Cap: Lightweight, modern open-source CAPTCHA alternative using proof-of-work

Concept & Background

  • Cap uses client-side proof-of-work (PoW) as a “CAPTCHA alternative,” but many commenters stress it’s really a rate limiter, not a human/bot discriminator.
  • The idea predates cryptocurrencies (Hashcash is cited) and inspired Bitcoin; this is seen as a return to that original PoW-for-abuse-control concept.

Threat Model & Effectiveness

  • Intended benefit: add small per-request cost that’s negligible for humans but ruinous at scale for large crawlers, spam, or bot farms.
  • Supporters note that even small extra costs or delays can kill the economics of large scraping operations.
  • Critics argue:
    • It doesn’t stop targeted attacks or low-volume bots; it only hurts generic large-scale abuse.
    • The real cost per challenge is likely tiny (far less than cents), making many abuse categories still profitable.
    • Attackers can use GPUs/ASICs/FPGAs to solve SHA-256 PoW far faster and cheaper than user devices, repeating crypto’s hardware-inequality problems.

PoW vs Traditional CAPTCHA

  • Several comments stress that PoW doesn’t determine “human vs bot,” so branding it as a CAPTCHA is seen as misleading.
  • For protecting single endpoints (e.g., “curl to CreatePost”), critics say this “lets all traffic through, just slower,” unlike CAPTCHAs that can outright block.
  • Some suggest simple delays or standard rate limiting might address similar abuses without client CPU work.

Energy, UX, and Accessibility

  • Concerns raised about battery drain, CO₂ impact, and “invisible mode” feeling like covert cryptomining.
  • Others argue the per-challenge energy is extremely small, dwarfed by normal browsing.
  • Accessibility critique: requires JavaScript; no provision for JS-disabled users, unlike some alternatives.

Law-Enforcement / Password-Cracking Paper Controversy

  • A linked white paper describes using PoW CAPTCHA-like systems to harness web users’ CPUs for law-enforcement password cracking.
  • Commenters find this “botnet for the feds” angle disturbing; some assume association with Cap, given the link from its site.
  • The project’s author responds that Cap does not send hashes anywhere, isn’t cracking passwords, and the paper was shared only as background; a clarification note was added.
  • Some remain uneasy, citing bundled WASM binaries and optics (logo, lack of initial disclosure), others accept the open-source code as sufficient reassurance.

Alternatives & Ecosystem

  • Other PoW CAPTCHA tools (Altcha, Anubis, Checkpoint) are discussed; some prefer them, especially for privacy or no-script support.
  • General frustration with Cloudflare CAPTCHAs motivates interest in PoW approaches.
  • Broader ideas include account systems tied to phone numbers or hardware attestation to solve Sybil problems, but these raise major privacy and usability concerns.