Age verification: Difference between revisions
m added EU to the affected countrys by the OSA, even doe not UK based. |
m wp-link |
||
| (9 intermediate revisions by 4 users not shown) | |||
| Line 2: | Line 2: | ||
{{See also|Forced identification|De-anonymization}} | {{See also|Forced identification|De-anonymization}} | ||
'''Age Verification''' (AV), also referred to as '''Age Affirmation''' (AA), is the process in where a business requires some form of identification to verify your age. This is usually done for more explicit or mature content. This practice has been widely spreading since the [[UK Online Safety Act|UK's Online Safety Act (OSA)]] has passed; requiring all individuals to verify themselves before accessing mature content. Ways of checking age include, but are not limited to: checking for a valid credit card, facial age estimation tools, government-issued ID, biometric data, account history behavior, and more. | '''[[wikipedia:Age_verification|Age Verification]]''' (AV), also referred to as '''Age Affirmation''' (AA) and '''Age gating''', is the process in where a business requires some form of identification to verify your age. This is usually done for more explicit or mature content. This practice has been widely spreading since the [[UK Online Safety Act|UK's Online Safety Act (OSA)]] has passed; requiring all individuals to verify themselves before accessing mature content. Ways of checking age include, but are not limited to: checking for a valid credit card, facial age estimation tools, government-issued ID, biometric data, account history behavior, and more. | ||
As of December 2025, 25 US States require websites with mature content to verify age.<ref>{{Cite web |title=State Age Verification Laws - Action Center |url=https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/ |url-status=live |access-date=2025-12-22 |archive-url=https://web.archive.org/web/20251228121257/https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/ |archive-date=2025-12-28 }}</ref> | As of December 2025, 25 US States require websites with mature content to verify age.<ref>{{Cite web |title=State Age Verification Laws - Action Center |url=https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/ |url-status=live |access-date=2025-12-22 |archive-url=https://web.archive.org/web/20251228121257/https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/ |archive-date=2025-12-28 }}</ref> | ||
| Line 8: | Line 8: | ||
==How it works== | ==How it works== | ||
When accessing a platform or website that may contain content not suitable for all audiences may force you to register for the platform along with verifying your age by one of the methods mentioned previously. Sites that likely don't use any form of account system will probably have a popup instead requiring you to verify your age before even serving the content you were trying to access. | When accessing a platform or website that may contain content not suitable for all audiences may force you to register for the platform along with verifying your age by one of the methods mentioned previously. Sites that likely don't use any form of account system will probably have a popup instead requiring you to verify your age before even serving the content you were trying to access. | ||
New legislation now mandates [[wikipedia:Operating_system|operating systems (OS)]] to block the user until they verify their age. This is done "for convenience" so that apps and websites don't individually prompt the user, instead those apps/websites can just query the platform (e.g. OS, web-browser, etc...) without the user noticing. | |||
==Why is this a problem?== | ==Why is this a problem?== | ||
The Online Safety Act is already exerting extraterritorial control through the age‑verification and validation changes it prompts, which are being implemented in the U.S. even though those companies customer bases are not at all subject to UK law, even Europeans that are also not under UK law are affected. This stems from the Act’s vague, overly broad language requiring companies to comply whenever users are located in the UK. Because the law effectively ignores national borders, non‑UK companies face only two options: geo‑block affected content for UK users or apply the same verification measures globally. | The Online Safety Act is already exerting extraterritorial control through the age‑verification and validation changes it prompts, which are being implemented in the U.S. even though those companies customer bases are not at all subject to UK law, even Europeans that are also not under UK law are affected. This stems from the Act’s vague, overly broad language requiring companies to comply whenever users are located in the UK. Because the law effectively ignores national borders, non‑UK companies face only two options: geo‑block affected content for UK users or apply the same verification measures globally. | ||
Geo‑blocking would severely disrupt services and business relationships that where already in place with UK customers before the Online Safety Act, so many companies choose to implement the changes for all users resulting in practical overreach beyond the UK. A reason for this is Ofcoms<ref>{{Cite web |date=2025-01-31 |title=What is Ofcom? |url=https://www.ofcom.org.uk/about-ofcom/what-we-do/what-is-ofcom |url-status=live |access-date=2026-04-07 |website= | Geo‑blocking would severely disrupt services and business relationships that where already in place with UK customers before the Online Safety Act, so many companies choose to implement the changes for all users resulting in practical overreach beyond the UK. A reason for this is Ofcoms<ref>{{Cite web |date=2025-01-31 |title=What is Ofcom? |url=https://www.ofcom.org.uk/about-ofcom/what-we-do/what-is-ofcom |url-status=live |access-date=2026-04-07 |website=[[Ofcom]]}}</ref> statutory powers to require platforms to use “accredited technology” to detect illegal content. As such systems would have to be implemented onto all the content this again would be an overreach of their precieved authorities. Companys that do not comply are already beeing fined for this. | ||
Even if the UK Government has “paused” its demand for implementing “accredited technologys” there is no practical way to meet the vague requirement set out by Ofcom in the Online Safety Act. The proposal ignores that smaller companies would likely be forced to close under the financial burden of compliance, producing a sterilized market with reduced competition only firms with deep pockets can comply. That still does not prevent Ofcom from fining companies that fail to comply. | Even if the UK Government has “paused” its demand for implementing “accredited technologys” there is no practical way to meet the vague requirement set out by Ofcom in the Online Safety Act. The proposal ignores that smaller companies would likely be forced to close under the financial burden of compliance, producing a sterilized market with reduced competition only firms with deep pockets can comply. That still does not prevent Ofcom from fining companies that fail to comply. | ||
| Line 18: | Line 20: | ||
Examples: | Examples: | ||
Webpage 4chan: | Webpage 4chan<ref>{{Cite web |date=2025-06-10 |title=Investigation into 4chan and its compliance with duties to protect its users from illegal content |url=https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/investigation-into-4chan-and-its-compliance-with-duties-to-protect-its-users-from-illegal-content |url-status=live |website=[[Ofcom]]}}</ref> | ||
https://www.ofcom.org.uk/online-safety/ | AVS GROUP LIMITED<ref>{{Cite web |date=2025-07-31 |title=Investigation into AVS Group Ltd’s compliance with the duty to prevent children from encountering pornographic content through the use of age assurance |url=https://www.ofcom.org.uk/online-safety/protecting-children/investigation-into-avs-group-ltds-compliance-with-the-duty-to-prevent-children-from-encountering-pornographic-content-through-the-use-of-age-assurance |url-status=live |website=[[Ofcom]]}}</ref> | ||
The provider of Im.ge<ref>{{Cite web |date=2025-06-10 |title=Investigation into the provider of Im.ge and its compliance with duties to protect its users from illegal content |url=https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/investigation-into-the-provider-of-im.ge-and-its-compliance-with-duties-to-protect-its-users-from-illegal-content |url-status=live |website=[[Ofcom]]}}</ref> | |||
https://www.ofcom.org.uk/online-safety/protecting-children/investigation-into- | Youngtek Solutions Ltd<ref>{{Cite web |date=2025-09-11 |title=Investigation into Youngtek Solutions Ltd’s compliance with the duty to prevent children from encountering pornographic content through the use of age assurance |url=https://www.ofcom.org.uk/online-safety/protecting-children/investigation-into-youngtek-solutions-ltds-compliance-with-the-duty-to-prevent-children-from-encountering-pornographic-content-through-the-use-of-age-assurance |url-status=live |website=[[Ofcom]]}}</ref> | ||
===Customer Profiling=== | ===Customer Profiling=== | ||
Having companies easily able to identify you means they can track you more efficiently and sell that shared profile to other companies such as ad agencies that then start targeting you specifically. | Having companies easily able to identify you means they can track you more efficiently and sell that shared profile to other companies such as ad agencies that then start targeting you specifically. | ||
=== | ===Government overreach=== | ||
Governments can also more easily track online movements and find out who you are. Saying something that may go against their own agenda may end up with a police raid, heavy interrogation, and prison time.<ref>{{Cite news |last=Liu |first=John |date=2025-06-20 |title=China tightens internet controls with new centralized form of virtual ID |url=https://edition.cnn.com/2025/06/20/tech/china-censorship-internet-id-hnk-intl#:~:text=%E2%80%9CThis%20is%20a%20state%2Dled,an%20infrastructure%20of%20digital%20totalitarianism.%E2%80%9D |access-date=2025-09-04 |work=CNN |archive-url=https://web.archive.org/web/20250620233250/https://edition.cnn.com/2025/06/20/tech/china-censorship-internet-id-hnk-intl |archive-date=2025-06-20 }}</ref> | Governments can also more easily track online movements and find out who you are. Saying something that may go against their own agenda may end up with a police raid, heavy interrogation, and prison time.<ref>{{Cite news |last=Liu |first=John |date=2025-06-20 |title=China tightens internet controls with new centralized form of virtual ID |url=https://edition.cnn.com/2025/06/20/tech/china-censorship-internet-id-hnk-intl#:~:text=%E2%80%9CThis%20is%20a%20state%2Dled,an%20infrastructure%20of%20digital%20totalitarianism.%E2%80%9D |access-date=2025-09-04 |work=CNN |archive-url=https://web.archive.org/web/20250620233250/https://edition.cnn.com/2025/06/20/tech/china-censorship-internet-id-hnk-intl |archive-date=2025-06-20 }}</ref> | ||
| Line 60: | Line 55: | ||
Platforms already experience major losses and consumer distrust from data breaches that reveal information less sensitive than government-issued IDs or biometric data.<ref name=":1" /> A data breach involving information this sensitive will seriously damage a business, and the users even more so. As stated previously, users who foresee these privacy risks will turn away from platforms which implement the policy, and towards niche platforms. | Platforms already experience major losses and consumer distrust from data breaches that reveal information less sensitive than government-issued IDs or biometric data.<ref name=":1" /> A data breach involving information this sensitive will seriously damage a business, and the users even more so. As stated previously, users who foresee these privacy risks will turn away from platforms which implement the policy, and towards niche platforms. | ||
===Inaccuracy=== | |||
Researches about age verification software that estimates age via face scans are inaccurate, identifying children as adults or vice versa. These inaccurate estimations might lead to have to use more privacy-invasive methods like submitting a picture of a personal ID. {{Citation needed}} | |||
==Examples== | ==Examples== | ||