Create a proper README #2
Labels
Sans labels
bug
Discussion
duplicate
enhancement
help wanted
invalid
question
wontfix
Sans jalon
Sans assignation
1 participants
Notifications
Échéance
Aucune échéance n'a été définie.
Dépendances
Aucune dépendance définie.
Référence : cerealxp/FreeCAPTCHA#2
Chargement…
Référencer dans un nouveau ticket
Block a user
Sans contenu.
Supprimer la branche "%!s()"
La suppression d’une branche est permanente. Bien qu’une branche supprimée puisse temporairement subsister, elle NE PEUT PAS être facilement restaurée. Continuer ?
Currently, the README shows how to the previous version of FreeCAPTCHA worked. That version of FreeCAPTCHA is documented here: https://www.turtle-techies.com/roll-your-own-captcha-python/.
This is no good for two reasons:
Here is what I want to show, in order of priority:
So here's the outline of how that should look
a. What is FreeCAPTCHA? (FOSS plug and play CAPTCHA for no-JS)
b. Why is it necessary? (replicate the behavior, quality, and security of commercial JS captchas, without the JS, because Tor users usually disable JS)
a. Show a gif demonstrating the use to access an onion service
b. Link to a video that does the same but shows the cookies as they come in and such
a. JS and Python blobs for calling FreeCAPTCHA API
b. PIP and NPM packages once they exist (middlewares)
c. HTML blurb for adding freecaptcha iframe to frontend (alternatively, the captcha solving page could be hosted by freecaptcha, and then redirects you to the real site once you've solved the captcha. Similar to how oauth redirects work)
a. Diagram showing the relationship between users' servers and our own. Show each part of the architecture and where it is in relation to everything else.
b. Explain the z-indexing, overlaying checkbox CSS nonsense. (this also needs to be a separate issue where we try to find a real CSS master who can help us clearly understand and explain this lol)
c. How the cookies work (see JWT issue)
d. Security. Disclosing issues. Where weaknesses are likely to be and what kinds (where do we render input unsafely, jinja, possible jwt issues, rotating secret keys, architecture security, etc.) We should have a hall of fame for devs and seperate one for hackers with little trophies.