index.html
32.6 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta name="generator"
content="HTML Tidy for Linux/x86 (vers 1st November 2002), see www.w3.org" />
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<title>Inaccessibility of CAPTCHA</title>
<link rel="stylesheet" type="text/css" href="http://www.w3.org/StyleSheets/TR/W3C-WG-NOTE" />
</head>
<body>
<div class="head">
<p><a href="http://www.w3.org/"><img alt="W3C"
src="http://www.w3.org/Icons/w3c_home" height="48" width="72" /></a></p>
<h1 id="title">Inaccessibility of CAPTCHA</h1>
<h2 id="subtitle">Alternatives to Visual Turing Tests on the Web</h2>
<h2>W3C Working Group Note 23 November 2005</h2>
<dl>
<dt>This version:</dt>
<dd><a
href="http://www.w3.org/TR/2005/NOTE-turingtest-20051123/">http://www.w3.org/TR/2005/NOTE-turingtest-20051123/</a></dd>
<dt>Latest version:</dt>
<dd><a
href="http://www.w3.org/TR/turingtest">http://www.w3.org/TR/turingtest</a></dd>
<dt>Previous version:</dt>
<dd><a
href="http://www.w3.org/TR/2003/WD-turingtest-20031105/">http://www.w3.org/TR/2003/WD-turingtest-20031105/</a></dd>
<dt>Editor/Author:</dt>
<dd>Matt May (until June 2005 while at W3C)</dd>
</dl>
<p class="copyright"><a
href="http://www.w3.org/Consortium/Legal/ipr-notice#Copyright">Copyright</a>
© 2005 <a href="http://www.w3.org/"><acronym
title="World Wide Web Consortium">W3C</acronym></a><sup>®</sup> (<a
href="http://www.csail.mit.edu/"><acronym
title="Massachusetts Institute of Technology">MIT</acronym></a>, <a
href="http://www.ercim.org/"><acronym
title="European Research Consortium for Informatics and Mathematics">ERCIM</acronym></a>,
<a href="http://www.keio.ac.jp/">Keio</a>), All Rights Reserved. W3C <a
href="http://www.w3.org/Consortium/Legal/ipr-notice#Legal_Disclaimer">liability</a>,
<a
href="http://www.w3.org/Consortium/Legal/ipr-notice#W3C_Trademarks">trademark</a>
and <a href="http://www.w3.org/Consortium/Legal/copyright-documents">document
use</a> rules apply.</p>
<hr />
</div>
<h2><a id="abstract" name="abstract">Abstract</a></h2>
<p>A common method of limiting access to services made available over the Web
is visual verification of a bitmapped image. This presents a major problem to
users who are blind, have low vision, or have a learning disability such as
dyslexia. This document examines a number of potential solutions that allow
systems to test for human users while preserving access by users with disabilities.</p>
<h2><a id="status" name="status">Status of this document</a></h2>
<p><em>This section describes the status of this document at the time of its publication.
Other documents may supersede this document. A list of current W3C publications
and the latest revision of this technical report can be found in the <a
href="http://www.w3.org/TR/">W3C technical reports index</a> at http://www.w3.org/TR/.</em></p>
<p>This is a W3C <a href="http://www.w3.org/2004/02/Process-20040205/tr.html#q74">Working
Group Note</a> produced by the <a href="http://www.w3.org/WAI/PF/">WAI Protocols
and Formats Working Group</a>. The Working Group has expressed its consensus
in support of publishing this Note.</p>
<p>The <a href="http://www.w3.org/WAI/PF/">WAI Protocols and Formats Working Group</a>
recognizes that this is a dynamic area of technology. The Group expects
to continue researching CAPTCHA and related technologies. They seek feedback
from developers and users of these technologies on how, where and why it is
in use. Particularly if you have a security plus accessibility success story,
please share it. Please <a
href="mailto:wai-xtech@w3.org">send comments to the WAI XTech list</a>. Messages
to this list are <a href="http://lists.w3.org/Archives/Public/wai-xtech/">archived
publicly</a>.</p>
<p>The <a href="http://www.w3.org/WAI/PF/">WAI Protocols and Formats Working Group</a>
is part of the <a
href="http://www.w3.org/WAI/Technical/Activity.html">WAI Technical Activity</a>.</p>
<p>This is an updated version of a document previously titled "<a
href="#ref-ANTIROBOT">Inaccessibility of Visually-Oriented Anti-Robot Tests:
Problems and Alternatives</a>".</p>
<p><em>Publication as a Working Group Note does not imply endorsement by the W3C
Membership. This is a draft document and may be updated, replaced or obsoleted
by other documents at any time. It is inappropriate to cite this document as
other than work in progress.</em></p>
<div class="toc">
<h2><a id="contents" name="contents">Table of contents</a></h2>
<ul class="toc">
<li> <a href="#problem">1. The problem</a>
<ul class="toc">
<li><a href="#security">1.1 A false sense of security</a></li>
</ul>
</li>
<li> <a href="#hierarchy">2. A hierarchy of needs</a>
<ul class="toc">
<li><a href="#privilege">2.1 Privilege</a></li>
<li><a href="#humanity">2.2 Humanity</a></li>
<li><a href="#identity">2.3 Identity</a></li>
</ul>
</li>
<li> <a href="#solutions">3. Possible solutions</a>
<ul class="toc">
<li><a href="#logic">3.1 Logic puzzles</a></li>
<li><a href="#sound">3.2 Sound output</a></li>
<li><a href="#limiteduse">3.3 Limited-use accounts</a></li>
<li> <a href="#noninteractive">3.4 Non-interactive checks</a>
<ul class="toc">
<li><a href="#bayesian">3.4.1 Spam filtering</a></li>
<li><a href="#heuristic">3.4.2 Heuristic checks</a></li>
</ul>
</li>
<li> <a href="#federatedidentity">3.5 Federated identity systems</a>
<ul class="toc">
<li><a href="#singlesignon">3.5.1 Single-sign-on</a></li>
<li><a href="#pki">3.5.2 Public-key infrastructure solutions</a></li>
<li><a href="#biometrics">3.5.3 Biometrics</a></li>
</ul>
</li>
<li> <a href="#other">3.6 Other approaches</a></li>
</ul>
</li>
<li><a href="#conclusion">4. Conclusion</a></li>
<li><a href="#acknowledgments">5. Acknowledgements</a></li>
<li><a href="#references">6. References</a></li>
</ul>
</div>
<hr />
<h2><a id="problem" name="problem">1. The problem</a></h2>
<p>Web sites with resources that are attractive to aggregators (travel and event
ticket sites, etc.) or other forms of automation (Web-based email, weblogs and
message boards) have taken measures to ensure that they can offer their service
to individual users without having their content harvested or otherwise exploited
by Web robots.</p>
<p>The most popular solution at present is the use of graphical representations
of text in registration or comment areas. The site attempts to verify that the
user in question is in fact a human by requiring the user to read a distorted
set of characters from a bitmapped image, then enter those characters into a
form.</p>
<p>Researchers at Carnegie Mellon University have pioneered this method, which
they have called <acronym title="Completely Automated Public Turing
test to Tell Computers and Humans Apart">CAPTCHA</acronym> (Completely Automated Public Turing
test to Tell Computers and Humans Apart) [<a href="#ref-CAPTCHA">CAPTCHA</a>].
Various groups are at work on projects based on or similar to this original,
and for the purpose of this paper, the term "CAPTCHA" is used to refer to all
of these projects collectively. A Turing test [<a href="#ref-TURING">TURING</a>],
named after famed computer scientist Alan Turing, is any system of tests designed
to differentiate a human from a computer.</p>
<p>This type of visual and textual verification comes at a huge price to users
who are blind, visually impaired or dyslexic. Naturally, this image has no text
equivalent accompanying it, as that would make it a giveaway to computerized
systems. In many cases, these systems make it impossible for users with certain
disabilities to create accounts, write comments, or make purchases on these
sites, that is, CAPTCHAs fail to properly recognize users with disabilities
as human.</p>
<h3><a id="security" name="security">1.1 A false sense of security</a></h3>
<p>It is important to note that, like seemingly every security system that has
preceded it, this system can be defeated by those who benefit most from doing
so. For example, spammers can pay a programmer to aggregate these images and
feed them one by one to a human operator, who could easily verify hundreds of
them each hour. The efficacy of visual verification systems is low, and their
usefulness is nullified once they are commonly exploited.</p>
<p>A history of how CAPTCHA has been adopted over the years is instructive. Larger
sites adopted CAPTCHA because their resources were easy to abuse for the purposes
of sending spam or conducting anonymous, illegal activity.</p>
<p>In recent times, however, inaccessible-by-design technologies such as CAPTCHA
have spread to smaller sites, and to new applications which further confound
assistive technology. Banking site ING Direct's "PIN Guard" [<a
href="#ref-PINGUARD">PINGUARD</a>] uses a visual keypad to associate letters
on the keyboard with numbers in a user's passcode. Users who cannot see the
code, or understand the juxtaposition of letters and numbers, are unable to
access their own financial data on this site.</p>
<p>CAPTCHA is now in frequent use in the comment areas of message boards and personal
weblogs. Many bloggers claim that CAPTCHA challenges are successful in eradicating
comment spam, but below a certain threshold of popularity, any other method
of comment spam control should be reasonably successful -- and more accessible
to users with disabilities.</p>
<p>A number of data points on this false sense of security have arisen since this
document was first published. Part of the CAPTCHA Project at Carnegie Mellon
University, where the technique was developed, was a group intended to defeat
new CAPTCHAs as they were created. One of the first documented attacks on the
system was by a Carnegie Mellon student, who associated CAPTCHA images with
access to an adult Web site, thus gaining free human labor to crack the authentication.
High-value Web resources are always at risk for social-engineering attacks of
this nature, as humans can be hired, sometimes at near-slave wages, to defeat
hundreds if not thousands of these tests per hour.</p>
<p>External projects such as [<a href="#ref-BREAKING">BREAKING</a>], <a
href="#ref-AICAPTCHA">[AICAPTCHA</a>] and [<a href="#ref-PWNTCHA">PWNTCHA</a>]
have shown methodologies and results indicating that many of the systems can
be defeated by computers with between 88% and 100% accuracy, using optical character
recognition. [<a href="#ref-BREAKINGOCR">BREAKINGOCR</a>] outlines a CAPTCHA
defeat on PHP- and ASP-based systems, in which known-valid session IDs are cached
and reused to circumvent several popular CAPTCHA schemes. The "Screen
Scraper" attack reported by the Anti-Phishing Working Group [<a
href="#ref-ANTIPHISHING">ANTIPHISHING</a>] defeats the [<a
href="#ref-PINGUARD">PINGUARD</a>] technique by capturing the screen when
the user clicks to enter their secret code.<br />
</p>
<p>It is a logical fallacy, then, to hail CAPTCHA as a spam-busting panacea. Even
10% accuracy by a computer amounts to system failure, just at a slower rate.
It is also faulty logic to believe that the adoption of CAPTCHA in large sites
is evidence of its supremacy in fighting spam. Indeed, a number of techniques
are as effective as CAPTCHA, without causing the human interaction step that
causes usability and accessibility issues.</p>
<h2><a id="hierarchy" name="hierarchy">2. A hierarchy of needs</a></h2>
<p>Sites implementing verification have very different needs, and they fall into
a hierarchy. As the bar for authentication is raised, so is the risk that many
users may be marginalized, and the damage that may cause.</p>
<h3><a id="privilege" name="privilege">2.1 Privilege</a></h3>
<p>Most systems implement security in some form or another to preserve privileges
for certain users. Authentication of a privileged user without a personal identification
scheme that cannot be repudiated is the current mechanism for all but the most
secure sites on the Web. We can open accounts on any number of email services,
portals, newspapers, and message boards without providing any credentials of
our own, such as a passport, driver's license or serial number. In these situations,
the first priority may be to point users to the resources they may access; security
itself may not take precedence until exploitable details such as credit card
information is stored on a given site.</p>
<h3><a id="humanity" name="humanity">2.2 Humanity</a></h3>
<p>Systems that offer attractive privileges are often exploited, particularly
when users can do so anonymously. The ability to create several accounts to
multiply a user's privileges is often the cause for these Turing tests to be
put into place. It is understood to be fact that human users interacting with
sites cannot consume resources as quickly as programs designed to acquire and
use free privileges. These sites wish to provide credentials to humans while
eliminating robot access to the same resources.</p>
<h3><a id="identity" name="identity">2.3 Identity</a></h3>
<p>Beyond humanity is unique human identity. A person's identity (including such
details as nationality, property, or even personal features) needs to be established
authoritatively in order to guarantee everything from secure and legal financial
transactions, to the security of medical and legal information, to fair elections.
All of these are becoming increasingly available online, including Web-based
voting, which has undergone trials in Sweden, Switzerland, France, the United
Kingdom, Estonia, and the United States.</p>
<p>It is important to determine solutions for verifying unique identity in users,
while balancing the needs of all potential users of such a system. The cost
of failure ranges from inconvenience in privilege-based models to the denial
of basic human rights in some identity-based systems.</p>
<h2><a id="solutions" name="solutions">3. Possible solutions</a></h2>
<p>There are many techniques available to users to discourage or eliminate fraudulent
account creations or uses. Several of them may be as effective as the visual
verification technique while being more accessible to people with disabilities.
Others may be overlaid as an accommodation for the purposes of accessibility.
Seven alternatives are listed below, with their individual pros and cons. Many
are achievable today, while some hint at a near future that may render this
need obsolete.</p>
<h3><a id="logic" name="logic">3.1 Logic puzzles</a></h3>
<p>The goal of visual verification is to separate human from machine. One reasonable
way to do this is to test for logic. Simple mathematical word puzzles, trivia,
and the like may raise the bar for robots, at least to the point where using
them is more attractive elsewhere.</p>
<p>Problems: Users with cognitive disabilities may still have trouble. Answers
may need to be handled flexibly, if they require free-form text. A system would
have to maintain a vast number of questions, or shift them around programmatically,
in order to keep spiders from capturing them all. This approach is also subject
to defeat by human operators.</p>
<h3><a id="sound" name="sound">3.2 Sound output</a></h3>
<p>To reframe the problem, text is easy to manipulate, which is good for assistive
technologies, but just as good for robots. So, a logical means of trying to
solve this problem is to offer another non-textual method of using the same
content. Hotmail serves a sound file that can be listened to if the visual verification
is not suitable for the user.</p>
<p>However, according to a CNet article [<a href="#ref-NEWSCOM">NEWSCOM</a>],
Hotmail's sound output, which is itself distorted to avoid the same programmatic
abuse, was unintelligible to all four test subjects, all of whom had "good hearing".
Users who are deaf-blind, don't have or use a sound card, work in noisy environments,
or don't have required sound plugins are likewise left in the lurch. Since this
content is auditory in nature, users often have to write down the code before
entering it, which is very inconvenient. Worst of all, some implementations
of this technique are JavaScript-based, or designed in such a way that some
blind users may not be able to access them. Machines, on the other hand, may
even have greater success with voice recognition software than they do with
OCR on visual CAPTCHAs.</p>
<h3><a id="limiteduse" name="limiteduse">3.3 Limited-use accounts</a></h3>
<p>Users of free accounts very rarely need full and immediate access to a site's
resources. For example, users who are searching for concert tickets may need
to conduct only three searches a day, and new email users may only need to send
a canned notification of their new address to their friends, and a few other
free-form messages. Sites may create policies that limit the frequency of interaction
explicitly (that is, by disabling an account for the rest of the day) or implicitly
(by slowing the response times incrementally). Creating limits for new users
can be an effective means of making high-value sites unattractive targets to
robots.</p>
<p>The drawbacks to this approach include having to take a trial-and-error approach
to determine a useful technique. It requires site designers to look at statistics
of normal and exceptional users, and determine whether a bright line exists
between them.</p>
<h3><a id="noninteractive" name="noninteractive">3.4 Non-interactive checks</a></h3>
<p>While CAPTCHA and other interactive approaches to spam control are sometimes
effective, they do make using a site more complex. This is often unnecessary,
as a large number of non-interactive mechanisms exist to check for spam or other
invalid content.</p>
<p>This category contains two popular non-interactive approaches: spam filtering,
in which an automated tool evaluates the <em>content</em> of a transaction,
and heuristic checks, which evaluate the <em>behavior</em> of the client.</p>
<h4><a id="bayesian" name="bayesian">3.4.1 Spam filtering</a></h4>
<p>Applications that use "hot words" to flag spam content, or Bayesian filtering
to detect other patterns consistent with spam, are very popular, and quite effective.
While such systems may experience false negatives from time to time, properly-tuned
systems are as effective as a CAPTCHA approach, while also removing the added
cognitive burden on the user.</p>
<p>Most major blogging software contains spam filtering capabilities, or can be
fitted with a plug-in for this functionality. Many of these filters can automatically
delete messages that reach a certain spam threshold, and mark questionable messages
for manual moderation. More advanced systems can control attacks based on post
frequency, filter content sent using the [<a href="#ref-TRACKBACK">TRACKBACK</a>]
protocol, and ban users by IP address range, temporarily or permanently.</p>
<h4><a id="heuristic" name="heuristic">3.4.2 Heuristic checks</a></h4>
<p>Heuristics are discoveries in a process that seem to indicate a given result.
It may be possible to detect the presence of a robotic user based on the volume
of data the user requests, series of common pages visited, IP addresses, data
entry methods, or other signature data that can be collected.</p>
<p>Again, this requires a good look at the data of a site. If pattern-matching
algorithms can't find good heuristics, then this is not a good solution. Also,
polymorphism, or the creation of changing footprints, is apt to result, if it
hasn't already, in robots, just as polymorphic ("stealth") viruses appeared
to get around virus checkers looking for known viral footprints.</p>
<p>Another heuristic approach identified in [<a href="#ref-KILLBOTS">KILLBOTS</a>]
involves the use of CAPTCHA images, with a twist: how the user reacts to the
test is as important as whether or not it was solved. This system, which was
designed to thwart distributed denial of service (DDoS) attacks, bans automated
attackers which make repeated attempts to retrieve a certain page, while protecting
against marking humans incorrectly as automated traffic. When the server's load
drops below a certain level, the authentication process is removed entirely.</p>
<h3><a id="federatedidentity" name="federatedidentity">3.5 Federated identity systems</a></h3>
<p>Competing efforts by Microsoft and the Liberty Alliance are attempting to establish
a "federated network identity" system, which can allow a user to create an account,
set his or her preferences, payment data, etc., and have that data persist across
all sites that use the same service. This sort of system, which is making inroads
in both Web sites and Web Services, would allow a portable form of identification
across the Web.</p>
<h4><a id="singlesignon" name="singlesignon">3.5.1 Single sign-on</a></h4>
<p>Ironically enough, the Passport system itself is one of the very same services
that currently utilizes visual verification techniques. These single sign-on
services will have to be among the most accessible on the Web in order to offer
these benefits to people with disabilities. Additionally, use of these services
will need to be ubiquitous to truly solve the problems addressed here once and
for all.</p>
<h4><a id="pki" name="pki">3.5.2 Public-key infrastructure solutions</a></h4>
<p>Another approach is to use certificates for individuals who wish to verify
their identity. The certificate can be issued in such a way as to ensure something
close to a one-person-one-vote system by for example issuing these identifiers
in person and enabling users to develop distributed trust networks, or having
the certificates issued by highly trusted authorities such as governments. These
type of systems have been implemented for securing web pages, and for authenticating
email.</p>
<p>The cost of creating fraudulent certificates needs to be high enough to destroy
the value of producing them in most cases. Sites would need to use mechanisms
which are widely implemented in user agents.</p>
<p>A subset of this concept, in which only people with disabilities who are affected
by other verification systems would register, raises a privacy concern in that
the user would need to telegraph to every site that she has a disability. The
stigma of users with disabilities having to register themselves to receive the
same services should be avoided. With that said, there are a few instances in
which users may <em>want</em> to inform sites of their disabilities or other
needs: sites such as Bookshare [<a href="#ref-BOOKSHARE">BOOKSHARE</a>] require
evidence of a visual disability in order to allow users to access printed materials
which are often unavailable in audio or Braille form. An American copyright
provision known as the Chafee Amendment [<a href="#ref-CHAFEE">CHAFEE</a>] allows
copyrighted materials to be reproduced in forms that are only usable by blind
and visually impaired users. A public-key infrastructure system would allow
Bookshare's maintainers to ensure that the site and its users are in compliance
with copyright law.</p>
<h4><a id="biometrics" name="biometrics">3.5.3 Biometrics</a></h4>
<p>On the horizon, a more foolproof method of user verification is being formulated
in the field of biometric technology. A host of tests, from fingerprint and
retinal scanning to DNA matching, promise to check a person's identity authoritatively,
effectively limiting the ability of spammers to create infinite email accounts.
Microsoft has announced a new biometric system in its Longhorn operating system,
complete with a new, secure connector to capture this data. Biometrics will
very likely be used in conjunction with single sign-on services.</p>
<p>Again, the weakness here is based on infrastructure. It will take several years
for biometric hardware to penetrate a market, and some political and social
issues exist which may hold back the process. Biometric systems will also have
to take into account the fact that not all people have the same physical features:
for example, retinal scanning does not work for a user who was born without
eyes.</p>
<h3><a id="other" name="other">3.6 Other approaches</a></h3>
<p>One approach that remains somewhat popular where identity is concerned is the
use of existing artifacts of identity, such as credit cards and national IDs
such as the Social Security number in the United States. While these systems
do provide an easy way to verify users against systems at low cost, their value
has been discounted in this paper due to their insecurity. Moreover, systems
which collect this data from large numbers of users create a more attractive
target for identity theft than they ever did for misappropriation of services.</p>
<p>Recently, Google has sent its account creation keys to new users via a Short
Message Service (SMS) message. While introducing new complications such as somewhat
limited worldwide penetration for mobile phones, thereby creating a different
sort of barrier, and poor accessibility to SMS features among users who are
blind, it does limit the extent to which large systems can be exploited. It's
not feasible, for example, for someone to use thousands of phones to farm account
keys daily, then exchange them for new phones when the service refuses to send
more keys. Sadly, the Google account creation system still requires a CAPTCHA
in addition to this security measure. This technique is included to encourage
innovative thought around using architectural constraints, with real costs involved,
to impact the feasibility of exploiting a Web resource.</p>
<h2><a id="conclusion" name="conclusion">4. Conclusion</a></h2>
<p>Sites with attractive resources and millions of users will always have a need
for access control systems that limit widespread abuse. At that level, it is
reasonable to employ many concurrent approaches, including audio and visual
CAPTCHA, to do so. However, it must be noted that human users will fall through
the cracks in these systems, and it will be necessary for sites like these to
ensure that users with disabilities will have some human-operated means of interacting
with a given resource in a reasonable amount of time.</p>
<p>The widespread use of CAPTCHA in low-volume, low-resource sites, on the other
hand, is unnecessarily damaging to the experience of users with disabilities.
An explicitly inaccessible access control mechanism should not be promoted as
a solution, especially when other systems exist that are not only more accessible,
but may be more effective, as well. It is strongly recommended that smaller
sites adopt spam filtering and/or heuristic checks in place of CAPTCHA.</p>
<p>Lastly, new approaches focusing on using exclusively visual or auditory means
for access control, such as the "PIN Guard" mentioned above, should be scrapped
until a reliable method exists for users who cannot access them to authenticate
themselves. A short-term security benefit is not worth threatening a person's
autonomy by denying them access to such important data as their finances.</p>
<hr />
<h2>5. <a id="acknowledgments" name="acknowledgments">Acknowledgments</a></h2>
<p>Thanks to the following contributors: Kentarou Fukuda, Marc-Antoine Garrigue, Al Gilman, Charles
McCathieNevile, David Pawson, David Poehlman, Janina Sajka, and Jason White.</p>
<p>This publication has been funded in part with Federal funds from the U.S.
Department of Education under contract number ED05CO0039. The content of
this publication does not necessarily reflect the views or policies of the
U.S. Department of Education, nor does mention of trade names, commercial
products, or organizations imply endorsement by the U.S. Government.
</p>
<h2>6. <a id="references" name="references">References</a></h2>
<dl>
<dt><a id="ref-AICAPTCHA" name="ref-AICAPTCHA">[AICAPTCHA]</a></dt>
<dd><a href="http://www.brains-n-brawn.com/default.aspx?vDir=aicaptcha">aiCaptcha:
Using AI to beat CAPTCHA and post comment spam</a>, Casey Chesnut. The site
is online at http://www.brains-n-brawn.com/default.aspx?vDir=aicaptcha</dd>
<dt><a id="ref-ANTIPHISHING" name="ref-ANTIPHISHING">[ANTIPHISHING]</a></dt>
<dd><a
href="http://antiphishing.org/APWG_Phishing_Activity_Report_Jul_05.pdf">Phishing
Activity Trends Report July, 2005,</a> Anti-Phishing Working Group.
Available online at http://antiphishing.org/APWG_Phishing_Activity_Report_Jul_05.pdf</dd>
<dt><a id="ref-ANTIROBOT" name="ref-ANTIROBOT">[ANTIROBOT]</a></dt>
<dd><a href="http://www.w3.org/TR/turingtest">Inaccessibility of Visually-Oriented
Anti-Robot Tests</a>, Matt May. The site is online at http://www.w3.org/TR/turingtest</dd>
<dt><a id="ref-BOOKSHARE" name="ref-BOOKSHARE">[BOOKSHARE]</a></dt>
<dd><a href="http://www.bookshare.org">Bookshare.org home page</a>. The site
is online at http://www.bookshare.org</dd>
<dt><a id="ref-BREAKING" name="ref-BREAKING">[BREAKING]</a></dt>
<dd><a href="http://www.cs.berkeley.edu/%7Emori/gimpy/gimpy.html">Breaking CAPTCHAs
Without Using OCR</a>, Howard Yeend. The site is online at http://www.cs.berkeley.edu/~mori/gimpy/gimpy.html</dd>
<dt><a id="ref-BREAKINGOCR" name="ref-BREAKINGOCR">[BREAKINGOCR]</a></dt>
<dd><a href="http://www.puremango.co.uk/cm_breaking_captcha_115.php">Breaking
CAPTCHAs Without Using OCR</a>, Howard Yeend. The site is online at http://www.puremango.co.uk/cm_breaking_captcha_115.php</dd>
<dt><a id="ref-CAPTCHA" name="ref-CAPTCHA">[CAPTCHA]</a></dt>
<dd><a href="http://www.captcha.net">The CAPTCHA Project</a>, Carnegie Mellon
University. The project is online at http://www.captcha.net</dd>
<dt><a id="ref-CHAFEE" name="ref-CHAFEE">[CHAFEE]</a></dt>
<dd><a href="http://www.copyright.gov/title17/92chap1.html">17 <abbr
title="United States Code">USC</abbr> 121</a>, Limitations on exclusive
rights: reproduction for blind or other people with disabilities (also known
as the Chafee Amendment): This amendment is online at http://www.loc.gov/copyright/title17/92chap1.html</dd>
<dt><a id="ref-KILLBOTS" name="ref-KILLBOTS">[KILLBOTS]</a></dt>
<dd><a
href="http://www.usenix.org/events/nsdi05/tech/kandula/kandula_html/">Botz-4-Sale:
Surviving DDos Attacks that Mimic Flash Crowds</a>, Srikanth Kandula, Dina
Katabi, Matthias Jacob, and Arthur Burger, Usenix NSDI 2005. Best Student
Paper Award. This paper is online at http://www.usenix.org/events/nsdi05/tech/kandula/kandula_html/
or http://nms.lcs.mit.edu/%7Ekandula/data/killbots.ps</dd>
<dt><a id="ref-NEWSCOM" name="ref-NEWSCOM">[NEWSCOM]</a></dt>
<dd><a href="http://news.com.com/2100-1032-1022814.html">Spam-bot tests flunk
the blind</a>, Paul Festa. News.com, 2 July 2003. This article is online at
http://news.com.com/2100-1032-1022814.html</dd>
<dt><a id="ref-PINGUARD" name="ref-PINGUARD">[PINGUARD]</a></dt>
<dd><a href="https://secure1.ingdirect.com/tpw/popup_whatIsThis.html">PIN Guard</a>,
ING Direct site. This site is online at https://secure1.ingdirect.com/tpw/popup_whatIsThis.html</dd>
<dt><a id="ref-PWNTCHA" name="ref-PWNTCHA">[PWNTCHA]</a></dt>
<dd><a href="http://sam.zoy.org/pwntcha/">PWNtcha - CAPTCHA decoder</a>, Sam
Hocevar. The site is online at http://sam.zoy.org/pwntcha/</dd>
<dt><a id="ref-TRACKBACK" name="ref-TRACKBACK">[TRACKBACK]</a></dt>
<dd><a href="http://en.wikipedia.org/wiki/Trackback">Trackback</a>, Wikipedia.
The site is online at http://en.wikipedia.org/wiki/Trackback</dd>
<dt><a id="ref-TURING" name="ref-TURING">[TURING]</a></dt>
<dd><a href="http://www.turing.org.uk/turing/scrapbook/test.html">The Turing
Test</a>, The Alan Turing Internet Scrapbook, 2002. The document is online
at http://www.turing.org.uk/turing/scrapbook/test.html</dd>
</dl>
</body>
</html>