CINXE.COM

The Official CAPTCHA Site

<html> <head> <title>The Official CAPTCHA Site</title> <link rel="stylesheet" href="shared-media/styles.css" type="text/css" /> <link rel="shortcut icon" href="favicon.ico" type="image/x-icon" /> </head> <body> <table width="100%" cellspacing=0 cellpadding=0 border=0> <tr> <td rowspan=3 class=topbarTile>&nbsp;</td> <td height=39 width=544 valign="top" class="topbarTile">&nbsp;</td> <td rowspan=3 class=topbarTile>&nbsp;</td> </tr> <tr> <td width=544 align="left" valign="top" style="padding-top: 28px"> <div class="normal" style="padding-top: 0px"> <h1>CAPTCHA: Telling Humans and Computers Apart Automatically</h1> <p>A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot. For example, humans can read distorted text as the one shown below, but current computer programs can't:</p> <center><a href="http://recaptcha.net/learnmore.html"><img src="images/recaptcha-example.gif" alt="CAPTCHA example" border="0" title="see a live demo of a CAPTCHA"></a></center> <p>The term CAPTCHA (for Completely Automated Public Turing Test To Tell Computers and Humans Apart) was coined in 2000 by Luis von Ahn, Manuel Blum, Nicholas Hopper and John Langford of Carnegie Mellon University.</p> <h1><a href="http://recaptcha.net/whyrecaptcha.html" style="text-decoration:none; font-weight: bold">Get a Free CAPTCHA For Your Site</a></h1> <p>A free, secure and accessible CAPTCHA implementation is available from the <a href="http://recaptcha.net/whyrecaptcha.html"><b>reCAPTCHA project</b></a>. Easy to install plugins and controls are available for <a href="http://recaptcha.net/plugins/wordpress/" title="WordPress CAPTCHA"> WordPress</a>, <a href="http://recaptcha.net/plugins/mediawiki/" title="MediaWiki CAPTCHA"> MediaWiki</a>, <a href="http://recaptcha.net/plugins/php/" title="PHP CAPTCHA">PHP</a>, <a href="http://recaptcha.net/plugins/aspnet/" title="ASP CAPTCHA">ASP.NET</a>, Perl, Python, Java, and many other environments. reCAPTCHA also comes with an audio test to ensure that blind users can freely navigate your site. reCAPTCHA is our officially recommended CAPTCHA implementation. </p> <h1>Test Drive a CAPTCHA</h1> <ul> <li><p><a href="http://recaptcha.net/learnmore.html"><b>reCAPTCHA</b></a>. Stop spam and help digitize books at the same time! The words shown come directly from old books that are being digitized.</p> <li><p><a href="http://server251.theory.cs.cmu.edu/cgi-bin/sq-pix"><b>SQUIGL-PIX</b></a>. Our newest CAPTCHA! </p> <li><p><a href="http://server251.theory.cs.cmu.edu/cgi-bin/esp-pix/esp-pix"><b>ESP-PIX</b></a>. A CAPTCHA script that's close to our hearts. Instead of typing letters, you authenticate yourself as a human by recognizing what object is common in a set of images. This was the first example of a CAPTCHA based on image recognition.</p> </ul> <h1> <a href="http://duolingo.com" style="text-decoration:none; font-weight: bold"> New: Learn Spanish, German or French for free while translating the Web!</a></h1> <p> <table cellpadding=3 border=0> <tr> <td> <a href="http://duolingo.com"><img src="duo_logo.png" border="0" width="150"></a> </td> <td valign=top> <p>Our new site, <a href="http://duolingo.com/">duolingo.com</a> offers a way for you to learn languages 100% free while helping to translate the Web. </p> </td> </tr> </table> </p> <h1>Applications of CAPTCHAs</h1> <p>CAPTCHAs have several applications for practical security, including (but not limited to): <UL> <li><p><b>Preventing Comment Spam in Blogs.</b> Most bloggers are familiar with programs that submit bogus comments, usually for the purpose of raising search engine ranks of some website (e.g., "buy penny stocks here"). This is called comment spam. By using a CAPTCHA, only humans can enter comments on a blog. There is no need to make users sign up before they enter a comment, and no legitimate comments are ever lost!</p> <li><p><b>Protecting Website Registration.</b> Several companies (Yahoo!, Microsoft, etc.) offer free email services. Up until a few years ago, most of these services suffered from a specific type of attack: "bots" that would sign up for thousands of email accounts every minute. The solution to this problem was to use CAPTCHAs to ensure that only humans obtain free accounts. In general, free services should be protected with a CAPTCHA in order to prevent abuse by automated scripts.</p> <li><p><b>Protecting Email Addresses From Scrapers.</b> Spammers crawl the Web in search of email addresses posted in clear text. CAPTCHAs provide an effective mechanism to hide your email address from Web scrapers. The idea is to require users to solve a CAPTCHA before showing your email address. A free and secure implementation that uses CAPTCHAs to obfuscate an email address can be found at <a href="http://mailhide.recaptcha.net/">reCAPTCHA MailHide</a>.</p> <li><p><b>Online Polls.</b> In November 1999, <i> http://www.slashdot.org</i> released an online poll asking which was the best graduate school in computer science (a dangerous question to ask over the web!). As is the case with most online polls, IP addresses of voters were recorded in order to prevent single users from voting more than once. However, students at Carnegie Mellon found a way to stuff the ballots using programs that voted for CMU thousands of times. CMU's score started growing rapidly. The next day, students at MIT wrote their own program and the poll became a contest between voting "bots." MIT finished with 21,156 votes, Carnegie Mellon with 21,032 and every other school with less than 1,000. Can the result of any online poll be trusted? Not unless the poll ensures that only humans can vote.</p> <li><p><b>Preventing Dictionary Attacks.</b> CAPTCHAs can also be used to prevent dictionary attacks in password systems. The idea is simple: prevent a computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins. This is better than the classic approach of locking an account after a sequence of unsuccessful logins, since doing so allows an attacker to lock accounts at will. </p> <li><p><b>Search Engine Bots.</b> It is sometimes desirable to keep webpages unindexed to prevent others from finding them easily. There is an html tag to prevent search engine bots from reading web pages. The tag, however, doesn't guarantee that bots won't read a web page; it only serves to say "no bots, please." Search engine bots, since they usually belong to large companies, respect web pages that don't want to allow them in. However, in order to truly guarantee that bots won't enter a web site, CAPTCHAs are needed.</p> <li><p><b>Worms and Spam.</b> CAPTCHAs also offer a plausible solution against email worms and spam: "I will only accept an email if I know there is a human behind the other computer." A few companies are already marketing this idea.</p> </ul> <h1>Guidelines</h1> <p>If your website needs protection from abuse, it is recommended that you use a CAPTCHA. There are many CAPTCHA implementations, some better than others. The following guidelines are strongly recommended for any CAPTCHA code:</p> <ul> <li><p><b>Accessibility.</b> CAPTCHAs must be accessible. CAPTCHAs based solely on reading text &#8212; or other visual-perception tasks &#8212; prevent visually impaired users from accessing the protected resource. Such CAPTCHAs may make a site incompatible with Section 508 in the United States. Any implementation of a CAPTCHA should allow blind users to get around the barrier, for example, by permitting users to opt for an audio or sound CAPTCHA.</p> <li><p><b>Image Security.</b> CAPTCHA images of text should be distorted randomly before being presented to the user. Many implementations of CAPTCHAs use undistorted text, or text with only minor distortions. These implementations are vulnerable to simple automated attacks. </p> <li><p><b>Script Security.</b> Building a secure CAPTCHA code is not easy. In addition to making the images unreadable by computers, the system should ensure that there are no easy ways around it at the script level. Common examples of insecurities in this respect include: (1) Systems that pass the answer to the CAPTCHA in plain text as part of the web form. (2) Systems where a solution to the same CAPTCHA can be used multiple times (this makes the CAPTCHA vulnerable to so-called "replay attacks"). Most CAPTCHA scripts found freely on the Web are vulnerable to these types of attacks. </p> <li><p><b>Security Even After Wide-Spread Adoption.</b> There are various "CAPTCHAs" that would be insecure if a significant number of sites started using them. An example of such a puzzle is asking text-based questions, such as a mathematical question ("what is 1+1"). Since a parser could easily be written that would allow bots to bypass this test, such "CAPTCHAs" rely on the fact that few sites use them, and thus that a bot author has no incentive to program their bot to solve that challenge. True CAPTCHAs should be secure even after a significant number of websites adopt them.</p> <li><p><b>Should I Make My Own CAPTCHA?</b> In general, making your own CAPTCHA script (e.g., using PHP, Perl or .Net) is a bad idea, as there are many failure modes. We recommend that you use a well-tested implementation such as <a href="http://recaptcha.net">reCAPTCHA</a>. </ul> <h1>The "Pornography Attack" is Not a Concern</h1> <p> It is sometimes rumored that spammers are using pornographic sites to solve CAPTCHAs: the CAPTCHA images are sent to a porn site, and the porn site users are asked to solve the CAPTCHA before being able to see a pornographic image. <b>This is not a security concern for CAPTCHAs</b>. While it might be the case that some spammers use porn sites to attack CAPTCHAs, the amount of damage this can inflict is tiny (so tiny that we haven't even noticed a dent!). Whereas it is trivial to write a bot that abuses an unprotected site millions of times a day, redirecting CAPTCHAs to be solved by humans viewing pornography would only allow spammers to abuse systems a few thousand times per day. The economics of this attack just don't add up: every time a porn site shows a CAPTCHA before a porn image, they risk losing a customer to another site that doesn't do this.</p> <h1>Advancing Artificial Intelligence</h1> <p>CAPTCHA tests are based on open problems in artificial intelligence (AI): decoding images of distorted text, for instance, is well beyond the capabilities of modern computers. Therefore, CAPTCHAs also offer well-defined challenges for the AI community, and induce security researchers, as well as otherwise malicious programmers, to work on advancing the field of AI. CAPTCHAs are thus a win-win situation: either a CAPTCHA is not broken and there is a way to differentiate humans from computers, or the CAPTCHA is broken and an AI problem is solved. </p> <h1>Academic Publications and Presentations</h1> <ul> <li><p>Luis von Ahn, Ben Maurer, Colin McMillen, David Abraham and Manuel Blum. <A HREF="http://www.cs.cmu.edu/~biglou/reCAPTCHA_Science.pdf">reCAPTCHA: Human-Based Character Recognition via Web Security Measures.</a> In <i>Science.</i></p> <li><p>Jennifer Tam, Jiri Simsa, Sean Hyde, and Luis von Ahn. <a href="Breaking_Audio_CAPTCHAs.pdf">Breaking Audio CAPTCHAs</a>. In <i>Advances in Neural Information Processing Systems (NIPS).</i></p> <li><p>Luis von Ahn, Manuel Blum and John Langford. <A HREF="captcha_cacm.pdf">Telling Humans and Computers Apart Automatically</A>. In <i>Communications of the ACM</i>.</p> <li><p>Luis von Ahn, Manuel Blum, Nicholas Hopper, and John Langford. <A HREF="captcha_crypt.pdf">CAPTCHA: Using Hard AI Problems for Security</A>. In <i>Eurocrypt</i>.</p> <li><p>Kumar Chellapilla and Patrice Y. Simard. <a href="http://research.microsoft.com/~kumarc/pubs/chellapilla_nips04.pdf">Using Machine Learning to Break Human Interaction Proofs (HIPs)</a>. In <i>NIPS</i>. (Explains how to break the simple CAPTCHAs for which character segmentation is easy.)</p> <li><p> Greg Mori and Jitendra Malik. <a href="http://www.cs.sfu.ca/~mori/research/gimpy/">Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA.</a> In <i>CVPR</i>. (Explains how to break a simple CAPTCHA.) </p> <li><p><a href="http://video.google.com/videoplay?docid=-8246463980976635143">Google Tech Talk about CAPTCHAs and Human Computation</a>.</p> </ul> <h1>Selected Popular Press Pieces</h1> <ul> <li><p><a href="http://query.nytimes.com/gst/fullpage.html?sec=technology&res=9907E5DF163AF933A25751C1A9649C8B63">Human or Computer? Take This Test</a>, The New York Times.</p> <li><p><a href="http://radar.oreilly.com/archives/2007/05/recaptcha_stop.html">reCAPTCHA - Stop Spam, Read Books</a>, O'Reilly Radar.</p> <li><p><a href="http://www.wired.com/techbiz/it/magazine/15-07/ff_humancomp">For Certain Tasks, the Cortex Still Beats the CPU</a>, Wired Magazine. </p> </ul> </div> <p class="footer">&copy; 2000-2010 Carnegie Mellon University, all rights reserved.</p> </td></tr> </table> <script src="http://www.google-analytics.com/urchin.js" type="text/javascript"> </script> <script type="text/javascript"> _uacct = "UA-372036-5"; urchinTracker(); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10