This is too awesome:
http://erkie.github.com/
+1 +20
hahahahaha, this is great. thanks for sharing. :)
bookmarked that thing lol
Doesn't work on iPad. :(
Quote from: iago on October 03, 2010, 08:52:31 PM
This is too awesome:
http://erkie.github.com/
After bookmarking it, I proceeded to destroy all my webpages. I was then forced to reload them to kill them once more. :) Thanks for sharing.
You should make one that spawns 10 mouse pointers each moving in the same direction as the real one but far enough apart that the user may have to bruteforce to figure out which one is the real one.
My concern about this is that you're loading a script file from some guy's site into the context of a bunch of your own sites. If you aren't checking the script file carefully, that can be dangerous. He can take actions on your behalf, log keystrokes, steal cookies, etc.
mmmmm... cookies
Quote from: iago on October 06, 2010, 05:31:50 PM
My concern about this is that you're loading a script file from some guy's site into the context of a bunch of your own sites. If you aren't checking the script file carefully, that can be dangerous. He can take actions on your behalf, log keystrokes, steal cookies, etc.
Good sites use HTTP-only cookies.
Quote from: MyndFyre on October 07, 2010, 03:12:56 AM
Quote from: iago on October 06, 2010, 05:31:50 PM
My concern about this is that you're loading a script file from some guy's site into the context of a bunch of your own sites. If you aren't checking the script file carefully, that can be dangerous. He can take actions on your behalf, log keystrokes, steal cookies, etc.
Good sites use HTTP-only cookies.
HTTP-only cookies are good, but they don't prevent cross-site request forgery-style attacks. As soon as you can run javascript code on another site, you can take any actions you want on the user's behalf (except for captcha-protected stuff and places where the user is forced to type in their password like change password pages). Standard XSRF defenses don't work if you can run javascript code in the context of the site.
I bet you could make a javascript letter detector for captchas easily ... might be really slow though. Face detectors are pretty easy to make.
A lot of captchas are cracked by 20 year old code (http://en.wikipedia.org/wiki/Tesseract_OCR) by HP ... breaking captchas is very doable. I still think captchas should randomly collage various objects together and query the user to input the largest/smallest object's name. Object detection and recognition is still a hard problem to solve.
True, but captchas raise the bar significantly.
The easiest way, really, is to get the user himself to fill in the captcha with some kind of pretext. :)
Quote from: nslay on October 07, 2010, 12:45:03 PM
I bet you could make a javascript letter detector for captchas easily ... might be really slow though. Face detectors are pretty easy to make.
A lot of captchas are cracked by 20 year old code (http://en.wikipedia.org/wiki/Tesseract_OCR) by HP ... breaking captchas is very doable. I still think captchas should randomly collage various objects together and query the user to input the largest/smallest object's name. Object detection and recognition is still a hard problem to solve.
I agree, a bunch of pictures asking which one is X would be perfect