Age verification: Difference between revisions
m wp-link |
|||
| (19 intermediate revisions by 8 users not shown) | |||
| Line 2: | Line 2: | ||
{{See also|Forced identification|De-anonymization}} | {{See also|Forced identification|De-anonymization}} | ||
'''Age Verification''' (AV), also referred to as '''Age Affirmation''' (AA), is the process in where a business requires some form of identification to verify your age. This is usually done for more explicit or mature content. This practice has been widely spreading since the [[UK Online Safety Act|UK's Online Safety Act (OSA)]] has passed; requiring all individuals to verify themselves before accessing mature content. Ways of checking age include, but are not limited to: checking for a valid credit card, facial age estimation tools, government-issued ID, biometric data, account history behavior, and more. | '''[[wikipedia:Age_verification|Age Verification]]''' (AV), also referred to as '''Age Affirmation''' (AA) and '''Age gating''', is the process in where a business requires some form of identification to verify your age. This is usually done for more explicit or mature content. This practice has been widely spreading since the [[UK Online Safety Act|UK's Online Safety Act (OSA)]] has passed; requiring all individuals to verify themselves before accessing mature content. Ways of checking age include, but are not limited to: checking for a valid credit card, facial age estimation tools, government-issued ID, biometric data, account history behavior, and more. | ||
As of December 2025, 25 US States require websites with mature content to verify age.<ref>{{Cite web |title=State Age Verification Laws - Action Center |url=https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/ |url-status=live |access-date=2025-12-22 |archive-url=https://web.archive.org/web/20251228121257/https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/ |archive-date=2025-12-28 }}</ref> | As of December 2025, 25 US States require websites with mature content to verify age.<ref>{{Cite web |title=State Age Verification Laws - Action Center |url=https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/ |url-status=live |access-date=2025-12-22 |archive-url=https://web.archive.org/web/20251228121257/https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/ |archive-date=2025-12-28 }}</ref> | ||
| Line 9: | Line 9: | ||
When accessing a platform or website that may contain content not suitable for all audiences may force you to register for the platform along with verifying your age by one of the methods mentioned previously. Sites that likely don't use any form of account system will probably have a popup instead requiring you to verify your age before even serving the content you were trying to access. | When accessing a platform or website that may contain content not suitable for all audiences may force you to register for the platform along with verifying your age by one of the methods mentioned previously. Sites that likely don't use any form of account system will probably have a popup instead requiring you to verify your age before even serving the content you were trying to access. | ||
New legislation now mandates [[wikipedia:Operating_system|operating systems (OS)]] to block the user until they verify their age. This is done "for convenience" so that apps and websites don't individually prompt the user, instead those apps/websites can just query the platform (e.g. OS, web-browser, etc...) without the user noticing. | |||
=== | ==Why is this a problem?== | ||
The Online Safety Act is already exerting extraterritorial control through the age‑verification and validation changes it prompts, which are being implemented in the U.S. even though those companies customer bases are not at all subject to UK law, even Europeans that are also not under UK law are affected. This stems from the Act’s vague, overly broad language requiring companies to comply whenever users are located in the UK. Because the law effectively ignores national borders, non‑UK companies face only two options: geo‑block affected content for UK users or apply the same verification measures globally. | |||
Geo‑blocking would severely disrupt services and business relationships that where already in place with UK customers before the Online Safety Act, so many companies choose to implement the changes for all users resulting in practical overreach beyond the UK. A reason for this is Ofcoms<ref>{{Cite web |date=2025-01-31 |title=What is Ofcom? |url=https://www.ofcom.org.uk/about-ofcom/what-we-do/what-is-ofcom |url-status=live |access-date=2026-04-07 |website=[[Ofcom]]}}</ref> statutory powers to require platforms to use “accredited technology” to detect illegal content. As such systems would have to be implemented onto all the content this again would be an overreach of their precieved authorities. Companys that do not comply are already beeing fined for this. | |||
Even if the UK Government has “paused” its demand for implementing “accredited technologys” there is no practical way to meet the vague requirement set out by Ofcom in the Online Safety Act. The proposal ignores that smaller companies would likely be forced to close under the financial burden of compliance, producing a sterilized market with reduced competition only firms with deep pockets can comply. That still does not prevent Ofcom from fining companies that fail to comply. | |||
Examples: | |||
Webpage 4chan<ref>{{Cite web |date=2025-06-10 |title=Investigation into 4chan and its compliance with duties to protect its users from illegal content |url=https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/investigation-into-4chan-and-its-compliance-with-duties-to-protect-its-users-from-illegal-content |url-status=live |website=[[Ofcom]]}}</ref> | |||
AVS GROUP LIMITED<ref>{{Cite web |date=2025-07-31 |title=Investigation into AVS Group Ltd’s compliance with the duty to prevent children from encountering pornographic content through the use of age assurance |url=https://www.ofcom.org.uk/online-safety/protecting-children/investigation-into-avs-group-ltds-compliance-with-the-duty-to-prevent-children-from-encountering-pornographic-content-through-the-use-of-age-assurance |url-status=live |website=[[Ofcom]]}}</ref> | |||
The provider of Im.ge<ref>{{Cite web |date=2025-06-10 |title=Investigation into the provider of Im.ge and its compliance with duties to protect its users from illegal content |url=https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/investigation-into-the-provider-of-im.ge-and-its-compliance-with-duties-to-protect-its-users-from-illegal-content |url-status=live |website=[[Ofcom]]}}</ref> | |||
Youngtek Solutions Ltd<ref>{{Cite web |date=2025-09-11 |title=Investigation into Youngtek Solutions Ltd’s compliance with the duty to prevent children from encountering pornographic content through the use of age assurance |url=https://www.ofcom.org.uk/online-safety/protecting-children/investigation-into-youngtek-solutions-ltds-compliance-with-the-duty-to-prevent-children-from-encountering-pornographic-content-through-the-use-of-age-assurance |url-status=live |website=[[Ofcom]]}}</ref> | |||
===Customer Profiling=== | |||
Having companies easily able to identify you means they can track you more efficiently and sell that shared profile to other companies such as ad agencies that then start targeting you specifically. | Having companies easily able to identify you means they can track you more efficiently and sell that shared profile to other companies such as ad agencies that then start targeting you specifically. | ||
===Government overreach=== | |||
Governments can also more easily track online movements and find out who you are. Saying something that may go against their own agenda may end up with a police raid, heavy interrogation, and prison time.<ref>{{Cite news |last=Liu |first=John |date=2025-06-20 |title=China tightens internet controls with new centralized form of virtual ID |url=https://edition.cnn.com/2025/06/20/tech/china-censorship-internet-id-hnk-intl#:~:text=%E2%80%9CThis%20is%20a%20state%2Dled,an%20infrastructure%20of%20digital%20totalitarianism.%E2%80%9D |access-date=2025-09-04 |work=CNN |archive-url=https://web.archive.org/web/20250620233250/https://edition.cnn.com/2025/06/20/tech/china-censorship-internet-id-hnk-intl |archive-date=2025-06-20 }}</ref> | Governments can also more easily track online movements and find out who you are. Saying something that may go against their own agenda may end up with a police raid, heavy interrogation, and prison time.<ref>{{Cite news |last=Liu |first=John |date=2025-06-20 |title=China tightens internet controls with new centralized form of virtual ID |url=https://edition.cnn.com/2025/06/20/tech/china-censorship-internet-id-hnk-intl#:~:text=%E2%80%9CThis%20is%20a%20state%2Dled,an%20infrastructure%20of%20digital%20totalitarianism.%E2%80%9D |access-date=2025-09-04 |work=CNN |archive-url=https://web.archive.org/web/20250620233250/https://edition.cnn.com/2025/06/20/tech/china-censorship-internet-id-hnk-intl |archive-date=2025-06-20 }}</ref> | ||
| Line 30: | Line 49: | ||
Big platforms can be regulated and forced to comply with applicable laws since they need to have infrastructure such as servers in all major markets. Only these will be affected by the age restriction requirement. | Big platforms can be regulated and forced to comply with applicable laws since they need to have infrastructure such as servers in all major markets. Only these will be affected by the age restriction requirement. | ||
However, users who do not wish to compromise their privacy or who are not of age will then go looking towards smaller niche platforms, often in other regions not affected by the regulation or the darknet.<ref name=":1">{{Cite web |last=Kaleta |first=Miroslav |date=2025-08-20 |title=The Cost of Data Privacy Negligence (And How to Avoid It) |url=https://countly.com/blog/data-privacy-negligence#:~:text=2.%20Losing%20Customer,IBM%20Report. |url-status=live |archive-url=https:// | However, users who do not wish to compromise their privacy or who are not of age will then go looking towards smaller niche platforms, often in other regions not affected by the regulation or the [[wikipedia:Darknet|darknet]].<ref name=":1">{{Cite web |last=Kaleta |first=Miroslav |date=2025-08-20 |title=The Cost of Data Privacy Negligence (And How to Avoid It) |url=https://countly.com/blog/data-privacy-negligence#:~:text=2.%20Losing%20Customer,IBM%20Report. |url-status=live |archive-url=http://web.archive.org/web/20251217003447/https://countly.com/blog/data-privacy-negligence |archive-date=17 Dec 2025|access-date=2025-09-04 |website=Countly Blog}}</ref> With these offerings, there is little to no leverage with regards to removal of illegal content. Increased exposure to illegal content can then lead to both a strengthening of illegal content providers<ref>{{Cite web |last=Branley |first=Dawn |last2=Covey |first2=Judith |date=2016-06-06 |title=Is exposure to online content depicting risky behavior related to viewers' own risky behavior offline? |url=https://www.sciencedirect.com/science/article/pii/S0747563217303357 |url-status=live |archive-url=https://web.archive.org/web/20220403233150/https://www.sciencedirect.com/science/article/pii/S0747563217303357 |archive-date=2022-04-03 |access-date=2025-09-04 |website=ScienceDirect}}</ref> and significantly increased danger to minors, who may not yet be able to differentiate between legal and illegal content as well as an adult.<ref>{{Cite web |date= |title=Potential risks of content, features, and functions: The science of how social media affects youth |url=https://www.apa.org/topics/social-media-internet/youth-social-media-2024 |url-status=live |archive-url=https://web.archive.org/web/20240416042251/https://www.apa.org/topics/social-media-internet/youth-social-media-2024 |archive-date=2024-04-16 |access-date=2025-09-04 |website=American Psychological Association}}</ref> <!-- ScienceDirect is resistant to common archival tools, but work fine even on Librewolf. PDF? Screenshot of it? --> | ||
===Increased damage from data breaches=== | ===Increased damage from data breaches=== | ||
Platforms which implement age checks that require sensitive information such as a government-issued ID will likely be more of a target for cyber criminals.<ref>{{Cite web |date=2025-04-02 |title=Cybercriminals Target These Industries the Most – Here’s Why and How to Stay Safe |url=https://brandefense.io/blog/cybercriminals-target-these-industries/#:~:text=The%20Most%20Vulnerable%20Industries%20to,information%20stored%20within%20their%20networks. |url-status=live |archive-url=https:// | Platforms which implement age checks that require sensitive information such as a government-issued ID will likely be more of a target for cyber criminals.<ref>{{Cite web |date=2025-04-02 |title=Cybercriminals Target These Industries the Most – Here’s Why and How to Stay Safe |url=https://brandefense.io/blog/cybercriminals-target-these-industries/#:~:text=The%20Most%20Vulnerable%20Industries%20to,information%20stored%20within%20their%20networks. |url-status=live |archive-url=http://web.archive.org/web/20260119030330/https://brandefense.io/blog/cybercriminals-target-these-industries/ |archive-date=19 Jan 2026|access-date=2025-09-04 |website=Brandefense}}</ref> As more platforms comply with the age checks, it becomes more likely that a data breach on at least one of these platforms can reveal extremely sensitive information. In the case of a data breach, it can be catastrophic if users' sensitive information were exposed, which can likely result in identity theft.<ref>{{Cite web |last=Popov |first=Cristina |date=2023-03-22 |title=Why breaches can affect you long after they occur |url=https://www.bitdefender.com/en-us/blog/hotforsecurity/why-breaches-can-affect-you-long-after-they-occur#:~:text=%232%3A%20Breaches%20can,for%20online%20accounts. |url-status=live |archive-url=http://web.archive.org/web/20260104220250/https://www.bitdefender.com/en-us/blog/hotforsecurity/why-breaches-can-affect-you-long-after-they-occur |archive-date=4 Jan 2026|access-date=2025-09-04 |website=Bitdefender}}</ref> | ||
Platforms already experience major losses and consumer distrust from data breaches that reveal information less sensitive than government-issued IDs or biometric data.<ref name=":1" /> A data breach involving information this sensitive will seriously damage a business, and the users even more so. As stated previously, users who foresee these privacy risks will turn away from platforms which implement the policy, and towards niche platforms. | Platforms already experience major losses and consumer distrust from data breaches that reveal information less sensitive than government-issued IDs or biometric data.<ref name=":1" /> A data breach involving information this sensitive will seriously damage a business, and the users even more so. As stated previously, users who foresee these privacy risks will turn away from platforms which implement the policy, and towards niche platforms. | ||
===Inaccuracy=== | |||
Researches about age verification software that estimates age via face scans are inaccurate, identifying children as adults or vice versa. These inaccurate estimations might lead to have to use more privacy-invasive methods like submitting a picture of a personal ID. {{Citation needed}} | |||
==Examples== | ==Examples== | ||
*[[YouTube | *[[YouTube age verification|YouTube's age verification]] and account estimation algorithm. | ||
*[[Spotify]]'s Age affirmation for MA rated songs and content. | *[[Spotify]]'s Age affirmation for MA rated songs and content. | ||
*[[Discord | *[[Discord's Mandatory Age Verification|Discord's age verification]] for accounts determining what eligible servers are available. | ||
*[[Roblox#ID & face scan age verification|Roblox's age verification]] and account estimation algorithm for talking with users of similar age. | |||
==External links== | |||
*[https://agelesslinux.org/distros.html Ageless Linux — Distro Compliance Tracker] | |||
*[https://github.com/BryanLunduke/DoesItAgeVerify GitHub BryanLunduke - List Tracking Operating Systems Not Implementing Age Verification] | |||
*[https://www.eff.org/pages/age-verification-bills-are-unconstitutional EFF explains how OS-level age-verification is unconstitutional] | |||
==See also== | |||
*[[ | *[[Chat Control]] | ||
==References== | ==References== | ||