A no-nonsense CAPTCHA system with seamless UX | Backend component
Find a file
2021-12-08 14:52:06 +05:30
.github move pow wasm lib out to a separate repo 2021-12-01 21:18:30 +05:30
config rename pow section in settings to captcha and add options to configure 2021-12-03 14:21:18 +05:30
docs Document pow section being renamed to captcha 2021-12-03 14:50:55 +05:30
migrations Implement CAPTCHA configuration estimation from avg, peak and 2021-12-03 14:26:23 +05:30
scripts setup librejs license and cachebust service worker file 2021-12-02 14:25:50 +05:30
src Implement CAPTCHA configuration estimation from avg, peak and 2021-12-03 14:26:23 +05:30
static use yaml directly for displaying open api spec 2021-10-08 15:36:42 +05:30
templates Load pow-sha256 polyfill to support browsers that aren't capable of 2021-12-08 14:52:06 +05:30
.dockerignore docker: wasm build step 2021-07-15 15:27:01 +05:30
.eslintrc.js frontend linting 2021-10-08 15:24:29 +05:30
.gitignore move pow wasm lib out to a separate repo 2021-12-01 21:18:30 +05:30
build.rs use yaml directly for displaying open api spec 2021-10-08 15:36:42 +05:30
Cargo.lock move pow wasm lib out to a separate repo 2021-12-01 21:18:30 +05:30
Cargo.toml move pow wasm lib out to a separate repo 2021-12-01 21:18:30 +05:30
CHANGELOG.md Document pow section being renamed to captcha 2021-12-03 14:50:55 +05:30
code_of_conduct.md added code_of_conduct.md 2021-05-02 18:13:13 +05:30
Cross.toml cache control 2021-05-30 17:55:11 +05:30
docker-compose.yml docker-compose: added redis 2021-06-12 12:24:05 +05:30
Dockerfile run cachebuster in docker build 2021-12-02 20:28:17 +05:30
jest.config.ts upgrade dev dependencies 2021-10-13 10:37:51 +05:30
LICENSE.md licence 2021-03-09 17:49:20 +05:30
Makefile setup librejs license and cachebust service worker file 2021-12-02 14:25:50 +05:30
package.json Load pow-sha256 polyfill to support browsers that aren't capable of 2021-12-08 14:52:06 +05:30
README.md update demo widget link in readme 2021-11-30 21:29:59 +05:30
rustfmt.toml get notifications 2021-05-10 15:38:09 +05:30
sailfish.yml frontend integration 2021-04-09 14:21:43 +05:30
sqlx-data.json Implement CAPTCHA configuration estimation from avg, peak and 2021-12-03 14:26:23 +05:30
tsconfig.json Load pow-sha256 polyfill to support browsers that aren't capable of 2021-12-08 14:52:06 +05:30
webpack.config.js call proof generator from within a web worker 2021-12-02 14:24:53 +05:30
yarn.lock Load pow-sha256 polyfill to support browsers that aren't capable of 2021-12-08 14:52:06 +05:30

mcaptcha logo

mCaptcha

Proof of work based, privacy respecting CAPTCHA system with a kickass UX.

Documentation Build Docker dependency status codecov
AGPL License Chat

STATUS: ACTIVE DEVELOPMENT

Skip to demo

mCaptcha is a privacy respecting, free CAPTCHA system with a kickass UX. Your users no longer have to interact with ridiculous image-based CAPTCHA system, wasting precious mental bandwidth. Instead, your computer will do the work for you, see for yourself!

How does it work?

mCaptcha uses SHA256 based proof-of-work(PoW) to rate limit users.

When a user wants to do something on an mCaptcha-protected website,

  1. they will have to generate proof-of-work(a bunch of math that will takes time to compute) and submit it to mCaptcha.

  2. We'll validate the proof:

    • if validation is unsuccessful, they will be prevented from accessing their target website
    • if validation is successful, read on,
  3. They will be issued a token that they should submit along with their request/form submission to the target website.

  4. The target website should validate the user-submitted token with mCaptcha before processing the user's request.

The whole process is automated from the user's POV. All they have to do is click on a button to initiate the process.

mCaptcha makes interacting with websites (computationally)expensive for the user. A well-behaving user will experience a slight delay(no delay when under moderate load to 2s when under attack; PoW difficulty is variable) but if someone wants to hammer your site, they will have to do more work to send requests than your server will have to do to respond to their request.

Why use mCaptcha?

  • Free software, privacy focused
  • Seamless UX - No more annoying CAPTCHAs!
  • No tracking: Our CAPTCHA routes are cookie free!
  • IP address independent: your users are behind a NAT? We got you covered!
  • Resistant to replay attacks: proof-of-work configurations have short lifetimes(30s) and can be used only once. If a user submits a PoW to an already used configuration or an expired one, their proof will be rejected.

Demo

Client-side widget:

mCaptcha's UX is super silent, solving CAPTCHAs have never been more easier. One click and you are on your way. To observe mCaptcha in action, open dev tools and monitor console and network activity.

  1. Link to widget

  2. Video:

Demo servers are available at:

Core functionality is working but it's still very much work-in-progress. Since we don't have a stable release yet, hosted demo servers might be a few versions behind master. Please check footer for build commit.

Feel free to provide bogus information while signing up(project under development, database frequently wiped).

Self-hosted:

Clone the repo and run the following from the root of the repo:

$ docker-compose -d up

It takes a while to build the image so please be patient :)

See DEPLOYMENT.md detailed alternate deployment methods.

Development:

See HACKING.md

Deployment:

See DEPLOYMENT.md

Configuration:

See CONFIGURATION.md