Age verification as mass surveillance infrastructure
Public support, politics, and motives
- Several argue age-verification laws are broadly popular with voters, including many young adults, who see tangible harms from social media and “big tech.”
- Others say support is shallow: people are not told about surveillance implications and mostly think about protecting kids from porn, predators, and addiction.
- Some attribute the push to incompetence and regulatory capture; others see deliberate intent to end anonymous publishing and create infrastructure for retaliation and control.
- Comparison is made to alcohol, tobacco, and gambling age limits: widely accepted even if imperfect.
Parental responsibility vs. state control
- One camp says the problem is non-technical: parents should control what kids access, via education and parental controls, not government ID checks.
- Opponents respond that many parents are inattentive, overworked, or incapable; public rules exist precisely to protect children in those cases.
- Some warn that using “protect the children” as justification for more state control is a long-running path toward a nanny or totalitarian state.
Privacy, surveillance, and anonymity
- A major concern is that robust online age verification inevitably expands surveillance and erodes anonymity.
- Critics emphasize that any system tying age checks to real-world identity can be repurposed later; legal limits (e.g., data retention caps) can be quietly removed.
- Some argue that the “child protection” framing is a cover for building comprehensive identity-linked tracking.
Technical proposals and trade-offs
- Multiple privacy-preserving ideas are discussed: zero-knowledge proofs, government-backed digital IDs, public-key–based credentials, verifiable credentials, attribute-only sharing, or age tokens bought offline.
- Thread repeatedly notes trade-offs:
- Strong privacy → easy sharing of tokens/credentials by minors.
- Strong enforcement → government or intermediaries get logs of who accessed what.
- Requiring records for audits → data-breach and abuse risks.
- One commenter highlights an existing zero-knowledge implementation (e.g., in phone wallets) as proof it’s technically feasible, though others question hardware trust.
Alternatives and liability concepts
- Proposals include device-level “parental flags” passed to sites, school/ISP/parent liability for a child’s internet use, or selling age-verification scratchcards via existing ID-checked channels.
- Skeptics argue any scheme can be circumvented by determined teens or irresponsible adults.
Critique of the linked site and HN meta
- Several participants regard the linked investigation as LLM-generated “slop,” with weak sourcing and over-extended claims about mass surveillance.
- There are calls for higher-quality, non-AI-written sources and even for HN to discourage or filter AI-generated submissions.