There are a lot of GOP-controller legislatures in the USA pushing through so-called “child protection” laws, but there’s a toll in the form of impacting people’s rights and data privacy. Most of these bills involve requiring adults to upload a copy of their photo ID.

    • sbv@sh.itjust.works
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      1 year ago

      If the government really wanted to, it could provide citizens with a portal that would do oauth (or something similar) to authorize the porn access.

      They could do some crypto crap to avoid storing anything about the citizen, so, unless the system is subborned, it doesn’t store anything about users.

      EDIT: the point is that this kind of system can be implemented in a privacy-preserving manner. I’m ambivalent about the idea, but it has been enacted by a democratically elected government, so they should go about it in the most responsible manner possible.

            • Rikudou_Sage@lemmings.world
              link
              fedilink
              arrow-up
              1
              ·
              1 year ago

              I thought it was obvious, but I guess I’m gonna go step-by-step. So, what’s needed to verify if you’re 18? Exactly one thing - a flag telling the other system yes/no! Very privacy friendly, porn site doesn’t know anything else about you. And obviously the auth system shouldn’t log that you verified for a porn site. That’s why it should be open source, so you can trust it.

              • buckykat@lemmy.blahaj.zone
                link
                fedilink
                arrow-up
                5
                ·
                edit-2
                1 year ago

                The auth system knows you verified for something. The only way to actually preserve privacy is total anonymity to everyone.

                  • jet@hackertalks.com
                    link
                    fedilink
                    English
                    arrow-up
                    4
                    ·
                    1 year ago

                    Please explain it to me like I’m five. How can the authentication service not know what your authenticating against? How can it provide you a token that you can’t use over and over again, or past other people?

                    OAuth specifically wants to know what you’re using your tokens for.

                    In principle if you insert a middleman into a transaction the middleman knows about the transaction. Thus it’s violates privacy

                  • buckykat@lemmy.blahaj.zone
                    link
                    fedilink
                    arrow-up
                    2
                    ·
                    1 year ago

                    It is a basic tautological fact that you cannot verify an identity while keeping that identity private from the verifier.

              • Aetherielle@kbin.social
                link
                fedilink
                arrow-up
                5
                ·
                1 year ago

                If it’s private and secure and isn’t linked to your identity, we will share it and it will be useless because everyone who shares the same login is the same over-18 person.
                If it is in any way linked to your identity, the data is online and a target for breach which will expose said identity.
                There is no realistic way to implement this which both actually does anything at all, AND does not require adding attack surface for breaches.

                  • Aetherielle@kbin.social
                    link
                    fedilink
                    arrow-up
                    2
                    ·
                    1 year ago

                    Please reread what I wrote. And regarding everything you use adding attack surface, that is the absolute best argument to not use an additional service such as the aforementioned 3rd party auth.
                    What are we doing here?

          • sbv@sh.itjust.works
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            Yeah. It’s possible, but I’m guessing there isn’t a will or an understanding of available tools.

        • sbv@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          Your original post said the last can’t be implemented in a privacy preserving manner. It can.

      • CAPSLOCKFTW@lemmy.ml
        link
        fedilink
        arrow-up
        13
        ·
        1 year ago

        I disagree. I could literally put some porn in this very comment. So the fediverse needs a porn barrier, and every file hoster, we can’t allow TOR, there is porn, and illegal porn as well. So please show us your id before entering TOR, pls.

        It is an authoritarian move. It is undermining privacy. It is censoring the web.

        It is parents and maybe schools responsabilty to teach kids how to interact with media, that porn exists and is not an actual representation of sex, and to restrict their access to pornography or media in general.

        Furthermore, on planet earth, there are no perfect democracies, and the democratic system of the USA is flawed to a degree where it is at least questionable if your leaders are elected democratically.

    • AtHeartEngineer@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 year ago

      There technically is, but it’s going to be a while until the government is ok with it. It’s called zero knowledge cryptography, where a user could prove they have an identification that is government issued, and that they are of age, without revealing any other information.

      • darth_helmet@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        1 year ago

        There’s a vanishingly small chance that the government wouldn’t fuck that up. Here is what would happen:

        • bill gets signed
        • no bid contract is assigned to a technology firm with a history of incompetence at everything other than lobbying for billions of dollars
        • 3-letter agencies secretly inject back door stipulations into the system so that they can keep spying on everyone
        • years late and at double the budget, it releases
        • two months later, someone shows off the secret backdoor keys at DEFCON, along with instructions on how to dump the access database
        • years of extortion material for spy agencies and organized crime around the world
        • zero children protected: they learn an ancient technology called “torrenting”
        • new calls for even more draconian control of information to save the children from sexy terrorists