Private Access Tokens – At a Glance

What are private access tokens (PAT)?

Private access tokens are a technology that validates users' devices without revealing personal data.

Benefits of private access tokens

Private access tokens improve privacy, accessibility, and UX by reducing traditional challenges and consent friction.

Private access tokens can supplement CAPTCHAs

As they have different security mechanisms, private access tokens and CAPTCHAs should be used as complementary security measures.

Compatibility of Friendly Captcha with private access tokens

As platform support matures, Friendly Captcha will incorporate private access tokens alongside its risk signals and proof-of-work security mechanisms to improve protection. Try out now ›

Privacy and security on the internet have become major concerns for both individuals and businesses in recent years. Users want to browse and access content freely without having their data collected or tracked. Meanwhile, website owners need ways to validate that site visitors are real human users, not bots or attackers. This has traditionally led to the rise of CAPTCHAs – those clunky “I’m not a robot” checks that annoy users and harm accessibility.

Now a new technology called Private Access Tokens (PATs) aims to address this problem. PATs allow users to prove their authenticity without revealing personal information or completing CAPTCHA challenges. In this post, we’ll take a comprehensive look at how PATs work, including their benefits and limitations and their lack of ability to judge between bots vs humans. We will consider what the future will hold for this emerging standard when combined with more comprehensive proof-of-work strategies provided by Friendly Captcha.

What are Private Access Tokens and How Do They Work?

Private Access Tokens are cryptographic tokens that can be used to validate users and devices without collecting or sharing identifying data. They are an extension of the Privacy Pass protocol currently being standardized by the IETF.

Four key parties are involved in the PAT architecture:

  • Client – The user’s browser or app making requests.
  • Mediator – An entity that authenticates the client and requests tokens, usually the device/platform vendor.
  • Issuer – Generates and signs the PATs after vetting requests.
  • Origin – The website or app being accessed by the client.

Here is an overview of the steps involved when a client requests access to an origin website:

  1. The origin site returns a 401 status code, asking the client to present a valid PAT.
  2. The client’s browser or app forwards this request to the mediator along with authentication.
  3. After the mediator has verified the client’s authenticity, it sends an anonymized token request to the issuer.
  4. The issuer checks that the request meets the origin’s policies. If so, it cryptographically signs a PAT and returns it to the mediator.
  5. The mediator forwards the PAT to the client.
  6. The client sends the PAT to the origin in its request headers.
  7. If the PAT signature is successfully verified, the origin allows the client to access the protected resource.

This tokenized approach allows user validity to be confirmed without the origin ever seeing identifying details. The PATs themselves reveal nothing about the client’s identity. The mediator and issuer similarly cannot correlate tokens with specific sites visited. An interesting article about PATs, which are not entirely uncritical, can be found here.

Benefits of Private Access Tokens

PATs offer a number of initial advantages both for end users and site owners:

  • Improved privacy – Users don’t have to expose personal information or get tracked across sites. Data stays compartmentalized between the mediator, issuer, and origin.
  • Better accessibility – Eliminates the need for visual CAPTCHAs that cause challenges for users with disabilities.
  • Smoother UX – No more annoying CAPTCHA prompts and delays for legitimate users.
  • Easier adoption – Websites don’t have to build or maintain custom SDKs. The validation happens transparently.
  • Mobile optimization – Apps can validate users without CAPTCHAs that don’t work well on small screens.
  • Bot resistance – PATs signal that requests come from authentic devices, not bots or emulators.

When implemented properly, PATs enable a frictionless user experience without sacrificing security. Tech platforms such as Apple and Google are actively collaborating to standardize and promote adoption of this technology.

Concerns and Limitations Around Private Access Tokens

However, some challenges and open questions remain regarding the use of PATs:

  • Partial Client support – PATs currently only work on iOS 16+ and MacOS Ventura+ until other platforms roll out support. Globally, most users cannot yet utilize them. Firefox on desktop, with a 15% marketshare in the EU, has an official position of “defer”, pending further spec development of privacy controls.
  • Partial solution – PATs signal authenticity but don’t definitively determine humanity. Additional signals are still needed. Bots will still operate on Genuine Apple or Google hardware with an iCloud or Google Account. Bots may still appear on other popular browsers, such as Firefox.
  • Mediator reputation – Issuers rely on mediators thoroughly vetting client identities. A weak mediator could enable abuse, or worse, multiple weak mediators.
  • Multiple identities – The PAT architecture does not enforce strong constraints around the definition of a Client identity and allows it to be defined entirely by a Mediator. If a user can create an arbitrary number of Client identities that are accepted by one or more Mediators, a malicious user can easily abuse the system to defeat the Issuer’s ability to enforce per-Client policies.
  • Linkability – While difficult, PAT correlation by fingerprinting factors may still be possible. For example, multiple keys can be used to segment users with arbitrary granularity, until the specification limits the number of keys that a server can use.
  • Configurability – Sites must determine what endpoints warrant PAT validation and protection. A user landing on any protected page will undergo the initial PAT handshake, creating a noticeable latency which is likely to have a financial impact from poor user experience and a weaker SEO/SERP ranking.
  • Token hoarding – As PAT usage grows, restrictions like device limits may become necessary to prevent token hoarding. Because PATs are anonymous and reusable tokens not permanently tied to specific users or devices, an attacker could potentially obtain a large stockpile of valid PATs through various malicious means. The attacker could then distribute these hoarded tokens to an army of bots or compromised devices, allowing them to bypass PAT-protected access controls on websites at scale since the sites have no way to identify the illegitimate source of the tokens. This threat of token hoarding highlights the need for implementing PATs cautiously alongside other robust bot detection and defense signals, rather than over-relying on PATs as a single passive signal that can be abused to overwhelm access controls.

While promising, PATs are not a magic bullet against all bots, fraud, and abuse. Implemented judiciously alongside other security measures, they can enhance user privacy without opening significant vulnerabilities. But reliance on PATs as a sole signal could ultimately undermine security goals.

Friendly Captcha: Our Perspective on Private Access Tokens

At Friendly Captcha we recognize the potential benefits of Private Access Tokens. However, given the nascent state of this technology, we believe a cautious approach is warranted.

For the foreseeable future, our products will continue primarily relying on established proof-of-work and bot detection capabilities, drawing in PATs as yet another signal as needed. As PAT adoption spreads, we plan to selectively integrate support in order to reduce friction for users of supported clients. However, we will ensure critical flows such as account signup and login retain robust validation methods including server-side fingerprinting and adaptive ML models.

Additionally, we are closely monitoring developments around the PAT standard, issuer landscapes, and mediator best practices. We want to encourage the responsible evolution of this technology before fully embracing it. As PATs become more battle-tested and capable of deterring sophisticated attacks at scale, we will expand our integration and usage accordingly.

In summary, we are enthusiastic about PATs’ potential but feel more learning and rigor is required around real-world efficacy, security, and privacy impact. By taking a prudent stance now, we can implement PATs safely over time without putting our customers or users at undue risk.

The Friendly Captcha PAT roadmap

Here are some of the key focus areas as we continue exploring PAT adoption:

  • Experimenting with prototype integrations in low-risk contexts to gain hands-on experience.
  • Developing strategies to selectively utilize PATs in user flows where they can enhance privacy without severely compromising security.
  • Closely tracking the standardization process and watching for any evidence of vulnerabilities or exploits.
  • Evaluating different issuers and mediators to determine optimal partnerships.
  • Exploring emerging complements like Google’s Private State Tokens framework that add adaptability.
  • Monitoring client support expansion to gauge real-world PAT viability across our user base.
  • Researching supplemental techniques like intelligent throttling that deter PAT abuse.
  • Planning awareness campaigns to educate customers and users on when and why PATs may come into play.

Our roadmap is to judiciously ramp up PAT usage in line with increasing platform support and proven security at scale. We want customers and users to enjoy the benefits without unnecessary risks.

Conclusion: The Road Ahead for Private Access Tokens

Private Access Tokens have the potential to meaningfully improve both user experience and privacy on the modern internet. However, realizing this potential will require responsible implementation and further maturation.

At Friendly Captcha we believe the way forward is to integrate PATs slowly rather than rushing into global dependence on them. With cautious use complementing robust legacy methods, PATs can be safely leveraged to enhance security and privacy over time.

We are committed to keeping customer needs and ethical data standards front and center throughout this process. Private Access Tokens are a promising development, but ensuring they are adopted smoothly will be an ongoing partnership between users, businesses, and technology platforms.

Protect your websites and web applications with Friendly Captcha: Experience a new level of privacy-compliant security without sacrificing user experience. Try Friendly Captcha free for 30 days and see the difference for yourself. Start Your Free Trial Today

FAQ

Yes, Private Access Tokens (PATs) are fundamentally secure by design from both a security and a privacy perspective. They are built on robust, open cryptographic standards to provide strong guarantees without compromising user data.

In summary, Private Access Tokens are a highly secure and privacy-enhancing technology for fighting bots, but their effectiveness in a real-world deployment depends on a holistic security strategy that combines them with other anti-fraud signals like Friendly Captcha and ensures robust fallbacks for all users.

When a user’s device or browser does not support Private Access Tokens (PATs) – which is currently common, as PATs are a new and emerging technology – the system must fall back to an alternative form of user verification.This fallback mechanism is handled transparently by the service provider and the website operator.

If a browser and operating system combination cannot generate or use a valid Private Access Token, the system reverts to the next best verification method
Privacy-friendly alternatives like Friendly Captcha aim to avoid traditional Google-style image CAPTCHAs entirely, as these are user-hostile and often require extensive data collection.

Preventing abuse of Private Access Tokens (PATs) involves a multi-layered security strategy that combines robust vendor-provided safeguards with sensible operational practices on the website operator’s end. Find in Friendly Captcha a managed bot protection solution, that does work for you.

Private Access Tokens (PATs) work best as part of a multi-layered security and anti-fraud strategy. They are a strong “human vs. bot” signal but should be combined with other measures for complete protection.

Since PATs are not universally supported by all browsers and devices, reliable fallbacks are essential to avoid excluding legitimate users. Modern CAPTCHA solutions like Friendly Captcha use a client-side PoW mechanism as a backup, which asks the user’s device to solve a simple cryptographic puzzle. This doesn’t track personal data but still verifies the device’s legitimacy.

Private Access Tokens (PATs) are a privacy-enhancing technology that allows a user to prove they are a real human on a genuine, non-compromised device without revealing their identity or being tracked across websites. They serve as a modern, anonymous replacement for traditional CAPTCHAs.

The main difference is that CAPTCHAs require active, often annoying human interaction and collect personal data for verification, while Private Access Tokens (PATs) verify a user’s humanity automatically and privately in the background, eliminating the need for user input and data collection.

In short, PATs are designed to provide the same security function as CAPTCHAs (telling humans and bots apart) but in a way that respects user privacy, is seamless, and enhances the overall web experience. Choose Friendly Captcha as the best PAT-replacement.

Protect your enterprise against bot attacks.
Contact the Friendly Captcha Enterprise Team to see how you can defend your websites and apps against bots and cyber attacks.