Tips for getting past Google's CAPTCHA when using a VPN?

Never works for most people anymore.

Nice! works for me! Ty for tip

Not true. I literally cant get past captcha rn and im using brave

every time I see someone recommend brave, especially on a VPN sub where you think users would be slightly smarter than the average computer user, I lose a neuron.

Do you mean Brave Browser? Because I use the Brave app and when i try to search on Google browser it also ask for captcha

Once you use a flagged IP, it’s very hard to pass the verification, no matter you select the correct blocks or not. I had this problem before. I didn’t know what happened at the beginning like you. Then a few days later I used another “clean” IP, the Captcha was either short or gone.

Sometimes they just hit you with multiple. How many have you tried doing?

I experience the same thing, and want to know the answer. I’ve gone through upwards of 8, answering correctly, and still keep receiving them. I give up instead! I also want to know if there’s a way to “get it correct” and be able to proceed.

Holy Hell! I cant believe this worked XD thanks. I just moved my mouse around clicked a few random times, closed a few ads that were on the site and captcha accepted!

If you cannot trust the app, there is nothing that can be done. But know that Windows Defender Smartscreen may sometimes show false positives.

Brave isn’t terrible, and is better than an uninformed user who just uses their default OS’ browser with zero ad blocking extensions. However for a user to claim Brave removes CAPTCHAs is totally bogus.

I lost count, but probably around 10 just to join Reddit.

Dude, enough with all caps.

I don’t have the Smartscreen part activated. And yes, I know /any/ antimalware app can report a false positive. But one would be foolish to make such an assumption and install it anyway, without first looking into that particular alert. You don’t seem to have done that…and that’s a great way to spread malware among the naive, who might trust you. I therefore conclude that, unless more information comes in regarding this particular extension on whether or not it’s carrying malware, to NOT INSTALL IT. Maybe “nitrohorse” is a hacker.

Well, I use Linux so no Windows Defender warnings showed up.

But I read it’s code, seemed pretty benign, although it was written in Go and I never worked with it.

Well, I use Linux so no Windows Defender warnings showed up.

I do, too, my system is dual-boot.

But I read it’s code, seemed pretty benign, although it was written in Go and I never worked with it.

But you are just talking about the extension, not the option within, that requires you to install “buster-client-v0.1.0-windows-amd64.exe”. And Defender reports a high-risk trojan alert when you try to install it. Don’t you find that suspicious?

You could have said “thanks for spotting it.” After all, this is not a Linux-only forum.

You are aware, are you not, that while Linux is not susceptible to Windows malware, it is quite capable of becoming a vector of such malware?

you are just talking about the extension

No, I mean the buster-client

Only the Linux version, not the “.exe.” Windows one. Which makes your conclusion irresponsible and uninformed.

But both files build from the same source don’t they?

He could have embedded a trojan in the “.exe” file. Or someone else could have replaced it with a trojan loaded version. Or it could have been infected by one, which would not of course impact its Linux twin. Just common sense. I am trying to track down any malware report on this extension option, but no luck yet. Furthermore:

It is likely the creator of the extension would know about a false positive result on his product, especially if found by /the/ most widespread OS antimalware client in the world. And in so knowing, would note that on the page that features his product, in order to not cause potential clients to panic and avoid his work.

Now, in between typing the previous paragraph and this one, I took a break and searched again for “buster-client-v0.1.0-windows-amd64.exe” to discover this:

Step By Step Guide To Remove amd64.exe Easy Removal Guide
https://www.spyware-buster.com/steps-to-uninstall-amd64-exe-from-windows-8

–quote:

amd64.exe is newly found malware infection that has already infected number of Windows computer across globe. The very dubious computer threats is mainly distributed through potentially unwanted programs and after getting inside Windows System hides itself deeply. Once gets executed completely starts its malevolent activities against your Windows System. It creates number of junk files that consume maximum available computer resources as resultant CPU freezes a lot and some application fails to open. amd64.exe mess up with installed security application, weakens them as well as blocks firewall access. The very malware changes your browser’s Proxy Server setting and cause unwanted redirection to malicious webpage. Additionally, slows down Internet speed and it not let you security related webpage or to your own desired webpage. amd64.exe also known to help cyber crooks to access your Windows System remotely so that criminals can steal your personnel data and make use of them for illegal purpose. Its presence inside Windows System is never good to your Windows System performance as well as to your privacy.

–end

So that’s what kind of trojan it may be, and is probably /not/ a false positive. Perhaps the link was changed from the correct one, to the one that downloads the trojan version. I just don’t know, but will inform github shortly. Especially since the link itself is embedded in the extension’s “options” list.

Edit:

Well looky here (article dated January 2019):

–quote:

GitHub becoming a repository for crypto malware

–quote:

GitHub and DropBox, a file-sharing service, were the two most common sources of the malware. The researchers explain that the hackers will use variations of Trojan horses that force the target to download and install the malware. They stated, “We observe that GitHub is the most popular site used to host the crypto-mining malware. This is because GitHub hosts most of the mining tools, which are directly downloaded — for malicious purposes — by droppers. Additionally, GitHub is also used to host modified versions of the miners (e.g., by removing the donation capabilities or adding further capabilities).

–end

No more Github for me! I can see why some hackers would embed an anti-Capcha extension with a trojan: everyone, and I mean everyone, hates Capcha.

Edit 2:

Wait, there’s more (article dated March 2017):

Malware finds unwitting ally in GitHub
https://www.infoworld.com/article/3184399/security/malware-finds-unwitting-ally-in-github.html

–quote:

Just because it’s on GitHub doesn’t mean it’s legitimate. A financially motivated espionage group is abusing a GitHub repository for C&C (command and control) communications, Trend Micro warned.

Researchers found malware used by Winnti, a group mainly known for targeting the online gaming industry, was connecting to a GitHub account to obtain the exact location of its C&C servers. The malware looked up an HTML page stored in the GitHub project to obtain the encrypted string containing the IP address and port number for the C&C server, wrote Trend Micro threat researcher Cedric Pernet on the TrendLabs Security Intelligence blog. It would then connect to that IP address and port to receive further instructions. As long as the group kept the HTML page updated with the latest location information, the malware would be able to find and connect to the C&C server.

–end