GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Monday, 14-Apr-2025 22:30:34 JST Ryan Castellucci :nonbinary_flag: Ryan Castellucci :nonbinary_flag:

    Proposals for using zero knowledge proofs computed by client executed JavaScript that determine if a website visitor is a bot have been made. Seems like known-good data could be replayed with minor perturbations to the proving function?

    Am I just having "salary depends on not understanding" issues?

    In conversation about a month ago from infosec.exchange permalink
    • Embed this notice
      bo0tzz (bo0tzz@fosstodon.org)'s status on Tuesday, 15-Apr-2025 00:10:19 JST bo0tzz bo0tzz
      in reply to

      @ryanc I believe you're talking about tools like Anubis - the challenge depends on a nonce set by the server, right?

      In conversation about a month ago permalink
    • Embed this notice
      Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Tuesday, 15-Apr-2025 00:10:19 JST Ryan Castellucci :nonbinary_flag: Ryan Castellucci :nonbinary_flag:
      in reply to
      • bo0tzz

      @bo0tzz no, not like Anubis - proof of work is different

      In conversation about a month ago permalink
    • Embed this notice
      Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Tuesday, 15-Apr-2025 01:26:25 JST Ryan Castellucci :nonbinary_flag: Ryan Castellucci :nonbinary_flag:
      in reply to
      • Luna R
      • bo0tzz

      @lunarood @bo0tzz yes, that sort of thing

      In conversation about a month ago permalink
    • Embed this notice
      Luna R (lunarood@mastodon.gamedev.place)'s status on Tuesday, 15-Apr-2025 01:26:26 JST Luna R Luna R
      in reply to
      • bo0tzz

      @ryanc @bo0tzz Do you mean stuff like zkSENSE or Cloudflare CAP?

      The former explicitly leaves data authenticity outside the threat model, making it pretty much entirely useless, as you pointed out (it's not even a secret... the paper says as much).

      The latter seems to rely on hardware authentication.

      Though I didn't look into the details much, because tbh I'm not particularly interested in these approaches, as they are either entirely useless or tied to specific trusted OEMs.

      In conversation about a month ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.