We’ve said it before: online age verification is incompatible with privacy. Companies responsible for storing or processing sensitive documents like drivers’ licenses are likely to encounter data breaches, potentially exposing not only personal data like users’ government-issued ID, but also information about the sites that they visit.

This threat is not hypothetical. This morning, 404 Media reported that a major identity verification company, AU10TIX, left login credentials exposed online for more than a year, allowing access to this very sensitive user data.

A researcher gained access to the company’s logging platform, “which in turn contained links to data related to specific people who had uploaded their identity documents,” including “the person’s name, date of birth, nationality, identification number, and the type of document uploaded such as a drivers’ license,” as well as images of those identity documents. Platforms reportedly using AU10TIX for identity verification include TikTok and X, formerly Twitter.

Lawmakers pushing forward with dangerous age verifications laws should stop and consider this report. Proposals like the federal Kids Online Safety Act and California’s Assembly Bill 3080 are moving further toward passage, with lawmakers in the House scheduled to vote in a key committee on KOSA this week, and California’s Senate Judiciary committee set to discuss AB 3080 next week. Several other laws requiring age verification for accessing “adult” content and social media content have already passed in states across the country. EFF and others are challenging some of these laws in court.

In the final analysis, age verification systems are surveillance systems. Mandating them forces websites to require visitors to submit information such as government-issued identification to companies like AU10TIX. Hacks and data breaches of this sensitive information are not a hypothetical concern; it is simply a matter of when the data will be exposed, as this breach shows.

Data breaches can lead to any number of dangers for users: phishing, blackmail, or identity theft, in addition to the loss of anonymity and privacy. Requiring users to upload government documents—some of the most sensitive user data—will hurt all users.

According to the news report, so far the exposure of user data in the AU10TIX case did not lead to exposure beyond what the researcher showed was possible. If age verification requirements are passed into law, users will likely find themselves forced to share their private information across networks of third-party companies if they want to continue accessing and sharing online content. Within a year, it wouldn’t be strange to have uploaded your ID to a half-dozen different platforms.

No matter how vigilant you are, you cannot control what other companies do with your data. If age verification requirements become law, you’ll have to be lucky every time you are forced to share your private information. Hackers will just have to be lucky once.

You are viewing a single thread.
View all comments
4 points

I agree with what you say, but how can we prevent kids to use those websites? Todays parents are too IT ignorant and they don’t know that they can protect their kids by using tools that they already have (parental control on smartphones and routers). So, how do we protect those kids? Pornography (for example) can do huge damage to kids.

permalink
report
reply
18 points
*

You guys do realize that porn has existed for generations right? You could get porn on the Internet back in like 1998. And before that people had magazines and vhs videos.

But for some reason people act like it’s some recent immergent phenomena that’s only NOW damaging kids. Makes no sense…

Just talk to your damn kids about sex. It’s not a big deal. Just be parents for Gods sake. Stop outsourcing your parenting responsibility to our dysfunctional and idiotic government, and corporations.

permalink
report
parent
reply
5 points

Guys, come on, in the '80/early '90 it was almost impossible to have access to porn, maybe some magazine found somewhere. Today a 10 years old can see porn video on a smartphone everytime he wants! You can’t say that it’s the same!

P.s. In my original message I didn’t say that I’m ok with that law, I was asking (to start a kind discussion) what other possibilities there are.

permalink
report
parent
reply
3 points

I’m in that age group. Kids had vhs and magazines. IMO the faces of death vhs going around was more scarring than any porn.

permalink
report
parent
reply
1 point

Nah. I’m in that age group. The kids around me had magazines and vhs. By the early-mid 90’s there was digital porn.

Sometime around 92 (I was leaving my tweens) my mom gave me a stack of magazines (pretty sure she thought I was gay or something). No sex talk. Just hey, have this stack of magazines (I refused out of embarrassment).

permalink
report
parent
reply
15 points
*

@peregus @ForgottenFlux

Education and trust. We should educate children and parents about the web, its advantages, and dangers. Parents need a starting point on what they can and can’t do to protect their children, and we (technical people) can provide them with best practices. We should also improve the mutual trust between children and their parents. If kids see something bad on the internet, they need to feel safe talking to their parents about it to get help instead of blame.

permalink
report
parent
reply
3 points

This sounds like the right answer at first, but really, the entire reason ID verification exists is because the whole “just parent your kids” thing already didn’t work, and now here we are. You can’t fix stupid, meanwhile the kids are still doing bad things, and everyone else doing nothing too, solves nothing.

permalink
report
parent
reply
5 points

Todays parents? No. The Boomer/Gen X parents of Millennials were also incredibly IT ignorant.

permalink
report
parent
reply
2 points

I know, but what were the risks there? There was no Internet! The firsts with wide Internet access were the late millennials.

permalink
report
parent
reply
5 points
*

I don’t know what you lived through, but there was wider internet access in the late 90s and early 00s that caused widespread panic amongst the boomers when I was a kid (born early 90s). I grew up in the era of the first social networks, MySpace being the biggest early one I remember. What surprises me more is that so many millennials have grown up to be just like their parents in that regard.

permalink
report
parent
reply
3 points

These laws don’t help when it’s insanely easy to install VPN clients on pretty much any device kids have access to. I have Adguard Home on our home network with the malicious and adult websites blocked. But still had a conversation with my kids about porn. And it turns out one of them had already been using a VPN on his phone and PC to bypass the local restrictions. We talked about it more, about being a good and safe “netizen” while discussing how unhealthy porn can be. I’m not anti-porn, but there is a lot of mistreatment of the people making it and can lead to some unhealthy misconceptions about sex and intimacy.

permalink
report
parent
reply

Privacy Guides

!privacyguides@lemmy.one

Create post

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more…


Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don’t ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don’t repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

Community stats

  • 725

    Monthly active users

  • 281

    Posts

  • 1.3K

    Comments