| ▲ | Aurornis 6 hours ago | ||||||||||||||||||||||
This comes up in every thread, but the purpose of the laws is not to verify that someone can access an anonymous token. If we had a true anonymous token system then everyone would just share tokens around. The real world analog would be if you could buy beer at the store with anyone's ID because they didn't make any effort to reasonably check that the ID was yours or discourage people from sharing or copying IDs. The systems enforce identity checking because that's the only way age verification can be done without having some reason to discourage or detect credential sharing. The retort that follows is always "Well it's not perfect. Nothing is perfect." The trap is convincing ourselves that a severely imperfect system would be accepted. What would really happen is that it would be the trojan horse to get everyone on board with age verification, then the laws would be changed to make them more strict. | |||||||||||||||||||||||
| ▲ | miloignis 6 hours ago | parent | next [-] | ||||||||||||||||||||||
Matthew Green talks about this in his blog on the subject: https://blog.cryptographyengineering.com/2026/03/02/anonymou... The two methods that seem feasible are making it hard to copy (putting it in the secure element in your phone, for example, which I don't love) or doing tokens that can only be used a limited number of times per day, like in : https://eprint.iacr.org/2006/454 | |||||||||||||||||||||||
| ▲ | an hour ago | parent | prev | next [-] | ||||||||||||||||||||||
| [deleted] | |||||||||||||||||||||||
| ▲ | goda90 6 hours ago | parent | prev | next [-] | ||||||||||||||||||||||
Make it a duplication resistant hardware token that you can get for free then. The stakes just aren't high enough to worry about these kinds of edge cases. | |||||||||||||||||||||||
| |||||||||||||||||||||||
| ▲ | nitwit005 4 hours ago | parent | prev [-] | ||||||||||||||||||||||
Continuous age verification isn't possible, so you'll have to store some sort of proof of age somewhere, and that proof will always be sharable. Let's say Facebook has verified my age somehow. I could share my Facebook login credentials, or the token that their authorization server sends back in response. You can create some hurdles to doing that, like requiring a second factor, but I can just share that too. You might as well go down the route of accepting that possibility. These systems are never going to hold up in the face of a determined enough teenager. | |||||||||||||||||||||||
| |||||||||||||||||||||||