What makes a good captcha




















Surely we can beat spammers at their own game by using automated systems to do the work for us. Despite the advances in intelligent computer systems, most spamming mechanisms are stupid.

Elderly users had issues with the distorted text. The logic puzzles were found to be odd and patronising. The audio was struggled with.

Human-powered spam is on the rise as is unethical link-building , and we should be implementing unobtrusive, invisible methods. We touched on two detection services at the beginning of this article. Akismet , Mollom and SBlam! But why not develop your own system that is tuned to the mechanics of your website?

Taking responsibility and removing the burden from users will improve their interactions with and impressions of your website. Manually moderating content is often a sacrifice worth making. In , Phil Haack suggested a clever method of detecting bots: using a honeypot. The idea behind the honeypot method is simple: website forms would include an additional field that is hidden to users.

Spam robots process and interact with raw HTML rather than render the source code and therefore would not detect that the field is hidden. The honeypot method can be made more sophisticated by using JavaScript and data hashing. These obfuscation methods are not hack-proof, but we can assume that robots are not sophisticated enough to enter the required information. JavaScript can be used to fill in hidden fields dynamically, which server-side validation can check for.

Additional timestamp and session data checks can also be used to detect automated submissions. A recent discussion on Stack Overflow provides many examples and ideas about this, including the implementation of Hashcash , which is available as a WordPress plug-in. As mentioned, spammers currently have too many targets to bother searching for a back door. With the rise of the social web, many websites now allow users to register and interact with one another.

Publishing to a third-party website was traditionally done either by registering a full-fledged account or by submitting totally anonymously, both of which methods leave the gate open to spam. In , Facebook announced Facebook Connect, which provides websites and their users with an integrated platform that addresses this and other concerns.

Both of these services can be implemented on websites relatively easily, and they eliminate the need for registration and comment forms, which are accessible to robots. So many websites offer social-networking integration that services like Janrain have popped up. Janrain provides an abstracted umbrella solution to ensure that websites are accessible through any account platform. Mahalo provides social log-in functionality via Janrain.

You can imagine how well that went. People have tried stymying image recognition by asking users to identify, say, pigs, but making the pigs cartoons and giving them sunglasses. Researchers have looked into asking users to identify objects in Magic Eye-like blotches. Other researchers have tried to exploit the fact that humans have bodies, using device cameras or augmented reality for interactive proof of humanity. You need some type of challenge that works with someone from Greece, someone from Chicago, someone from South Africa, Iran, and Australia at the same time.

And it has to be independent from cultural intricacies and differences. Figuring out how to fix those blurry image quizzes quickly takes you into philosophical territory: what is the universal human quality that can be demonstrated to a machine, but that no machine can mimic?

What is it to be human? Keeping current on updates is another sign of humanity, the professors said. Also, allow cookies before you start searching, advises Guerar and Migliardi. The professors noted the privacy concerns and suggested that people use tools to clear their history and remove cookies. That will probably show that you are human. Application Identifying Fabrications Content moderation Human-computer interaction. Company Alphabet Google. End User Consumer Big company Small company.

Sector Consumer services. Source Data Images. Request demo Learn more. Article's content. Latest Blogs. DDoS Mitigation Application Security.

Grainne McKeever. Yohann Sillam , Ron Masas. Matthew Hathaway. Research Labs Daniel Kerman. Application Security Bruce Lynch.



0コメント

  • 1000 / 1000