Feeds

CAPTCHA-busting service relies on CAPTCHA to block bots

Can you use to it to spam itself?

Next gen security for virtualised datacentres

An automated CAPTCHA circumvention service has decided to use CAPTCHAs to restrict access to its own contact us services.

It's unclear whether or not its possible to use bypasscaptcha.com to, err, bypass bypasscaptcha.com "contact us" page CAPTCHA. The automated CAPTCHA solving service is likely to be of interest primarily to those who want to sign up to online forums and set up webmail accounts in preparation for spam runs, or other similar malfeasance.

Asked directly whether it was in the pay of spammers (like most other CAPTCHA-busting services), bypasscaptcha.com quickly responded:

"Sorry that we can not tell you who our customers are."

Bypasscaptcha.com's front page explains that "we hire workers to work on our project not only to make money for ourselves, but also to make our workers live better with much better salary than other local workers without any special skills."

Which is a nice way of saying we're paying poor folk overseas a pittance to decipher the letters in jumbled up images hundreds of times a day in hi-tech sweat-shops ... but it's better than picking over rubbish dumps.

An advert for the service on ProgrammableWeb explains:

"The service operates through the Bypass CAPTCHA API which can be implemented in third-party software."

It's unclear who's behind the service, which was brought to our attention by Reg reader Christopher P.

"They cannot be English, what with their absolute failure to understand irony," Christopher notes. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.