In recent weeks, CloudFlare has been blocking my Firefox ESR browser from various sites, with dreaded infinite loops like "Checking your browser before accessing gitlab.com."
This was merely annoying until now, in a "guess I won't be reading that article or trying their site, after all" way, but I can't log in to an actually important site, GitLab.
Even when I disable both uBlock Origin and Firefox "Advanced Tracking Protection", I'm still blocked from GitLab by CloudFlare.
Testing with Chromium (same residential IP address as Firefox) in a "please violate me in every possible way" configuration, CloudFlare doesn't block me from GitLab.
But I really want to use Firefox for GitLab, and my Firefox doesn't have trouble with non-CloudFlare sites. For example, GitHub works fine with my Firefox. (But I'd really prefer to use GitLab, so long as this problem can be resolved and I'm not going to run into problems like this.)
I see a various complaints about CloudFlare blocking GitLab online, with various explanations. Sometimes, the user is blamed for not figuring out how they're not complying with whatever CloudFlare is trying to do (like the user is some divergent citizen, to be denied rights, in some Kafkaesque authoritarian police state).
I suspect that sites don't know when CloudFlare is false-positive blocking legitimate visitors and costing them customers...
There is no way to actually know who is or isn't a bot. The methodology for bot detection changes dramatically, isn't published, often isn't well tested, and fails to fully capture turing tests in any meaningful way. Its all about forcing more requirements on the user, where the more unique the user is, the more likely its a user and counting all blocks as a net win. The only problem is it drives surveillance capitalism, and its a flawed assumption.
Maybe you should start an end-user Firefox extension/platform that aggregates where it checks for these, and allows the user to self-report when it fails (or detect and show repeat failures.