Jump to content

Age verification: Difference between revisions

From Consumer Rights Wiki
Petr (talk | contribs)
No edit summary
Raster (talk | contribs)
m Added archive for rest of links (ScienceDirect screamed and kicked away archive services, so archive is a File: screenshot.)
Line 30: Line 30:
Big platforms can be regulated and forced to comply with applicable laws since they need to have infrastructure such as servers in all major markets. Only these will be affected by the age restriction requirement.
Big platforms can be regulated and forced to comply with applicable laws since they need to have infrastructure such as servers in all major markets. Only these will be affected by the age restriction requirement.


However, users who do not wish to compromise their privacy or who are not of age will then go looking towards smaller niche platforms, often in other regions not affected by the regulation or the darknet.<ref name=":1">{{Cite web |last=Kaleta |first=Miroslav |date=2025-08-20 |title=The Cost of Data Privacy Negligence (And How to Avoid It) |url=https://countly.com/blog/data-privacy-negligence#:~:text=2.%20Losing%20Customer,IBM%20Report. |access-date=2025-09-04 |website=Countly Blog}}</ref> With these offerings, there is little to no leverage with regards to removal of illegal content. Increased exposure to illegal content can then lead to both a strengthening of illegal content providers<ref>{{Cite web |last=Branley |first=Dawn |last2=Covey |first2=Judith |date=2016-06-06 |title=Is exposure to online content depicting risky behavior related to viewers' own risky behavior offline? |url=https://www.sciencedirect.com/science/article/pii/S0747563217303357 |access-date=2025-09-04 |website=ScienceDirect}}</ref> and significantly increased danger to minors, who may not yet be able to differentiate between legal and illegal content as well as an adult.<ref>{{Cite web |date=2024-04 |title=Potential risks of content, features, and functions: The science of how social media affects youth |url=https://www.apa.org/topics/social-media-internet/youth-social-media-2024 |url-status=live |archive-url=https://web.archive.org/web/20240416042251/https://www.apa.org/topics/social-media-internet/youth-social-media-2024 |archive-date=2024-04-16 |access-date=2025-09-04 |website=American Psychological Association}}</ref>
However, users who do not wish to compromise their privacy or who are not of age will then go looking towards smaller niche platforms, often in other regions not affected by the regulation or the darknet.<ref name=":1">{{Cite web |last=Kaleta |first=Miroslav |date=2025-08-20 |title=The Cost of Data Privacy Negligence (And How to Avoid It) |url=https://countly.com/blog/data-privacy-negligence#:~:text=2.%20Losing%20Customer,IBM%20Report. |url-status=live |archive-url=https://archive.is/OJSf5 |archive-date=2026-01-06 |access-date=2025-09-04 |website=Countly Blog}}</ref> With these offerings, there is little to no leverage with regards to removal of illegal content. Increased exposure to illegal content can then lead to both a strengthening of illegal content providers<ref>{{Cite web |last=Branley |first=Dawn |last2=Covey |first2=Judith |date=2016-06-06 |title=Is exposure to online content depicting risky behavior related to viewers' own risky behavior offline? |url=https://www.sciencedirect.com/science/article/pii/S0747563217303357 |url-status=live |archive-url=https://consumerrights.wiki/w/File:ArchiveScreenshot-www.sciencedirect.com_S0747563217303357.png |archive-date=2026-02-02 |access-date=2025-09-04 |website=ScienceDirect}}</ref> and significantly increased danger to minors, who may not yet be able to differentiate between legal and illegal content as well as an adult.<ref>{{Cite web |date= |title=Potential risks of content, features, and functions: The science of how social media affects youth |url=https://www.apa.org/topics/social-media-internet/youth-social-media-2024 |url-status=live |archive-url=https://web.archive.org/web/20240416042251/https://www.apa.org/topics/social-media-internet/youth-social-media-2024 |archive-date=2024-04-16 |access-date=2025-09-04 |website=American Psychological Association}}</ref> <!-- ScienceDirect is resistant to common archival tools, but work fine even on Librewolf. PDF? Screenshot of it?  -->


===Increased damage from data breaches===
===Increased damage from data breaches===
Platforms which implement age checks that require sensitive information such as a government-issued ID will likely be more of a target for cyber criminals.<ref>{{Cite web |date=2025-04-02 |title=Cybercriminals Target These Industries the Most – Here’s Why and How to Stay Safe |url=https://brandefense.io/blog/cybercriminals-target-these-industries/#:~:text=The%20Most%20Vulnerable%20Industries%20to,information%20stored%20within%20their%20networks. |access-date=2025-09-04 |website=Brandefense}}</ref> As more platforms comply with the age checks, it becomes more likely that a data breach on at least one of these platforms can reveal extremely sensitive information. In the case of a data breach, it can be catastrophic if users' sensitive information were exposed, which can likely result in identity theft.<ref>{{Cite web |last=Popov |first=Cristina |date=2023-03-22 |title=Why breaches can affect you long after they occur |url=https://www.bitdefender.com/en-us/blog/hotforsecurity/why-breaches-can-affect-you-long-after-they-occur#:~:text=%232%3A%20Breaches%20can,for%20online%20accounts. |access-date=2025-09-04 |website=Bitdefender}}</ref>
Platforms which implement age checks that require sensitive information such as a government-issued ID will likely be more of a target for cyber criminals.<ref>{{Cite web |date=2025-04-02 |title=Cybercriminals Target These Industries the Most – Here’s Why and How to Stay Safe |url=https://brandefense.io/blog/cybercriminals-target-these-industries/#:~:text=The%20Most%20Vulnerable%20Industries%20to,information%20stored%20within%20their%20networks. |url-status=live |archive-url=https://archive.is/RTolc |archive-date=2026-02-02 |access-date=2025-09-04 |website=Brandefense}}</ref> As more platforms comply with the age checks, it becomes more likely that a data breach on at least one of these platforms can reveal extremely sensitive information. In the case of a data breach, it can be catastrophic if users' sensitive information were exposed, which can likely result in identity theft.<ref>{{Cite web |last=Popov |first=Cristina |date=2023-03-22 |title=Why breaches can affect you long after they occur |url=https://www.bitdefender.com/en-us/blog/hotforsecurity/why-breaches-can-affect-you-long-after-they-occur#:~:text=%232%3A%20Breaches%20can,for%20online%20accounts. |url-status=live |archive-url=https://archive.is/yCKkx |archive-date=2026-02-02 |access-date=2025-09-04 |website=Bitdefender}}</ref>


Platforms already experience major losses and consumer distrust from data breaches that reveal information less sensitive than government-issued IDs or biometric data.<ref name=":1" /> A data breach involving information this sensitive will seriously damage a business, and the users even more so. As stated previously, users who foresee these privacy risks will turn away from platforms which implement the policy, and towards niche platforms.
Platforms already experience major losses and consumer distrust from data breaches that reveal information less sensitive than government-issued IDs or biometric data.<ref name=":1" /> A data breach involving information this sensitive will seriously damage a business, and the users even more so. As stated previously, users who foresee these privacy risks will turn away from platforms which implement the policy, and towards niche platforms.

Revision as of 18:27, 1 February 2026

⚠️ Article status notice: This article has been marked as incomplete

This article needs additional work for its sourcing and verifiability to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues.

This notice will be removed once sufficient documentation has been added to establish the systemic nature of these issues. Once you believe the article is ready to have its notice removed, please visit the Moderator's noticeboard, or the discord and post to the #appeals channel.

Learn more ▼

Age Verification (AV), also referred to as Age Affirmation (AA), is the process in where a business requires some form of identification to verify your age. This is usually done for more explicit or mature content. This practice has been widely spreading since the UK's Online Safety Act (OSA) has passed; requiring all individuals to verify themselves before accessing mature content. Ways of checking age include, but are not limited to: checking for a valid credit card, facial age estimation tools, government-issued ID, biometric data, account history behavior, and more.

As of December 2025, 25 US States require websites with mature content to verify age.[1]

How it works

When accessing a platform or website that may contain content not suitable for all audiences may force you to register for the platform along with verifying your age by one of the methods mentioned previously. Sites that likely don't use any form of account system will probably have a popup instead requiring you to verify your age before even serving the content you were trying to access.

Why it is a problem

Privacy

Having companies easily able to identify you means they can track you more efficiently and sell that shared profile to other companies such as ad agencies that then start targeting you specifically.

Governments can also more easily track online movements and find out who you are. Saying something that may go against their own agenda may end up with a police raid, heavy interrogation, and prison time.[2]

Censorship

Certain topics, such as adult content, politics, and LGBT+ topics, will likely be unfairly censored by the governing body or company that has a say on what platform has the potential to be inappropriate for minors or other age groups.[3][4]

Platforms that host this type of content may also be more proactive in deleting/hiding posts that may get them in trouble or fined by laws or policies by local governments, leading to a more censored internet where opinions are streamlined to fit a set narrative or outlook.[4]

Increased inequality and denial of service

Some stores, such as grocery stores, prohibit young people from viewing their web sites or using loyalty cards, which provide discounts and digital coupons. Age verification means that young people and families where the young person does the shopping pay more for essentials like food.[5] Those who do not have ID, or do not chose to use it (for instance, those who fear domestic violence, or are members of a group subject to persecution) may also be locked out or have to pay more.

Storage of private and biometric Information by age verification service providers

A study commissioned by the Australian government found that age verification service providers accumulate a concerning amount of personal information, sometimes even biometric in nature, even when that was not necessary to provide the age verification service.[6][7]

Driving users towards smaller and completely unregulated offerings

Big platforms can be regulated and forced to comply with applicable laws since they need to have infrastructure such as servers in all major markets. Only these will be affected by the age restriction requirement.

However, users who do not wish to compromise their privacy or who are not of age will then go looking towards smaller niche platforms, often in other regions not affected by the regulation or the darknet.[8] With these offerings, there is little to no leverage with regards to removal of illegal content. Increased exposure to illegal content can then lead to both a strengthening of illegal content providers[9] and significantly increased danger to minors, who may not yet be able to differentiate between legal and illegal content as well as an adult.[10]

Increased damage from data breaches

Platforms which implement age checks that require sensitive information such as a government-issued ID will likely be more of a target for cyber criminals.[11] As more platforms comply with the age checks, it becomes more likely that a data breach on at least one of these platforms can reveal extremely sensitive information. In the case of a data breach, it can be catastrophic if users' sensitive information were exposed, which can likely result in identity theft.[12]

Platforms already experience major losses and consumer distrust from data breaches that reveal information less sensitive than government-issued IDs or biometric data.[8] A data breach involving information this sensitive will seriously damage a business, and the users even more so. As stated previously, users who foresee these privacy risks will turn away from platforms which implement the policy, and towards niche platforms.

Examples

  • Spotify's Age affirmation for MA rated songs and content.
  • Discord's Age verification for accounts determining what eligible servers are available.
  • Roblox's Age verification and account estimation algorithm for talking with users of similar age.

References

  1. "State Age Verification Laws - Action Center". Archived from the original on 2025-12-28. Retrieved 2025-12-22.
  2. Liu, John (2025-06-20). "China tightens internet controls with new centralized form of virtual ID". CNN. Archived from the original on 2025-06-20. Retrieved 2025-09-04.
  3. "Strict Age Verification Laws: Balancing Content Restriction and Educational Rights". Think Academy. 2025-09-01. Archived from the original on 2025-10-18. Retrieved 2025-09-04.
  4. 4.0 4.1 Kelley, Jason; Mackey, Aaron; Mullin, Joe (2024-02-15). "Don't Fall for the Latest Changes to the Dangerous Kids Online Safety Act". Electronic Frontier Foundation. Archived from the original on 2024-02-15. Retrieved 2025-09-04.
  5. Pell, Miranda (25 Oct 2024). "Tesco, Lidl and Sainsbury's shoppers issued warning over little-known 'age limit' rules". Manchester evening news. Archived from the original on 2025-10-21. Retrieved 20 Sep 2025.
  6. Meineck, Sebastian (2025-09-03). "Anbieter von Alterskontrollen horten biometrische Daten [Age Verification Providers are hoarding biometric Data]". Netzpolitik.org. Archived from the original on 2025-09-03. Retrieved 2025-09-03.
  7. Meineck, Sebastion (2025-09-03). "Anbieter von Alterskontrollen horten biometrische Daten [Google Translate English Version]". Netzpolitik.org. Archived from the original on 2025-10-23. Retrieved 2025-09-03.
  8. 8.0 8.1 Kaleta, Miroslav (2025-08-20). "The Cost of Data Privacy Negligence (And How to Avoid It)". Countly Blog. Archived from the original on 2026-01-06. Retrieved 2025-09-04.
  9. Branley, Dawn; Covey, Judith (2016-06-06). "Is exposure to online content depicting risky behavior related to viewers' own risky behavior offline?". ScienceDirect. Archived from the original on 2026-02-02. Retrieved 2025-09-04.
  10. "Potential risks of content, features, and functions: The science of how social media affects youth". American Psychological Association. Archived from the original on 2024-04-16. Retrieved 2025-09-04.
  11. "Cybercriminals Target These Industries the Most – Here's Why and How to Stay Safe". Brandefense. 2025-04-02. Archived from the original on 2026-02-02. Retrieved 2025-09-04.
  12. Popov, Cristina (2023-03-22). "Why breaches can affect you long after they occur". Bitdefender. Archived from the original on 2026-02-02. Retrieved 2025-09-04.