Distributed Human Sorting of Internet Objects. I learn a lot from reading Ed Felton. In A Spoonful of Sugar he describes an absolutely brilliant method being used at Carnegie-Mellon to “label all the images on the web”…. [Discourse.net]
it is my understanding that this is somewhat similar to the way spammers bypass visual control systems they open up a page, fill out the info, and send the visual symbol to someone trying to access a pron site, which then decodes teh visual signal, types it in, gets access to her pron, and the spammer gets access to the visually protected material, usually email addys.