As it turns out, "anonymous password authentication" means that it gives you a randomly generated string which you have to copy and paste into another box each time you submit a comment. It sounds like something a machine could do because it is something a machine could do with ease. And yet nobody seems to have noticed this for two reasons:
1) The author deletes all the comments on his blog questioning why the system works
2) It has a 4.5 star rating on the WordPress plugin DB
As a result, the author is still making ridiculously exaggerated claims about the capability of his system, like "If Gawker had been using the anonymous password authentication built into Spam Free WordPress this incident [the Gawker break-in in 2010] would not have happened." Another gem is "CAPTCHA is not used because it is hard to read, unnecessary, easily cracked, and reduces the number of real comments substantially."
So there it is, another snake-oil salesman spreading FUD and making users (of some very popular websites[1]) suffer.
[0]: http://www.toddlahman.com/spam-free-wordpress/ [1]: http://www.raspberrypi.org/
If I had not witnessed that, I would never believe that it happened. The Raspberry Pi team fell for something that any kid who can write a python script should have known had the utility of a voodoo incantation? I'm floored.
Still seems totally insane to me. The extent of his features are things like "DNS lookups are asynchronous in all libraries".
And the company name "TrustLeap" ... seriously ? http://trustleap.ch disappeared by the way.. here you go http://web.archive.org/web/20110707004226/http://www.trustle...
http://web.archive.org/web/20091028041609/http://trustleap.c...
http://web.archive.org/web/20110707004059/http://www.trustle...
Now it looks that they redesigned the site, changing target and adding new buzz words here and there (removing the obsolete buzz no one is using anymore)
see also http://news.ycombinator.com/item?id=2776927
And to be honest this king of restriction on a web server, sounds crazy:
=== “Server identification field” means the field in the response header which contains the text “Server: G-WAN/x.x.x” where “x.x.x” is the program version number.
You agree not to remove or modify the server identification field contained in the response header. ===
Funny stuff!
Except, I'm pretty sure the gwan guys are just a very sophisticated group of trolls.
I'm going to go out on a limb and say if you test their web server yourself you'll find that their claims are false, and that the reason it's closed source is because the joke would be too obvious if we could simply take a quick look.
In any event this is all hilarious.
Now, I hope someone with the time and curiosity will do this.. and publish some actual benchmarks of gwan so this controversy can finally end.
[1] http://news.ycombinator.com/item?id=4109698
To run a benchmark yourself, see [2].
As for making it harder for humans, I very much see your point, but the solution isn't to come up with some of the trivial captchas that many come up with by themselves.
Captchas as a concept are flawed and should be replaced by something that $works. (Don't ask me what that could be - I have no idea.)
Sadly the only solution I can see to the overall 'Captchas are broken' problem that's current available is forcing people to link to an established identity like a Google account or a Facebook account. This then of course recurses to how can you prevent automated Google/Facebook sign ups. I wonder whether Google/Facebook could use some kind of heuristic for detecting genuine users of the service? (maybe a Facebook account that plays games or uploads photos regularly, or has attended a few events could be a threshold?)
That example is easy to solve because it is not using any of the provided techniques that makes it more difficult for robots to solve the CAPTCHA: "changing the HTML background color based on: mouse cursor hovering, previous state or input or shared secret"
The purpose of the example is to give you a basis on which you could implement an effective CAPTCHA.
The claim of "difficult or even completely impossible for robots" applies to CAPTCHAs using the above techniques, which are not used in the example.
Such a claim would be no less ludicrous.
I'd put my money on there being hundreds of people on Hacker News alone that could script a DOM-monkeying cracker for such a system. That runs with ~100% accuracy. And in under an hour of coding.
This Captcha strategy is so absolutely terrible in light of modern libraries that I'm honestly shocked you feel the need to defend it.
In any case, it seems trivially easy to break. Just capture the image. Read the background color value. Generate the image (with the background color) in ImageMagick and run through your OCR of choice. Obviously, that's not the fastest way to do it if you're trying to do thousands of attempts at once, but it's the least brainpower-involved.
OCR would probably be more robust in general (for varying fonts and number shapes)... but it's simply absurd to call G-WAN's scheme a better captcha. More obscure and less targeted? Perhaps.
It appears to me that he maps the character set GWAN uses for the captcha system, and as such, should work for any image generated by GWAN using the same character set as it simply identifies pixels matching the character set.
But G-wan author i think need chillout and start re-thinking
G wan should be OK for eq CDN
For hosters * need options to turn off script language * Support modules like in Apache * Support .httacess For me * Add fcgid but something better and more faster its posibble. Show that PHP on gwan can be balizing fast * add modules session mongodb redis etc * should be OK replacement for apache * recode version for windows for developer
Go to some IT conference run 2 machine NginX full optimized for speed + Gigagbyte network and show people how its work CPU usage request per second to compare
<@merlin_> do we know this guy?
... snip ...
<@merlin_> """Today I had my first lightning talk at #BerlinSides_0x3"""
<@Kos> OH YEAH
<@Kos> that adude started following me a few weeks ago
<@C-Ps> berlin sids is pretty slick
... snip ...
<@Kos> I probably meat that dude at berlinsides
<@Kos> erm
<@Kos> met
<@savant42> meat, eh?
... snip ...
<@C-Ps> do you often meat men in berlin?
Thank you for providing the lulz, as well as the link to stiltwalker!