in my experience, you can sometimes get away messing a token or two in the user string as long as it is one of the common ones out there. start injecting BeOS and other arcane values in and things get less reliable.
Comment on How do CAPTCHAs work without giving you a challenge task?
key@lemmy.keychat.org 8 months ago
Rather than try to unilaterally deprecate and replace CAPTCHA with a single alternative, we built a platform to test many alternatives and rotate new challenges in and out as they become more or less effective.
With Turnstile, we adapt the actual challenge outcome to the individual visitor or browser. First, we run a series of small non-interactive JavaScript challenges gathering more signals about the visitor/browser environment. Those challenges include, proof-of-work, proof-of-space, probing for web APIs, and various other challenges for detecting browser-quirks and human behavior. As a result, we can fine-tune the difficulty of the challenge to the specific request and avoid ever showing a visual puzzle to a user.
Turnstile also includes machine learning models that detect common features of end visitors who were able to pass a challenge before. The computational hardness of those initial challenges may vary by visitor, but is targeted to run fast.
developers.cloudflare.com/turnstile/
TL;DR A bunch of heuristics that are hard to spoof. Fun side effect of this method is that if you spoof your user agent, you’ll often end up locked out in a loop. Lack of a captcha fallback is obnoxious.
leaky_shower_thought@feddit.nl 8 months ago
originalucifer@moist.catsweat.com 8 months ago
also the subtle but not so subtle 'we will fingerprint errrrbody'
so what do they do with that data?