Rudxain (talk | contribs)
ClippyWantsToHelp (talk | contribs)
No edit summary
 
Line 68: Line 68:
Recent studies evidenced practices done by the Online Safety Act legislation are poorly effective as many users managed to reach to VPNs and bypasses in order to protect their privacy online {{Citation needed}}. Children might use their parents' IDs or credit cards to circumvent the systems and have access to mature content. {{Citation needed}}  
Recent studies evidenced practices done by the Online Safety Act legislation are poorly effective as many users managed to reach to VPNs and bypasses in order to protect their privacy online {{Citation needed}}. Children might use their parents' IDs or credit cards to circumvent the systems and have access to mature content. {{Citation needed}}  


 
===Limitation of control over owned devices===
===Anti-ownership practices and limitation of control over the device===
Age verification methods that are done at the operating system level, such as how it is done on [[Apple introduces OS-level age verification|iOS]] in some regions, prevent the device owner, even if they're an adult, to freely use their device unless they send sensitive data online. This also prevents parents from configuring their children's devices to their liking or to create different profiles in case a device is used by multiple people.{{Citation needed}}
Age verification methods that are done at the operating system level, such as how it is done on [[Apple introduces OS-level age verification|iOS]] in some regions, prevent the device owner, even if they're an adult, to freely use their device unless they send sensitive data online. This also prevents parents from configuring their children's devices to their liking or to create different profiles in case a device is used by multiple people.{{Citation needed}}


Line 76: Line 75:


==Methods==
==Methods==
There are various methods used to verify and check the age of an user, but these are the most common:
There are various methods used to verify and check the age of an user, being these the most common ones:


*'''Age attestation''': Consists of establishing the user's birthdate on their account or profile.
*'''ID check''': The most privacy-invasive method and the riskiest of all. It consists of sending a picture of a government-issued ID, a passport or a drivers licence.
*'''ID check''': The most privacy-invasive method and the riskiest of all. It consists of sending a picture of a government-issued ID, a passport or a drivers licence.
*'''Live selfie''': It consists of a live recording of the user's face. It has been questioned for its effectiveness and accuracy.
*'''Live selfie''': It consists of a live recording of the user's face. It has been questioned for its effectiveness and accuracy.
*'''Credit card check''': Less privacy-invasive than an ID check or a live selfie, but very problematic because of potential card theft if a data leak occurs.
*'''Credit card check''': Less privacy-invasive than an ID check or a live selfie, but very problematic because of potential card theft if a data leak occurs.
*'''Behavior prediction''': Used by some social media to estimate the user's age by its behavior on the platform using algorithms.
*'''Behavior prediction''': Used by some social media to estimate the user's age by its behavior on the platform using algorithms.


==Examples==
==Examples==