EU Age Control: The trojan horse for digital IDs

Meta / Thread Context

  • Original site was overloaded; readers share archive links.
  • Several participants note that HN often debates without many people reading source material closely.

Surveillance, Record‑Keeping, and Consent

  • Strong disagreement over whether digital ID systems are inherently “surveillance” or just record‑keeping.
  • One side: any compulsory ID use for web access is mass surveillance; the core problem is the existence of centralized personal data, not just accuracy.
  • Other side: governments and companies already keep necessary records; legality, purpose, and consent distinguish surveillance from legitimate data use.
  • Dispute over whether democratic legislation counts as “consent” from citizens.

Child Protection and Age Verification

  • Many argue age checks for online content are largely ineffective: kids will use VPNs, pirate sites, or borrowed credentials.
  • Others argue partial effectiveness still helps parents and society set norms around children’s exposure to social media and porn.
  • Concern that “protecting children” is a pretext for broader identity requirements and control.

Digital IDs: Inevitable or Dangerous?

  • Some see digital IDs as inevitable and convenient, already used for taxes and government services; focus should be on legal limits (e.g., preventing “de‑personing” by revoking IDs).
  • Others see a slippery slope to total surveillance and “social credit”–like outcomes: mandatory ID for banking, social media, SIMs, payments, even buying food.
  • Experiences differ: some EU countries have long‑standing eID with limited scope; skeptics warn that scope can expand via regulation and corporate incentives.

Technical Design: ZKPs, Wallets, and Platform Lock‑In

  • EU age‑verification docs explicitly mention zero‑knowledge proofs, but several commenters highlight practical gaps:
    • Current schemes may still allow linking via revocation and reuse patterns.
    • Hardware in phones doesn’t support advanced anonymous credentials (e.g., BBS+), so systems rely on rotating signatures tied to secure elements.
  • Serious concern about reliance on Google/Apple ecosystems (e.g., Google Play Integrity, attestation on outdated Android), potentially excluding alternative OSes and violating EU competition rules.
  • Debate over whether remote attestation and centralized databases create major breach/abuse risks.

State vs Corporate Power; Bots and Disinformation

  • Some justify stronger identity controls to counter bots, foreign influence, and AI‑generated disinformation.
  • Others argue this just shifts power from opaque platforms to governments without solving algorithms, censorship, or propaganda.
  • Disagreement whether foreign “bot farms” are a major factor or an exaggerated excuse for political failures.

Resistance and Alternatives

  • Proposals mentioned: web‑of‑trust systems to fight bots without tying to real‑world IDs; decentralized protocols; continuing to use cash and physical tokens.
  • A minority plan to block or avoid any site requiring ID/age verification, though others note many essential services already require ID.