CAPTCHA: Difference between revisions

Content deleted Content added
I removed spaces, and removed a advertisement.
(36 intermediate revisions by 25 users not shown)
Line 3:
{{Cleanup rewrite|date=November 2022|It feels like an essay criticising CAPTCHA|section=no}}
{{Use dmy dates|date=October 2022}}
[[File:captcha.jpg|upright=1.35|thumb|This CAPTCHA (Version[[reCAPTCHA 1{{clarifyme|date=June 2023}}v1]]) of "smwm" obscures its message from computer interpretation by twisting the letters and adding a slight background color gradient.]]
 
A '''CAPTCHA''' ({{IPAc-en|ˈ|k|æ|p|.|tʃ|ə}} {{respell|KAP|chə}}) is a type of [[challenge–response authentication|challenge–response]] test used in [[computing]] to determine whether the user is human in order to deter bot attacks and spam.<ref>{{Cite web|title=The reCAPTCHA Project – Carnegie Mellon University CyLab|url=https://www.cylab.cmu.edu/partners/success-stories/recaptcha.html|url-status=dead|archive-url=https://web.archive.org/web/20171027203659/https://www.cylab.cmu.edu/partners/success-stories/recaptcha.html|archive-date=2017-10-27|access-date=2017-01-13|website=www.cylab.cmu.edu}}</ref>
 
The term was coined in 2003 by [[Luis von Ahn]], [[Manuel Blum]], Nicholas J. Hopper, and [[John Langford (computer scientist)|John Langford]].<ref name="abhl" /> It is a [[contrived acronym]] for "Completely Automated Public [[Turing test]] to tell Computers and Humans Apart."<ref>{{Cite web |title=What is CAPTCHA? |url=https://support.google.com/a/answer/1217728 |url-status=live |archive-url=https://web.archive.org/web/20200806173938/https://support.google.com/a/answer/1217728 |archive-date=6 August 2020 |access-date=2022-09-09 |website=Google Support |publisher=Google Inc. |quote=CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a [...]}}</ref> A historically common type of CAPTCHA (displayed as Version[[reCAPTCHA 1.0{{clarifyme|date=June 2023}}v1]]) was first invented in 1997 by two groups working in parallel. This form of CAPTCHA requires entering a sequence of letters or numbers in a distorted image. Because the test is administered by a computer, in contrast to the standard Turing test that is administered by a human, CAPTCHAs are sometimes described as [[reverse Turing test|reverse Turing tests]]s.<ref>{{citeCite journal |last=Mayumi Takaya |last2=Yusuke Tsuruta |last3=Akihiro Yamamura |date=2013-09-30 |title=Reverse Turing Test using Touchscreens and CAPTCHA web|url=http://isyou.info/jowua/papers/jowua-v4n3-3.pdf |titlejournal=ReverseJournal Turingof TestWireless usingMobile TouchscreensNetworks, Ubiquitous Computing, and CAPTCHA∗|author1=MayumiDependable Applications Takaya|author2volume=Yusuke4 Tsuruta2|author3issue=Akihiro3 Yamamura1|publisherpages=Akita41–57 University|access-datedoi=10 January 2019.22667/JOWUA.2013.09.31.041|archive-date=22 August 2017|archive-url=https://web.archive.org/web/20170822001858/http://isyou.info/jowua/papers/jowua-v4n3-3.pdf|url-status=live}}</ref>
 
Two widely used CAPTCHA services are hCaptcha,[[Google]]'s [[reCAPTCHA]]<ref>{{Cite web |title=WebsitesWhat usingis hCaptchareCAPTCHA? –?reCAPTCHA Help |url=https://trendssupport.builtwithgoogle.com/websitelistrecaptcha/hCaptchaanswer/6080904?hl=en |access-date=20222023-1107-1020 |website=trendssupport.builtwithgoogle.com |archive-date=1020 NovemberJuly 20222023 |archive-url=https://web.archive.org/web/2022111002040820230720192427/https://trends.builtwith.com/websitelist/hCaptcha |url-status=live }}</ref> an independent company,<ref>{{Cite web |title=hCaptcha – About Us |url=https://www.hcaptcha.com/about |access-date=2023-07-20 |website=www.hcaptcha.com |language=en}}</ref> and [[reCAPTCHA]], offered by [[Google]].<ref>{{Cite web |title=What is reCAPTCHA? –?reCAPTCHA Help |url=https://support.google.com/recaptcha/answer/6080904?hl=en |accessurl-datestatus=2023-07-20live |website=support.google.com}}</ref><ref>{{Cite web |last=Sulgrove |first=Jonathan |date=2022-07-07 |title=reCAPTCHA: What It Is and Why You Should Use It on Your Website – TSTS |url=https://www.tsts.com/blog/recaptcha-what-it-is-and-why-you-should-use-it-on-your-website/ |access-date=2022-11-10 |website=Twin State Technical Services |language=en-US |archive-date=10 November 2022 |archive-url=https://web.archive.org/web/20221110020410/https://www.tsts.com/blog/recaptcha-what-it-is-and-why-you-should-use-it-on-your-website/ |url-status=live }}</ref> and the independent hCaptcha.<ref>{{Cite web |title=Websites using hCaptcha |url=https://trends.builtwith.com/websitelist/hCaptcha |access-date=2022-11-10 |website=trends.builtwith.com |archive-date=10 November 2022 |archive-url=https://web.archive.org/web/20221110020408/https://trends.builtwith.com/websitelist/hCaptcha |url-status=live }}</ref><ref>{{Cite web |title=hCaptcha – About Us |url=https://www.hcaptcha.com/about |access-date=2023-07-20 |website=www.hcaptcha.com |language=en |archive-date=20 July 2023 |archive-url=https://web.archive.org/web/20230720192429/https://www.hcaptcha.com/about |url-status=live }}</ref> It takes the average person approximately 10 seconds to solve a typical CAPTCHA.<ref>{{cite book|last1=Bursztein|first1=Elie|last2=Bethard|first2=Steven|last3=Fabry|first3=Celine|last4=Mitchell|first4=John C.|last5=Jurafsky|first5=Dan|title=2010 IEEE Symposium on Security and Privacy |chapter=How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation |access-date=March 30, 2018|chapter-url=https://web.stanford.edu/~jurafsky/burszstein_2010_captcha.pdf|year=2010|pages=399–413|doi=10.1109/SP.2010.31|citeseerx=10.1.1.164.7848|isbn=978-1-4244-6894-2|s2cid=14204454|archive-date=8 August 2018|archive-url=https://web.archive.org/web/20180808033552/https://web.stanford.edu/~jurafsky/burszstein_2010_captcha.pdf|url-status=live}}</ref>
 
== Purpose ==
CAPTCHAs'The purpose of CAPTCHAs is to prevent spam on websites, such as promotion spam, registration spam, and data scraping, and bots are less likely to abuse websites with spamming if those websites use CAPTCHA. Many websites use CAPTCHA effectively to prevent bot raiding. CAPTCHAs are designed so that humans can complete them, while most robots cannot.<ref>{{Cite web |last=Stec |first=Albert |date=2022-06-12 |title=What is CAPTCHA and How Does It Work? {{!}} Baeldung on Computer Science |url=https://www.baeldung.com/cs/captcha-intro |url-status=live |archive-url=https://web.archive.org/web/20221101005730/https://www.baeldung.com/cs/captcha-intro |archive-date=1 November 2022 |access-date=2022-11-01 |website=www.baeldung.comBaeldung on Computer Science |language=en-US}}</ref> Newer CAPTCHAs look at the user's behaviour on the internet, to prove that they are a human.<ref>{{Cite web |date=November 1, 2022 |title=What is a CAPTCHA? |url=https://www.cloudflare.com/learning/bots/how-captchas-work/ |url-status=live |archive-url=https://web.archive.org/web/20221027061629/https://www.cloudflare.com/learning/bots/how-captchas-work/ |archive-date=27 October 2022 |access-date=November 1, 2022 |website=Cloudflare}}</ref> A normal CAPTCHA test only appears if the user acts like a bot, such as when they request webpages, or click links too fast.
 
== History ==
Line 19:
One of the earliest commercial uses of CAPTCHAs was in the Gausebeck–Levchin test. In 2000, idrive.com began to protect its signup page<ref>{{Cite web|title=idrive turing signup page|url=https://drive.google.com/open?id=0BzbOLm20p6CrUE1SSXp5Zjl2MW8|access-date=2017-05-19|website=Google Drive|archive-date=15 March 2023|archive-url=https://web.archive.org/web/20230315233241/https://accounts.google.com/v3/signin/identifier?dsh=S-569764738%3A1678923161301090&continue=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fdrive.google.com%2Fopen%3Fid%3D0BzbOLm20p6CrUE1SSXp5Zjl2MW8&followup=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fdrive.google.com%2Fopen%3Fid%3D0BzbOLm20p6CrUE1SSXp5Zjl2MW8&ifkv=AWnogHfb-QQLSi-KGh4vgzje6iZGJ1BZZvpaKSlXZLsXVSfSHlafPjo8v6B9qJTV2nuxzahDQYGTtw&osid=1&passive=1209600&service=wise&flowName=GlifWebSignIn&flowEntry=ServiceLogin|url-status=live}}</ref> with a CAPTCHA and prepared to file a patent.<ref name=":1">{{Cite web|url=https://drive.google.com/open?id=0BzbOLm20p6CrOS1mWEhITGJ4d2s|title=idrive turing patent application|access-date=2017-05-19|archive-date=15 March 2023|archive-url=https://web.archive.org/web/20230315233244/https://accounts.google.com/v3/signin/identifier?dsh=S956306740%3A1678923164278227&continue=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fdrive.google.com%2Fopen%3Fid%3D0BzbOLm20p6CrOS1mWEhITGJ4d2s&followup=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fdrive.google.com%2Fopen%3Fid%3D0BzbOLm20p6CrOS1mWEhITGJ4d2s&ifkv=AWnogHfWh9qH38C8IGelcYVq9WSJcqP6Q30eP1Bba6t1EcfIlDb1n3eZMtAJSv1IRxdTdxgTsu8r0A&osid=1&passive=1209600&service=wise&flowName=GlifWebSignIn&flowEntry=ServiceLogin|url-status=live}}</ref> In 2001, [[PayPal]] used such tests as part of a fraud prevention strategy in which they asked humans to "retype distorted text that programs have difficulty recognizing."<ref name=stringham2015>{{cite book |last1=Stringham|first1=Edward P |title=Private Governance : creating order in economic and social life |publisher=[[Oxford University Press]] |year=2015 |page=105 |isbn=978-0-19-936516-6 |oclc=5881934034 }}</ref> PayPal co founder and CTO [[Max Levchin]] helped commercialize this use.
 
A popular deployment of CAPTCHA technology, [[reCAPTCHA]], was acquired by Google in 2009.<ref>{{cite web |title=Teaching computers to read: Google acquires reCAPTCHA |url=https://googleblog.blogspot.com/2009/09/teaching-computers-to-read-google.html |url-status=live |archive-url=https://web.archive.org/web/20190831195346/https://googleblog.blogspot.com/2009/09/teaching-computers-to-read-google.html |archive-date=31 August 2019 |access-date=29 October 2018 |website=Google Official Blog}}</ref> In addition to preventing bot fraud for its users, Google used reCAPTCHA and CAPTCHA technology to digitize the archives of ''[[The New York Times]]'' and books from Google Books in 2011.<ref>{{cite news |last1=Gugliotta |first1=Guy |date=28 March 2011 |title=Deciphering Old Texts, One Woozy, Curvy Word at a Time |website=The New York Times |url=https://www.nytimes.com/2011/03/29/science/29recaptcha.html |url-status=live |access-date=29 October 2018 |archive-url=https://web.archive.org/web/20171117172409/http://www.nytimes.com/2011/03/29/science/29recaptcha.html |archive-date=17 November 2017}}</ref>
=== Invention ===
Eran Reshef, [[Gili Raanan]] and Eilon Solan<ref name=":0">{{cite patent|country=US|number=2005/0114705 A1|status=|title=Method and system for discriminating a human action from a computerized action|pubdate=26 May 2005|gdate=|pridate=11 December 1997|fdate=1 March 2004|inventor1-first=Eran|inventor1-last=Reshef|inventor2-first=Gil|inventor2-last=Raanan|inventorlink2=Gili Raanan|inventor3-first=Eilon|inventor3-last=Solan|url=https://patentimages.storage.googleapis.com/9c/fc/21/1188d59d94d268/US20050114705A1.pdf}} {{Webarchive|url=https://web.archive.org/web/20190224001924/https://patentimages.storage.googleapis.com/9c/fc/21/1188d59d94d268/US20050114705A1.pdf |date=24 February 2019 }}</ref> who worked at [[Sanctum (company)|Sanctum]] on [[Web application firewall|Application Security Firewall]] first patented CAPTCHA in 1997. Their patent application details that "The invention is based on applying human advantage in applying sensory and cognitive skills to solving simple problems that prove to be extremely hard for computer software. Such skills include, but are not limited to processing of sensory information such as identification of objects and letters within a noisy graphical environment".{{Citation needed|date=June 2023}}
 
== Characteristics ==
Line 33 ⟶ 32:
Each of these problems poses a significant challenge for a computer, even in isolation. Therefore, these three techniques in tandem make CAPTCHAs difficult for computers to solve.<ref name=bursz>{{cite book|last1=Bursztein|first1=Elie|first2=Matthieu|last2=Martin|first3=John C.|last3=Mitchell|chapter=Text-based CAPTCHA Strengths and Weaknesses|title=ACM Computer and Communication Security 2011 (CSS'2011)|year=2011|chapter-url=https://www.elie.net/publication/text-based-captcha-strengths-and-weaknesses|access-date=5 April 2016|archive-date=24 November 2015|archive-url=https://web.archive.org/web/20151124055747/https://www.elie.net/publication/text-based-captcha-strengths-and-weaknesses|url-status=live}}</ref>
 
Whilst primarily used for security reasons, CAPTCHAs can also serve as a benchmark task for artificial intelligence technologies. According to an article by Ahn, Blum and Langford,<ref name=Ahn2003>{{Cite book| chapter-url=https://link.springer.com/content/pdf/10.1007/3-540-39200-9_18.pdf| doi=10.1007/3-540-39200-9_18| chapter=CAPTCHA: Using Hard AI Problems for Security| title=Advances in Cryptology—EUROCRYPT 2003| volume=2656| pages=294–311| series=Lecture Notes in Computer Science| year=2003| last1=von Ahn| first1=Luis| last2=Blum| first2=Manuel| last3=Hopper| first3=Nicholas J.| last4=Langford| first4=John| isbn=978-3-540-14039-9| s2cid=5658745| access-date=30 August 2019| archive-date=4 May 2019| archive-url=https://web.archive.org/web/20190504115630/https://link.springer.com/content/pdf/10.1007%2F3-540-39200-9_18.pdf| url-status=live}}</ref> "any program that passes the tests generated by a CAPTCHA can be used to solve a hard unsolved AI problem."<ref>Moy{{Cite G,conference N|last=Moy |first=Gabriel |last2=Jones and C|first2=Nathan |last3=Harkless (|first3=Curt |last4=Potter |first4=Randall |date=2004) "[|title=Distortion estimation techniques in solving visual CAPTCHAs |url=http://www.cs.duke.edu/courses/cps296.3/spring07/breaking_captchas.pdf Distortion|publisher=IEEE estimation|volume=2 techniques|pages=23–28 in|doi=10.1109/CVPR.2004.1315140 solving visual CAPTCHAs] {{Webarchive|urlisbn=978-0-7695-2158-9|archiveurl=https://web.archive.org/web/20200729175253/https://www2.cs.duke.edu/courses/cps296.3/spring07/breaking_captchas.pdf |datearchivedate=29 July 2020|conference=[[Conference }}",on Computer Vision and Pattern Recognition|Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.]]}}</ref> They argue that the advantages of using [[AI-complete|hard AI]] problems as a means for security are twofold. Either the problem goes unsolved and there remains a reliable method for distinguishing humans from computers, or the problem is solved and a difficult AI problem is resolved along with it.<ref name="Ahn2003" />
 
== Accessibility ==
{{See also|Web accessibility}}
[[File:FancyCaptcha screenshot.png|left|thumb|260px|Many websites require typing a CAPTCHA when creating an account to prevent spam. This image contains a user trying to type the CAPTCHA word "sepalbeam" to protect against automated spam.]]
 
CAPTCHAs based on reading text—or other visual-perception tasks—prevent [[blindness|blind]] or [[visual impairment|visually impaired]] users from accessing the protected resource.<ref name="w3c_inaccessibility">{{cite web |url=http://www.w3.org/TR/turingtest/ |title=Inaccessibility of CAPTCHA |date=2005-11-23 |access-date=2015-04-27 |publisher=[[W3C]] |author=May, Matt |archive-date=21 May 2012 |archive-url=https://web.archive.org/web/20120521023537/http://www.w3.org/TR/turingtest/ |url-status=live }}</ref><ref>{{cite Howevermagazine |author=Shea, CAPTCHAsMichael do|url=http://www.theskinny.co.uk/tech/features/captcha-spambots-ebooks-and-the-turing-test not|title=CAPTCHA: haveSpambots, toeBooks beand visual.the AnyTuring hardTest [[artificial|date=19 intelligence]]November problem, such as2015 |magazine=[[speechThe Skinny (magazine)|The recognitionSkinny]], can|access-date=9 beJanuary used2016 as|archive-date=27 CAPTCHAJanuary 2016 |archive-url=https://web.archive.org/web/20160127043239/http://www.theskinny.co.uk/tech/features/captcha-spambots-ebooks-and-the-turing-test Some|url-status=live implementations}}</ref> ofBecause CAPTCHAs permitare usersdesigned to optbe forunreadable anby audio CAPTCHAmachines, common [[assistive technology]] tools such as reCAPTCHA,[[screen thoughreaders]] acannot 2011interpret paperthem. demonstratedThe use of CAPTCHA thus excludes a techniquesmall forpercentage defeatingof theusers popularfrom schemesusing atsignificant thesubsets time.<ref>{{citeof book|last1=Bursztein|first1=Elie|first2=Romain|last2=Beauxis|first3=Hristo|last3=Perito|first4=Daniele|last4=Paskov|last5=fabry|first5=Celine|last6=Mitchell|first6=Johnsuch C.|title=2011common IEEEWeb-based Symposiumservices onas SecurityPayPal, andGmail, PrivacyOrkut, |chapter=TheYahoo!, Failuremany offorum Noise-Basedand Non-continuousweblog Audiosystems, Captchasetc.<ref>{{Cite web|pagestitle=19–31Inaccessibility of CAPTCHA|year=2011|chapter-url=https://www.eliew3.netorg/publicationTR/the2019/NOTE-failureturingtest-of-noise-based-non-continuous-audio-captchas|doi=10.110920191209/SP.2011Overview.14html|isbnaccess-date=9782020-110-4577-0147-431|s2cidwebsite=6933726|access-date=5 April 2016www.w3.org|archive-date=164 AprilNovember 20162020|archive-url=https://web.archive.org/web/2016041622142720201104011109/https://www.eliew3.netorg/publicationTR/the2019/NOTE-failureturingtest-of-noise-based-non-continuous-audio-captchas20191209/Overview.html|url-status=live}}</ref> In certain jurisdictions, site owners could become targets of litigation if they are using CAPTCHAs that discriminate against certain people with disabilities. For example, a CAPTCHA may make a site incompatible with [[Section 508]] in the United States.
 
CAPTCHAs do not have to be visual. Any hard [[artificial intelligence]] problem, such as [[speech recognition]], can be used as CAPTCHA. Some implementations of CAPTCHAs permit users to opt for an audio CAPTCHA, such as reCAPTCHA, though a 2011 paper demonstrated a technique for defeating the popular schemes at the time.<ref>{{cite book|last1=Bursztein|first1=Elie|first2=Romain|last2=Beauxis|first3=Hristo|last3=Perito|first4=Daniele|last4=Paskov|last5=fabry|first5=Celine|last6=Mitchell|first6=John C.|title=2011 IEEE Symposium on Security and Privacy |chapter=The Failure of Noise-Based Non-continuous Audio Captchas |pages=19–31|year=2011|chapter-url=https://www.elie.net/publication/the-failure-of-noise-based-non-continuous-audio-captchas|doi=10.1109/SP.2011.14|isbn=978-1-4577-0147-4|s2cid=6933726|access-date=5 April 2016|archive-date=16 April 2016|archive-url=https://web.archive.org/web/20160416221427/https://www.elie.net/publication/the-failure-of-noise-based-non-continuous-audio-captchas|url-status=live}}</ref>
Blind or visually impaired people have problems with CAPTCHAs.<ref>{{cite magazine |author=Shea, Michael |url=http://www.theskinny.co.uk/tech/features/captcha-spambots-ebooks-and-the-turing-test |title=CAPTCHA: Spambots, eBooks and the Turing Test |date=19 November 2015 |magazine=[[The Skinny (magazine)|The Skinny]] |access-date=9 January 2016 |archive-date=27 January 2016 |archive-url=https://web.archive.org/web/20160127043239/http://www.theskinny.co.uk/tech/features/captcha-spambots-ebooks-and-the-turing-test |url-status=live }}</ref> Because CAPTCHAs are designed to be unreadable by machines, common [[assistive technology]] tools such as [[screen readers]] cannot interpret them. Since sites may use CAPTCHAs as part of the initial registration process, or even every login, this challenge can block access. In certain jurisdictions, site owners could become targets of litigation if they are using CAPTCHAs that discriminate against certain people with disabilities. For example, a CAPTCHA may make a site incompatible with [[Section 508]] in the United States.
 
The use of CAPTCHA thus excludes a small percentage of users from using significant subsets of such common Web-based services as PayPal, Gmail, Orkut, Yahoo!, many forum and weblog systems, etc.<ref>{{Cite web|title=Inaccessibility of CAPTCHA|url=https://www.w3.org/TR/2019/NOTE-turingtest-20191209/Overview.html|access-date=2020-10-31|website=www.w3.org|archive-date=4 November 2020|archive-url=https://web.archive.org/web/20201104011109/https://www.w3.org/TR/2019/NOTE-turingtest-20191209/Overview.html|url-status=live}}</ref>
 
It has been reported that the new generations of graphical CAPTCHAs, designed to overcome sophisticated recognition software, can be very hard or impossible to read for general internet users and not those who experience low vision or blindness.<!-- This sounds pretentious! --><ref>{{Cite web |title=Why are CAPTCHAs so hard to read? |url=https://www.quora.com/Why-are-CAPTCHAs-so-hard-to-read |access-date=2022-10-27 |website=Quora |language=en |archive-date=15 March 2023 |archive-url=https://web.archive.org/web/20230315233247/https://www.quora.com/Why-are-CAPTCHAs-so-hard-to-read |url-status=live }}</ref>
 
A method of improving CAPTCHA to ease the work with it was proposed by ProtectWebForm and named "Smart CAPTCHA".<ref>{{cite web|date=2006-10-08|title=Smart Captcha|url=http://www.protectwebform.com/smartcaptcha|url-status=dead|archive-url=https://web.archive.org/web/20161104163541/http://protectwebform.com/smartcaptcha|archive-date=2016-11-04|access-date=2017-09-15|publisher=Protect Web Form .COM}}</ref> Developers are advised to combine CAPTCHA with JavaScript. Since it is hard for most bots to parse and execute JavaScript, a combinatory method which fills the CAPTCHA fields and hides both the image and the field from human eyes was proposed.<ref>{{Cite web |title=Invisible reCAPTCHA |url=https://developers.google.com/recaptcha/docs/invisible |access-date=2022-10-28 |website=Google Developers |language=en |archive-date=16 January 2020 |archive-url=https://web.archive.org/web/20200116133416/https://developers.google.com/recaptcha/docs/invisible |url-status=live }}</ref>
Line 54 ⟶ 49:
 
== Circumvention ==
Two main ways to bypass CAPTCHA include using cheap human labor to recognize them, and using [[machine learning]] to build an automated solver.<ref>{{cite book|last=Jakobsson|first=Markus|title=The death of the Internet|url=http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118062418.html|access-date=4 April 2016|date=August 2012|archive-date=15 October 2014|archive-url=https://web.archive.org/web/20141015182639/http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118062418.html|url-status=live}}</ref> According to former Google "''[[click fraud]] czar''" [[Shuman Ghosemajumder]], there are numerous services which solve CAPTCHAs automatically.<ref name=ai-security>{{cite news |last=Ghosemajumder |first=Shuman |title=The Imitation Game: The New Frontline of Security |url=http://www.infoq.com/presentations/ai-security |agency=InfoQ |access-date=8 December 2015 |newspaper=InfoQ |date=8 December 2015 |archive-date=23 March 2019 |archive-url=https://web.archive.org/web/20190323061742/https://www.infoq.com/presentations/ai-security |url-status=live }}</ref>
 
=== Machine learning-basedlearning–based attacks ===
Two main ways to bypass CAPTCHA include using cheap human labor to recognize them, and using [[machine learning]] to build an automated solver.<ref>{{cite book|last=Jakobsson|first=Markus|title=The death of the Internet|url=http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118062418.html|access-date=4 April 2016|date=August 2012|archive-date=15 October 2014|archive-url=https://web.archive.org/web/20141015182639/http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118062418.html|url-status=live}}</ref> According to former Google "''[[click fraud]] czar''" [[Shuman Ghosemajumder]], there are numerous services which solve CAPTCHAs automatically.<ref name=ai-security>{{cite news |last=Ghosemajumder |first=Shuman |title=The Imitation Game: The New Frontline of Security |url=http://www.infoq.com/presentations/ai-security |agency=InfoQ |access-date=8 December 2015 |newspaper=InfoQ |date=8 December 2015 |archive-date=23 March 2019 |archive-url=https://web.archive.org/web/20190323061742/https://www.infoq.com/presentations/ai-security |url-status=live }}</ref>
[[File:Modern-captcha.jpg|thumb|An example of a [[reCAPTCHA]] challenge from 2007, containing the words "following finding". The waviness and horizontal stroke were added to increase the difficulty of breaking the CAPTCHA with a computer program.]]
[[File:Captchacat.png|thumb|A CAPTCHA usually has a text box directly underneath where the user should fill out the text that they see. In this case, "sclt ..was here".]]
 
=== Machine learning-based attacks ===
There was not a systematic methodology for designing or evaluating early CAPTCHAs.<ref name=bursz /> As a result, there were many instances in which CAPTCHAs were of a fixed length and therefore automated tasks could be constructed to successfully make educated guesses about where segmentation should take place. Other early CAPTCHAs contained limited sets of words, which made the test much easier to game<!-- This sentence makes no sense! -->. Still others{{Example needed|date=October 2022}} made the mistake of relying too heavily on background confusion in the image. In each case, algorithms were created that were successfully able to complete the task by exploiting these design flaws. However, light changes to the CAPTCHA could thwart them. Modern CAPTCHAs like [[reCAPTCHA]] rely on present variations of characters that are collapsed together, making them hard to segment, and they have warded off automated tasks.<ref name=bursz2 />
 
[[File:Modern-captcha.jpg|thumb|An example of a [[reCAPTCHA]] challenge from 2007, containing the words "following finding". The waviness and horizontal stroke were added to increase the difficulty of breaking the CAPTCHA with a computer program.]]
[[File:Captchacat.png|thumb|A CAPTCHA usually has a text box directly underneath where the user should fill out the text that they see. In this case, "sclt ..was here".]]
 
In October 2013, artificial intelligence company [[Vicarious (Company)|Vicarious]] claimed that it had developed a generic CAPTCHA-solving algorithm that was able to solve modern CAPTCHAs with character recognition rates of up to 90%.<ref>{{cite web|last=Summers|first=Nick|title=Vicarious claims its AI software can crack up to 90% of CAPTCHAs offered by Google, Yahoo and PayPal|url=https://thenextweb.com/insider/2013/10/28/vicarious-claims-ai-software-can-now-crack-90-captchas-google-yahoo-paypal/|publisher=TNW|access-date=19 June 2018|archive-date=15 September 2018|archive-url=https://web.archive.org/web/20180915002117/https://thenextweb.com/insider/2013/10/28/vicarious-claims-ai-software-can-now-crack-90-captchas-google-yahoo-paypal/|url-status=live}}</ref> However, [[Luis von Ahn]], a pioneer of early CAPTCHA and founder of reCAPTCHA, said: "It's hard for me to be impressed since I see these every few months." 50 similar claims to that of Vicarious had been made since 2003.<ref>{{cite web|last=Hof|first=Robert|title=AI Startup Vicarious Claims Milestone In Quest To Build A Brain: Cracking CAPTCHA|url=https://www.forbes.com/sites/roberthof/2013/10/28/ai-startup-vicarious-claims-milestone-in-quest-to-build-a-brain-craking-captcha/|work=Forbes|access-date=25 August 2017|archive-date=15 September 2018|archive-url=https://web.archive.org/web/20180915002819/https://www.forbes.com/sites/roberthof/2013/10/28/ai-startup-vicarious-claims-milestone-in-quest-to-build-a-brain-craking-captcha/|url-status=live}}</ref>
Line 74 ⟶ 68:
Another technique consists of using a script to re-post the target site's CAPTCHA as a CAPTCHA to the attacker's site, which unsuspecting humans visit and solve within a short while for the script to use.<ref>{{cite web|url=http://www.boingboing.net/2004/01/27/solving_and_creating.html |title=Solving and creating captchas with free porn |last=Doctorow |first=Cory |author-link=Cory Doctorow |date=2004-01-27 |work=Boing Boing |archive-url=https://web.archive.org/web/20060209040456/http://www.boingboing.net/2004/01/27/solving_and_creating.html |archive-date=2006-02-09 |access-date=2015-04-27 |url-status=dead }}</ref><ref>{{cite web | url = http://petmail.lothar.com/design.html#auto35 | title = Hire People To Solve CAPTCHA Challenges | access-date = 2015-04-27 | date = 2005-07-21 | work = Petmail Design | archive-date = 18 September 2020 | archive-url = https://web.archive.org/web/20200918050055/http://petmail.lothar.com/design.html#auto35 | url-status = live }}</ref>
 
In 2023, the generative AI chatbot [[ChatGPT]], tricked a [[Taskrabbit|TaskRabbit]] worker tointo solvesolving a CAPTCHA by telling the worker it was not a robot and had impaired vision.<ref>{{cite web |last1=Hurler |first1=Kevin |title=Chat-GPT Pretended to Be Blind and Tricked a Human Into Solving a CAPTCHA |url=https://gizmodo.com/gpt4-open-ai-chatbot-task-rabbit-chatgpt-1850227471 |website=Gizmodo |access-date=11 April 2023 |archive-date=11 April 2023 |archive-url=https://web.archive.org/web/20230411200745/https://gizmodo.com/gpt4-open-ai-chatbot-task-rabbit-chatgpt-1850227471 |url-status=live }}</ref>
 
=== Outsourcing to paid services ===
Line 89 ⟶ 83:
Chew et al. published their work in the 7th International Information Security Conference, ISC'04, proposing three different versions of image recognition CAPTCHAs, and validating the proposal with user studies. It is suggested that one of the versions, the anomaly CAPTCHA, is best with 100% of human users being able to pass an anomaly CAPTCHA with at least 90% probability in 42 seconds.<ref>{{cite web |url=http://www.cs.berkeley.edu/~tygar/papers/Image_Recognition_CAPTCHAs/imagecaptcha.pdf |title=Image Recognition CAPTCHAs |publisher=Cs.berkeley.edu |access-date=2013-09-28 |archive-url=https://web.archive.org/web/20130510022240/http://www.cs.berkeley.edu/~tygar/papers/Image_Recognition_CAPTCHAs/imagecaptcha.pdf |archive-date=2013-05-10 |url-status=dead }}</ref> Datta et al. published their paper in the [[Association for Computing Machinery|ACM]] [[Multimedia]] '05 Conference, named IMAGINATION (IMAge Generation for INternet AuthenticaTION), proposing a systematic way to image recognition CAPTCHAs. Images are distorted so image recognition approaches cannot recognise them.<ref>{{cite web |url=http://infolab.stanford.edu/~wangz/project/imsearch/IMAGINATION/ACM05/ |title=Imagination Paper |publisher=Infolab.stanford.edu |access-date=2013-09-28 |archive-date=2 October 2013 |archive-url=https://web.archive.org/web/20131002170726/http://infolab.stanford.edu/~wangz/project/imsearch/IMAGINATION/ACM05/ |url-status=live }}</ref>
 
Microsoft (Jeremy Elson, John R. Douceur, Jon Howell, and Jared Saul) claim to have developed Animal Species Image Recognition for Restricting Access (ASIRRA) which ask users to distinguish cats from dogs. Microsoft had a beta version of this for websites to use.<ref>{{cite web |url=https://www.microsoft.com/en-us/research/publication/asirra-a-captcha-that-exploits-interest-aligned-manual-image-categorization/ |archive-url=https://web.archive.org/web/20081215032402/http://research.microsoft.com/en-us/um/redmond/projects/asirra/ |archive-date=15 December 2008 |title=Asirra is a human interactive proof that asks users to identify photos of cats and dogs |website=[[Microsoft]] |url-status=dead }}</ref> They claim "Asirra is easy for users; it can be solved by humans 99.6% of the time in under 30 seconds. Anecdotally, users seemed to find the experience of using Asirra much more enjoyable than a text-based CAPTCHA." This solution was described in a 2007 paper to Proceedings of 14th ACM Conference on Computer and Communications Security (CCS).<ref>{{citeCite conference |last=Elson |first=Jeremy |last2=Douceur |first2=John |last3=Howell |first3=Jon |last4=Saul |first4=Jared |date=October 2007 |title=Asirra: A CAPTCHA that Exploits Interest-Aligned Manual Image Categorization web|url=https://www.microsoft.com/en-us/research/publication/asirra-a-captcha-that-exploits-interest-aligned-manual-image-categorization/ |titleconference=Asirra:Proceedings Aof CAPTCHA14th thatACM ExploitsConference Interest-Alignedon ManualComputer Imageand Communications Security Categorization|websitepublisher=[[Microsoft]]|access-date=15 September 2017|archive-date=15 December 2008|archive-url=https://web.archive.org/web/20081215032402/http://research.microsoft.com/en-us/um/redmond/projects/asirra/ |archive-date=15 December 2008 |access-date=15 September 2017 |url-status=live}}</ref> It was closed in October 2014.<ref>{{citeCite web |title=After 8 years of operation, Asirra is shutting down effective October 1, 2014. Thank you to all of our users! |url=httphttps://research.microsoft.com/en-us/um/redmond/projects/asirra/installationdefault.aspx |url-status=dead |archive-url=https://web.archive.org/web/2009011203232320150207180225/httphttps://research.microsoft.com/en-us/um/redmond/projects/asirra/installationdefault.aspx |archive-date=12 January 20092015-02-07 |titlepublisher=[[Microsoft's Asirra project closed. |url-status=dead ]]}}</ref>
 
== See also ==
* [[Bot prevention]]
* [[Defense strategy (computing)]]
* [[NuCaptcha]]
* [[Proof of personhood]]
* [[Proof- of-work systemwork]]
* [[reCAPTCHA]]
 
Line 168 ⟶ 162:
 
==Further references==
* von Ahn, L; M. Blum and J. Langford. (2004) "[http://www.cs.cmu.edu/afs/cs/Web/People/aladdin/papers/pdfs/y2004/captcha_cacm.pdf Telling humans and computers apart (automatically)]". ''Communications of the ACM'', '''47'''(2):57–60.
 
== External links ==
{{Sister project links|d=Q484598|mw=CAPTCHA|voy=no|species=no|commons=Category:Captcha|v=no|q=no|n=no|s=no}}
<!--Please, no implementations here – see discussion-->
* {{Curlie|Computers/Internet/Abuse/CAPTCHA/}}
* [http://www.wisdom.weizmann.ac.il/~naor/PAPERS/human_abs.html Verification of a human in the loop, or Identification via the Turing Test], Moni Naor, 1996.
* [http://www.w3.org/TR/turingtest/ Inaccessibility of CAPTCHA: Alternatives to Visual Turing Tests on the Web], a [[W3C]] Working Group Note.