Why CAPTCHAs have gotten so difficult

General discussion about web technology.
Post Reply
barbaz
Senior Member
Posts: 10847
Joined: Sat Aug 03, 2013 5:45 pm

Why CAPTCHAs have gotten so difficult

Post by barbaz »

https://www.theverge.com/2019/2/1/18205 ... telligence

Good to know it's not just me. Also sometimes feels like the picture quizzes are going on and on and on and on and on...

I've even noticed it when testing things on this forum that require solving a CAPTCHA.
*Always* check the changelogs BEFORE updating that important software!
-
User avatar
GµårÐïåñ
Lieutenant Colonel
Posts: 3365
Joined: Fri Mar 20, 2009 5:19 am
Location: PST - USA
Contact:

Re: Why CAPTCHAs have gotten so difficult

Post by GµårÐïåñ »

not just that, sometimes they ask for something that is not even in the god damn picture and then because you clicked to continue they prolong it even more it's getting absurd
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows NT; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0
musonius
Master Bug Buster
Posts: 203
Joined: Sun Jul 08, 2018 5:38 pm

Re: Why CAPTCHAs have gotten so difficult

Post by musonius »

Thanks for the link! However, it gets even more interesting than that: US9407661B2 - Blocking via an unsolvable CAPTCHA.
Abstract

A security device may receive a request from an attacker device and intended for a server device. The security device may identify the request as being associated with a malicious activity. The malicious activity may include one or more undesirable tasks directed to the server device. The security device may generate an unsolvable challenge-response test based on identifying the request as being associated with the malicious activity. The unsolvable challenge-response test may be generated using at least one construction technique and may be configured in an attempt to block the attacker device without making the attacker device aware that the attacker device is being blocked. The security device may provide the unsolvable challenge-response test to the attacker device, and may receive a solution associated with the unsolvable challenge-response test. The security device may notify the attacker device that the solution is incorrect regardless of whether the solution is actually correct.
If you use the Tor browser or use certain settings like privacy.resistFingerprinting and privacy.firstparty.isolate, this may seem familiar to you.
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
Post Reply