Apple implements a new function to avoid CAPTCHAs on the internet
CAPTCHAs are a verification method very common today. We can find them once or several times when we enter to surf the internet.
and although are not usually a problemfor many it is an action that can take valuable seconds or can become annoying if they are not resolved at first.
Google revamped a version of CAPTCHA that doesn’t necessarily ask you to solve it. You can even avoid them if you use some extensions in your browser.
However, these windows that serve to authenticate navigation by a human and not by a robot or computer that may have bad intentions, is still an annoying process for many users.
Automatic verification in iOS 16
thinking about this, Apple has created a new function implemented in iOS 16 that allows an iPhone or iPad user to “skip” this authentication and navigate the Internet more easily.
According to information from Apple. When you turn on this feature, iCloud will verify your apple ID and device automatically through a private access token and thus the user will be able to have a better experience, privacy and accessibility.
“Private access tokens are a powerful alternative that help you identify HTTP requests from legitimate devices and people without compromising your identity or personal information”
Cloudflare and Fastly, two of the server networks that replicate their clients’ websites offering DDoS protection and security they have already announced support for these private access tokens. Therefore, millions of applications and websites will be compatible with this new Apple feature very soon.
Apple has published a video in which he explains and details everything necessary to fully understand the use and function of private access tokens.
To activate it You must go to Settings> Apple ID> Password and security> Activate “Automatic verification” and voila, that would be it.
Currently, Apple has released the fourth Beta of iOS 16.1 with some new features. However, these tokens could be a trend that other companies will begin to replicate and thus take the next step in the evolution of human verification and authentication on the internet.