I have recently been asked by @panoptykon if it was possible to create an online age verification system that would not be a privacy nightmare.

I replied that yes, under certain assumptions, this is possible. And provided a rough sketch of such a system.

But privacy is not the only issue with systems like that:
https://rys.io/en/178.html

#Privacy #AgeVerification #Web

Privacy of online age verification

I have recently been asked by the Panoptykon Foundation if it was possible to create an online age verification system that would not be a privacy nightmare. I replied that yes, under certain assumpti

Songs on the Security of Networks

That protocol is simplified to the point where it makes no sense and thus we cannot really evaluate its security, but yeah, I was glad to see that you do get around to semi-acknowledging that a scheme like that would need to rely on some kind of service like Tor to begin to provide any semblance of privacy. Even then the central authority would have a record of it every time each of us hit an age gate, which is valuable metadata to be giving away whether or not it's probably just pornography.

Lots of people seem eager to claim that it can feasibly be done in a privacy-safe way but I still have yet to be convinced of it.

And it's all just to set up a new system of oppression with the other problems you mention. It seems utterly ridiculous.

One particular way in which the story makes no sense to me: The website wants to ask a question about "the visitor." How does it identify the visitor in its message to the central authority? If nothing prevents it, said visitor could simply pass the question on to Charlie's Web Age Verifier Bypass Service down the road which is in posession of an age-appropriate keypair, and relay the response in an automated fashion. How does one prevent that?

I mean it's not as if people wouldn't do it. Borrowing an older kid's ID to buy beer was commonplace when I was younger. Imagine if it could be done automatically, instantly, on a large scale. Shutting down The Pirate Bay is already nigh-impossible for the powers of law and order, it seems. Imagine if every kid had to use it if they wanted to connect to Instagram.

@kbal @panoptykon the website does not identify the visitor to the e-ID service, that's what the trusted app on the visitor's device is for.

The website provides a question and an URL to the trusted app. The trusted app sends a request containing the question, signed with the visitor's key, to the e-ID service. The e-ID service responds with a signed response also containing the question, to the trusted app. The trusted app then forwards that response to the website, using the URL.

@kbal @panoptykon the website knows it's a response related to this particular visit thanks to the nonce. And then verifies the signature on the response against a well-known long-term public key of the e-ID service.

Obviously the e-ID service is not any e-ID service. Perhaps it's government-run. Perhaps it is run by institutions that are somehow "anointed" by the government.

Okay, there is a nonce. Presumably it is negotiated somehow to prevent the Website from hiding any info in it. But then the question for the ID server is simply "Does a user who knows this nonce have access to a keypair indicating the right age range?" The user (i.e. the "trusted app" that is in their control) can then simply send that question off to Charlie or whoever and get the desired answer to relay to the Website without revealing to anyone any secrets of their own. The ID server has no way to know it was proving the age of the wrong person, the Website doesn't know who it actually got an age for, and neither can identify the actual user.

I think the people implementing these age verification schemes do want to try and defend against that sort of thing, because both the ones I've seen so far in reality (the one from Spain and some other thing a couple years ago that was closer to your idea) seem to have willingly sacrificed any semblance of privacy in their efforts to prevent it.

@kbal

> The ID server has no way to know it was proving the age of the wrong person

Did you actually read the post?

The e-ID server knows who it is providing a response about, as the request from the trusted app is signed with the key associated with that person.

That key is authenticated by logging into that application through the e-ID service.

The ID server knows who its response is about, but it does not know if they're the person using the website.
@kbal @panoptykon just like when an adult passes any other kind of age verification we could imagine – even most intrusive ones, with fingerprints and whatnot – and then hands over the laptop to a kid. Your point?
I'm not imaging a friendly adult signing in for their child, I'm thinking a completely automated service that instantly gets past age verification for anyone who signs up for it by sharing a pool of stolen, purchased, fraudulently obtained, or willingly shared IDs.
Maybe that could be kept under control by making the keys valuable — hard to replace and maybe even the same keypair that's used for age verifying your mastodon login also used for more important things. But key management is probably going to be a nightmare. Just ask the cryptocurrency guys.
@kbal @panoptykon this is a problem solved well enough for this by any e-government services or e-banking app out there.

Okay I can imagine it being similar to a yubikey, albeit one with a totally new protocol along the lines of what you described. But it occurs to me that people wanting to share their age credentials with friends or strangers wouldn't actually need to give up the keys to anyone. People could run rate-limited age verifier relay services using their legit keypairs without having to compromise their ownership of those keys, similar to the way some people are willing to run bittorrent clients today.

If we assume that anyone who puts in a little effort being able to bypass this elaborate system is not a problem because it's only meant to deter people who can't be bothered, I guess it only remains to design the Tor-like service over which this will run and make it resistant to traffic analysis.

Anyway, thank you for being patient with my questions.

@kbal @rysiek Hey. Thanks for the discussion.
Indeed, the point of the government seems to be to protect younger kids that wander around the internet without supervision and may be harmed by unintentionally accessing adult content. We don't think they are fooling themselves a 100% airtight system can be deployed.
Also, our position as a human rights watchdog, is that age verification, if introduced, must be limited to porn websites, we strongly oppose it being stretched to other services, ia IG
@panoptykon
My position (as a non-Pole and non-EU citizen) is that parents and guardians should be more active in their children's lives in order to protect them. If they don't have the time for that, then that's something we should try to fix.
@kbal @rysiek
@light @kbal @rysiek Consumers alone can't stop the climate change with their choices, similarly parents alone can't protect their children from all harms caused by internet companies (incl. platforms with porn). Actually we believe a combo of activities by states, businesses, schools, parents, and society as a whole, is necessary. We elaborated on it on the occasion of politicians discussing banning smartphones in schools. Here, if you are interested, in Polish though: https://panoptykon.org/zakaz-smartfonow-w-szkolach-jak-wyrwac-dzieci
Zakaz smartfonów w szkołach? Kto i co powinien zrobić, by wyrwać dzieci ze smartfonów | Fundacja Panoptykon