I am wondering what are some age verification alternatives that could be better a way instead of asking for ids or biometric verification? Any ideas? It is not really about the kids though but opposition needs an argument and they are quite dumb to come up with something and I am exhausted.

    • laz@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      0
      ·
      20 days ago

      It is more guiding the narrative to be sound to an average person such that their method seems unfavourable to common sense impacting their vote bank, point is to make it look regressive, stupid, expensive, against small business apparently

  • shads@lemy.lol
    link
    fedilink
    English
    arrow-up
    0
    ·
    20 days ago

    The way things are going, I wonder how long before a politician admits that it is more efficient to have the kids positively identify themselves and then be forced to provide their if details to which ever paedophile asks. We can’t have the inefficiencies of yesteryear in our modern world kiddy fiddlers need to move fast and break stuff.

    After all it turns out the people agitating for these laws, when the mask is ripped off them like a pirate ghost at the end of a Scooby Do episode, the villain was the people who most directly benefit from government mandated doxxing all along, like fucking Meta and OpenAI. What a fucking amazing coincidence.

    • Fluffy Kitty Cat@slrpnk.net
      link
      fedilink
      English
      arrow-up
      0
      ·
      20 days ago

      Given how financial institutions are behaving towards Free Speech online I really don’t want them to be trust anchors that are required to access anything, which is something that is completely unnecessary and we were just fine without 5 years ago. What changed?

  • lemmefixdat4u@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    20 days ago

    If I had to choose a method, it would involve an authentication site - one it would have its security validated by a trusted entity and guarantee that you will be fully compensated should they be hacked. Even better if that’s backed up by a large insurance policy.

    You verify your identity with them. Then they verify information requested by other sites. The risk of hacking is minimized to that one company. They should collect your IP and information about your browser, operating system, and hardware. Then issue you a cookie stored on your browser.

    Subsequently, when you use a website that needs to verify your age, they read your identification cookie and validate it with the identification company, asking if you are of majority age and providing the information they collected. The identification company gives a yes or no response. They do not give out any other information about you, preserving your privacy. As long as you are using the same computer on the same IP you don’t have to revalidate. A hacker would need access to your computer if they wanted to impersonate you.

    • sbv@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      20 days ago

      The identifying site doesn’t need to record IP or other identifying information. It just needs to answer “yes” or “no” when queried about the current user. It could use a similar handoff mechanism to oauth.

      The cost of a hack turns into getting a list of people in the region, rather than people who use a given service. Arguably, that’s less problematic.

    • Eheran@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      19 days ago

      You get compensated? How? How much does it cost you when some data of you gets leaked? Can you prove that?

    • laz@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      0
      ·
      20 days ago

      Could easily be countered by arguments like everything gets hacked, who’ll insure it, which department’s problem will it be, or all states have their own jank, and every piece of work will want that level of access

  • Paragone@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    19 days ago

    The point is to

    1. gain more exploitation-leverage for the big-tech owners of our civilization, while
    2. making Linux illegal, because it isn’t locked-proprietary-enforcing-this-regime.

    Elegant as can be.

    Removal of competition while breaking the population from civilrights, too.


    there needs to be an age-verification-ONLY ID, which makes it illegal for age-verifying companies to ask passport-images, or driver’s-license images, etc, so as to break the identity-theft-chain that big-tech’s working at creating, as fast as it can.

    The whole thing about making operating systems be the “owners” of the authority, is to make all non-Microsoft/Apple/Google OS’s illegal.

    Period.

    ID should always be orthogonal.

    Healthcard ought never be used for anything else.

    There ought be a specific ID card for one’s province/canton/prefecture/state, which provides only the minimum-required information.

    Years ago, I discovered that anybody could run a name on the local drivers’-license ID database, & it would provide a picture of said person, which is WRONG.

    Secure by design, not when “lucky”.

    Every ID ought be purpose-only, locked-down, & illegal to abuse.

    ( I also hold that it ought be illegal for the “credit rating” companies to protect disinformation, while disallowing the life in-question from fixing it with true information,

    AND that legal-address ought be a right, such that even homeless people can have a mailing-address, so as to not be locked-out from the ability to get ID, or to have a cellphone, etc )

    Solving the wrong problem, for machiavellian purposes, is all that this is.

    _ /\ _

  • chicken@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    0
    ·
    19 days ago

    IMO the issue is way deeper than the method of age verification because you cannot automate child safety (from what I’ve read Roblox and Youtube Kids are notable failures here), and tech platforms are going to pick between some half-assed attempt at such automation and entirely banning minors, at which point they find a way to bypass it or go somewhere else on the internet that is also unsafe for children. It’s all about deferring blame to someone else, not creating a society where people are making sure the kids are ok, and cannot possibly address the actual problem.

    But if the idea is that people are too stupid to understand this and it’s necessary to come up with the least bad form of plausibly functional age verification to placate them, maybe the best bet would be something like those self-attesting OS verification laws but modified to be less shitty. Something like a more voluntary system where when you buy a device, there’s a prominent option to get a version of it that is for kids and has parental control software preinstalled as bloatware. This could (optionally!) broadcast a flag (only to preapproved apps and websites!) that lets the service block the user from seeing or interacting with certain stuff, and otherwise do parental control things. It could at least somewhat work since kids don’t have the ability to buy their own hardware. It could be open source and collectively developed and funded as a set of common standards that experts have thought about and agreed on.

    It wouldn’t solve the biggest issues, but at least it might make it a little simpler for parents who are overwhelmed and need a simpler solution for handling the problem of the raw internet.

      • chicken@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        0
        ·
        19 days ago

        You’re mostly right that it’s not about child safety, but in that case why are you asking for suggestions about how to do it? What goals should age verification have if child safety is not accepted as a goal?

        Parental control already exists, but seemingly valid criticisms are that it is not a default, has limited effectiveness, and is not easy enough to use. The important detail here is that there are not widely accepted standards for it to interface with online platforms, which are now being pressured to develop privacy invasive child protection schemes they implement independently. What I’m suggesting is that instead of that, letting them rely on “verification” of whether a user is on a restricted device would do mostly the same thing in terms of benefits and be less harmful, if more work is put into building a standard for that and making it an easy to use default.

  • Pommes_für_dein_Balg@feddit.org
    link
    fedilink
    arrow-up
    0
    ·
    19 days ago

    If you start to argue how to better implement age verification, you’ve already accepted the premise that it is necessary and useful in any way.
    It isn’t. All it will do is positively identify children to people who prey on children.

  • Zak@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    19 days ago

    opposition needs an argument

    The argument is that it’s fundamentally a bad idea, not that we know a better way to do it. I realize that’s a harder argument to make.

    Take porn for example. Above board porn sites generally try to comply with the law. They either perform age verification or block jurisdictions that require it. They verify the ages of performers. They comply with copyright law. They enforce rules against unauthorized deepfakes.

    Sites exist which are hosted outside the jurisdiction of USA/EU/AU/etc… legal systems which do none of those things. On such sites, there’s a good chance of finding CSAM, stolen content, and deepfakes; I will not list any here. Driving teenagers who want to see porn from mainstream sites to poorly moderated ones is the likely outcome of a successful age verification scheme, and an undesirable one.

  • Strlcpy@2@programming.dev
    link
    fedilink
    arrow-up
    0
    ·
    19 days ago

    Apart from the question of desirability of such checks in the first place: with attestations, the digital equivalent if a signed government document.

    This process involves three parties:

    • you
    • the identity provider (the government)
    • the third party (who wants to verify your age).
    1. You click a button that takes you to the identity provider (government e-identiy). There you log in.
    2. Identity provider asks you to confirm what you want to share with the third party, like your age bracket.
    3. The third party receives a digitally signed attestation with this information.

    The proof of identity is exclusively between you and the government’s e-identity platform. The third party only gets to see what’s shared with them (like your age bracket).

    Government e-identity isn’t hypothetical btw, e.g. in the Netherlands that’s DigiD.

      • Strlcpy@2@programming.dev
        link
        fedilink
        English
        arrow-up
        0
        ·
        19 days ago

        Why? You’re using this method every time you use “Log in with Facebook”, or when you use corporate single sign-in. Logging in with “passkeys” is this. It has been widely deployed for government ID already. In fact, I remember it being used for age verification when getting prepaid sim card in Austria.

        • laz@lemmy.dbzer0.comOP
          link
          fedilink
          arrow-up
          0
          ·
          19 days ago

          Do you know average age and degree of an average policy maker? I have to first read up on it then figure out how to best present it