• General_Effort@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 day ago

    The key doesn’t have to be on your phone. You can just send it to some service to sign it, identifying yourself to that service in whatever way.

    • iii@mander.xyz
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      8 hours ago

      It’s that “whatever way” that is difficult. This proposal merely shifts the problem: now the login to that 3rd party can be shared, and age verification subverted.

      • General_Effort@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        8 hours ago

        A phone can also be shared. If it happens at scale, it will be flagged pretty quickly. It’s not a real problem.

        The only real problem is the very intention of such laws.

        • iii@mander.xyz
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 hours ago

          If it happens at scale, it will be flagged pretty quickly.

          How? In a correct implementation, the 3rd parties only receive proof-of-age, no identity. How will re-use and sharing be detected?

          • General_Effort@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            3 hours ago

            There are 3 parties:

            1. the user
            2. the age-gated site
            3. the age verification service

            The site (2) sends the request to the user (1), who passes it on to the service (3) where it is signed and returned the same way. The request comes with a nonce and a time stamp, making reuse difficult. An unusual volume of requests from a single user will be detected by the service.