« More SSN Exposures | Main | Shipping Network Diversion? »

April 24, 2007

Comments

casey chesnut

the plan was to release the code, but i got into too much trouble ... so i did not. alternate proof, check the timestamps of the comment spam, and compare that to the # of comment spam left. then figure out if a human could have performed that quickly

jsqrisk

Good point, Casey.

And there's also the outsourced comment spam method:

http://riskman.typepad.com/perilocity/2006/11/outsourced_blog.html

One way or another, CAPTCHA won't last forever.

-jsq

James Seng

I think Captcha has being broken for a while.

http://www.cs.sfu.ca/~mori/research/gimpy/

Gimpy is one of the most well-known research on that.

Gunnar

I will see your CAPTCHA and raise you $0.60 (the price to outsource CAPTCHA circumvention)

http://1raindrop.typepad.com/1_raindrop/2006/09/outsourced_capt.html

The comments to this entry are closed.

My Photo

Risk Reading

Blog powered by Typepad