this post was submitted on 22 Jun 2023
88 points (96.8% liked)

Lemmy

12524 readers
9 users here now

Everything about Lemmy; bugs, gripes, praises, and advocacy.

For discussion about the lemmy.ml instance, go to !meta@lemmy.ml.

founded 4 years ago
MODERATORS
 

A dev initially suggested in the Lemmy GitHub to remove captchas from future releases altogether because "they're easy to bypass".

Here's the thing though, the lemmy.world instance avoided the daily 10k+ bot signups per day the other instances are currently experiencing simply by activating captchas.

Yes basic OCR easily bypasses them, but the whole point is that you're forcing the spammer to use it, and it costs CPU resources, meaning that for the same budget the spammer will be able to create LESS bot accounts, or none at all if he doesn't know how to automate the use of an OCR. Compare that with the current situation where anyone who followed a Python crash course can easily write a small script doing tens of thousands of automated signups using just the requests module.

Please enable captchas by default in future releases. You can try out other proposed solutions like hashcash too but IMO focus on the low hanging fruit first and make captchas a default in 0.18 already. One barrier, no matter how weak it is, is much better than no barrier at all.

And to those who maintain websites that list instances and rank them by size, you are also contributing to this problem by adding an incentive for bad actors to inflate their own instances. Please either remove that ranking, or remove the spammy looking instances by hand.

Also, maybe change the user count such that only users having clicked on the verification link are counted.

you are viewing a single comment's thread
view the rest of the comments
[–] kevincox@lemmy.ml 4 points 1 year ago* (last edited 1 year ago) (1 children)

If you add a delay the botters will just run more requests in parallel. It is a tiny barrier but in a completely different league than even a simple captcha.

[–] ablackcatstail@goblackcat.net 4 points 1 year ago (1 children)

@kevincox @fubo I've tried actually shunting the bots into a queue that basically sets the TCP receive window to 1. You're quite correct, the bots just spawn off more processes.

And then you respond by limiting access by IP. That degrades the experience a bit for large networks like universities, but if it's limited to logins and signups, it can be acceptable.

And then they respond with bot nets, and then you know you've hit the mainstream.