April 25, 2025
Trending News

How come robots can’t solve “I’m not a robot” questions that even a 5-year-old can solve?

  • October 10, 2022
  • 0

Today, technology, which is constantly evolving, isautomationWe see that it offers great advantages in terms of ”. In this context, we see functional robots and bots showing themselves

Today, technology, which is constantly evolving, isautomationWe see that it offers great advantages in terms of ”. In this context, we see functional robots and bots showing themselves in both industry (such as car manufacturing) and entertainment (such as Discord bots).

But who can create applications from scratch, spotless programmed bots that can process material, entertain people and have a lot more skills,”I am not a robotIt looks like it can’t get past the ” box. So, what’s behind this chilling situation that has been the material of countless internet memes?

Let’s fix the error from the beginning; There are many things that robots excel at. But we are to blame

If you see the box in question, first your cursor you take it there. You may even have gone a little too far and bring it back. For example, when you click . click pedestrian crossing You will be asked to select all images that: You think small-scale and mark images with zebra crossings. And congratulations, you have proved that you are human, now you have access to the site.

Now programmed behind your back a boat try to get in. If that box pops up, he won’t bother dragging the cursor there like we do. Instead, move the cursor because it knows what pixel range the tile in question is in. localize it will take you there and click on it. It will then immediately select all images that contain a crosswalk and try to enter.

But even if it has chosen the right images like you, the bot will not be able to enter the site.

Instead, an error code may appear in the verification section or CAPTCHA The box (Automatic Turing test to separate humans and bots) can make a loop and ask the bot to constantly search images. This keeps him away from the site. Well, this verification of the right images would he not have been chosen?

There’s a lot more to it, and that’s where the actual validation happens:

You can see the end of almost every site membership within Google. reCAPTCHA, is also interested in your current Internet activity history. For example, if you surf the web for a few hours and then join the site in question, which most of us do, unless we go on the web specifically for that purpose, your chances to be human is considered higher.

But you can go directly to that page and locate that box. in milliseconds Marking is not very human. Speaking of locating the box, did you know that your mouse movements are also directly monitored while on that page? Let’s go here together let’s testify now.

on your keyboard CTRL+SHIFT+J Make the combination and click once on the sidebar and paste the command “onmousemove = function(e){console.log(“mouse location:”, e.clientX, e.clientY)}” without the quotes. Move your mouse cursor over the site after pressing Enter. Saw you? It’s so easy to watch these moves.

If you look at your own cursor movements, you see that you follow a certain path from one place to another:

But since the bots don’t do this and go straight to the target, chances are they are human almost impossible. Because even if you try, you can’t tick that box like a machine. In other words, your activity on the page, your cursor movements, your internet activity from YouTube to Twitter, from Webtekno to the site you subscribe to, and much more are analyzed and whether you are human decision is made. Therefore, the way we use the internet allows us to smoothly pass these boxes every time.

But if VPN Using such tools, instant location changes can negatively impact the verification process, as can bots. In this context again and again you may have to choose an image or the verification box may give an error right away. Depending on the authentication type, you may also be able to succeed regardless of whether you use a VPN or not.

Let’s briefly describe the types of authentication we all know and the methods they use:

The difference between CAPTCHA and reCAPTCHA itself, which we blindly try to solve:

CAPTCHA, 1997 appeared in the year and in its first form “Are we robots?It contained words that were barely read with different rules and methods. Then when the bots start to pass by, to protect the safety to CAPTCHA Added visuals that present several challenges.

  • How I felt when I failed the CAPTCHA test 10 times in a row

Let’s come to reCAPTCHA:

ReCAPTCHA “CAPTCHA from GoogleWe can do it ‘. Because different companies have the ability to handle it in their own way. It appeared in 2007 and 2 years later Google in the reception. In the early versions of this it was necessary to write the word in the image as we saw in the original CAPTCHA.

of the first version in 2018 reCAPTCHA, which was disconnected, appeared in its second version with the most common box we see today. In this version, users are asked to check the box and according to the conditions we mentioned above, they will be automatically imported or “pedestrian crossing”, “traffic lightThey must select images taken from Street View, such as ‘. Then they are brought to the site.

extra information: In this version, the confirmation dialog can be hidden on several buttons. In other words, when you press the registration button, you may be confirming that you are a robot without your knowledge. But when a friend does this, they may encounter verification based on their current internet activity.

In the third version, the requirement to check boxes directly has been eliminated:

Instead, the system your internet activity a statement indicating whether you are human or not, taking into account determines the score. If your score is at a questionable level, you will be prompted to verify as before. Then you can enter the site.

As a result, we can surf the Internet due to our flaws and because they are perfect We can say that bots are not brought to the sites. But we know that bots will adapt to these systems at some point. When that time comes, what kind of authentication methods do you think will be used? You can share your thoughts in the comments section.

sources: Google, DataDome, Logical Answered

Source: Web Tekno

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version