Privacy Policy


As most services nowadays, it’s hard to keep something running without any data collection at all, however I do take privacy very seriously and I’m doing my best to minimize the amount of collected data, or even the data that’s available to me if I can and I try to only keep what’s absolutely necessary, for as little time as necessary, while still allowing me to properly maintain the service long-term, and catch any malicious activity.

# How I collect data

I’m completely against having any 3rd party service having access to any info about the users which visit my webpage and you won’t find any such data-collection platforms attached to my websites (things like google analytics). The data which I do collect is purely 1st party data, there’s no middle man peeking at the requests.

I should however point out that I do use Cloudflare, mainly because of the incredibly quick DNS that they provide for free, and for their DDoS protections which I simply couldn’t handle on my own with my small home network. Note that this means Cloudflare can read all HTTP/HTTPS traffic you send over. (TLS/SSL connection is only encrypted between you and Cloudflare, not the whole way back to my servers. Sadly, Cloudflare doesn’t offer this kind of end-to-end encryption for non-enterprise customers. That said, the connection between my server and Cloudflare is also encrypted during transit, so man-in-the-middle attacks are possible, unless that middle man is Cloudflare itself.)

As for the data I do collect on my own servers from the reverse proxy, all of it is being collected by an open-source tool called Prometheus, which is living on an isolated network not connected to the internet and only having access to the services it monitors (most notably the reverse proxy) since even though I do trust that this service isn’t sending any of my data anywhere, even if it did try, this setup ensures that it won’t succeed and gives me some more peace of mind.

# What I collect

Specifically, these are the all of the data I’m storing, along with explanation why, exact info on what is stored and for how long it’s stored.

# The raw amount of HTTP requests and their response codes

I’m logging the each HTTP request along with a timestamp at which it occurred. This information is necessary to know how much traffic is going through my server so that I can know about higher demand and easily handle it before it gets out of bounds. I’m also collecting the HTTP response codes which I’m using to ensure there aren’t too many of 4XX errors, most notably things like 404s likely pointing to having invalid links on my webpage which should be fixed.

This request information will be stored on my server for about 1 month. Specifically, this information will only include the timestamp, HTTP response code, and a category (that this is an HTTP request). There are no other captured information, such as an IP address, User-Agent or anything else that’s stored along with this specific category.

# The connecting IP addresses

I’m also logging the IP addresses belonging to each request along with what internal service at what URL was accessed over them. I’m doing this to immediately detect brute-force attacks and prevent people from attempting to crack passwords on some of my other self-hosted services. If I do detect such activity, I proceed to ban all requests from that IP for a certain amount of time (this time depends on many factors, and can vary from service to service). This means that if you’ve made more than the maximum amount of requests over certain time, your IP will be stored for at least the time it will be blocked for, but more likely for much longer, due to security concerns, so I can monitor if something like that happens again, and perhaps issue a permanent ban on that IP.

If you haven’t gone over these limits though, all logs containing IPs are being consistently rotated and should be gone in at most a week, I have no intention of storing IP addresses for any longer than I need to.

# Cloudflare data

Along with data collected and stored on my servers directly, I should also point out that cloudflare is, by design, also storing some user data from the requests going through it. I can’t speak for how much data cloudflare is collecting and keeping on their servers for them, however you can check their privacy policy.

What I can comment on however is that data that’s made available to me on the dashboard, and this includes:

  • Number of unique visitiors over last 30 days
  • Number of total requests over last 30 days
  • Traffic by country/region over last 30 days
  • DNS Queries by respones code over last 30 days

# That’s it!

As I said, I take privacy very seriously, and I’m trying to do my best in protecting the privacy of others, if I can, so while I can’t afford to just stop collecting everything for the sake of security of my services, I try not to collect anything more.

# Don’t actually trust me on any of this

As with any privacy policy, I can say whatever I want in here, even if it’s a complete lie and sadly providing some proof that what I say isn’t a lie is incredibly hard, and often just impossible. The simple fact is that no matter how much I may be claiming that I don’t collect more than I say and that I don’t keep logs for longer than I claim to, that’s all it is, my claim, and it’s up to you whether you will trust me with it, or not. (Hint: I wouldn’t)

That said, you can fact check some of my claims I mention here, for your own peace of mind. In this section, I will try to provide you with some information on how to perform such a check on some of the claims I made. As usual though, do your own research, fact-check that these methods really do prove what I’m saying that they do. Blindly following my guide on how to fact-check that I’m not tracking you can be dangerous.

# Third party tracking platforms

One of the easiest things you can check is that there’s no direct connection being made from your browser to any 3rd party data collection platforms. You can (and always should) verify this claim very easily from pretty much any modern browser. With Firefox, this can be done by opening the developer tools (Ctrl+Shift+I), going to the Network tab and checking all of the requests being made. From there, you should inspect all of the 3rd party URLs you see there and make sure that none of these URLs are pointing to platforms for such data collection. This process can be pretty tedious though, and I’d recommend using tools such as uBlock Origin’s plugin in advanced mode, which can show you each domain a site tried to contact and even give you an easy way to block requests being made to that domain.

However direct 3rd party data collection, while being the most common way website owners track their users, certainly isn’t the only way to do that. After all, everything that a 3rd party website can track can also be done directly as a 1st party, and even worse, some 3rd party services provide tools to do this collection, only for that 1st party back-end server to then send it right back to the data collection website without the user ever even having a way to find out, since it wouldn’t be your browser that will be making that connection now, it’s the 1st party server with your data.

# First party JavaScript

Luckily though, it is in fact possible to prove, that the 1st party tracking is at least not using any intrusive JavaScript, that would be collecting information that the browser’s JavaScript engine makes available, which is a lot. To demonstrate just how much a data can be collected purely with JavaScript, you can check the Creep.js project.

Proving that there’s no such JavaScript code is technically very easy, all you need to do is go through every linked JavaScript and every <script> tag on the webpage and check what is it doing. In practice though, this is actually very hard, because websites often obfuscate their JavaScript code to hide what’s it actually doing and turn it into gibberish which the JavaScript interpreter can understand, but it’s very hard to read and understand it by just reading it. (This isn’t always done with malicious intent, it’s usually just to make the code smaller to take up less bandwidth and hence be quicker to load, that’s why this is often called “minifying”)

In my case, I’m only including jquery and bootstrap (for now) which provide functionalities for things like the navigation bar, and some other interactive elements on the site. If you take a look at the included javascript files, these should be the only ones you will find (unless I added something new and forgot to update this - very possible). There may also be some more javascript on page-to-page basis to handle some special functionalities, but for the most part, I tried to make as little use of JavaScript as I could.

Since my use of JavaScript on the site is pretty minimal, it should actually be quite fine to simply disable javascript execution on your browser and still have a mostly good experience on the site, without loosing too many functionalities. That said, javascript is important and you will definitely experience some issues, but I will try to do my best to ensure that the site will at least remain properly formatted (unlike many other websites, which break completely if you don’t enable JS).

# Tracking from raw HTTP Requests

After all that, there is still some information that I can be collecting directly from the HTTP requests you’re making. These requests often contain the so called “User-Agent” header, which is a string containing things like what browser you use along with it’s version, the version of the Operating System used, etc. Additionally, you’re of course going to be making those requests from a certain IP address. There are several more data-points in these requests, and you should check what those are for yourself. You can check the Mozilla’s docs for more info about all of the things contained in an HTTP request and most browsers do allow you to inspect the requests you’re making and see the sent data along with all of the headers and other data within each request.

You should assume that I collect all of this data, because this time, there’s indeed no way to verify that I’m not, and you can be certain that I’m getting those data, because it’s simply how HTTP communication over the internet works. To easily demonstrate all of the data that a request like this holds, along with all additional data (mostly forward headers) included by my reverse proxy and Cloudflare, you can visit https://whoami.itsdrike.xyz, which houses a Traefik’s whoami service. This service is an easy way to print back all of the captured information it got from the HTTP request that was made when connecting to the page. But of course, this is purely for demonstration and you shouldn’t trust me that I haven’t edited this service to show less info than what I’m actually getting, but again, you can see exactly what you’re sending yourself by inspecting the requests in your browser.