Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

CloudFlare Delves into its CAPTCHA Issue


People who routinely use Tor know very well that CloudFlare displays CAPTCHAS to the Web-surfers working on its clients' websites by utilizing one exit node Internet Protocol of Tor. CloudFlare says it implemented this strategy because it continuously found attackers abusing Tor IPs to fulfill own malicious purposes.

CloudFlare, which provides network of content delivery, suggested it be allowed to take part in the Tor Scheme for enforcing solutions which would let people using the anonymity-facilitating browser towards staying away from CAPTCHAS, blocks, as well as many increasing impediments that apparently caused a battle between routine network traffic and Tor users.

CloudFlare explains that a study of CloudFlare network's data reveals that 94% of the requests observed on Tor network bear some malevolent behavior. However, that's not the fact that the Web-surfers are accessing contentious content, rather the requests are automated and thus devised for harming CloudFlare's customers. The greater part of spam that are just comments, fake ad-click scams, scanning of security flaws, content scraping as well as login scanning occur through Tor's network. Pcmag.com posted this, April 1, 2016.

Meanwhile, CPATCHA challenges to users can be minimized via adoption of a plug-in by Tor which can transmit one cryptographically-protected yet anonymous indication for CloudFlare services towards substantiating whether a request is automated or not.

Yes, according to CloudFlare, the company monitors and scores highly the exit node Internet Protocol of Tor as also considers them greatly threatening. CloudFlare is sympathetic with Tor's creation and understands that the Tor Scheme isn't responsible for cyber-crooks' utilization of it.

The company, of late, began engaging in Tor Scheme so it may find some solution for its clients through the Tor Browser. This way all security companies along with CloudFlare would be able to distinguish between real Tor users and those related to automated requests.

Moreover, it's CloudFlare's opinion that Tor Project should embark upon employing SHA256 to create .onion URLs. More-and-more of its clients can then establish their genuine websites' onion versions where Tor traffic can be redirected and where there won't be a need for CloudFlare's CAPTCHA displays that have been remarkably lacking during recent weeks.

ยป SPAMfighter News - 4/6/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next