this post was submitted on 27 Jul 2025
553 points (99.1% liked)

Technology

73379 readers
4723 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] General_Effort@lemmy.world 1 points 1 day ago (1 children)

The key doesn't have to be on your phone. You can just send it to some service to sign it, identifying yourself to that service in whatever way.

[–] iii@mander.xyz 1 points 8 hours ago* (last edited 8 hours ago) (1 children)

It's that "whatever way" that is difficult. This proposal merely shifts the problem: now the login to that 3rd party can be shared, and age verification subverted.

[–] General_Effort@lemmy.world 2 points 7 hours ago (1 children)

A phone can also be shared. If it happens at scale, it will be flagged pretty quickly. It's not a real problem.

The only real problem is the very intention of such laws.

[–] iii@mander.xyz 1 points 5 hours ago (1 children)

If it happens at scale, it will be flagged pretty quickly.

How? In a correct implementation, the 3rd parties only receive proof-of-age, no identity. How will re-use and sharing be detected?

[–] General_Effort@lemmy.world 1 points 3 hours ago

There are 3 parties:

  1. the user
  2. the age-gated site
  3. the age verification service

The site (2) sends the request to the user (1), who passes it on to the service (3) where it is signed and returned the same way. The request comes with a nonce and a time stamp, making reuse difficult. An unusual volume of requests from a single user will be detected by the service.