The simplicity of it is logic defying. It used to be that you had to find crosswalks or move puzzle pieces or type blurred letters and numbers, but NOW all the sudden I can just click a box and HEY!, I’m human?

That’s hardly the Turing Test I’d expected.

  • Ballistic_86@lemmy.world
    link
    fedilink
    arrow-up
    35
    ·
    24 days ago

    These type of “captchas” look at your browsing behavior. It is sort of a “trade secret” of what it looks for, but it might be screen resolution, mouse behavior, cookies, OS, time to click, etc. Anything a website has access to that would look different from a bot.

    • hswolf@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      24 days ago

      Yes, and it gives you (or the bot), a score.

      If you don’t meet the score, is highly likely that you are a bot.

      You can have a superficial an yet interesting read on the topic on the Google re-captch dev docs.

  • Magnetic_dud@discuss.tchncs.de
    link
    fedilink
    arrow-up
    25
    ·
    24 days ago

    Cloudflare knows almost everything done from your IP address because they’re used by the majority of websites. And some websites are using a cloudflare signed TLS certificate so if cloudflare wants, can see the content of the communication instead of an encrypted package

    So they know if you have a human behavior (visiting many different websites at human speed and having rests during sleeping time) or if you have a bot behavior (sending millions of requests to the same endpoint at superhuman speeds)

    • kahdbrixk@feddit.org
      link
      fedilink
      Deutsch
      arrow-up
      4
      ·
      23 days ago

      I’d argue that the certificate authority does not have the ability to decrypt your communication because of the nature of private and public key mechanism during the whole TLS certificate procedure. You do not send your web servers private key to cloudflare when requesting a certificate.

      That would actually be pretty wild…

      Other then that you’re probably right.

      • Magnetic_dud@discuss.tchncs.de
        link
        fedilink
        arrow-up
        2
        ·
        23 days ago

        There’s a default setting that allows unencrypted communication between the server and cloudflare. So they receive unencrypted data, sign with their certificate. Or send with self signed certificate, they decrypt and reencrypt. Or for some reason can download and import on the server their own internal use certificate.

        • kahdbrixk@feddit.org
          link
          fedilink
          Deutsch
          arrow-up
          2
          ·
          22 days ago

          You’re right, forgot that you can just not encrypt on your servers end and use cloudflare to do that for you, especially when used as CDN

  • Itdidnttrickledown@lemmy.world
    link
    fedilink
    arrow-up
    9
    ·
    24 days ago

    I’m pretty sure I’m a robot since they often force me to select the motorcycle from a picture that is just one motor cycle. If I select every part of it I fail every time. Same thing with street lights and fire plugs.

  • Platypus@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    26 days ago

    It tests whether your mouse movement looks human–we’re really bad at things like moving in straight lines, so it’s pretty evident from a mouse movement log whether you’re a human or a simple bot. It also takes a bunch of auxiliary browser/environment data into account. It’s not perfect, but it’s complicated enough to defeat to provide fine protection against cheap spam.

    • Random_Character_A@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      25 days ago

      Shitty situation if you are used to using hotkeys and only use mouse cursor when no other means are available by moving it using numpad.

      • Wugmeister@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        25 days ago

        Nah that’s different as well. What they are filtering out is

        • a mouse teleporting to the exact center of the checkbox
        • a mouse smoothly gliding in a straight line to the center if the checkbook
        • a mouse traveling in a straight line to the center of the checkbook with some momentary stutters to add noise

        Et cetera. Humans are much noiser than anything a python script will spit out. Of course there are ways to get around this, like recording and reenacting a human mouse movement, but the point of any capcha system is to make it significantly more difficult to bot, not impossible.

        • Jessica@discuss.tchncs.de
          link
          fedilink
          arrow-up
          1
          ·
          24 days ago

          No OP was right. If the reCaptcha is on the same page as a login, and I use my password manager to fill the fields, I fail the reCaptcha almost every time. I have to manually paste in the user name and password separately to slow things down to act more human…

      • Thorry84@feddit.nl
        link
        fedilink
        arrow-up
        2
        ·
        25 days ago

        If it’s in doubt it just gives you extra challenges. So in the end everybody will get there, or not and then fuck you I guess.

        • s3p5r@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          25 days ago

          Some provide screen-reader instructions, but most places barely remember blind people exist. It’s another example of people with disabilities being ignored and marginalised.

          And then even if they do remember blind people exist, they probably forget there are people who aren’t blind who can’t do their tests for other reasons, like dyslexia or dexterity impairments.

          And then you have hCaptcha who makes disabled people to sign up to their database to use their cookie.

    • Jimmycrackcrack@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      25 days ago

      I’ve learned from these that I must definitely move my mouse like a robot since it always asks me to do more puzzles afterwards. This is even if I try jiggling it around after clicking just to try and convince it.

    • Melatonin@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      0
      ·
      26 days ago

      Interesting that my mouse movement is available to anyone who wants it.

      It seems like a small step from that to accessing my keyboard.

      • sbv@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        26 days ago

        Your mouse movement and keyboard events are available to webpages that you’ve loaded, when the browser window is focused.

        This isn’t nefarious - it allows websites to build nice UIs that most people enjoy using, most of the time.

        There’s lots of shady stuff going on in browsers, this isn’t really one of them.

  • xylogx@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    25 days ago

    Cloudflare has a bot score. Depending on how sus your bot score is you can use several different levels of verification. The checkbox you refer to is kind of in the middle. There is also a more complicated intrusive captcha and a totally transparent javascript. It’s a pretty slick system.

      • cadekat@pawb.social
        link
        fedilink
        arrow-up
        2
        ·
        24 days ago

        Don’t mix tor plus VPN.

        If you’re using tor browser without tor for some reason, carry on.

          • cadekat@pawb.social
            link
            fedilink
            arrow-up
            3
            ·
            24 days ago

            There are two ways to layer a VPN and tor:

            1. Tor over VPN; or
            2. VPN over Tor.

            In the first option, you gain little. Tor already encrypts your traffic, so your ISP can’t see inside them. Technically, Tor over a VPN hides the fact that you’re using Tor from your ISP, but Tor’s snowflake does something similar if you need that.

            In the second option, you’re revealing your VPN account information, which could theoretically be associated back to you. Tor adds nothing over just a VPN in this case.

            • wolfpack86@lemmy.world
              link
              fedilink
              arrow-up
              4
              ·
              24 days ago

              So really, “no value in mixing,” which is distinct from “don’t mix.”

              The latter implies a security risk could be created.

              • nyxia@lemmy.blahaj.zone
                link
                fedilink
                arrow-up
                1
                ·
                24 days ago

                A security risk is created, you’re creating a permanent guard node by using your VPN with TOR. A lot of people downplay how serious this can be against a dedicated attacker. Sure, it may not matter for most, but for those with the right threat model, it will.

                • wolfpack86@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  20 days ago

                  So VPN first then Tor is ill advised for this, or only the reverse? What is the potential attack in running Tor while on VPN?

  • isolatedscotch@discuss.tchncs.de
    link
    fedilink
    arrow-up
    5
    ·
    25 days ago

    https://blog.cloudflare.com/turnstile-private-captcha-alternative/

    TL:DR cloudflare made a new recaptcha which does some complex math and other stuff on your browser, which done once has no noticable effect but if someone were to scrape websites at an absurd speed it slows everything down significantly.

    this is not only cool because you don’t have to manually solve the captcha, but also because it allows for low-speed scraping to be feasible, with tools like flaresolverr

    • madcaesar@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      25 days ago

      That’s actually kinda cool. Punish the scrapers, but allow regular people to not waste time.

      Meanwhile, Google is having you find the zebra crossing for the 400th time…

    • newerAccountWhoDis [they/them]@hexbear.net
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      2
      ·
      25 days ago

      Thanks for being the only person in this thread who doesn’t joke or talk out of their ass order-of-lenin

      Quite interesting really and a genius solution (it they don’t lie about not stealing your data)

      • Treachery4524@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        24 days ago

        Didn’t the Soviets see geniuses and other intellectuals as a danger to society during the time this award was given out? Or are there incidents where this was given to scientists as well? I know you’re probably joking, but when I suddenly encounter Lenin’s head being used in a positive manner I have to look twice.

  • elrik@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    25 days ago

    Proof of work, which becomes computationally expensive to scale, along with other heuristics based on your browser and page interaction. I believe it’s less about clicking the box and what happens after you’ve clicked the box.

    • SerotoninSwells@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      25 days ago

      This is correct. I work in bot detections. There are baseline checks for various browser automation used as bot frameworks like Puppeteer or Playwright. Then there is basic analysis of server side and client side fingerprints; meaning, do the fingerprints you claim make sense. There are other heuristics too and I imagine Cloudflare is monitoring movements that point to automation. All of this happens after you click. I personally prefer this over Google’s captcha which frequently doesn’t recognize me as a human but is easily bypassed by bots.

  • brian@programming.dev
    link
    fedilink
    arrow-up
    1
    ·
    25 days ago

    some of them are also less bot detection and more spam limiting and mitigation. cloudflare’s has more stuff built in I’m sure, but things like mCapcha are just proof of work, so if you’re trying to make a bunch of accounts or whatever, it’s really computationally expensive.

  • communism@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    25 days ago

    I always fail Cloudflare captchas because I’m clicking it with Vimium-C lol. I hate captchas for making me reach for my mouse. It also seems like a genuine accessibility issue if people who cannot use a mouse can’t pass a captcha.

    I’ve found that Google’s reCAPTCHA has also started rejecting me no matter what I do. I think it might be because my IP address is a VPN, but that’s pretty stupid; if I can pass the test by clicking the squares why not let me in?

    • LaGG_3 [he/him, comrade/them]@hexbear.net
      link
      fedilink
      English
      arrow-up
      1
      ·
      25 days ago

      I think it might be because my IP address is a VPN, but that’s pretty stupid; if I can pass the test by clicking the squares why not let me in?

      They want your tasty IP data

  • Lem Jukes@lemm.ee
    link
    fedilink
    arrow-up
    1
    ·
    25 days ago

    A side to this is that certain techniques will be deliberately obfuscated or simply omitted as a security measure in the hopes of slowing a bad actor’s eventual bypassing of the measure. It’s an arms race and if the intruder doesn’t know what all the locks even are, it takes longer to break or pick them.

  • trustnoone@lemmy.sdf.org
    link
    fedilink
    arrow-up
    1
    ·
    25 days ago

    Theres a few answrs to this

    1. It uses your movements before this to determine whether it feels like your a bot or not
    2. It makes you wait, the biggest issue with bots is they may try to log in say 50 different passwords for example, so if it takes 5 seconds to do each one it makes boting multiple acounts not worth it.
    3. Google uses catchphas with images to choose. They use this to train their own AI or data to sell
    • IphtashuFitz@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      25 days ago

      Smarter bots know how to easily avoid being detected based on the speed of their requests by simply adding a random delay to them. A few years ago we discovered a very slow speed credential stuffing attack (testing usernames & passwords) against my employers site. It was only testing one set of credentials every couple of minutes.

      Once we discovered it we didn’t block it though. We were able to spot the attack fairly easily once we knew what to look for, so we updated our system to always return a login failure no matter what credentials they sent.