The simplicity of it is logic defying. It used to be that you had to find crosswalks or move puzzle pieces or type blurred letters and numbers, but NOW all the sudden I can just click a box and HEY!, I’m human?

That’s hardly the Turing Test I’d expected.

  • Lem Jukes@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    22 days ago

    A side to this is that certain techniques will be deliberately obfuscated or simply omitted as a security measure in the hopes of slowing a bad actor’s eventual bypassing of the measure. It’s an arms race and if the intruder doesn’t know what all the locks even are, it takes longer to break or pick them.

  • The_Walkening [none/use name]@hexbear.net
    link
    fedilink
    English
    arrow-up
    0
    ·
    22 days ago

    The timing of the click captcha loading is randomized and it probably is looking for human-ish cursor movement? (Like you’re probably moving your hand in imperceptibly small ways that are difficult to replicate). Clicking before it loads and doing it repeatedly probably triggers detection.

    • Paradachshund@lemmy.today
      link
      fedilink
      arrow-up
      0
      ·
      22 days ago

      This is correct. Those captchas are tracking everything they can and comparing it to other results to try and figure this out. Mouse movement, delay before you click, everything.

    • tetris11@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      22 days ago

      I used to think it was timing based, but now leaning on the idea that it just performs more fingerprinting in the background: user agent per ip pool, canvas or puppeteer checks.

  • brianorca@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    21 days ago

    Others mention the mouse motion, and monitoring your other traffic to similar sites. When it shows the checkbox, it has already determined you are probably human. If you had suspicious activity, they will give you more advanced tests instead of just a checkbox.

    • BigMikeInAustin@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      21 days ago

      If you don’t know you don’t need to reply.

      What’s the purpose of making fun of someone for asking a question to try to learn?

    • Gamoc@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      21 days ago

      Ha! They must have missed the billboards, front page newspaper articles, TV reports, and public service annou- oh wait.

    • Melatonin@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      21 days ago

      I have not been in a coma but…

      I could possibly be the least aware person you’ve ever had a conversation with, digital or otherwise.

      I used to have “weekends” that rotated to different two-day sets every year. One year I got Wednesday and Thursday. I told my wife, “It’s not so bad. At least Thanksgiving falls on a Thursday this year. I checked.” She looked at me and said, “Thanksgiving is on a Thursday every year.” I was over thirty. Had no idea.

      She’s a very patient woman.

  • Mambert@beehaw.org
    link
    fedilink
    arrow-up
    0
    ·
    22 days ago

    Basically bots would automatically click on it, teleporting the cursor to the very center of the button. They will do this within exact milliseconds of the page loading.

    Humans read something on the site, then find the banner, and move the cursor over to it, confirm that the cursor is somewhere on the button, and then click it.

    It’s not just the button, it’s the before the button that determines you’re a bot or not.

  • Itdidnttrickledown@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    21 days ago

    I’m pretty sure I’m a robot since they often force me to select the motorcycle from a picture that is just one motor cycle. If I select every part of it I fail every time. Same thing with street lights and fire plugs.

    • Melatonin@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      21 days ago

      I often wonder if that’s a fail or just some tech sitting in a room saying “Now do THIS!” and pressing refresh over and over.

  • trustnoone@lemmy.sdf.org
    link
    fedilink
    arrow-up
    0
    ·
    21 days ago

    Theres a few answrs to this

    1. It uses your movements before this to determine whether it feels like your a bot or not
    2. It makes you wait, the biggest issue with bots is they may try to log in say 50 different passwords for example, so if it takes 5 seconds to do each one it makes boting multiple acounts not worth it.
    3. Google uses catchphas with images to choose. They use this to train their own AI or data to sell
    • IphtashuFitz@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      21 days ago

      Smarter bots know how to easily avoid being detected based on the speed of their requests by simply adding a random delay to them. A few years ago we discovered a very slow speed credential stuffing attack (testing usernames & passwords) against my employers site. It was only testing one set of credentials every couple of minutes.

      Once we discovered it we didn’t block it though. We were able to spot the attack fairly easily once we knew what to look for, so we updated our system to always return a login failure no matter what credentials they sent.

    • Black_Mald_Futures [any]@hexbear.net
      link
      fedilink
      English
      arrow-up
      0
      ·
      22 days ago

      They’re literally using captchas to train AI, that’s why you have to identify 50 ffucking bicycles and fire hydrants sometimes. I’m pissed off at all the fucking free work I’ve had to do just to log in to shit

  • 0laura@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    21 days ago

    By clicking the box you agree to the terms and conditions which gives them permission to use all the data they have about you to decide whether you’re human. That and mouse movement probably.

  • davel@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    22 days ago

    01100011 01101100 01101111 01110101 01100100 01100110 01101100 01100001 01110010 01100101 00100000 01110000 01110101 01110100 01110011 00100000 01101101 01100101 00100000 01101001 01101110 00100000 01100001 01101110 00100000 01101001 01101110 01100110 01101001 01101110 01101001 01110100 01100101 00100000 01101100 01101111 01101111 01110000 00100000 01110011 01101111 01101101 01100101 01110100 01101001 01101101 01100101 01110011

  • elrik@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    22 days ago

    Proof of work, which becomes computationally expensive to scale, along with other heuristics based on your browser and page interaction. I believe it’s less about clicking the box and what happens after you’ve clicked the box.

    • SerotoninSwells@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      22 days ago

      This is correct. I work in bot detections. There are baseline checks for various browser automation used as bot frameworks like Puppeteer or Playwright. Then there is basic analysis of server side and client side fingerprints; meaning, do the fingerprints you claim make sense. There are other heuristics too and I imagine Cloudflare is monitoring movements that point to automation. All of this happens after you click. I personally prefer this over Google’s captcha which frequently doesn’t recognize me as a human but is easily bypassed by bots.

    • Dasus@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      22 days ago

      I believe it’s less about clicking the box and what happens after you’ve clicked the box.

      I think it’s before, not after.

  • brian@programming.dev
    link
    fedilink
    arrow-up
    0
    ·
    22 days ago

    some of them are also less bot detection and more spam limiting and mitigation. cloudflare’s has more stuff built in I’m sure, but things like mCapcha are just proof of work, so if you’re trying to make a bunch of accounts or whatever, it’s really computationally expensive.

    • tills13@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      21 days ago

      The newest models already know whether you’re a bot or not before the checkbox loads. A massive majority of the internet goes through Cloudflare so by the time you land on a site you already have what Cloudflare dubs a Bot Score based on your behavior across the web.

      Checking the box really just confirms what they already know. There’s a second form which I’m sure is even more prevalent than the checkbox that renders nothing, requires no user action, but can prevent form submission if you fail the check.

  • Magnetic_dud@discuss.tchncs.de
    link
    fedilink
    arrow-up
    0
    ·
    20 days ago

    Cloudflare knows almost everything done from your IP address because they’re used by the majority of websites. And some websites are using a cloudflare signed TLS certificate so if cloudflare wants, can see the content of the communication instead of an encrypted package

    So they know if you have a human behavior (visiting many different websites at human speed and having rests during sleeping time) or if you have a bot behavior (sending millions of requests to the same endpoint at superhuman speeds)

    • kahdbrixk@feddit.org
      link
      fedilink
      Deutsch
      arrow-up
      0
      ·
      20 days ago

      I’d argue that the certificate authority does not have the ability to decrypt your communication because of the nature of private and public key mechanism during the whole TLS certificate procedure. You do not send your web servers private key to cloudflare when requesting a certificate.

      That would actually be pretty wild…

      Other then that you’re probably right.

      • Magnetic_dud@discuss.tchncs.de
        link
        fedilink
        arrow-up
        0
        ·
        19 days ago

        There’s a default setting that allows unencrypted communication between the server and cloudflare. So they receive unencrypted data, sign with their certificate. Or send with self signed certificate, they decrypt and reencrypt. Or for some reason can download and import on the server their own internal use certificate.

        • kahdbrixk@feddit.org
          link
          fedilink
          Deutsch
          arrow-up
          0
          ·
          18 days ago

          You’re right, forgot that you can just not encrypt on your servers end and use cloudflare to do that for you, especially when used as CDN

  • wuphysics87@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    22 days ago

    Humans have mouse movement that, on August 8, 2024, are very hard to reproduce. But just like regular captchas we are just teaching computers to do the same thing.