Age verification as mass surveillance infrastructure

Public support, politics, and motives

  • Several argue age-verification laws are broadly popular with voters, including many young adults, who see tangible harms from social media and “big tech.”
  • Others say support is shallow: people are not told about surveillance implications and mostly think about protecting kids from porn, predators, and addiction.
  • Some attribute the push to incompetence and regulatory capture; others see deliberate intent to end anonymous publishing and create infrastructure for retaliation and control.
  • Comparison is made to alcohol, tobacco, and gambling age limits: widely accepted even if imperfect.

Parental responsibility vs. state control

  • One camp says the problem is non-technical: parents should control what kids access, via education and parental controls, not government ID checks.
  • Opponents respond that many parents are inattentive, overworked, or incapable; public rules exist precisely to protect children in those cases.
  • Some warn that using “protect the children” as justification for more state control is a long-running path toward a nanny or totalitarian state.

Privacy, surveillance, and anonymity

  • A major concern is that robust online age verification inevitably expands surveillance and erodes anonymity.
  • Critics emphasize that any system tying age checks to real-world identity can be repurposed later; legal limits (e.g., data retention caps) can be quietly removed.
  • Some argue that the “child protection” framing is a cover for building comprehensive identity-linked tracking.

Technical proposals and trade-offs

  • Multiple privacy-preserving ideas are discussed: zero-knowledge proofs, government-backed digital IDs, public-key–based credentials, verifiable credentials, attribute-only sharing, or age tokens bought offline.
  • Thread repeatedly notes trade-offs:
    • Strong privacy → easy sharing of tokens/credentials by minors.
    • Strong enforcement → government or intermediaries get logs of who accessed what.
    • Requiring records for audits → data-breach and abuse risks.
  • One commenter highlights an existing zero-knowledge implementation (e.g., in phone wallets) as proof it’s technically feasible, though others question hardware trust.

Alternatives and liability concepts

  • Proposals include device-level “parental flags” passed to sites, school/ISP/parent liability for a child’s internet use, or selling age-verification scratchcards via existing ID-checked channels.
  • Skeptics argue any scheme can be circumvented by determined teens or irresponsible adults.

Critique of the linked site and HN meta

  • Several participants regard the linked investigation as LLM-generated “slop,” with weak sourcing and over-extended claims about mass surveillance.
  • There are calls for higher-quality, non-AI-written sources and even for HN to discourage or filter AI-generated submissions.