home.social

#captcha — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #captcha, aggregated by home.social.

  1. A long time ago, in high school, no one ever warned me about this: if you drop Biology you'll never be able to solve captchas in the future 😆

    #captcha #hCaptcha #animals

  2. Google’s QR-code reCAPTCHA now requires approved Android or iOS devices, blocking some deGoogled and privacy-focused operating systems from verification 📱
    @GrapheneOS says the system expands hardware attestation and increases dependence on Apple or Google-controlled mobile ecosystems 🔒

    🔗 cybernews.com/privacy/google-q

    #TechNews #Google #reCAPTCHA #GrapheneOS #Android #Apple #iPhone #iOS #Privacy #OpenSource #FOSS #Cybersecurity #Encryption #Linux #Surveillance #Freedom #Security #CAPTCHA #DeGoogle

  3. Google’s QR-code reCAPTCHA now requires approved Android or iOS devices, blocking some deGoogled and privacy-focused operating systems from verification 📱
    @GrapheneOS says the system expands hardware attestation and increases dependence on Apple or Google-controlled mobile ecosystems 🔒

    🔗 cybernews.com/privacy/google-q

    #TechNews #Google #reCAPTCHA #GrapheneOS #Android #Apple #iPhone #iOS #Privacy #OpenSource #FOSS #Cybersecurity #Encryption #Linux #Surveillance #Freedom #Security #CAPTCHA #DeGoogle

  4. Google’s QR-code reCAPTCHA now requires approved Android or iOS devices, blocking some deGoogled and privacy-focused operating systems from verification 📱
    @GrapheneOS says the system expands hardware attestation and increases dependence on Apple or Google-controlled mobile ecosystems 🔒

    🔗 cybernews.com/privacy/google-q

    #TechNews #Google #reCAPTCHA #GrapheneOS #Android #Apple #iPhone #iOS #Privacy #OpenSource #FOSS #Cybersecurity #Encryption #Linux #Surveillance #Freedom #Security #CAPTCHA #DeGoogle

  5. Google’s QR-code reCAPTCHA now requires approved Android or iOS devices, blocking some deGoogled and privacy-focused operating systems from verification 📱
    @GrapheneOS says the system expands hardware attestation and increases dependence on Apple or Google-controlled mobile ecosystems 🔒

    🔗 cybernews.com/privacy/google-q

    #TechNews #Google #reCAPTCHA #GrapheneOS #Android #Apple #iPhone #iOS #Privacy #OpenSource #FOSS #Cybersecurity #Encryption #Linux #Surveillance #Freedom #Security #CAPTCHA #DeGoogle

  6. Google’s QR-code reCAPTCHA now requires approved Android or iOS devices, blocking some deGoogled and privacy-focused operating systems from verification 📱
    @GrapheneOS says the system expands hardware attestation and increases dependence on Apple or Google-controlled mobile ecosystems 🔒

    🔗 cybernews.com/privacy/google-q

    #TechNews #Google #reCAPTCHA #GrapheneOS #Android #Apple #iPhone #iOS #Privacy #OpenSource #FOSS #Cybersecurity #Encryption #Linux #Surveillance #Freedom #Security #CAPTCHA #DeGoogle

  7. Old CAPTCHAs asked: "Can you think?" New reCAPTCHA asks: "Are you compliant?"

    Google shifted the question from proving you're human to proving you're their customer. That's not security. That's a loyalty test.

    Ep 26 breaks it down 👇

    🔗 impracticalprivacy.com

    #DigitalRights #Surveillance #OpenWeb #ImpracticalPrivacy #privacy #degoogle #captcha #recaptcha #privacytools #podcast #tech #worldwideweb

  8. Old CAPTCHAs asked: "Can you think?" New reCAPTCHA asks: "Are you compliant?"

    Google shifted the question from proving you're human to proving you're their customer. That's not security. That's a loyalty test.

    Ep 26 breaks it down 👇

    🔗 impracticalprivacy.com

    #DigitalRights #Surveillance #OpenWeb #ImpracticalPrivacy #privacy #degoogle #captcha #recaptcha #privacytools #podcast #tech #worldwideweb

  9. Old CAPTCHAs asked: "Can you think?" New reCAPTCHA asks: "Are you compliant?"

    Google shifted the question from proving you're human to proving you're their customer. That's not security. That's a loyalty test.

    Ep 26 breaks it down 👇

    🔗 impracticalprivacy.com

    #DigitalRights #Surveillance #OpenWeb #ImpracticalPrivacy #privacy #degoogle #captcha #recaptcha #privacytools #podcast #tech #worldwideweb

  10. Old CAPTCHAs asked: "Can you think?" New reCAPTCHA asks: "Are you compliant?"

    Google shifted the question from proving you're human to proving you're their customer. That's not security. That's a loyalty test.

    Ep 26 breaks it down 👇

    🔗 impracticalprivacy.com

    #DigitalRights #Surveillance #OpenWeb #ImpracticalPrivacy #privacy #degoogle #captcha #recaptcha #privacytools #podcast #tech #worldwideweb

  11. Old CAPTCHAs asked: "Can you think?" New reCAPTCHA asks: "Are you compliant?"

    Google shifted the question from proving you're human to proving you're their customer. That's not security. That's a loyalty test.

    Ep 26 breaks it down 👇

    🔗 impracticalprivacy.com

    #DigitalRights #Surveillance #OpenWeb #ImpracticalPrivacy #privacy #degoogle #captcha #recaptcha #privacytools #podcast #tech #worldwideweb

  12. #cloudflare #paywall #captcha à gogo, surveillance, prisons sociales... Rendez moi le #web que j'ai connu en 2000 avec ses logos "Optimized for IE", ses musiques en MIDI dégueulasses qui gueulaient et ses designs approximatifs. Ça au moins, c'était supportable.

  13. O Google bloqueou a capacidade de reCaptcha sem usar Google Play Services, o que cria um problema pra quem não pertence ao ecossistema deles. Sistemas operacionais que não o usam, como GrapheneOS ou LineageOS, ficarão em uma situação de desgraça.

    #grapheneos #lineageos #recaptcha #google #captcha #keepandroidopen #2fa #youtube #googleauthenticator

  14. Google’s new QR-based reCAPTCHA ties web verification to Play Integrity and Apple attestation systems instead of traditional CAPTCHA check 🌐
    Privacy-focused Android variants like GrapheneOS and LineageOS risk losing access as device approval becomes part of web authentication 🔐

    @GrapheneOS
    @lineageos

    🔗 heise.de/en/news/Google-s-new-

    #TechNews #Google #reCAPTCHA #Captcha #GooglePlay #PlayIntegrity #GrapheneOS #LineageOS #Privacy #OpenWeb #Android #Security #FOSS #Telemetry #Web #Freedom #OpenSource

  15. Google’s new QR-based reCAPTCHA ties web verification to Play Integrity and Apple attestation systems instead of traditional CAPTCHA check 🌐
    Privacy-focused Android variants like GrapheneOS and LineageOS risk losing access as device approval becomes part of web authentication 🔐

    @GrapheneOS
    @lineageos

    🔗 heise.de/en/news/Google-s-new-

    #TechNews #Google #reCAPTCHA #Captcha #GooglePlay #PlayIntegrity #GrapheneOS #LineageOS #Privacy #OpenWeb #Android #Security #FOSS #Telemetry #Web #Freedom #OpenSource

  16. Google’s new QR-based reCAPTCHA ties web verification to Play Integrity and Apple attestation systems instead of traditional CAPTCHA check 🌐
    Privacy-focused Android variants like GrapheneOS and LineageOS risk losing access as device approval becomes part of web authentication 🔐

    @GrapheneOS
    @lineageos

    🔗 heise.de/en/news/Google-s-new-

    #TechNews #Google #reCAPTCHA #Captcha #GooglePlay #PlayIntegrity #GrapheneOS #LineageOS #Privacy #OpenWeb #Android #Security #FOSS #Telemetry #Web #Freedom #OpenSource

  17. Google’s new QR-based reCAPTCHA ties web verification to Play Integrity and Apple attestation systems instead of traditional CAPTCHA check 🌐
    Privacy-focused Android variants like GrapheneOS and LineageOS risk losing access as device approval becomes part of web authentication 🔐

    @GrapheneOS
    @lineageos

    🔗 heise.de/en/news/Google-s-new-

    #TechNews #Google #reCAPTCHA #Captcha #GooglePlay #PlayIntegrity #GrapheneOS #LineageOS #Privacy #OpenWeb #Android #Security #FOSS #Telemetry #Web #Freedom #OpenSource

  18. Google’s new QR-based reCAPTCHA ties web verification to Play Integrity and Apple attestation systems instead of traditional CAPTCHA check 🌐
    Privacy-focused Android variants like GrapheneOS and LineageOS risk losing access as device approval becomes part of web authentication 🔐

    @GrapheneOS
    @lineageos

    🔗 heise.de/en/news/Google-s-new-

    #TechNews #Google #reCAPTCHA #Captcha #GooglePlay #PlayIntegrity #GrapheneOS #LineageOS #Privacy #OpenWeb #Android #Security #FOSS #Telemetry #Web #Freedom #OpenSource

  19. Google betreibt schon lange einen Captcha-Dienst. Dieser soll nun KI-sicherer gestaltet werden. Eigentlich eine gute Idee, aber mit einem weiteren Rückschlag für die Privatsphäre.

    Schon die bisherigen Captchas hatten die Nebenwirkung, dass man mit aktivierten #Google- #Tracking-Cookies deutlich weniger davon sah. Wer also nicht sein ganzes Surfverhalten mit Google teilen wollte, wurde mit mehr #Captcha-Aufforderungen „bestraft“.
    dnip.ch/2023/12/20/tracking-ne

  20. Google auf dem Weg zur weltweiten Kontrolle von Smartphones?

    Übersetzter Artikel (Originalquelle siehe unten)

    "Google hat sein reCAPTCHA-System der nächsten Generation mit den Google Play Services auf Android verknüpft, was bedeutet, dass jeder, der ein von Google befreites Smartphone nutzt, automatisch bei der Verifizierung durchfällt, sobald das System beschließt, ihn zu überprüfen.

    Diese Anforderung zwingt Android-Nutzer dazu, Googles proprietäres App-Framework in der Version 25.41.30 oder höher zu nutzen, nur um zu beweisen, dass sie Menschen sind.

    Wenn reCAPTCHA eine als verdächtig eingestufte Aktivität meldet, verzichtet es auf die alten Bildrätsel und fordert Sie auf, einen QR-Code zu scannen. Dieser Scan erfordert, dass Play Services im Hintergrund läuft und mit Googles Servern kommuniziert. Wenn Sie GrapheneOS oder ein anderes benutzerdefiniertes ROM verwenden, das Googles Software entfernt, schlägt die Verifizierung fehl.

    Google kündigte das umfassendere System, Google Cloud Fraud Defense, am 23. April auf der Cloud Next an und stellte es als Vertrauensplattform vor, die sowohl autonome KI-Agenten als auch herkömmliche Bots abdecken soll. Was Google dabei nicht hervorhob, war der Punkt, dass der Nachweis, dass man ein Mensch ist, nun die Unterwerfung unter seine proprietäre Überwachung erfordert."

    reclaimthenet.org/google-broke

    #google #graphene #grapheneos #kontrolle #control
    #GooglePlay #GooglePixel #GoogleCloudPlatform #monopol #captcha #captchas #captchaabfragen #samstag #deutschland #itsecurity #uberwachung #android16 #android #

  21. How nice of Google to provide a delivery mechanism for .apk malware.

    #google #captcha #recaptcha

  22. Je n'ai pas de téléphone Android sans Google, mais est ce que Firefox avec un user-agent type Safari/iOS permet de passer les reCaptcha de Google ?
    Est ce la solution ?
    #Google #Android #Captcha #reCaptcha #Safari #iOS #GrapheneOS #LineageOS

  23. RE: caneandable.social/@WeirdWrite

    I thought from the title that this might be about the #disability #cookie that some sites use so they can get away with #inaccessible #CAPTCHA challenges.

    This is the only thing I use #BeMyEyes for. I don't want to be profiled.

  24. 🚫🔒 Ah, the golden days of Cartoon Network Flash games, now locked behind a digital fortress of "Sorry, you've been blocked" messages. Because nothing says 'nostalgia' like a #CAPTCHA and a #Cloudflare Ray ID! 🤦‍♂️✨
    webdesignmuseum.org/flash-game #CartoonNetwork #Nostalgia #FlashGames #DigitalFortress #HackerNews #ngated

  25. In another sickening twist to Google's grasp on Android, Google can now require you to have an Android device with Google Mobile Services, or an iOS device with the reCAPTCHA mobile app installed, in order to solve CAPTCHAs.

    support.google.com/recaptcha/a

    and archive: archive.is/Fq196

    #Google #reCAPTCHA #CAPTCHA #privacy #GMS #Android

  26. Multi-Stage AiTM Attack Uses Code Of Conduct Phishing Emails

    A sophisticated credential theft campaign targeting over 35,000 users across 13,000 organizations was observed between April 14-16, 2026. The operation primarily impacted the United States, particularly healthcare and financial services sectors. Attackers used code of conduct themed phishing emails masquerading as internal compliance communications, sent through legitimate email delivery services from attacker-controlled domains. Victims received polished HTML emails with PDF attachments containing fake disciplinary logs and CAPTCHA gates to evade automated analysis. The multi-stage attack chain ultimately directed users to counterfeit Microsoft authentication pages operating as adversary-in-the-middle infrastructure, enabling real-time interception of credentials and session tokens while bypassing multi-factor authentication defenses.

    Pulse ID: 69fb1736879a4a945346b9ba
    Pulse Link: otx.alienvault.com/pulse/69fb1
    Pulse Author: AlienVault
    Created: 2026-05-06 10:25:58

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AdversaryInTheMiddle #AitM #CAPTCHA #CyberSecurity #Email #HTML #Healthcare #InfoSec #Microsoft #OTX #OpenThreatExchange #PDF #Phishing #RAT #RCE #Troll #UnitedStates #bot #AlienVault

  27. Breaking the code: Multi-stage 'code of conduct' phishing campaign leads to AiTM token compromise

    A sophisticated large-scale credential theft campaign targeted over 35,000 users across 13,000 organizations, primarily in the United States, between April 14-16, 2026. Attackers distributed fully authenticated emails from legitimate services using code of conduct-themed lures with polished HTML templates. The multi-stage attack chain included PDF attachments with embedded links, multiple CAPTCHA challenges, and intermediate staging pages designed to appear legitimate while filtering automated defenses. Recipients were directed through several layers ultimately leading to an adversary-in-the-middle phishing flow that proxied authentication sessions and captured tokens, bypassing non-phishing-resistant multifactor authentication. The campaign broadly impacted Healthcare, Financial services, Professional services, and Technology industries, using social engineering techniques that created urgency through time-bound prompts and concerning accusations.

    Pulse ID: 69f8f1230f0bda494499b941
    Pulse Link: otx.alienvault.com/pulse/69f8f
    Pulse Author: AlienVault
    Created: 2026-05-04 19:18:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AdversaryInTheMiddle #AitM #CAPTCHA #CyberSecurity #Email #HTML #Healthcare #InfoSec #MultiFactorAuthentication #OTX #OpenThreatExchange #PDF #Phishing #SocialEngineering #UnitedStates #bot #AlienVault

  28. Breaking the code: Multi-stage 'code of conduct' phishing campaign leads to AiTM token compromise

    A sophisticated large-scale credential theft campaign targeted over 35,000 users across 13,000 organizations, primarily in the United States, between April 14-16, 2026. Attackers distributed fully authenticated emails from legitimate services using code of conduct-themed lures with polished HTML templates. The multi-stage attack chain included PDF attachments with embedded links, multiple CAPTCHA challenges, and intermediate staging pages designed to appear legitimate while filtering automated defenses. Recipients were directed through several layers ultimately leading to an adversary-in-the-middle phishing flow that proxied authentication sessions and captured tokens, bypassing non-phishing-resistant multifactor authentication. The campaign broadly impacted Healthcare, Financial services, Professional services, and Technology industries, using social engineering techniques that created urgency through time-bound prompts and concerning accusations.

    Pulse ID: 69f8f1230f0bda494499b941
    Pulse Link: otx.alienvault.com/pulse/69f8f
    Pulse Author: AlienVault
    Created: 2026-05-04 19:18:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AdversaryInTheMiddle #AitM #CAPTCHA #CyberSecurity #Email #HTML #Healthcare #InfoSec #MultiFactorAuthentication #OTX #OpenThreatExchange #PDF #Phishing #SocialEngineering #UnitedStates #bot #AlienVault

  29. Breaking the code: Multi-stage 'code of conduct' phishing campaign leads to AiTM token compromise

    A sophisticated large-scale credential theft campaign targeted over 35,000 users across 13,000 organizations, primarily in the United States, between April 14-16, 2026. Attackers distributed fully authenticated emails from legitimate services using code of conduct-themed lures with polished HTML templates. The multi-stage attack chain included PDF attachments with embedded links, multiple CAPTCHA challenges, and intermediate staging pages designed to appear legitimate while filtering automated defenses. Recipients were directed through several layers ultimately leading to an adversary-in-the-middle phishing flow that proxied authentication sessions and captured tokens, bypassing non-phishing-resistant multifactor authentication. The campaign broadly impacted Healthcare, Financial services, Professional services, and Technology industries, using social engineering techniques that created urgency through time-bound prompts and concerning accusations.

    Pulse ID: 69f8f1230f0bda494499b941
    Pulse Link: otx.alienvault.com/pulse/69f8f
    Pulse Author: AlienVault
    Created: 2026-05-04 19:18:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AdversaryInTheMiddle #AitM #CAPTCHA #CyberSecurity #Email #HTML #Healthcare #InfoSec #MultiFactorAuthentication #OTX #OpenThreatExchange #PDF #Phishing #SocialEngineering #UnitedStates #bot #AlienVault

  30. Breaking the code: Multi-stage 'code of conduct' phishing campaign leads to AiTM token compromise

    A sophisticated large-scale credential theft campaign targeted over 35,000 users across 13,000 organizations, primarily in the United States, between April 14-16, 2026. Attackers distributed fully authenticated emails from legitimate services using code of conduct-themed lures with polished HTML templates. The multi-stage attack chain included PDF attachments with embedded links, multiple CAPTCHA challenges, and intermediate staging pages designed to appear legitimate while filtering automated defenses. Recipients were directed through several layers ultimately leading to an adversary-in-the-middle phishing flow that proxied authentication sessions and captured tokens, bypassing non-phishing-resistant multifactor authentication. The campaign broadly impacted Healthcare, Financial services, Professional services, and Technology industries, using social engineering techniques that created urgency through time-bound prompts and concerning accusations.

    Pulse ID: 69f8f1230f0bda494499b941
    Pulse Link: otx.alienvault.com/pulse/69f8f
    Pulse Author: AlienVault
    Created: 2026-05-04 19:18:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AdversaryInTheMiddle #AitM #CAPTCHA #CyberSecurity #Email #HTML #Healthcare #InfoSec #MultiFactorAuthentication #OTX #OpenThreatExchange #PDF #Phishing #SocialEngineering #UnitedStates #bot #AlienVault

  31. Breaking the code: Multi-stage 'code of conduct' phishing campaign leads to AiTM token compromise

    A sophisticated large-scale credential theft campaign targeted over 35,000 users across 13,000 organizations, primarily in the United States, between April 14-16, 2026. Attackers distributed fully authenticated emails from legitimate services using code of conduct-themed lures with polished HTML templates. The multi-stage attack chain included PDF attachments with embedded links, multiple CAPTCHA challenges, and intermediate staging pages designed to appear legitimate while filtering automated defenses. Recipients were directed through several layers ultimately leading to an adversary-in-the-middle phishing flow that proxied authentication sessions and captured tokens, bypassing non-phishing-resistant multifactor authentication. The campaign broadly impacted Healthcare, Financial services, Professional services, and Technology industries, using social engineering techniques that created urgency through time-bound prompts and concerning accusations.

    Pulse ID: 69f8f1230f0bda494499b941
    Pulse Link: otx.alienvault.com/pulse/69f8f
    Pulse Author: AlienVault
    Created: 2026-05-04 19:18:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AdversaryInTheMiddle #AitM #CAPTCHA #CyberSecurity #Email #HTML #Healthcare #InfoSec #MultiFactorAuthentication #OTX #OpenThreatExchange #PDF #Phishing #SocialEngineering #UnitedStates #bot #AlienVault

  32. Fake CAPTCHA Campaign Abuses SMS Pumping via International Revenue Share Fraud

    Attackers use fake CAPTCHA pages to trick users into sending international SMS messages and monetize them through SMS pumping fraud.

    Pulse ID: 69f64ff64b8d4643d61a5464
    Pulse Link: otx.alienvault.com/pulse/69f64
    Pulse Author: cryptocti
    Created: 2026-05-02 19:26:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CAPTCHA #CyberSecurity #InfoSec #OTX #OpenThreatExchange #SMS #bot #cryptocti

  33. Fake CAPTCHA Campaign Abuses SMS Pumping via International Revenue Share Fraud

    Pulse ID: 69f50d2b75e45030293e86fd
    Pulse Link: otx.alienvault.com/pulse/69f50
    Pulse Author: cryptocti
    Created: 2026-05-01 20:29:31

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CAPTCHA #CyberSecurity #InfoSec #OTX #OpenThreatExchange #SMS #bot #cryptocti

  34. Fake CAPTCHA Pages Enable Global SMS Scams

    Pulse ID: 69f4739812a42ff21e7a15ea
    Pulse Link: otx.alienvault.com/pulse/69f47
    Pulse Author: CyberHunter_NL
    Created: 2026-05-01 09:34:16

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CAPTCHA #CyberSecurity #InfoSec #OTX #OpenThreatExchange #SMS #bot #CyberHunter_NL