top | item 45508415

(no title)

phamilton | 4 months ago

It successfully got through the captcha at https://www.google.com/recaptcha/api2/demo

discuss

order

simonw|4 months ago

Post edited: I was wrong about this. Gemini tried to solve the Google CAPTCHA but it was actually Browserbase that did the solve, notes here: https://simonwillison.net/2025/Oct/7/gemini-25-computer-use-...

dhon_|4 months ago

I was concerned there might be sensitive info leaked in the browserbase video at 0:58 as it shows a string of characters in the browser history:

    nricy.jd t.fxrape oruy,ap. majro
3 groups of 8 characters, space separated followed by 5 for a total of 32 characters. Seemed like text from a password generator or maybe an API key? Maybe accidentally pasted into the URL bar at one point and preserved in browser history?

I asked ChatGPT about it and it revealed

    Not a password or key — it’s a garbled search query typed with the wrong keyboard layout.
    
    If you map the text from Dvorak → QWERTY,
    nricy.jd t.fxrape oruy,ap. majro → “logitech keyboard software macos”.

pants2|4 months ago

Interesting that they're allowing Gemini to solve CAPTCHAs because OpenAI's agent detects and forces user-input for CAPTCHAs despite being fully able to solve them

SilverSlash|4 months ago

Any idea how Browserbase solves CAPTCHA? Wouldn't be surprised if it sends requests to some "click farm" in a low cost location where humans solve captchas all day :\

jrmann100|4 months ago

Impressively, it also quickly passed levels 1 (checkbox) and 2 (stop sign) on http://neal.fun/not-a-robot, and got most of the way through level 3 (wiggly text).

siva7|4 months ago

probably because its ip is coming from googles own subnet

asadm|4 months ago

isnt it coming from browserbase container?