That’s more or less what I was implying, there’s not really any good way to implement it. Canada almost ended up implementing it, but thankfully Poilievre ended up losing the election including losing his own seat.
I don’t think I’ve ever seen a single suggestion of a way to implement age verification that isn’t a privacy nightmare. Oftentimes they literally just want a credit card number, the assumption being that a child would never be able to get hold of such a thing.
In some of the worst cases they actually want a passport or other government ID sending to some organisation that would verify you. With all the fun potential data breaches that that would ensue.
Most of the time these rules never get off the ground because privacy advocacy groups basically sue over it and win every time.
ipkpjersi@lemmy.ml 10 months ago
hansolo@lemm.ee 10 months ago
Tokenization is the easy solution.
You go onto you state gov website and get a token that just says “this is an adult.” Nothing else. Token lasts 10 minutes.
Cut and paste into the site. They authenticate without saying who theu are, back to the gov site, “yo, this legit?” State says “looks like something we would do.” State keeps no records of WHO validated the token, just that it was a legit token.
Same way that routers connect to VPN services.
echodot@feddit.uk 10 months ago
How does the state verify that you’re an adult and therefore should have a token?
This solution simply seems to be kicking the can down the road
hansolo@lemm.ee 10 months ago
Not at all, this is well established technology already in use all over the place.
When countries use digital IDs, they are able to carve out validating individual aspects of an identity. Just address, just over 18, just class of driver’s license, etc.
So the State has a website/wallet where the user pulls a token from the State, basically a fancy hashed OTP/Login code.
The website, which can’t derive your identity from the code, sends the code to the state API and can’t ask more than “is this hash legit” and the State API doesnt need to say more than “yup.”
Where can things go wrong? The State can require knowing whonises the token. Or even demand to know, and log what sites use it. The state can contract this out to a vendor that logs it all.
It all depends on his the state builds requirements.