01:08 PM

The Dreaded Captcha: Beginning Of The End?

Ticketmaster dumps reviled security technology that forces users to decipher distorted words. Will it spark a trend?

If those all-but-impossible-to-read Captchas disappeared tomorrow, would anyone lament their demise?

Ticketmaster is betting not. The company recently announced that it plans to dump its current challenge-and-response verification mechanism in favor of a system that asks users to type clearly legible phrases or answer multiple choice questions. The company's goal is to get event-goers to buy more tickets, while blocking automated software -- bots -- from buying up large quantities of tickets on behalf of resellers.

"We relentlessly pursue ways to make ticket buying more fan-friendly," said Nathan Hubbard, CEO of Ticketmaster. "While an important step in blocking bots, we know the current Captcha solution has been a frustrating part of buying tickets for fans."

Based on the word "capture," Captcha is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. First developed at Carnegie Mellon University in 2000, Captchas are designed to allow a computer to tell if it's interacting with a real person or another computer.

[ What's the best way to tackle social spam? See Don't Let Spam Sabotage Your Social Brand. ]

Why bother? As any fan of the cult film "Blade Runner" knows, when psychotic human-lookalike androids come calling, you'll need to know who's human and who's a machine.

Outside the dystopian science fiction realm, websites want to differentiate between real users and bots that have been programmed for malevolent purposes such as adding advertising spam to comment boards, registering for free email services and using them to send spam, spidering all usernames on a site, or, in the case of Ticketmaster, buying large quantities of tickets for the purpose of reselling them for a profit.

As security checks go, current Captchas count few -- and possibly zero -- supporters. That's largely because the typical Captcha, which requires a user to type in what they see on screen, displays phrases that look like they've been generated by a drunk Dadaist wielding a copy of Microsoft WordArt. Illegibility is just the start.

History is also littered with failed Captcha improvement efforts. For example, when changes to word-and-letter Captchas made them difficult for automated software to decode, enterprising attackers outsourced the job. Their ploy: websites that offered free porn after users navigated past a Captcha -- pulled, naturally, from the site attackers wanted to exploit. With a library of Captcha images and their real-world equivalents, attackers could bypass their target site's security defenses with aplomb.

Another attempted revamp has been audio Captchas. On the upside, these make websites with challenge-response systems accessible to people with visual impairments -- a legal requirement in some countries. But like their visual counterparts, many audio challenge-and-response systems can also be reliably circumvented by using software that converts spoken words to text.

So will Ticketmaster's Captcha revamp succeed? Ticketmaster said that its mobile apps will now include a push-notification feature that shares a user's Ticketmaster credentials with the company's site, thus allowing mobile users to bypass Captcha-type security checks. But the website security check strategy now being pursued by Ticketmaster involves a "Type-In," which -- wait for it -- is technically another type of Captcha, albeit one that uses clear, legible text. Developed by Solve Media, the approach substitutes squiggly letters with phrases or multiple-choice questions served up in a variety of different image and multimedia formats.

Ticketmaster has already been running trials with the Type-In system. "We're starting to see an uptick in fan satisfaction," Kip Levin, Ticketmaster's executive vice president of ecommerce, told the BBC. "We're happy with what we've seen from a security standpoint as well." He said that while the previous, squiggly Captcha took users an average of 14 seconds to successfully complete, the new system required only seven seconds.

Risk management is all the rage for handling security today, but it's a practice fraught with misconceptions and challenges. In the special Avoid Risky Business By Getting A Grip On Your Real Threats retrospective, Dark Reading takes a look at best practices, new technologies, common missteps -- and the added risks associated with the cloud and mobile devices coming in and out of the enterprise. (Free registration required.)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Thomas Claburn
Thomas Claburn,
User Rank: Moderator
2/6/2013 | 9:40:11 PM
re: The Dreaded Captcha: Beginning Of The End?
I actually like the math CAPTCHAs, where you have to type the sum of two single digit integers. Not only does it provide the satisfaction of knowing I have mastered kindergarten-level math, but it fills me with confidence that no computer could ever tackle such a complex equation.
User Rank: Apprentice
2/4/2013 | 10:06:31 PM
re: The Dreaded Captcha: Beginning Of The End?
The end of captchas? Some of the best news I've heard all day. I think audio captchas can gain ground in years to come. Everyone expects voice to play a bigger role with mobile devices and Siri is just the beginning. Wouldn't surprise me if voice authentications become commonplace in the years to come.
User Rank: Apprentice
2/4/2013 | 8:59:17 PM
re: The Dreaded Captcha: Beginning Of The End?
I've seen some that I would swear are configured improperly. For instance, put in a wrong answer (swap a couple of letters) and it accepts it anyway.
Deirdre Blake
Deirdre Blake,
User Rank: Apprentice
2/4/2013 | 3:59:13 PM
re: The Dreaded Captcha: Beginning Of The End?
I haven't run into any of these "puzzle"-type approaches yet, but they would certainly be a welcome change. Regardless of their great utility in thwarting bots over the years, I don't think anyone will mourn the end of CAPTCHAs.
User Rank: Ninja
2/4/2013 | 11:46:05 AM
re: The Dreaded Captcha: Beginning Of The End?
I refuse to answer captchas period.
User Rank: Apprentice
2/3/2013 | 7:22:30 PM
re: The Dreaded Captcha: Beginning Of The End?
At Last! I would prefer pop-up porn spam to having to decipher yet another obfuscated Captcha Gotcha puzzle...
User Rank: Apprentice
2/3/2013 | 10:46:06 AM
re: The Dreaded Captcha: Beginning Of The End?
Is that an "r' or a "v" One space? 6 spaces? or none? I wonder how many sales, how munch activity is lost to captcha phrases that can't be deciphered by any one or any thing? I know I've given up in disgust after 3 tries at 3 different phrases.
User Rank: Apprentice
2/1/2013 | 10:19:06 PM
re: The Dreaded Captcha: Beginning Of The End?
The trend IGÇÖm noticing is that CAPTCHAs are moving away from requiring any sort of type-in at all. More and more, I'm seeing CAPTCHA approaches that involve clicking on certain pictures, playing a game, drawing a shape, etc. Since people are increasingly using smartphones and tablets rather than PCs to visit websites, CAPTCHA methods that allow you to swipe, draw or tap some pictures make more sense than ones that require you to fumble with the keypad to type in something.
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-11-23
Buffer overflow in Cybozu Office 9 and 10 before 10.1.0, Mailwise 4 and 5 before 5.1.4, and Dezie 8 before 8.1.1 allows remote authenticated users to execute arbitrary code via e-mail messages.

Published: 2014-11-23
The (1) DOMConverter, (2) JDOMConverter, (3) DOM4JConverter, and (4) XOMConverter functions in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allow remote attackers to read arbitrary files via DOM data containing an XML external entity declaration in conjunction with an entity refe...

Published: 2014-11-23
Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server,,,, and allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?