May's Blog

If you’ve spent the last year clicking on blurry crosswalks and traffic lights like you’re grinding a side quest in a mediocre mobile game, I’ve got news: the boss has leveled up. Recent reports and research roundups (PYMNTS, Campus Technology/The Journal, Science Focus) confirm what many of us suspected—modern vision-language models (VLMs) and cheap solver APIs are now beating image CAPTCHAs at high accuracy and low cost. Even vendors and identity platforms (DataDome, Stytch, HumanID) are saying it out loud: classic CAPTCHA is no longer enough.

As a security-minded dev and open-source nerd, I’ve been tracking this shift for years. The short version: AI didn’t just catch up; it made CAPTCHA farms obsolete and turned “prove you’re human” puzzles into conversion-killing theater. Time to refactor.

What just happened (and why it matters)

Why e‑commerce should care (beyond “users hate CAPTCHAs”)

Why CAPTCHAs fail technically

So what replaces CAPTCHA?

Move from “prove humanness” to “prove legitimacy” Defense-in-depth beats any single gate. The pattern that works in 2025 blends strong device/user attestation, risk-adaptive flows, and server-side controls that don’t punish legitimate users.

1 Use attestation and passkeys where identity matters

2 Make your controls adaptive, not universal

3 Harden server-side and reduce spoofable signals

4 Keep telemetry, not trackers

Open-source and community tools worth a look

Concrete implementation patterns

Add passkeys for login and step-up

Example: risk-based rate limiting in Node with Redis (conceptual)

High-level pseudocode:

Server-side validation for Turnstile or similar

Security implications and trade-offs

A pragmatic roadmap (90-day plan)

What the research and vendors agree on

The open-source angle No single vendor will solve your bot problem. The healthiest pattern I’ve seen in the wild blends open standards (WebAuthn), open-source enforcement (OWASP CRS, CrowdSec), and carefully chosen proprietary components where they genuinely add value (e.g., PAT-enabled challenges). Keep your core logic and telemetry in-house, and treat third-party scripts as replaceable modules.

Final thoughts CAPTCHAs had a good run, but AI has turned them into nostalgia—like training weights a shonen hero forgets to take off. If you’re protecting real value, stop asking users to find the bicycle. Bind identity to devices with passkeys, validate clients with privacy-preserving tokens, and let risk engines decide when to step up. Your users will convert more, and your fraud team will chase fewer ghosts.

I’m curious: if you’ve ripped out CAPTCHAs, what did you replace them with—and how did it impact conversion and fraud? If you’re weighing options, what’s blocking you? Drop your stack and war stories; I’ll share code patterns and open-source configs in a follow-up.

#AP vs CAPTCHA #Application Security #Bot Mitigation #Passkeys #WebAuthn #Open Source Security #Creowdsec #Accessibility #Kill Teh CAPTCHA