Anubis Works

User experience and comparison to Cloudflare

  • People report proof-of-work times from ~0.5s to ~8s on modern phones, some much slower; most prefer this to interactive CAPTCHAs.
  • Several contrast it favorably with Cloudflare’s infinite CAPTCHA loops, though others note CF problems often come from strict tracking protection or third‑party cookie blocking.
  • Some users are blocked entirely if they disable JS, which for static sites feels like needless “enshittification.”

Purpose: AI/bot scraping and abuse

  • Anubis is framed as defense against abusive, high‑volume scraping (especially LLM crawlers and poorly written bots), not against all bots or AI training per se.
  • Core argument: serving a page is cheap for the scraper and relatively expensive for the origin; PoW shifts some cost back to clients and deters “free‑riding at scale.”

Mechanics and claimed effectiveness

  • Browser solves a SHA‑256 PoW in JS, gets a JWT cookie bound to IP and time, valid about a week; sites can additionally rate‑limit per token.
  • Residential botnets and IP carousels defeat simple IP rate limiting; PoW + per‑token limits force either slower crawling or much higher compute spend.
  • Deployed examples (GNOME GitLab, SourceHut, private forge instances) report 90–97% bot traffic reduction.

Limitations, bypasses, and arms race

  • Commenters note big scrapers can already or will soon solve PoW at scale (full browsers, GPU implementations, cookie farms); this is viewed as a cost‑raising deterrent, not a hard block.
  • Some see it as “DRM for HTTP”: determined, well‑funded actors get through while ordinary users pay the UX and energy cost.
  • Current design hinders search engine indexing; maintainers treat that as an acceptable trade‑off.

JS, accessibility, and protocol-level ideas

  • JS requirement excludes no‑JS users, older browsers, niche setups, and some accessibility scenarios; a no‑JS mode is promised but not ready.
  • Several argue PoW should eventually move into the protocol stack (HTTP/TLS‑level challenges, GPU‑friendly formats) rather than per‑site JS hacks.

Alternative and complementary defenses

  • Other strategies discussed: classic rate limiting, ASN/IP‑range blocking, abuse reporting, requiring logins, or even telling bots to use BitTorrent.
  • Some propose human‑only schemes (custom questions, obfuscated fonts) but others point out accessibility, cryptanalysis, and OCR would still be issues.