATA[ Today there were multiple vulnerabilities released in OpenSSL, a cryptographic library used by CloudFlare (and most sites on the Internet). ]]></description>
            <content:encoded><![CDATA[ <p>Today there were <a href="http://openssl.org/news/secadv_20150319.txt">multiple vulnerabilities</a> released in <a href="https://www.openssl.org/">OpenSSL</a>, a cryptographic library used by CloudFlare (and most sites on the Internet). There has been advance notice that an announcement would be forthcoming, although the contents of the vulnerabilities were kept closely controlled and shared only with major operating system vendors until this notice.</p><p>Based on our analysis of the vulnerabilities and how CloudFlare uses the OpenSSL library, this batch of vulnerabilties primarily affects CloudFlare as a "Denial of Service" possibility (it can cause CloudFlare's proxy servers to crash), rather than as an information disclosure vulnerability. Customer traffic and customer SSL keys continue to be protected.</p><p>As is good security practice, we have quickly tested the patched version and begun a push to our production environment, to be completed within the hour. We encourage all customers to upgrade to the latest patched versions of OpenSSL on their own servers, particularly if they are using the 1.0.2 branch of the OpenSSL library.</p><p>The individual vulnerabilities included in this announcement are:</p><ul><li><p>OpenSSL 1.0.2 ClientHello sigalgs DoS (CVE-2015-0291)</p></li><li><p>Reclassified: RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)</p></li><li><p>Multiblock corrupted pointer (CVE-2015-0290)</p></li><li><p>Segmentation fault in DTLSv1_listen (CVE-2015-0207)</p></li><li><p>Segmentation fault in ASN1_TYPE_cmp (CVE-2015-0286)</p></li><li><p>Segmentation fault for invalid PSS parameters (CVE-2015-0208)</p></li><li><p>ASN.1 structure reuse memory corruption (CVE-2015-0287)</p></li><li><p>PKCS7 NULL pointer dereferences (CVE-2015-0289)</p></li><li><p>Base64 decode (CVE-2015-0292)</p></li><li><p>DoS via reachable assert in SSLv2 servers (CVE-2015-0293)</p></li><li><p>Empty CKE with client auth and DHE (CVE-2015-1787)</p></li><li><p>Handshake with unseeded PRNG (CVE-2015-0285)</p></li><li><p>Use After Free following d2i_ECPrivatekey error (CVE-2015-0209)</p></li><li><p>X509_to_X509_REQ NULL pointer deref (CVE-2015-0288)</p></li></ul><p>We thank the OpenSSL project and the individual vulnerability reporters for finding, disclosing, and remediating these problems. All software has bugs, sometimes security critical bugs, and having a good process for handling them once identified is a necessary part of the world of computer software.</p> ]]></content:encoded>
            <category><![CDATA[Bugs]]></category>
            <category><![CDATA[OpenSSL]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[SSL]]></category>
            <guid isPermaLink="false">5iDk819SWpIq72Z4POaLdw</guid>
            <dc:creator>Ryan Lackey</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enforce Web Policy with HTTP Strict Transport Security (HSTS)]]></title>
            <link>https://blog.cloudflare.com/enforce-web-policy-with-hypertext-strict-transport-security-hsts/</link>
            <pubDate>Thu, 26 Feb 2015 01:25:25 GMT</pubDate>
            <description><![CDATA[ HTTP Strict Transport Security (HSTS, RFC 6797) is a web security policy technology designed to help secure HTTPS web servers against downgrade attacks. ]]></description>
            <content:encoded><![CDATA[ <p>HTTP Strict Transport Security (HSTS, <a href="https://tools.ietf.org/html/rfc6797">RFC 6797</a>) is a web security policy technology designed to help secure HTTPS web servers against downgrade attacks. HSTS is a powerful technology which is not yet widely adopted. CloudFlare aims to change this.</p><p>Downgrade attacks (also known as SSL stripping attacks) are a serious threat to web applications. This type of attack is a form of on-path attacker attack in which an attacker can redirect web browsers from a correctly configured HTTPS web server to an attacker controlled server. Once the attacker has successfully redirected a user, user data, including cookies, can be compromised. Unfortunately, this attack is outside the realm of pure SSL to prevent. This is why HSTS was created.</p><p>These attacks are very real: many major websites have been attacked through SSL stripping. They are a particularly powerful attack against otherwise well secured sites, as they bypass the protections of SSL.</p><p>HSTS headers consists of an HTTP header with several parameters -- including a configurable duration for client web browsers to cache and continue to enforce policy even if the site itself changes. Through CloudFlare, it is easy to configure on a per-domain basis with standard settings.</p><p>HSTS causes compliant browsers to strictly enforce web security practices. Specifically, it automatically turns all HTTP links into HTTPS links within an application, and it upgrades all SSL errors from warnings or bypassable errors into non-bypassable errors.</p><p>The configurable parameters for HSTS are:</p><ul><li><p>Enable HSTS (Strict-Transport-Security): On/Off.</p></li><li><p>Max Age (max-age): This is essentially a "time to live" field for the HSTS header. We recommend 6 months in order to earn an A+ rating from <a href="https://www.ssllabs.com/ssltest/">Qualys SSL Labs</a>. Web browsers will cache and enforce HSTS policy for the duration of this value. A value of "0" will disable HSTS.</p></li><li><p>Apply HSTS Policy to subdomains (includeSubDomains): Applies HSTS policy to every host in a domain.</p></li></ul><p>There is one caveat to HSTS: it's a policy cached in each browser. If you configure HSTS settings, browsers will cache those settings for the duration of max-age. We recommend 6 months. If your site becomes inaccessible over strongly-configured HTTPS, web browsers will refuse to connect to the site on HTTP until the policy expires in the browser. Therefore, it's important that you set up HSTS only <b>after</b> establishing a stable SSL configuration. Fortunately, CloudFlare's default SSL settings are perfectly compatible with HSTS.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/63OsZWTGB5tV3TGPahMxMW/f521ae314a59ad96127c11456fb736eb/Screen-Shot-2015-02-25-at-17-46-53-1.png" />
            
            </figure><p>In order to enable HSTS for your CloudFlare protected website, you will need to use our new dashboard, currently in beta. To access this beta dashboard, first log in to your CloudFlare account. In the lower right corner of the page there is a button labeled "Try Our New Dashboard." Click and log in again. At this point, you're in our new dashboard with access to all your existing domains and settings through a completely new user interface.</p><p>There will be more information about this new dashboard in the near future, but feel free to check it out. You can continue to freely switch between old and new dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6M4Xi3jy1sdsM8YyQCC57I/ca6c84f08db285720125a6054229282e/cloudflare_ssl-week-2.png" />
            
            </figure> ]]></content:encoded>
            <category><![CDATA[SSL]]></category>
            <category><![CDATA[HTTPS]]></category>
            <category><![CDATA[Dashboard]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Crypto Week]]></category>
            <guid isPermaLink="false">2QJImFnNK6u7UkdbpdjfIv</guid>
            <dc:creator>Ryan Lackey</dc:creator>
        </item>
        <item>
            <title><![CDATA[Bash vulnerability CVE-2014-6271 patched]]></title>
            <link>https://blog.cloudflare.com/bash-vulnerability-cve-2014-6271-patched/</link>
            <pubDate>Wed, 24 Sep 2014 17:12:00 GMT</pubDate>
            <description><![CDATA[ This morning, Stephane Chazelas [disclosed](http://seclists.org/oss-sec/2014/q3/649) a vulnerability in the program bash, the GNU Bourne-Again-Shell.  ]]></description>
            <content:encoded><![CDATA[ <p>This morning, Stephane Chazelas <a href="http://seclists.org/oss-sec/2014/q3/649">disclosed</a> a vulnerability in the program bash, the GNU Bourne-Again-Shell. This software is widely used, especially on Linux servers, such as the servers used to provide CloudFlare’s performance and security cloud services.</p><p>This vulnerability is a serious risk to Internet infrastructure, as it allows remote code execution in many common configurations, and the severity is heightened due to bash being in the default configuration of most Linux servers. While bash is not directly used by remote users, it is used internally by popular software packages such as web, mail, and administration servers. In the case of a web server, a specially formatted web request, when passed by the web server to the bash application, can cause the bash software to run commands on the server for the attacker. More technical information was <a href="http://seclists.org/oss-sec/2014/q3/650">posted on the oss-sec mailing list</a>.</p><p>The security community has assigned this bash vulnerability the ID CVE-2014-6271.</p><p>As soon as we became aware of this vulnerability, CloudFlare’s engineering and operations teams tested a patch to protect our servers, and deployed it across our infrastructure. As of now, all CloudFlare servers are protected against CVE-2014-6271.</p><p>Everyone who is using the bash software package should upgrade as soon as possible; operating system vendors and linux distributions have released new versions today.</p><p>Additionally, CloudFlare has prepared <a href="https://www.cloudflare.com/waf">Web Application Firewall (WAF)</a> rules to protect customers who have not yet patched their own servers. This firewall rule is available to Pro, Business, and Enterprise customers. We have enabled this rule by default, so no WAF configuration is necessary.</p><p>UPDATE (Wed Sep 24 20:59:46 PDT 2014): At the current time, there are reports the initial bash patch deployed by most OS vendors does not fully mitigate the vulnerability. CloudFlare continues to watch the situation closely and will update both our own systems and customer-protecting WAF rules as more information becomes available. MITRE has assigned reports of additional vulnerablities <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169">CVE-2014-7169</a>.</p><p>UPDATE (Fri Sep 26 05:08:00 EDT 2014): Over the past day, Linux distributions have released updated bash packages which address both CVE-2014-6271 and CVE-2014-7169. CloudFlare has installed these packages on all of our servers, and strongly encourages all customers to do the same. Our WAF rule remains in place, protecting Pro, Business, and Enterprise customers for web traffic going through CloudFlare.</p> ]]></content:encoded>
            <category><![CDATA[WAF Rules]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">5jN1lzZJ71MvFiILM3MO8J</guid>
            <dc:creator>Ryan Lackey</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q&A with Ryan Lackey]]></title>
            <link>https://blog.cloudflare.com/q-a-with-ryan-lackey/</link>
            <pubDate>Wed, 18 Jun 2014 16:00:00 GMT</pubDate>
            <description><![CDATA[ I started using the Internet when I was young—in the early 1990s, before I was a teenager. I was drawn to security for two main reasons. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Lackey being hoisted onto Sealand in the North Sea circa 2000</p>
    <div>
      <h3>How did you get into computer security?</h3>
      <a href="#how-did-you-get-into-computer-security">
        
      </a>
    </div>
    <p>I started using the Internet when I was young—in the early 1990s, before I was a teenager. I was drawn to security for two main reasons: First, I was interested in how individuals could stand up to large groups, even nation states, using mathematics. Also, learning about computer security meant I was able to subvert security systems, and this gave me access to things I wasn’t supposed to see. I never used my skills to harm anyone, I just thought it was fun to get an account on a supercomputer and things like that.</p>
    <div>
      <h3>Do you have any advice for younger people getting into the field?</h3>
      <a href="#do-you-have-any-advice-for-younger-people-getting-into-the-field">
        
      </a>
    </div>
    <p>The best way to learn about computer security, as with most technology, is to get hands-on experience. Once you have some practical experience and have decided that you’re interested, then go back and learn the theory through formal education or certifications. If you use this approach, you have an intuitive understanding of how the different parts of the field are related and it is very powerful.</p><p>Probably one of the hardest problems for young people in this field is assessing how much you really know—once you understand the basics, you think you know everything, but there can be huge problems lurking just under the surface. I think it’s important to keep in mind that no matter how much you learn, there’s always something new—it’s a rapidly changing field. This fluidity means it is possible to become a relative expert on very specific things quite early in your career. The most important thing is to learn how to find information, perform experiments, and figure out how things work. Sometimes just being able to identify a problem by name is enough to solve it, since there’s a huge amount of academic, industrial, and hacker literature about most topics.</p>
    <div>
      <h3>How do you feel about having your company acquired by CloudFlare?</h3>
      <a href="#how-do-you-feel-about-having-your-company-acquired-by-cloudflare">
        
      </a>
    </div>
    <p>I’m very happy! My main interest in starting CryptoSeal was to get Trusted Computing technology into commercial use. At CryptoSeal, we were working on using that technology for a general cloud computing solution, key management, and overlay networks. These are all fairly sophisticated, difficult to use applications, and not really directly usable by end users. I wanted to change that.</p><p>I think CloudFlare has done an amazing job of bringing high-end anti-DDoS, caching, firewalling, and filtering technology to a huge number of users, and by working with CloudFlare to incorporate Trusted Computing technology, I get to accomplish everything I wanted to do with CryptoSeal.</p><p>Also, CloudFlare has a really amazing team—people with cryptographic and protocol expertise, great network engineers, peering specialists, and one of the best support teams in the tech industry—so I’m really excited to be working with them.</p>
    <div>
      <h3>What attracted you to CloudFlare in the first place?</h3>
      <a href="#what-attracted-you-to-cloudflare-in-the-first-place">
        
      </a>
    </div>
    <p>I was first attracted to CloudFlare because I was a customer for three years, and I was always impressed with their service. They are a great service for startups, and through my interactions as a customer, I got to know some of the team.</p><p>As I looked further into CloudFlare I realized that they are solving some really difficult problems, especially now that they are operating at Internet scale—5% of web requests. Sometimes projects at CloudFlare require actually fixing the underlying infrastructure of the Internet, and the company is willing—and able—to invest the resources to make that happen.</p><p>The three founders, Matthew, Lee, and Michelle, are actively involved, and they’ve created CloudFlare to be a flat organization without unneeded bureaucracy and process. As a company, it’s a great place to be -- the hiring bar is really high, so all of your coworkers are brilliant and hard-working. Everyone is focused on doing the right thing for CloudFlare’s users, and for the Internet as a whole. (If you’re interested, we’re hiring. Check out our openings <a href="https://www.cloudflare.com/join-our-team">here</a>).</p>
    <div>
      <h3>Before CryptoSeal, what are some interesting projects you’ve worked on?</h3>
      <a href="#before-cryptoseal-what-are-some-interesting-projects-youve-worked-on">
        
      </a>
    </div>
    <p>I’ve done a lot of different things. I worked on an early anonymous electronic cash system while living on a Caribbean island in the late 1990s. The electronic cash system didn’t work out, but we ended up building some useful cryptographic tools that we later used in other products.</p><p>My neighbors on the island, the folks who ran the “.ai” domain name, introduced me to Sean Hastings. After I left the Caribbean, Sean and I got together to figure out the best place to host content free of government interference, but we couldn’t find a country which would be good enough. At that point, we bought a book: “How to Start Your Own Country”, and soon after that we found this abandoned WW2 anti-aircraft fortress occupied by pirate radio people called Sealand in the North Sea. It was exciting, but the costs to provide service were really high: diesel fuel, helicopters, boats, etc. So I eventually left and moved back to the US.</p><p>For a couple years, I worked on cryptographic software for payment systems companies and RFID/NFC payments for credit cards. When the Iraq War started, and I got in touch with some Iraqi expats who needed help setting up Internet in Iraq after the US intervention. I flew into Iraq on a civilian flight, and spent six months working with them on satellite and wireless networking for a variety of military, government, and commercial customers. Then, as the country got more dangerous, I moved onto a US military base in Iraq and spent the next six years doing defense contracting, primarily building satellite, cellular, and wireless networks for a diverse set of customers in Iraq, Afghanistan, Kuwait, and elsewhere.</p><p>After enough close calls with explosions and helicopters, and missing the Bay Area, I moved back to work on a more “conventional” tech startup—CryptoSeal—which was also a great adventure.</p>
    <div>
      <h3>What’s different between being at a company versus your own startup?</h3>
      <a href="#whats-different-between-being-at-a-company-versus-your-own-startup">
        
      </a>
    </div>
    <p>Getting to focus on the parts of the company I really care about which are product and technology, and not having to constantly worry about administration, finance, etc. It’s more efficient, less stressful, and produces better results. Since CloudFlare has such a great team, I’m also really enjoying getting to learn from people across the company.</p> ]]></content:encoded>
            <category><![CDATA[Acquisitions]]></category>
            <category><![CDATA[Cryptography]]></category>
            <guid isPermaLink="false">179Qz3aOo3xHGhM50lW4uM</guid>
            <dc:creator>Andrew A. Schafer</dc:creator>
            <dc:creator>Ryan Lackey</dc:creator>
        </item>
    </channel>
</rss>