A no-nonsense CAPTCHA system with seamless UX | Backend component
Find a file
2023-05-30 12:47:41 +02:00
.github feat: install selenium drivers 2023-04-30 23:46:58 +05:30
config feat: queue length and IP runner config 2022-08-09 16:28:30 +05:30
db Update cargo 2022-10-22 21:53:18 +02:00
docs Update CONFIGURATION.md 2023-05-18 12:44:39 -05:00
scripts feat: install selenium drivers 2023-04-30 23:46:58 +05:30
src Remove redunant format 2022-10-24 16:22:10 +02:00
static use yaml directly for displaying open api spec 2021-10-08 15:36:42 +05:30
templates fix(license): accidential AGPL in MIT licensed files 2023-04-18 11:20:12 +02:00
utils/cache-bust feat: run cache busting via a separate bin 2022-05-14 15:59:40 +05:30
.dockerignore docker: wasm build step 2021-07-15 15:27:01 +05:30
.env_sample feat: add MARIA_DATABASE_URL to .env_sample and load maria config in CI 2022-07-23 12:04:17 +05:30
.eslintrc.js frontend linting 2021-10-08 15:24:29 +05:30
.gitignore move pow wasm lib out to a separate repo 2021-12-01 21:18:30 +05:30
build.rs feat: migrate fetch captcha config to use db_* 2022-05-27 18:16:47 +05:30
Cargo.lock Merge pull request #70 from mCaptcha/fix-53 2023-03-31 17:29:58 +05:30
Cargo.toml chore(deps): bump openssl from 0.10.41 to 0.10.48 2023-03-25 05:03:34 +00:00
CHANGELOG.md feat: add changelog entry to doc change in access token verification 2022-07-22 19:49:07 +05:30
code_of_conduct.md added code_of_conduct.md 2021-05-02 18:13:13 +05:30
Cross.toml cache control 2021-05-30 17:55:11 +05:30
docker-compose.yml fix: fixes broken docker-compose.yml (#38) 2022-08-05 14:00:40 +02:00
Dockerfile fix: copy OpenAPI build from build container to final container 2023-01-17 03:54:54 +05:30
jest.config.ts upgrade dev dependencies 2021-10-13 10:37:51 +05:30
LICENSE.md licence 2021-03-09 17:49:20 +05:30
Makefile feat: run integration tests using nightwatch js 2023-04-30 20:17:51 +05:30
package.json chore: migrate dart-sass to sass 2022-05-08 17:36:49 +05:30
README.md Typo in README.md 2023-05-30 12:47:41 +02:00
rustfmt.toml get notifications 2021-05-10 15:38:09 +05:30
sailfish.toml chore: upgrade sailfish 2022-05-08 17:57:29 +05:30
sqlx-data.json fix: add sqlx offline compilation data 2022-07-22 20:04:41 +05:30
tsconfig.json Load pow-sha256 polyfill to support browsers that aren't capable of 2021-12-08 14:52:06 +05:30
webpack.config.js chore: migrate dart-sass to sass 2022-05-08 17:36:49 +05:30
yarn.lock Merge pull request #24 from mCaptcha/dependabot/npm_and_yarn/nanoid-3.3.4 2022-08-14 01:32:55 +05:30

mcaptcha logo

mCaptcha

Proof of work based, privacy respecting CAPTCHA system with a kickass UX.

Documentation Build Docker dependency status codecov
AGPL License Chat

STATUS: ACTIVE DEVELOPMENT

Skip to demo

mCaptcha is a privacy respecting, free CAPTCHA system with a kickass UX. Your users no longer have to interact with ridiculous image-based CAPTCHA system, wasting precious mental bandwidth. Instead, your computer will do the work for you, see for yourself!

How does it work?

mCaptcha uses SHA256 based proof-of-work (PoW) to rate limit users.

When a user wants to do something on a mCaptcha-protected website,

  1. they will have to generate proof-of-work (a bunch of math that will takes time to compute) and submit it to mCaptcha.

  2. We'll validate the proof:

    • if validation is unsuccessful, they will be prevented from accessing their target website
    • if validation is successful, read on,
  3. They will be issued a token that they should submit along with their request/form submission to the target website.

  4. The target website should validate the user-submitted token with mCaptcha before processing the user's request.

The whole process is automated from the user's POV. All they have to do is click on a button to initiate the process.

mCaptcha makes interacting with websites (computationally) expensive for the user. A well-behaving user will experience a slight delay (no delay when under moderate load to 2s when under attack; PoW difficulty is variable) but if someone wants to hammer your site, they will have to do more work to send requests than your server will have to do to respond to their request.

Why use mCaptcha?

  • Free software, privacy focused
  • Seamless UX - No more annoying CAPTCHAs!
  • No tracking: Our CAPTCHA routes are cookie free!
  • IP address independent: your users are behind a NAT? We got you covered!
  • Resistant to replay attacks: proof-of-work configurations have short lifetimes (30s) and can be used only once. If a user submits a PoW to an already used configuration or an expired one, their proof will be rejected.

Demo

Client-side widget:

mCaptcha's UX is super silent, solving CAPTCHAs have never been more easier. One click and you are on your way. To observe mCaptcha in action, open dev tools and monitor console and network activity.

  1. Link to widget

  2. Video:

Demo servers are available at:

Core functionality is working but it's still very much work-in-progress. Since we don't have a stable release yet, hosted demo servers might be a few versions behind master. Please check footer for build commit.

Feel free to provide bogus information while signing up (project under development, database frequently wiped).

Self-hosted:

Clone the repo and run the following from the root of the repo:

git clone https://github.com/mCaptcha/mCaptcha.git
docker-compose up -d

After the containers are up, visit http://localhost:7000 and login with the default credentials:

  • username: aaronsw
  • password: password

It takes a while to build the image so please be patient :)

See DEPLOYMENT.md for detailed alternate deployment methods.

Development:

See HACKING.md

Deployment:

See DEPLOYMENT.md

Configuration:

See CONFIGURATION.md

Funding

NLnet

NLnet NGIZero logo

2023 development is funded through the NGI0 Entrust Fund, via NLnet. Please see here for more details.