To clarify — the website owner can fully add Tor to your allow list if you’d like to. That’s entirely your choice if you’re concerned about Tor users being CAPTCHA’d. Also you control the overall security level — so drop it if you’d like to reduce the likelihood of any CAPTCHAs.
To be clear -- the website owner can always reply to the email they receive from our Trust & Safety team. That goes directly to our team. This individual could also do that if they had further questions for the team.
Hackernews isn't a necessary route, and quite frankly no changes need to be made to existing policies. The individual could directly reach out team via a reply to the email they received. It seems in this case the person just didn't like the reply they received. That's quite different.
Hi, I'm the Head of Trust & Safety at Cloudflare. I'd be happy to discuss the specifics of your domain's DNS settings that lead to this if you'd like to email me -- justinATcloudflareDOTcom
Specifically:
"Having an MX record for a root domain proxied through Cloudflare will reveal your origin web server’s IP address to potential attackers. See Why do I have a dc-######### subdomain? for further details."
This article includes the following quote:
"If your mail server resides on the same IP as your web server, your MX record will expose your origin IP address."
After we resolve all bugs we want to opensource it. If you give us your email we'll let you know when it is available. Here is our GitHub page: https://github.com/TheGurus