With many jurisdictions introducing age verification laws for various things on the internet, a lot of questions have come up about implementation and privacy. I haven’t seen anyone come up with a real working example of how to implement it technically/cryptographically that don’t have any major flaws.

Setting aside the ethics of age verification and whether or not it’s a good idea - is it technically possible to accurately verify someone’s age while respecting their privacy and if so how?

For an implementation to work, it should:

  • Let the service know that the user is an adult by providing a verifiable proof of adulthood (eg. A proof that’s signed by a trusted authority/government)
  • Not let the service know any other information about the user besides what they already learn through http or TCP/IP
  • Not let a government or age verification authority know whenever a user is accessing 18+ content
  • Make it difficult or impossible for a child to fake a proof of adulthood, eg. By downloading an already verified anonymous signing key shared by an adult, etc.
  • Be simple enough to implement that non-technical people can do it without difficulty and without purchasing bespoke hardware
  • Ideally not requiring any long term storage of personal information by a government or verification authority that could be compromised in a data breach

I think the first two points are fairly simple (lots of possible implementations with zero-knowledge proofs and anonymous signing keys, credentials with partial disclosure, authenticating with a trusted age verification system, etc. etc.)

The rest of the points are the difficult ones. Some children will circumvent any system (eg. By getting an adult to log in for them) but a working system should deter most children and require more than a quick download or a web search for instructions on how to circumvent.

The last point might already be a lost cause depending on your government, so unfortunately it’s probably not as important.

  • rowinxavier@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    2 hours ago

    There are a few options for age verification, but the one I like best is at the ISP/device level. You make the account at the ISP level have a flag for being a kid friendly service. You could also have the government establish simple tools for parents to install on their kids devices which would limit other apps and services, for example by blocking porn or violent age inappropriate content. You could even have it tie in with the age advice for film classification, though the current classification guidelines are pretty horrible. All of that could be handled by a very small government team and could be deliverable in 6 months.

    These are active steps a parent can take to limit their child’s exposure to the internet and do not come with added cost to the parent. They would be just as available for someone who is poor as for someone who is rich. It would be possible to protect kids from many of the more dangerous aspects of the internet while also leaving unmanaged devices free and clear, preserving the good things about the open internet.

  • Pommes_für_dein_Balg@feddit.org
    link
    fedilink
    arrow-up
    1
    ·
    1 hour ago

    The German government ID card has an age verification function:
    It only sends one bit to the requesting service: Yes, over 18 or No, not over 18.
    And it doesn’t transmit back or store any data, so the state doesn’t know what services you access.
    Since you are required to have an ID card and the state knows your age, this would be a pretty good option (in Germany).

  • psycotica0@lemmy.ca
    link
    fedilink
    arrow-up
    12
    arrow-down
    2
    ·
    3 hours ago

    I’m not sure if this is part of the “setting aside” stuff, but I’d ask why age needs to be verified and not simply stated.

    I’m the admin on this device, I say I’m 50, why does the website need to check some ID to prove I’m 50? They trust what I reported, and if I lied to them that’s on me. It shouldn’t be the websites job to validate.

    • roofuskit@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      2
      ·
      2 hours ago

      Exactly, it should be a parent’s job to limit a child’s access not a website.

      • lcmpbll@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        1 hour ago

        I agree, but also parents need better tools to be able to effectively limit their child’s access. App and device level parental controls are not sufficient as they currently work.

  • Passerby6497@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    2 hours ago

    Why prove it at all?? An assertion from the OS should be good enough Just have the OS ask once, and send that info when it has to as a general age range. A few different age ranges for kids/teens, an 18-21 group, and 21+ is all the info they really need at most.

    If age verification has to be a thing, let the user supply it at install/profile creation time, and just leave it at that.

    • bamboo@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      2
      ·
      35 minutes ago

      This is the way. I think this is what Apple is finally implementing, but since they took too long to do so, governments have been passing laws which require privacy invasive measures that fill the void. Hard to say if that will reverse itself now that there’s a whole age-verification industry that popped up. Actually it’s unclear to me if the age-verification industry manufactured a problem to push their solution?

      Had Apple implemented this in their Parental Controls setting, it would have avoided the government intervention and shady age-verification companies from popping up.

  • Godnroc@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    ·
    5 hours ago

    You know how there are stores that sell restricted substances and verify your age by checking a provided ID? Have those same stores sell a cheap, sealed card with a confirmation code on it. You can enter that code online to verify any service. The code expires after a set period of time after it’s first use to prevent sharing and misuse.

    This system would be as secure as the restrictions on the restricted substance, such as alcohol, so it should be fine for “protecting the children”

    • bamboo@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      30 minutes ago

      Were you ever a teenager? This would be abused immediately, unless the codes were single use, and in that case it’s a non-starter.

    • dustycups@aussie.zone
      link
      fedilink
      arrow-up
      5
      ·
      4 hours ago

      +1 At least in WA there are restrictions on licenced premises recording your ID, they are meant to just check it.

    • FinjaminPoach@lemmy.world
      link
      fedilink
      arrow-up
      9
      ·
      5 hours ago

      Interesting idea. Could also give it out free with packs of beer like a golden ticket from Charlie And The Chocolate Factory.

      And all across the whole world, 18 year old men will jump for joy when picking up birthday booze - “I can finally look at boobs on the internet!”

  • Voidian@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    12
    ·
    5 hours ago

    Despite our current parliament sucking ass, I still have some general trust in my country’s government (and culture). That country being Finland. So with that in mind:

    Our government bodies already have my basic data. Healthcare, census etc. and we use our online banking services to verify identity when accessing the data. It’s simple, and extremely widely used. I really don’t see why it would be so hard to make a relatively simple service that just gives sites that need to know a yes or no answer on if I’m over 18. They don’t need to know my birth date or any other information.

    Not let a government or age verification authority know whenever a user is accessing 18+ content

    This should be possible but of course the question is if one trusts the government to actually uphold this. Again, with my background, it’s a bit easier for me to speak.

    Make it difficult or impossible for a child to fake a proof of adulthood, eg. By downloading an already verified anonymous signing key shared by an adult, etc.

    You’ll never patch all the holes. In a perfect world, we wouldn’t be having this conversation. In a perfect world, parents would actually parent their kids and monitor their internet use. Access to adult content doesn’t even come close to being the biggest problem in many cases where some kids parents are fucking up their duties. Drugs, gangs, petty (and not so petty) crime comes to mind. Collective responsibility would be great but since we don’t live in a perfect world where everyone can just agree to a good idea like “take responsibility of your kids”, I’ll settle for trusting a democratic government to have some capacity to pick up those that fall.

    I happen to agree with age verification laws. This is a tangent but I would also go a step further in saying that MAINSTREAM internet should not be possible to use without verifying that the user is a real individual person. This would be another yes/no question via a service. Outwardly they don’t have to reveal their identity but even JizzMcCumsocks needs to have a backend verification as a real person. Basically, if any government member uses some service with their own name and has a verification about that, that service must also have a way of verifying that any user is a real person. We have given Xitter way too much power and at the same time, allowed anonymity. Meta services too of course but I think Xitter is one of the worst due to easy and straight forward use. Humanity has shown, that we are not equipped to handle the kind of (mis)information flow there is in these spaces. Spaces such as Lemmy can and should operate in full anonymity, as there are natural barriers to entry here, plus it’s less appealing when it’s not even really intended for the kind of use mainstream social media sites are. Here we have a collective and individual responsibility to account for the anonymity and the challenges it brings.

  • one_old_coder@piefed.social
    link
    fedilink
    English
    arrow-up
    34
    arrow-down
    12
    ·
    6 hours ago

    I’m pretty sure there is already a cryptographic protocol that can do this, but that’s not the point. We do NOT need age verification in software, it makes no sense. We need parents to take care of their own children because why would open-source software do the job of failed parenting? It’s a social issue, not something that can be solved with technology. Or we would have put shock-collars in every kids when they don’t behave.

    • bamboo@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      23 minutes ago

      Agreed, and for every site which would comply with these rules, there are 10-100 which won’t and are not able to be controlled in the jurisdiction. Teenagers will find a way to get around restrictions, and will go to sites which are less regulated, and possibly not have the controls in place to flag grooming interactions, promoting self harm, etc.

    • Voidian@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      15
      arrow-down
      2
      ·
      5 hours ago

      Great idea, let’s get parents to raise their kids.

      Now, how do we suddenly make them actually do that. Last I checked this idea has been around about as long as people have been around but it’s still not happening.

      Parenting matters, but it’s not the only layer of protection. We don’t rely solely on parents to keep kids from walking into bars or buying cigarettes, we have laws and systems to back them up. Why should the internet be different?

      • Waveform@multiverse.soulism.net
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        1
        ·
        5 hours ago

        You see, if we tell parents that it’s actually super important that they raise their kids, I’m sure they will do it. Just like if we tell everyone that a vaccine for a dangerous disease is a really good idea, everyone will just settle down and go get it.

      • bluGill@fedia.io
        link
        fedilink
        arrow-up
        5
        ·
        5 hours ago

        How am I supposed to take care of my kids? My kid has got up at 3am and used his school device to do things I don’t want. The thing wasn’t supposed to be allow by the school but the bypass (web site not blocked) wasn’t one the school will find out and block. Bypasses like that spread fast in schools.

        • Voidian@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          5
          ·
          4 hours ago

          My point is that we can’t rely on parental oversight only because some plain won’t… and in your case, even actively trying may fail (it’s not your fault). And there’s always going to be loopholes in every system. Clever kids will get by most verifications, and if they don’t, that’s likely to mean the verification gets too invasive to be worth it. The best, though not perfect system is to have parental oversight + impartial verification + platform responsibility. This will reduce but not eradicate the problem.

          • bluGill@fedia.io
            link
            fedilink
            arrow-up
            4
            ·
            3 hours ago

            Problem is an OS is not a useful part of this. My kids are perfectly able to install linux on a pi - and this is something I want to encourage in general (I don’t think they have, but they could), thus giving them root access - including access to things in the package repo that I may not approve of. It is a hard problem and I can’t always be there.

    • Korhaka@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 hours ago

      Need parents to use already existing parental controls and for society to blame parents more for incompetence

  • A1kmm@lemmy.amxl.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    4 hours ago

    is it technically possible to accurately verify someone’s age while respecting their privacy and if so how?

    With your constraints yes, but there are open questions as to whether that would actually be enough.

    Suppose there was a well-known government public key P_g, and a well protected corresponding government private key p_g, and every person i (i being their national identity number) had their own keypair p_i / P_i. The government would issue a certificate C_i including the date of birth and national identity number attesting that the owner of P_i has date of birth d.

    Now when the person who knows p_i wants to access an age restricted site s, they generate a second site (or session) specific keypair P_s_i / p_s_i. They use ZK-STARKs to create a zero-knowledge proof that they have a C_i (secret parameter) that has a valid signature by P_g (public parameter), with a date of birth before some cutoff (DOB secret parameter, cutoff public parameter), and which includes key P_i (secret parameter), that they know p_i (secret parameter) corresponding to P_i, and that they know a hash h (secret parameter) such that h = H(s | P_s_i | p_i | t), where t is an issue time (public parameter, and s and P_s_i are also public parameters. They send the proof transcript to the site, and authenticate to the site using their site / session specific P_s_i key.

    Know as to how this fits your constraints:

    Let the service know that the user is an adult by providing a verifiable proof of adulthood (eg. A proof that’s signed by a trusted authority/government)

    Yep - the service verifies the ZK-STARK proof to ensure the required properties hold.

    Not let the service know any other information about the user besides what they already learn through http or TCP/IP

    Due to the use of a ZKP, the service can only see the public parameters (plus network metadata). They’ll see P_s_i (session specific), the DOB cutoff (so they’ll know the user is born before the cutoff, but otherwise have no information about date of birth), and the site for which the session exists (which they’d know anyway).

    Generating a ZK-STARK proof of a complexity similar to this (depending on the choice of hash, signing algorithm etc…) could potentially take about a minute on a fast desktop computer, and longer on slower mobile devices - so users might want to re-use the same proof across sessions, in which case this could let the service track users across sessions (although naive users probably allow this anyway through cookies, and privacy conscious users could pay the compute cost to generate a new session key every time).

    Sites would likely want to limit how long proofs are valid for.

    Not let a government or age verification authority know whenever a user is accessing 18+ content

    In the above scheme, even if the government and the site collude, the zero-knowledge proof doesn’t reveal the linkage between the session key and the ID of the user.

    Make it difficult or impossible for a child to fake a proof of adulthood, eg. By downloading an already verified anonymous signing key shared by an adult, etc.

    An adult could share / leak their P_s_i and p_s_i keypair anonymously, along with the proof. If sites had a limited validity period, this would limit the impact of a one-off-leak.

    If the adult leaks the p_i and C_i, they would identify themselves.

    However, if there were adults willing to circumvent the system in a more online way, they could set up an online system which allows anyone to generate a proof of age and generates keypairs on demand for a requested site. It would be impossible to defend against such online attacks in general, and by the anonymity properties (your second and third constraints), there would never be accountability for it (apart from tracking down the server generating the keypairs if it’s a public offering, which would be quite difficult but not strictly impossible if it’s say a Tor hidden service). What would be possible would be to limit the number of sessions per user per day (by including a hash of s, p_i and the day as a public parameter), and perhaps for sites to limit the amount of content per session.

    Be simple enough to implement that non-technical people can do it without difficulty and without purchasing bespoke hardware

    ZK-STARK proof generation can run on a CPU or GPU, and could be packaged up as say, a browser addon. The biggest frustration would be the proof generation time. It could be offloaded to cloud for users who trust the cloud provider but not the government or service provider.

    Ideally not requiring any long term storage of personal information by a government or verification authority that could be compromised in a data breach

    Governments already store people’s date of birth (think birth certificates, passports, etc…), and would need to continue to do so to generate such certificates. They shouldn’t need to store extra information.

  • Scott 🇨🇦🏴‍☠️@sh.itjust.works
    link
    fedilink
    arrow-up
    11
    arrow-down
    6
    ·
    6 hours ago

    Parental Controls. Most devices have this setting. Parents need to be taught how to turn it on, and penalized when they don’t turn it on. This way there would be no centralized database that could be hacked thereby violating user privacy. Adults wouldn’t have to give up their government issued ID to websites.

  • Zagorath@aussie.zone
    link
    fedilink
    English
    arrow-up
    2
    ·
    5 hours ago

    Here’s one good answer: https://crypto.stackexchange.com/a/96283

    It has the downside of requiring a physical device like a passport or some specific trusted long-running locally-kept identity store held by the user. But it’s otherwise very good.

    Another option does not require anything extra be kept by the user, but does slightly compromise privacy. The Government will not be able to track each time the user tries to access age-gated content, or even know what sources of age-gated content are being accessed, but they will know how many different sites the user has requested access to. It works like this:

    1. The user creates or logs in to an account on the age-gated site.
    2. The site creates a token T that can uniquely identify that user.
    3. That token is then blinded B(T). Nobody who receives B(T) can learn anything about the user.
    4. The user takes the token to the government age verification service (AVS).
    5. The user presents the AVS with B(T) and whatever evidence is needed to verify age.
    6. The AVS checks if the person should be verified. If not, we can end the flow here. If so, move on.
    7. The AVS signs the blinded token using a trusted AVS certificate, S(B(T)) and returns it to the user.
    8. The user returns the token to the site.
    9. The site unblinds the token and obtains S(T). This allows them to see that it is the same token T representing the user, and to know that it was signed by the AVS, indicating that the user is of age.
    10. The site marks in their database that the user has been age verified. On future visits to that site, the user can just log in as normal, no need to re-verify.

    All of the moving around of the token can be automated by the browser/app, if it’s designed to be able to do that. Unfortunately a typical OAuth-style redirect system probably would not work (someone with more knowledge please correct me), because it would expose to the AVS what site the token is being generated for. So the behaviour would need to be created bespoke. Or a user could have a file downloaded and be asked to share it manually.

    There’s also a potential exposure of information due to timing. If site X has a user begin the age verification flow at 8:01, and the AVS receives a request at 8:02, and the site receives a return response with a signed token at 8:05, then the government can, with a subpoena (or the consent of site X) work out that the user who started it at 8:01 and return at 8:05 is probably the same person who started verifying themselves at 8:02. Or at least narrow it down considerably. Making the redirect process manual would give the user the option to delay that, if they wanted even more privacy.

    The site would probably want to store the unblinded, signed token, as long-term proof that they have indeed verified the user’s age with the AVS. A subsequent subpoena would not give the Government any information they could not have obtained from a subpoena in an un-age-verified system, assuming the token does not include a timestamp.

  • crwth@piefed.zip
    link
    fedilink
    English
    arrow-up
    1
    ·
    4 hours ago
    1. Apply for access to age-gated content.
    2. Ignore application for 18 years.
    3. Your account has been approved.
  • neidu3@sh.itjust.worksM
    link
    fedilink
    English
    arrow-up
    3
    ·
    6 hours ago

    When software poses a requirement, software should be ditched in favor of protocols. This is why any software that relies on a closed spec protocol should be avoided.

    You’ll never see an age verification requirement on IRC or XMPP. And any software using these protocols that try to implement age verification will simply be left at the curbside.

  • SMillerNL@piefed.social
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 hours ago

    For an implementation to work, it should: * Let the service know that the user is an adult by providing a verifiable proof of adulthood (eg. A proof that’s signed by a trusted authority/government) * Not let the service know any other information about the user besides what they already learn through http or TCP/IP *

    Seems like that’s exactly what https://yivi.app/en/ can do.

    • exaybachae@startrek.website
      link
      fedilink
      arrow-up
      1
      ·
      4 hours ago

      Yoti too.

      They hold and verify ID, then mostly just pass an OK to the website or service you wanna access. Similar to Paypal playing the middle man when shopping and clicking Pay with Paypal.

      They do also have the ability to share other details, but according to their FAQ it’s always with your permission.

      Likewise Paypal will share your name address and email, but that’s often necessary while shopping.

      Logging in to sites with Google of Facebook has a similar effect, the login prompts often have check boxes that allow you to control the data you share.