Risk
2/1/2013
01:08 PM
50%
50%

The Dreaded Captcha: Beginning Of The End?

Ticketmaster dumps reviled security technology that forces users to decipher distorted words. Will it spark a trend?

If those all-but-impossible-to-read Captchas disappeared tomorrow, would anyone lament their demise?

Ticketmaster is betting not. The company recently announced that it plans to dump its current challenge-and-response verification mechanism in favor of a system that asks users to type clearly legible phrases or answer multiple choice questions. The company's goal is to get event-goers to buy more tickets, while blocking automated software -- bots -- from buying up large quantities of tickets on behalf of resellers.

"We relentlessly pursue ways to make ticket buying more fan-friendly," said Nathan Hubbard, CEO of Ticketmaster. "While an important step in blocking bots, we know the current Captcha solution has been a frustrating part of buying tickets for fans."

Based on the word "capture," Captcha is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. First developed at Carnegie Mellon University in 2000, Captchas are designed to allow a computer to tell if it's interacting with a real person or another computer.

[ What's the best way to tackle social spam? See Don't Let Spam Sabotage Your Social Brand. ]

Why bother? As any fan of the cult film "Blade Runner" knows, when psychotic human-lookalike androids come calling, you'll need to know who's human and who's a machine.

Outside the dystopian science fiction realm, websites want to differentiate between real users and bots that have been programmed for malevolent purposes such as adding advertising spam to comment boards, registering for free email services and using them to send spam, spidering all usernames on a site, or, in the case of Ticketmaster, buying large quantities of tickets for the purpose of reselling them for a profit.

As security checks go, current Captchas count few -- and possibly zero -- supporters. That's largely because the typical Captcha, which requires a user to type in what they see on screen, displays phrases that look like they've been generated by a drunk Dadaist wielding a copy of Microsoft WordArt. Illegibility is just the start.

History is also littered with failed Captcha improvement efforts. For example, when changes to word-and-letter Captchas made them difficult for automated software to decode, enterprising attackers outsourced the job. Their ploy: websites that offered free porn after users navigated past a Captcha -- pulled, naturally, from the site attackers wanted to exploit. With a library of Captcha images and their real-world equivalents, attackers could bypass their target site's security defenses with aplomb.

Another attempted revamp has been audio Captchas. On the upside, these make websites with challenge-response systems accessible to people with visual impairments -- a legal requirement in some countries. But like their visual counterparts, many audio challenge-and-response systems can also be reliably circumvented by using software that converts spoken words to text.

So will Ticketmaster's Captcha revamp succeed? Ticketmaster said that its mobile apps will now include a push-notification feature that shares a user's Ticketmaster credentials with the company's site, thus allowing mobile users to bypass Captcha-type security checks. But the website security check strategy now being pursued by Ticketmaster involves a "Type-In," which -- wait for it -- is technically another type of Captcha, albeit one that uses clear, legible text. Developed by Solve Media, the approach substitutes squiggly letters with phrases or multiple-choice questions served up in a variety of different image and multimedia formats.

Ticketmaster has already been running trials with the Type-In system. "We're starting to see an uptick in fan satisfaction," Kip Levin, Ticketmaster's executive vice president of ecommerce, told the BBC. "We're happy with what we've seen from a security standpoint as well." He said that while the previous, squiggly Captcha took users an average of 14 seconds to successfully complete, the new system required only seven seconds.

Risk management is all the rage for handling security today, but it's a practice fraught with misconceptions and challenges. In the special Avoid Risky Business By Getting A Grip On Your Real Threats retrospective, Dark Reading takes a look at best practices, new technologies, common missteps -- and the added risks associated with the cloud and mobile devices coming in and out of the enterprise. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Lee009
50%
50%
Lee009,
User Rank: Apprentice
2/1/2013 | 10:19:06 PM
re: The Dreaded Captcha: Beginning Of The End?
The trend IGÇÖm noticing is that CAPTCHAs are moving away from requiring any sort of type-in at all. More and more, I'm seeing CAPTCHA approaches that involve clicking on certain pictures, playing a game, drawing a shape, etc. Since people are increasingly using smartphones and tablets rather than PCs to visit websites, CAPTCHA methods that allow you to swipe, draw or tap some pictures make more sense than ones that require you to fumble with the keypad to type in something.
Deirdre Blake
50%
50%
Deirdre Blake,
User Rank: Apprentice
2/4/2013 | 3:59:13 PM
re: The Dreaded Captcha: Beginning Of The End?
I haven't run into any of these "puzzle"-type approaches yet, but they would certainly be a welcome change. Regardless of their great utility in thwarting bots over the years, I don't think anyone will mourn the end of CAPTCHAs.
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Moderator
2/6/2013 | 9:40:11 PM
re: The Dreaded Captcha: Beginning Of The End?
I actually like the math CAPTCHAs, where you have to type the sum of two single digit integers. Not only does it provide the satisfaction of knowing I have mastered kindergarten-level math, but it fills me with confidence that no computer could ever tackle such a complex equation.
GBARRINGTON196
50%
50%
GBARRINGTON196,
User Rank: Apprentice
2/3/2013 | 10:46:06 AM
re: The Dreaded Captcha: Beginning Of The End?
Is that an "r' or a "v" One space? 6 spaces? or none? I wonder how many sales, how munch activity is lost to captcha phrases that can't be deciphered by any one or any thing? I know I've given up in disgust after 3 tries at 3 different phrases.
MyW0r1d
50%
50%
MyW0r1d,
User Rank: Apprentice
2/4/2013 | 8:59:17 PM
re: The Dreaded Captcha: Beginning Of The End?
I've seen some that I would swear are configured improperly. For instance, put in a wrong answer (swap a couple of letters) and it accepts it anyway.
Buzz2020
50%
50%
Buzz2020,
User Rank: Apprentice
2/3/2013 | 7:22:30 PM
re: The Dreaded Captcha: Beginning Of The End?
At Last! I would prefer pop-up porn spam to having to decipher yet another obfuscated Captcha Gotcha puzzle...
macker490
50%
50%
macker490,
User Rank: Ninja
2/4/2013 | 11:46:05 AM
re: The Dreaded Captcha: Beginning Of The End?
I refuse to answer captchas period.
Jonathan_Camhi
50%
50%
Jonathan_Camhi,
User Rank: Apprentice
2/4/2013 | 10:06:31 PM
re: The Dreaded Captcha: Beginning Of The End?
The end of captchas? Some of the best news I've heard all day. I think audio captchas can gain ground in years to come. Everyone expects voice to play a bigger role with mobile devices and Siri is just the beginning. Wouldn't surprise me if voice authentications become commonplace in the years to come.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.