Hacker Newsnew | past | comments | ask | show | jobs | submit | NicoJuicy's commentslogin

That's basically not how Cloudflare works.

Your app works distributed/globally on the go.

Additionally, every Enterprise feature will become available in time ( discussed during their previous quarter earnings). It will be bound to regions ( eg. Eu)


No website uses Apple

A sync issue in drive would barely be noticed.


Apple Pay, with 65M users, can rely on external content from Apple.

https://developer.apple.com/documentation/applepayontheweb/d...


That's not a website

You'd probably be affected if you used Sign in with Apple, same as if you used third party sign in with Google, Facebook, Microsoft, or others and their authentication was down.

Sure, I don't use/have it though.

They literally copied their supplier ( autostore ).

Unfortunately, auto.ol shared secrets with them, Ocado abused that in court.

Literally, Fuck Ocado. I wouldn't trust them.


Some context: https://archive.ph/Apfdv

Autostore ended up paying Ocado? How did Ocado abuse them?


Because autostore shared trade secrets with Ocado. The lawsuit was found to be not valid.

Note: Ocado was a customer of Autostore in 2012 and just copied them. Sharing IP basically invalidated the lawsuit.


https://www.blackstonechambers.com/news/autostore-technology...

Autostore disclosed their design externally before the patents. So the patents were "invalidated" by themselves


At least read what you’re posting:

AutoStore claimed that several of its European patents covering cube-storage robots and grid-based systems were infringed by Ocado’s Smart Platform robots and storage grid. The judge looked closely at the “central cavity” robot patents (EP 2 928 794 and EP 3 070 027) and two other related patents and compared them to earlier disclosures and designs. He found that the claimed inventions lacked novelty and/or an inventive step, meaning they did not add enough new technical idea over what was already publicly available, so the patents were revoked.

Additionally, even if the patents were not invalidated, the judge found that Ocado did not infringe them, even if they were valid. Specifically, Ocado’s robots and grid as actually built and used did not fall within the wording of AutoStore’s patent claims. The court concluded that, on proper claim construction, Ocado’s design did not use several key features required by the claims, so there was no infringement in any event.

This is all in the judgment.

Finally, Autostore had to pay Ocado $256M USD: https://www.therobotreport.com/autostore-to-pay-ocado-256m-i...


There's literally a picture on that page to compare Ocado vs their original supplier...

Let's say "heavily inspired" on instead of copied then.


Yes, AutoStore lost most important cases in US (ITC) and UK's High Court.

That's 2 years old?

You should really check Cloudflare.

There is not a single company that makes their infrastructure as globally available like Cloudflare.

Additionally, the downtime of Cloudflare seems to be objectively less than the others.

Now, it took 25 minutes for 28% of the network.

While being the only ones to fix a global vulnerability.

There is a reason other clouds wouldn't touch the responsiveness and innovation that Cloudflare brings.


Where I work, all teams were notified about the React CVE.

Cloudflare made it less of an expedite.


Find a problem in your social circle.

Fix it


Cloudflare has made considerable improvements in running small models in gpu's world-wide ( loading multiple small models).

I think they want to be the provider of inference for specialized slm's. Replicate is a perfect acquisition for that, they have a large catalog of smaller models.

With the acquisition they are saying that they have made enough improvements for the next step, earning money from those improvements.


I think this is "an" misleading answer from AWS to Cloudflare Containers.

It looks like just AWS ECS with default values/setup.

You'll still need to pay for the load balancer, networking resources, ...

It will also never scale to zero. Cloudflare Containers is literally "pay for usage", while AWS is pay for capacity.

https://developers.cloudflare.com/changelog/2025-11-21-new-c...

AWS will never drop their profits from bandwith and container unutilised uptime.


I think defence against a DDOS against your network is the best reason for a quick rollout


This was not about DDoS defense but the Bot Management feature, which is a paid Enterprise-only feature not enabled by default to block automated requests regardless of whether an attack is going on.

https://developers.cloudflare.com/bots/get-started/bot-manag...


Bots can also cause a DoS/DDoS. We use the feature to restrict certain AI scraper tools by user agent that adversly impact performance (they have a tendency to hammer "export all the data" endpoints much more than regular users do)


So if you didn't enable it your stuff would work?


It would still fail if you were unluckily on the new proxy (it's not very clear why if the feature was not enabled, indeed):

> Unrelated to this incident, we were and are currently migrating our customer traffic to a new version of our proxy service, internally known as FL2. Both versions were affected by the issue, although the impact observed was different.

> Customers deployed on the new FL2 proxy engine, observed HTTP 5xx errors. Customers on our old proxy engine, known as FL, did not see errors, but bot scores were not generated correctly, resulting in all traffic receiving a bot score of zero. Customers that had rules deployed to block bots would have seen large numbers of false positives. Customers who were not using our bot score in their rules did not see any impact.


Maybe, but in that case maybe have some special casing logic to detect that yes indeed we're under a massive DDOS at this very moment, do a rapid rollout of this thing that will mitigate said DDOS. Otherwise use the default slower one?

Of course, this is all so easy to say after the fact..


Isn’t CF under a ‘massive DDOS’ 24/7 pretty much by definition? When does malicious traffic rest, and how many targets of same aren’t using CF?


It's literally in the blog post as well

> In the internal incident chat room, we were concerned that this might be the continuation of the recent spate of high volume Aisuru DDoS attacks:


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: