Opening up ‘Zero-Knowledge Proof’ technology
Age assurance, porn access, and broader regulation fears
- Many see age-gating as the thin end of the wedge toward “internet usage permits” tied to government ID via corporate intermediaries.
- Supporters argue that current reality—young kids rapidly reaching extreme porn or misogynistic content—is unacceptable, and some form of gatekeeping is needed.
- Others warn that once infrastructure exists, “adult-only” classification can shift to LGBTQ topics, birth control, or other disfavored speech.
Parents vs state: who should protect kids online?
- One camp: this is fundamentally a parenting problem; empower guardians with better device-level filters and education, not global identity systems.
- Counterpoint: that only protects kids with “the right kind of parents”; schools, devices, and platforms undermine parental control, so legislation is a legitimate tool.
- Some argue harsh criminal enforcement against producers/distributors (as with child sexual abuse material) is preferable to mass ID systems.
Architecture: MDOC, secure elements, and unlinkability
- The scheme builds on existing digital ID formats (e.g., MDOC) issued by governments (DMV/passports) and stored on devices.
- A secure element (phone chip, smartcard, or similar) holds a key that “binds” the credential to a device and biometric, preventing easy sharing.
- The ZKP layer lets a site verify properties (e.g., “over 18”) without seeing extraneous attributes (e.g., name) and aims for “unlinkability”: repeated uses can’t be tied to the same person, even if site and issuer collude.
- Revocation is a hard unsolved tradeoff: real‑time checks reintroduce timing/correlation risks.
Bypassability, sybil issues, and limits
- Commenters stress that any such system can be bypassed (sharing devices, hardware attacks, proxies, foreign VPNs), so it mainly raises the bar for naïve users.
- Sybil‑like concerns remain: if even one legitimate user colludes to “rent” their credential, they can front for many others, limited only by biometrics and hardware friction.
Trust model: wallets, big tech, and openness
- A core criticism: the protocol assumes a “wallet” implementation that can see both user data and relying sites; a malicious wallet can secretly leak usage patterns.
- Some jurisdictions (e.g., EU) plan to require open‑source, “blessed” wallets, potentially with reproducible builds, which mitigates but does not eliminate trust concerns.
- Debate over whether users can run their own clients or must rely on government‑approved / big‑tech software and secure hardware.
Technical ZKP discussion and pedagogy
- Several intuitive explanations are shared (Where’s Waldo, “Ali Baba cave”, paint/Fiat–Shamir transform), plus links to primers and videos.
- Non‑interactive ZK is explained as simulating interactive protocols by deriving verifier “challenges” from hashing prior transcript and public inputs (Fiat–Shamir).
- Some clarify why simple “over‑18 token” constructions aren’t truly zero‑knowledge if proofs are deterministic and linkable.
Comparisons to other ZK systems
- The scheme is described as circuit‑based and compatible with existing ECDSA hardware, targeting client‑side proofs on commodity phones (single‑threaded, no GPU).
- It’s contrasted with systems like BBS/BBS+, Idemix, and blockchain‑oriented SNARK/STARK frameworks: those are seen as either more complex for this use or slower on this specific credential problem.
- One commenter notes external benchmarks where this approach is ~10x faster than other candidate systems for identity proofs on the same hardware.
Potential applications and enthusiasm
- Supportive comments highlight this as a major privacy win versus naive “send your ID scan to every site” approaches, with applications to:
- age checks,
- political‑affiliation proofs,
- SSN‑style identity attributes,
- anonymous payments and micropayments,
- zkTLS (proving facts about remote accounts without revealing identity).
- Others remain wary of centralization, regulatory creep, and dependence on large vendors, while still conceding that this is “strictly better” than current non‑private age‑verification schemes.