<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: PeopleSign</title>
	<atom:link href="http://habitablezone.com/2012/03/14/peoplesign/feed/" rel="self" type="application/rss+xml" />
	<link>https://habitablezone.com/2012/03/14/peoplesign/</link>
	<description></description>
	<lastBuildDate>Fri, 03 Apr 2026 22:41:18 -0700</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.1</generator>
	<item>
		<title>By: Robert</title>
		<link>https://habitablezone.com/2012/03/14/peoplesign/#comment-12579</link>
		<dc:creator>Robert</dc:creator>
		<pubDate>Sat, 17 Mar 2012 22:52:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.habitablezone.com/?p=10975#comment-12579</guid>
		<description>&lt;p&gt;Define a &quot;good number&quot;&lt;/p&gt;

A proposed security measure always has to be judged against cost, and compared against alternatives that include doing nothing. Are we under attack from captcha-guessing bots, or is it a mere annoyance? Is it easier for us to simply delete the occasional spam rather than armor up the place?

I wasn&#039;t that impressed by PeopleSpoor&#039;s technology, and I suspect that it&#039;ll be busted in considerably less than a decade. You also have to judge security measures over the long haul, and even if their system is exactly as difficult as a captcha, it&#039;s ten years after the invention of the captcha and if nothing else, there&#039;s that much more raw computer power available to break it.

Ten years ago you couldn&#039;t rent computer power by the yard for pennies like you can today.

Which of course means that captcha is also that much weaker today. 

Maybe another way to address the problem with the tools at hand is to reexamine security policy. Allowing anyone to post after passing only a captcha is asking for trouble if captcha is weak. But if we require people to be registered to post, and use captcha to verify organic sentience during registration, we considerably slow down aspiring spammers. We can close down a spammer&#039;s account, whichis better than running around deleting individual spam posts by anonymous visitors. How the tools are used matters too.</description>
		<content:encoded><![CDATA[<p>Define a &#8220;good number&#8221;</p>
<p>A proposed security measure always has to be judged against cost, and compared against alternatives that include doing nothing. Are we under attack from captcha-guessing bots, or is it a mere annoyance? Is it easier for us to simply delete the occasional spam rather than armor up the place?</p>
<p>I wasn&#8217;t that impressed by PeopleSpoor&#8217;s technology, and I suspect that it&#8217;ll be busted in considerably less than a decade. You also have to judge security measures over the long haul, and even if their system is exactly as difficult as a captcha, it&#8217;s ten years after the invention of the captcha and if nothing else, there&#8217;s that much more raw computer power available to break it.</p>
<p>Ten years ago you couldn&#8217;t rent computer power by the yard for pennies like you can today.</p>
<p>Which of course means that captcha is also that much weaker today. </p>
<p>Maybe another way to address the problem with the tools at hand is to reexamine security policy. Allowing anyone to post after passing only a captcha is asking for trouble if captcha is weak. But if we require people to be registered to post, and use captcha to verify organic sentience during registration, we considerably slow down aspiring spammers. We can close down a spammer&#8217;s account, whichis better than running around deleting individual spam posts by anonymous visitors. How the tools are used matters too.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: TB</title>
		<link>https://habitablezone.com/2012/03/14/peoplesign/#comment-12451</link>
		<dc:creator>TB</dc:creator>
		<pubDate>Wed, 14 Mar 2012 14:46:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.habitablezone.com/?p=10975#comment-12451</guid>
		<description>&lt;p&gt;Not sure what the issue is in that article.&lt;/p&gt;

A single Captcha word does the spam-deflecting job, and that they&#039;re using distributed processing (us) to get some work done with the extra word doesn&#039;t bother me.  I remember a while some years ago when my computer was doing stuff for SETI when I wasn&#039;t using it.  I don&#039;t think I&#039;d do that now.

I doubt the &quot;fake&quot; captcha returns are plugged directly into OCR results with no further input, but if the author has fun saying dirty words to a computer, he can go for it.</description>
		<content:encoded><![CDATA[<p>Not sure what the issue is in that article.</p>
<p>A single Captcha word does the spam-deflecting job, and that they&#8217;re using distributed processing (us) to get some work done with the extra word doesn&#8217;t bother me.  I remember a while some years ago when my computer was doing stuff for SETI when I wasn&#8217;t using it.  I don&#8217;t think I&#8217;d do that now.</p>
<p>I doubt the &#8220;fake&#8221; captcha returns are plugged directly into OCR results with no further input, but if the author has fun saying dirty words to a computer, he can go for it.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
