@campuscodi The real question is: what compromises are better, and which are worse?
It's a tough nut to crack. Can one ensure the integrity of the security enclave on a rooted phone? If not through the vendor API, how does one ensure the integrity? If not through integrity of the enclave, how will one prevent copying of the attestation, especially if privacy concerns rule out tracing use of the attestation and possibly revoking it?
The only alternative that I can see is: don't use age verification. But that ship has sailed after the tech bros sabotaged every attempt at making their algos kid safe for twenty years.
If no one comes up with a solution to the integrity issue, maybe offer people the choice between using the vendor API and uploading their govt id to every site. What could go wrong?