this post was submitted on 15 Apr 2026
398 points (96.9% liked)

Technology

83831 readers
3661 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] 5gruel@lemmy.world 3 points 14 hours ago* (last edited 14 hours ago) (1 children)

Not sure that's necessarily true. I don't see why it couldn't work like this:

  1. request personal token from authority. it works similar to a certificate chain, your token is derived from a central certificate
  2. you store your token locally
  3. you visit an age-restricted website. you send your token (or a challenge encrypted with that token) back to the website
  4. the website verifies your token with the certificate from the authority, (like how literal Certificate Authorities work) . the CA doesn't know when or why your token was used.

(fwiw I am sure governments will try their best to make this process less private)

[โ€“] wewbull@feddit.uk 2 points 14 hours ago* (last edited 14 hours ago)

Your step 4 will make the token reusable, or at least reusable within a time frame. If a token can only be used once there has to be some information flow back to a central approval authority.