<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: CAPTCHA &#8211; eeeewwwww</title>
	<atom:link href="http://www.barneyb.com/barneyblog/2006/07/28/captcha-eeeewwwww/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.barneyb.com/barneyblog/2006/07/28/captcha-eeeewwwww/</link>
	<description>Thoughts, rants, and even some code from the mind of Barney Boisvert.</description>
	<lastBuildDate>Thu, 11 Sep 2014 09:58:12 +0000</lastBuildDate>
	<generator>http://wordpress.org/?v=2.9.2</generator>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
		<item>
		<title>By: Barney</title>
		<link>https://www.barneyb.com/barneyblog/2006/07/28/captcha-eeeewwwww/comment-page-1/#comment-379</link>
		<dc:creator>Barney</dc:creator>
		<pubDate>Thu, 17 Aug 2006 21:37:17 +0000</pubDate>
		<guid isPermaLink="false">http://barneyb.com/barneyblog/?p=174#comment-379</guid>
		<description>CAPTCHA is designed to prevent computers from doing what you only want humans to do.  Whether it&#039;s logging into a bank, registering a domain, or posting a blog comment, the goal is the same.

But you make exactly my point.  Security needs to be more difficult to crack than the benefits of cracking it, but at the same time, it needs to be as transparent as possible.  Hence I use biometrics and two separate computer controlled keys to get in my datacenter, but I use stupid JS obfuscation to keep blog spammers out.  Both are secure enough, and both are minimally intrusive.
</description>
		<content:encoded><![CDATA[<p>CAPTCHA is designed to prevent computers from doing what you only want humans to do.  Whether it's logging into a bank, registering a domain, or posting a blog comment, the goal is the same.</p>
<p>But you make exactly my point.  Security needs to be more difficult to crack than the benefits of cracking it, but at the same time, it needs to be as transparent as possible.  Hence I use biometrics and two separate computer controlled keys to get in my datacenter, but I use stupid JS obfuscation to keep blog spammers out.  Both are secure enough, and both are minimally intrusive.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tuggle</title>
		<link>https://www.barneyb.com/barneyblog/2006/07/28/captcha-eeeewwwww/comment-page-1/#comment-378</link>
		<dc:creator>Tuggle</dc:creator>
		<pubDate>Thu, 17 Aug 2006 21:15:21 +0000</pubDate>
		<guid isPermaLink="false">http://barneyb.com/barneyblog/?p=174#comment-378</guid>
		<description>I am certainly up for correction on this, but I thought CAPTCHA was primarily developed for stopping automated signups on high traffic sites or hacking/DoS style attack. When did &quot;the average Joe&quot; starting thinking they should apply it to their blog comments? Comments spam bots are looking to hit the web in mass droves. So even having a field that says &quot;Type the word &#039;happy&#039; in the box&quot; would stop a bot because they&#039;re not going to write a custom submission just for your blog. Any question would work &quot;What color is the sky?&quot;, etc.

So aside from the cool factor which wears off in about 7 minutes, I think CAPTCHA is like killing an ant with a nuke.</description>
		<content:encoded><![CDATA[<p>I am certainly up for correction on this, but I thought CAPTCHA was primarily developed for stopping automated signups on high traffic sites or hacking/DoS style attack. When did "the average Joe" starting thinking they should apply it to their blog comments? Comments spam bots are looking to hit the web in mass droves. So even having a field that says "Type the word 'happy' in the box" would stop a bot because they're not going to write a custom submission just for your blog. Any question would work "What color is the sky?", etc.</p>
<p>So aside from the cool factor which wears off in about 7 minutes, I think CAPTCHA is like killing an ant with a nuke.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ben Nadel</title>
		<link>https://www.barneyb.com/barneyblog/2006/07/28/captcha-eeeewwwww/comment-page-1/#comment-377</link>
		<dc:creator>Ben Nadel</dc:creator>
		<pubDate>Mon, 07 Aug 2006 16:25:29 +0000</pubDate>
		<guid isPermaLink="false">http://barneyb.com/barneyblog/?p=174#comment-377</guid>
		<description>Sami Hoda, I would definately be interested in a math captcha. I am currently using a math de-spamming method on my site and it is working quite nicely. I do, however, have to get a bit complicated when obfuscating the display of the math. Check it out at http://bennadel.com/index.cfm?dax=blog:197.view</description>
		<content:encoded><![CDATA[<p>Sami Hoda, I would definately be interested in a math captcha. I am currently using a math de-spamming method on my site and it is working quite nicely. I do, however, have to get a bit complicated when obfuscating the display of the math. Check it out at <a href="http://bennadel.com/index.cfm?dax=blog:197.view" rel="nofollow">http://bennadel.com/index.cfm?dax=blog:197.view</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Barney</title>
		<link>https://www.barneyb.com/barneyblog/2006/07/28/captcha-eeeewwwww/comment-page-1/#comment-376</link>
		<dc:creator>Barney</dc:creator>
		<pubDate>Fri, 28 Jul 2006 20:49:23 +0000</pubDate>
		<guid isPermaLink="false">http://barneyb.com/barneyblog/?p=174#comment-376</guid>
		<description>Charlie,

Another alternative that I considered (but didn&#039;t end up having to implement), is a session-based check to ensure the submission matches a form that&#039;s been rendered by the app.  You could even do it without a session and just use form/URL variables, if you wanted.

The trick is to make the computer have to jump through hoops to do what it wants.  As soon as navigating the hoops isn&#039;t worth the benefits, you&#039;ve won.  A link on my blog comments that I&#039;m going to delete anyway isn&#039;t worth much, so people don&#039;t try very hard.</description>
		<content:encoded><![CDATA[<p>Charlie,</p>
<p>Another alternative that I considered (but didn't end up having to implement), is a session-based check to ensure the submission matches a form that's been rendered by the app.  You could even do it without a session and just use form/URL variables, if you wanted.</p>
<p>The trick is to make the computer have to jump through hoops to do what it wants.  As soon as navigating the hoops isn't worth the benefits, you've won.  A link on my blog comments that I'm going to delete anyway isn't worth much, so people don't try very hard.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Barney</title>
		<link>https://www.barneyb.com/barneyblog/2006/07/28/captcha-eeeewwwww/comment-page-1/#comment-375</link>
		<dc:creator>Barney</dc:creator>
		<pubDate>Fri, 28 Jul 2006 20:41:25 +0000</pubDate>
		<guid isPermaLink="false">http://barneyb.com/barneyblog/?p=174#comment-375</guid>
		<description>Peter, I know all about spambots hosing my blog.  Initially, I had few problems, but there was a point when I was getting several thousand per day on a regular basis.  Some of the simple obfuscation tricks (like renaming mt-comments.cgi) produced results like Matt&#039;s: it stopped the spam for a few hours.  However, doing JS-based rewrite seems to have almost completely cured it.  Check the source for how it works.  Wouldn&#039;t be hard to defeat, but like everything else in the world of security, it only has to be more difficult than it&#039;s worth.

The handful that don&#039;t get foiled are mostly handled by content filters (which, I might add have yet to kill a legit comment), and the occasional one that slips through both is immediately manually deleted and used to improve the content filter.

I&#039;ll certainly agree that registering for a site (particularly if it requires email-based positive confirmation) is far worse than a CAPTCHA check.  I can see the utility for &quot;important&quot; stuff (like PayPal), but for blog comments on most blogs, the benefits of computer posting aren&#039;t sufficient to endeavor to overcome simple, user-transparent security measures, which makes those measures equally effective.</description>
		<content:encoded><![CDATA[<p>Peter, I know all about spambots hosing my blog.  Initially, I had few problems, but there was a point when I was getting several thousand per day on a regular basis.  Some of the simple obfuscation tricks (like renaming mt-comments.cgi) produced results like Matt's: it stopped the spam for a few hours.  However, doing JS-based rewrite seems to have almost completely cured it.  Check the source for how it works.  Wouldn't be hard to defeat, but like everything else in the world of security, it only has to be more difficult than it's worth.</p>
<p>The handful that don't get foiled are mostly handled by content filters (which, I might add have yet to kill a legit comment), and the occasional one that slips through both is immediately manually deleted and used to improve the content filter.</p>
<p>I'll certainly agree that registering for a site (particularly if it requires email-based positive confirmation) is far worse than a CAPTCHA check.  I can see the utility for "important" stuff (like PayPal), but for blog comments on most blogs, the benefits of computer posting aren't sufficient to endeavor to overcome simple, user-transparent security measures, which makes those measures equally effective.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: charlie griefer</title>
		<link>https://www.barneyb.com/barneyblog/2006/07/28/captcha-eeeewwwww/comment-page-1/#comment-374</link>
		<dc:creator>charlie griefer</dc:creator>
		<pubDate>Fri, 28 Jul 2006 17:54:39 +0000</pubDate>
		<guid isPermaLink="false">http://barneyb.com/barneyblog/?p=174#comment-374</guid>
		<description>I just signed up for a forum today, and at the bottom there were two radio buttons.  the one that was checked by default said something along the lines of &quot;i am a bot and won&#039;t know enough to click the other radio button&quot;, and the 2nd (unchecked) button had text that read, &quot;I&#039;m a human.  Let me in&quot;.

I&#039;ll admit, I thought that was a better alternative than trying to figure out some CAPTCHAs that I&#039;ve seen.  Altho I don&#039;t profess to know how successful something like that is vs. a CAPTCHA system&#039;s success rate.</description>
		<content:encoded><![CDATA[<p>I just signed up for a forum today, and at the bottom there were two radio buttons.  the one that was checked by default said something along the lines of "i am a bot and won't know enough to click the other radio button", and the 2nd (unchecked) button had text that read, "I'm a human.  Let me in".</p>
<p>I'll admit, I thought that was a better alternative than trying to figure out some CAPTCHAs that I've seen.  Altho I don't profess to know how successful something like that is vs. a CAPTCHA system's success rate.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sami Hoda</title>
		<link>https://www.barneyb.com/barneyblog/2006/07/28/captcha-eeeewwwww/comment-page-1/#comment-373</link>
		<dc:creator>Sami Hoda</dc:creator>
		<pubDate>Fri, 28 Jul 2006 17:50:15 +0000</pubDate>
		<guid isPermaLink="false">http://barneyb.com/barneyblog/?p=174#comment-373</guid>
		<description>What do you guys think of Math Captcha&#039;s? Like the one on Kurt Wiersma&#039;s blog?</description>
		<content:encoded><![CDATA[<p>What do you guys think of Math Captcha's? Like the one on Kurt Wiersma's blog?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Peter J. Farrell</title>
		<link>https://www.barneyb.com/barneyblog/2006/07/28/captcha-eeeewwwww/comment-page-1/#comment-372</link>
		<dc:creator>Peter J. Farrell</dc:creator>
		<pubDate>Fri, 28 Jul 2006 15:48:06 +0000</pubDate>
		<guid isPermaLink="false">http://barneyb.com/barneyblog/?p=174#comment-372</guid>
		<description>Barney,

While you may not like Captcha - the technology is here to stay until there is an international identification / authentication system in place.  According to the research, Captchas are usually only solvable about 80% of the time for humans.  Sometimes you have to guess and computer just don&#039;t guess well.

This is because OCR technology has gotten pretty good.  For example, the Captcha on the PayPal signup page is 100% defeatable with consumer grade OCR software.  Many people have already defeated it.

I think spammers are just not targetting you fully - yet.  Matt Woodward did similar stuff like you have done to combat spam.  After a while, the spammer were adapting to changes after just a few minutes.

Lastly, I&#039;ll take a Captcha over having to create an account on somebody&#039;s blog to make comment any day!  I&#039;ll fill in a Captcha, but I won&#039;t create an account.</description>
		<content:encoded><![CDATA[<p>Barney,</p>
<p>While you may not like Captcha &#8211; the technology is here to stay until there is an international identification / authentication system in place.  According to the research, Captchas are usually only solvable about 80% of the time for humans.  Sometimes you have to guess and computer just don't guess well.</p>
<p>This is because OCR technology has gotten pretty good.  For example, the Captcha on the PayPal signup page is 100% defeatable with consumer grade OCR software.  Many people have already defeated it.</p>
<p>I think spammers are just not targetting you fully &#8211; yet.  Matt Woodward did similar stuff like you have done to combat spam.  After a while, the spammer were adapting to changes after just a few minutes.</p>
<p>Lastly, I'll take a Captcha over having to create an account on somebody's blog to make comment any day!  I'll fill in a Captcha, but I won't create an account.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
