| ▲ | Noaidi 7 hours ago | ||||||||||||||||
Whatever happened to all the innovation the tech world was capable of? This is 100% a solvable problem. It only needs the will and good law. 1) Person signs up with discord with fake name and fake email. 2) Discord asks (state system) for an age validation. 3) In pop up window, state validates the persons age with ID matching with face recognition. 3) State system sends token to discord with yes or no with zero data retention in the state records. 4) Discord takes action on the account. What is so hard about this? | |||||||||||||||||
| ▲ | tolmasky 7 hours ago | parent [-] | ||||||||||||||||
I want to sincerely ask whether you read my post, because your response is so unrelated I believe you might accidentally be responding to another post? If so, please ignore the rest, which is only intended in the case where you are actually responding to what I wrote. Your system seems to address none of the issues I listed. For example, I argue that one difficulty is in the fact that these systems would be highly phishable -- a property that is present in your described "easy" solution. Your system trains users to become accustomed to being pestered by pop up windows that ask to see their ID and use their camera. Congrats, I can now trivially make a pop up a window that looks like this UI and use it to steal your info, as the user will just respond on auto-drive, as we have repeatedly shown both in user studies and in our own lived experiences. I also explained how a system like this would assist in the practice of trapping migrant workers by confiscating their government credentials [1]. This is a huge problem today in Asia, and one of the few outlets captive workers can use to escape this control is the internet -- a "loophole" your system would dutifully close for these corporations. I am happy to have a discussion about this -- it's how we come up with new solutions! But that requires reading and responding to the concerns I brought up, not assuming that my issue is that I can't imagine implementing a glorified OAuth login flow. 1. There's tons of articles about this, here is one of the first ones that comes up on Google: https://www.amnesty.org/en/latest/news/2025/05/saudi-arabia-... | |||||||||||||||||
| |||||||||||||||||