Risk
2/1/2013
01:08 PM
50%
50%

The Dreaded Captcha: Beginning Of The End?

Ticketmaster dumps reviled security technology that forces users to decipher distorted words. Will it spark a trend?

If those all-but-impossible-to-read Captchas disappeared tomorrow, would anyone lament their demise?

Ticketmaster is betting not. The company recently announced that it plans to dump its current challenge-and-response verification mechanism in favor of a system that asks users to type clearly legible phrases or answer multiple choice questions. The company's goal is to get event-goers to buy more tickets, while blocking automated software -- bots -- from buying up large quantities of tickets on behalf of resellers.

"We relentlessly pursue ways to make ticket buying more fan-friendly," said Nathan Hubbard, CEO of Ticketmaster. "While an important step in blocking bots, we know the current Captcha solution has been a frustrating part of buying tickets for fans."

Based on the word "capture," Captcha is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. First developed at Carnegie Mellon University in 2000, Captchas are designed to allow a computer to tell if it's interacting with a real person or another computer.

[ What's the best way to tackle social spam? See Don't Let Spam Sabotage Your Social Brand. ]

Why bother? As any fan of the cult film "Blade Runner" knows, when psychotic human-lookalike androids come calling, you'll need to know who's human and who's a machine.

Outside the dystopian science fiction realm, websites want to differentiate between real users and bots that have been programmed for malevolent purposes such as adding advertising spam to comment boards, registering for free email services and using them to send spam, spidering all usernames on a site, or, in the case of Ticketmaster, buying large quantities of tickets for the purpose of reselling them for a profit.

As security checks go, current Captchas count few -- and possibly zero -- supporters. That's largely because the typical Captcha, which requires a user to type in what they see on screen, displays phrases that look like they've been generated by a drunk Dadaist wielding a copy of Microsoft WordArt. Illegibility is just the start.

History is also littered with failed Captcha improvement efforts. For example, when changes to word-and-letter Captchas made them difficult for automated software to decode, enterprising attackers outsourced the job. Their ploy: websites that offered free porn after users navigated past a Captcha -- pulled, naturally, from the site attackers wanted to exploit. With a library of Captcha images and their real-world equivalents, attackers could bypass their target site's security defenses with aplomb.

Another attempted revamp has been audio Captchas. On the upside, these make websites with challenge-response systems accessible to people with visual impairments -- a legal requirement in some countries. But like their visual counterparts, many audio challenge-and-response systems can also be reliably circumvented by using software that converts spoken words to text.

So will Ticketmaster's Captcha revamp succeed? Ticketmaster said that its mobile apps will now include a push-notification feature that shares a user's Ticketmaster credentials with the company's site, thus allowing mobile users to bypass Captcha-type security checks. But the website security check strategy now being pursued by Ticketmaster involves a "Type-In," which -- wait for it -- is technically another type of Captcha, albeit one that uses clear, legible text. Developed by Solve Media, the approach substitutes squiggly letters with phrases or multiple-choice questions served up in a variety of different image and multimedia formats.

Ticketmaster has already been running trials with the Type-In system. "We're starting to see an uptick in fan satisfaction," Kip Levin, Ticketmaster's executive vice president of ecommerce, told the BBC. "We're happy with what we've seen from a security standpoint as well." He said that while the previous, squiggly Captcha took users an average of 14 seconds to successfully complete, the new system required only seven seconds.

Risk management is all the rage for handling security today, but it's a practice fraught with misconceptions and challenges. In the special Avoid Risky Business By Getting A Grip On Your Real Threats retrospective, Dark Reading takes a look at best practices, new technologies, common missteps -- and the added risks associated with the cloud and mobile devices coming in and out of the enterprise. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Moderator
2/6/2013 | 9:40:11 PM
re: The Dreaded Captcha: Beginning Of The End?
I actually like the math CAPTCHAs, where you have to type the sum of two single digit integers. Not only does it provide the satisfaction of knowing I have mastered kindergarten-level math, but it fills me with confidence that no computer could ever tackle such a complex equation.
Jonathan_Camhi
50%
50%
Jonathan_Camhi,
User Rank: Apprentice
2/4/2013 | 10:06:31 PM
re: The Dreaded Captcha: Beginning Of The End?
The end of captchas? Some of the best news I've heard all day. I think audio captchas can gain ground in years to come. Everyone expects voice to play a bigger role with mobile devices and Siri is just the beginning. Wouldn't surprise me if voice authentications become commonplace in the years to come.
MyW0r1d
50%
50%
MyW0r1d,
User Rank: Apprentice
2/4/2013 | 8:59:17 PM
re: The Dreaded Captcha: Beginning Of The End?
I've seen some that I would swear are configured improperly. For instance, put in a wrong answer (swap a couple of letters) and it accepts it anyway.
Deirdre Blake
50%
50%
Deirdre Blake,
User Rank: Apprentice
2/4/2013 | 3:59:13 PM
re: The Dreaded Captcha: Beginning Of The End?
I haven't run into any of these "puzzle"-type approaches yet, but they would certainly be a welcome change. Regardless of their great utility in thwarting bots over the years, I don't think anyone will mourn the end of CAPTCHAs.
macker490
50%
50%
macker490,
User Rank: Ninja
2/4/2013 | 11:46:05 AM
re: The Dreaded Captcha: Beginning Of The End?
I refuse to answer captchas period.
Buzz2020
50%
50%
Buzz2020,
User Rank: Apprentice
2/3/2013 | 7:22:30 PM
re: The Dreaded Captcha: Beginning Of The End?
At Last! I would prefer pop-up porn spam to having to decipher yet another obfuscated Captcha Gotcha puzzle...
GBARRINGTON196
50%
50%
GBARRINGTON196,
User Rank: Apprentice
2/3/2013 | 10:46:06 AM
re: The Dreaded Captcha: Beginning Of The End?
Is that an "r' or a "v" One space? 6 spaces? or none? I wonder how many sales, how munch activity is lost to captcha phrases that can't be deciphered by any one or any thing? I know I've given up in disgust after 3 tries at 3 different phrases.
Lee009
50%
50%
Lee009,
User Rank: Apprentice
2/1/2013 | 10:19:06 PM
re: The Dreaded Captcha: Beginning Of The End?
The trend IGÇÖm noticing is that CAPTCHAs are moving away from requiring any sort of type-in at all. More and more, I'm seeing CAPTCHA approaches that involve clicking on certain pictures, playing a game, drawing a shape, etc. Since people are increasingly using smartphones and tablets rather than PCs to visit websites, CAPTCHA methods that allow you to swipe, draw or tap some pictures make more sense than ones that require you to fumble with the keypad to type in something.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.