this post was submitted on 26 Nov 2025
204 points (99.0% liked)

No Stupid Questions

44475 readers
506 users here now

No such thing. Ask away!

!nostupidquestions is a community dedicated to being helpful and answering each others' questions on various topics.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must be legitimate questions. All post titles must include a question.

All posts must be legitimate questions, and all post titles must include a question. Questions that are joke or trolling questions, memes, song lyrics as title, etc. are not allowed here. See Rule 6 for all exceptions.



Rule 2- Your question subject cannot be illegal or NSFW material.

Your question subject cannot be illegal or NSFW material. You will be warned first, banned second.



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That's it.



Rule 5- No baiting or sealioning or promoting an agenda.

Questions which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding META posts and joke questions.

Provided it is about the community itself, you may post non-question posts using the [META] tag on your post title.

On fridays, you are allowed to post meme and troll questions, on the condition that it's in text format only, and conforms with our other rules. These posts MUST include the [NSQ Friday] tag in their title.

If you post a serious question on friday and are looking only for legitimate answers, then please include the [Serious] tag on your post. Irrelevant replies will then be removed by moderators.



Rule 7- You can't intentionally annoy, mock, or harass other members.

If you intentionally annoy, mock, harass, or discriminate against any individual member, you will be removed.

Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.



Rule 8- All comments should try to stay relevant to their parent content.



Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- Majority of bots aren't allowed to participate here. This includes using AI responses and summaries.



Credits

Our breathtaking icon was bestowed upon us by @Cevilia!

The greatest banner of all time: by @TheOneWithTheHair!

founded 2 years ago
MODERATORS
 

To be clear, I'm not advocating for online age verification. I'm very much against it in any form. I'm just curious from a technical standpoint if it's possible somehow to construct an accurate age verification system that doesn't compromise a user's privacy? i.e., it doesn't expose the person's identity to anyone nor leaves behind a paper trail that can be traced to that person?

top 50 comments
sorted by: hot top controversial new old
[–] SorteKanin@feddit.dk 142 points 2 weeks ago (8 children)

In principle it should be possible to do a zero-knowledge proof.

This means that the website asking for age verification asks a yes/no question like "Is this user 18+?" and the age verification service (like a digital ID provided by the government or whatever) answers "yes" or "no" accordingly, but without telling anything else about the user. Also, the verification service should ideally not know who asked for the age verification.

So the site you want to visit only knows the thing they need to know: Whether you are 18+ or not. Nothing else. And the age verification service only knows somebody asked for age verification and provided the answer, but do not know which site you visited.

This is all possible, but I don't have high hopes this is the intended implementation of any government seeking age verification, so don't get your hopes up.

[–] birdwing@lemmy.blahaj.zone 25 points 2 weeks ago (2 children)

The one who asked the verification service also shouldn't know who the verification service is, imho.

[–] SorteKanin@feddit.dk 33 points 2 weeks ago (1 children)

I'm not sure that is feasible, because in order to trust the answer, I feel the asker must know and trust the one providing the answer. It sounds like you're imagining a system with many different ID providers? What prevents me from creating my own provider that just answers "Yes", even for people under 18? If the site asking does not know it is my fake ID service providing the answer, I'm not sure they can trust any answer.

But I won't pretend to be an expert on this topic, so perhaps it is feasible somehow.

[–] halcyoncmdr@lemmy.world 8 points 2 weeks ago

the asker must know and trust the one providing the answer.

This is possible if there's a central authority for that that everyone can agree to trust, like the government records directly. The issue is ensuring the rest of the chain remains anonymous so the only thing the authority gets is the request that an undisclosed service is verifying John Doe is 18+ and nothing else. And that's not something many governments are going to want to allow with the increasingly alarming amount of authoritarian leadership.

load more comments (1 replies)
[–] chicken@lemmy.dbzer0.com 22 points 2 weeks ago (1 children)

There are some pretty strong arguments that even zk proof is a flawed way of preserving privacy though, in a variety of ways. It prevents pseudonymity by enabling one-user-one-account, and it leaves users vulnerable to being coerced to reveal their full online activities by handing over cryptographic keys.

[–] Wren@lemmy.today 13 points 2 weeks ago (1 children)

Got ready to read some bullshit,

Vitalik Buterin

nevermind. But damn, what a great read. I haven't given much thought to on-chain ID in years and he lays it out pretty well. Still sounds like encrypted tokens are the way to go, but we all need to have multiple forms for it to protect anonymity.

[–] chicken@lemmy.dbzer0.com 6 points 2 weeks ago (1 children)

If there's one person who knows their applied zk proofs, it's that guy.

load more comments (1 replies)
[–] AtHeartEngineer@lemmy.world 8 points 2 weeks ago* (last edited 2 weeks ago)

I worked in this field for 3 years, a lot of the core parts are written, but there are a few key pieces missing and no one has taken it to real production.

You can use a passport in pretty much any country and prove you're over a certain age. Here is a demo: https://github.com/dog-18/dog18

The parts that are missing are primarily around making secure nullifiers, which prevents someone from reusing identities, but also without revealing any private information. We were pursuing research that allowed nullifier generation in MPC where none of the servers or the users knew the "salt" that their identity was hashed with, so no one could recover the original piece of unique data (like their passport number, even if a govt had a hunch about which passports signed up to a service) but it would also prevent them from signing up with multiple accounts. We got our funding cut pretty bad and management was a mess, so I left and that research I think was shut down. This really is the key part to actually make that viable in the real world though. It's maybe a year worth of research and a year worth of production left to make that practical.

[–] quick_snail@feddit.nl 4 points 2 weeks ago (1 children)

Does that mean the government sees all the sites I've visited?

[–] SorteKanin@feddit.dk 5 points 2 weeks ago

No, that's what I wrote as well. The identity service would not know what sites were visited or ideally not even how many sites were visited.

load more comments (4 replies)
[–] Zachariah@lemmy.world 57 points 2 weeks ago* (last edited 2 weeks ago) (5 children)

Even if it works, it’s a solution without a problem. If I can afford internet access, I am mature enough to see anything on the internet, and I am mature enough to decide which users can access my internet-connected network and whether they can have access to the whole internet. That’s all the age verification needed ever.

The request for age verification by each website is purely about unnecessary control and censorship.

load more comments (5 replies)
[–] ininewcrow@lemmy.ca 44 points 2 weeks ago (4 children)

The problem is not the system or the idea of age verification

The problem is that no one on earth can be trusted with that level of monitoring, control and power.

[–] edgemaster72@lemmy.world 17 points 2 weeks ago (2 children)

Nah you can totally trust me, I'm too lazy to do anything nefarious

[–] ininewcrow@lemmy.ca 13 points 2 weeks ago (1 children)

Great! .... the solution to our problems ... let's all trust edgemaster72

[–] edgemaster72@lemmy.world 15 points 2 weeks ago* (last edited 2 weeks ago) (2 children)

Oh, oh shit, this has backfired massively, I didn't think anyone would go along with it, that's way too much responsibility

[–] some_kind_of_guy@lemmy.world 9 points 2 weeks ago

This is precisely what the chosen one would say!

[–] original_reader@lemmy.zip 11 points 2 weeks ago

Wait until you have that power and you're made offers that are hard to resist.

load more comments (3 replies)
[–] groet@feddit.org 31 points 2 weeks ago (8 children)

Super easy. Technology has existed for quite some time and was already used in the encrpytion of web traffic.

Basically: you sign up with your "age verification institution" (ideally a service of your government because they have your ID anyway and no profit motive). This involves createing a private key (reaaaaaaaaaaly long password that is saved in a file on your device) and saving the public key with that institution. They also check your ID to ensure your identity and your age.

When you want to visit a 18+ website, the website sends you a nonce (loooooong random number). You take that nonce and send it to the verifier, along with a signature of your private key (and the age they want you verified against). The verifier verifies your signature using your public key. They then sign the nonce with their own private key, thereby verifying, that you, the owner of your private key (whos identity and age they have verified) are above the asked age theshould. You then send the signed nonce back to the 18+ website and they can verifiy the signature to confirm that a trusted age verifier has verified your age.

The site never has access to your identity and the verifier never knows which site you visited, only that you wanted to visit a website that wants to know if you are of a certain age.

(The corresponding technology was used for OCSP Stapling in TLS verification ... and has been discontinued last year because nobody was using it ...)

load more comments (8 replies)
[–] ameancow@lemmy.world 19 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

In my ideal world, it's not an issue because parents don't let kids under a certain age or demonstrated maturity level have computers in their room alone, and even better, they teach their kids how to not have problems with predators, porn, and the deluge of online weirdness and have open, honest talks about how some things are dangerous because they prey on you, some things are dangerous because they get you hooked on certain feelings, and some things are dangerous because they give you false impressions of the world and relationships.

We're about as close to that world as interstellar exploration, I know. Imagine having parents who you don't feel afraid to talk to about mature topics and personal matters.

And all that aside, why is it such a big deal that kids not see boobs but they can see violence and gore? Why is it magically okay for Timmy Neckbeard to watch strangle-fetish porn night and day as soon as he turns 18? Why do we scream about how porn is ruining kids minds but we're not taking down the grifting "masculinity influencers" with as much zeal as we're going after pornhub and other sites that are mostly just consenting adults doing fun biological acts together? Why do we say porn companies are evil and not do anything to make it less evil like better regulations and resources since we know people are going to find ways to make and view it anyway? (These aren't questions for Lemmy but I would sure love to see communities start asking these questions to their elected representatives.)

Our species' obsession with clear lines and labels is making us ignore where the actual problems are, we build fences around the outcomes not the sources. We create solutions to problems we don't even want to look at directly. It's like the government handing out umbrellas to combat the issue with the massive water main leak flooding the street.

load more comments (1 replies)
[–] Blackmist@feddit.uk 18 points 2 weeks ago

It can. Zero knowledge proofs have been around a while and are ideal for this.

They'll try not to have that because data gathering is what they're after, not keeping little Timmy from seeing some tits.

[–] DeathByBigSad@sh.itjust.works 15 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

Its possible.

Open source front-interfacing app + a secure element thing in the backgound.

You download an app. You verify your identity, then the app sets up a OTP thing with the shared secret seed lasting for 30 days. But every 30 seconds the OTP changes. Everyone doing a verification in these 30 days gets the same exact secret seed.

The seed hides in the secure element of your device. (it won't be impossible to extract, but the average kid is not gonna be able hack a secure element) Every 30 seconds, it releases the new OTP to the Open source app. The app doesn't connect to the internet once the OTP has already been set up. So nobody knows if you actually view the OTP code.

So the government only knows you have the verification OTP set up not which websites you visited, the website only knows you have a valid OTP from the government, but you could be any of the people in the past 30 days (which the company don't even have access to).

Even if the company and government cooperates, they could only pin down the time of website registration and that you are one of the millions of people that did the verification and requested a OTP Seed.

(Idk the exact terminology for these things, but hopefully I make sense)

[–] anton@lemmy.blahaj.zone 7 points 2 weeks ago

The seed hides in the secure element of your device. (it won't be impossible to extract, but the average kid is not gonna be able hack a secure element).

But only one person needs to "hack" it on their device to publish the key, allowing everyone to use it without "hacking" their own device.

You can't store a key on a device and keep it safe from the owner.

[–] blaggle42@lemmy.today 15 points 2 weeks ago (1 children)

Yes. Look up "zero knowledge proofs"

[–] blaggle42@lemmy.today 21 points 2 weeks ago (1 children)

I mean "no, look up zero knowledge proofs"

[–] Modern_medicine_isnt@lemmy.world 14 points 2 weeks ago (12 children)

Nope, you always need a middle man to do the verification. That middle man has too much information.

Also, if you could solve for the middle man, there is no way to know the user belongs to the ID. It can easily be stolen.

load more comments (12 replies)
[–] grandel@lemmy.ml 12 points 2 weeks ago* (last edited 2 weeks ago)

No, It should be a browser setting. If parental controls are enabled, access should be denied to the site.

[–] qevlarr@lemmy.world 11 points 2 weeks ago

It is possible, but the real goal is about removing anonymity altogether

[–] Natanael@infosec.pub 9 points 2 weeks ago (3 children)

Correct, as a cryptography nerd I can assure you that you MUST at minimum have a trusted verifier which met you in person at some point (such as whatever office you get your physical ID card at) and they have to have your information.

And then you're trusting both Secure Element hardware and fancy cryptography where both must be flawless in order to protect the end user's side of it, all while the end user now carries much more personal information with them than before

load more comments (3 replies)
[–] ComradePenguin@lemmy.ml 9 points 2 weeks ago (3 children)

Yes. There are many solutions.

Maybe the absolutely easiest to implement is just a signed message from an authority (gov.). You click a button on the website that requires verification, get a new tab to a gov. site with no identifiers from the site redirecting you and get a message you copy. The copied message is then pasted in to the site requiring verification. The site can then verify the message at their servers.

[–] Scirocco@lemmy.world 14 points 2 weeks ago* (last edited 2 weeks ago)

Hey benign and honorable govt!

Please tell the website "kill-your-govt .net" that I am old enough to join the revolution!!!

Kthxbai

edit: if this was pasted in both directions AND we trust that there is no identifying information in either 'secret' message, might work. Normies will not like the ctrl-c/ctrl-v workflow though.

[–] ameancow@lemmy.world 9 points 2 weeks ago (1 children)

That still creates a chain that can be followed. If the site you're trying to enter is ever compromised, there will be record of your government code and whatever tracking is used to verify that you have entered your code.

I would be happy if the government was not involved in my online activities at all but I guess that ship is about to sail.

load more comments (1 replies)
[–] DoctorPress@lemmy.zip 5 points 2 weeks ago (2 children)

This requires you to trust gov that they will not trace where the secret message is pasted.

load more comments (2 replies)
[–] daniskarma@lemmy.dbzer0.com 8 points 2 weeks ago* (last edited 2 weeks ago)

It's possible with certificates and 2fa issued by a government, which already have all your data, that would only verify that you are over 18.

We already have that in Spain, sort of. We have a government app where you have a digital id stored and you can make it create a verify qr that only shows if the user is over 18 or under 18, no more data. The qr only last 5 minutes active.

It is necessary? Not for internet access. That's a duty of the one paying for internet in the household, not the government. If they have underage kids under their responsibility it's their duty to make sure that they get good education about what to see and what not and restrict access if needed. Having the government to universally interfere everyone it's just plain bad.

[–] birdwing@lemmy.blahaj.zone 7 points 2 weeks ago* (last edited 2 weeks ago)

Zero-knowledge proof. Medium has a practical example, though unfortunately the article logs user data, so beware on that.

[–] Nighed@feddit.uk 7 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

The government knows who you are. They know your age, your address and know you exist (probably).

You go to a site that requires ages verification. You say:please verify me with the government portal. You go to that portal to get a temporary id code to give to the site. The website says to the gov portal give me the name and age of the user with this temp ID. You approve that access. Portal sends age (or an is over 16/18/21 etc flag) to the site.

  • Gov portal doesn't need to know who the site is.
  • You don't provide a unique ID to the website, just a temporary one.
  • as if codes are temporary, you must have access to the id/login now, not just at some point
  • Site only gets the data you approve/it requested,.not everything.

The process can do with some streamlining, but should work in practice?

load more comments (1 replies)
[–] ilinamorato@lemmy.world 5 points 2 weeks ago (13 children)

I'm inclined to say no. Reducing the problem down to its most basic parts: Alice is authorized to talk to Bob, but Bob doesn't know that. How can Alice prove it?

Bob has to assume that anyone asking to talk to him could be Mallory, who isn't authorized to talk to him but will always answer "yes" if asked whether she is. So the authorization he gets has to be from a trusted third party; it can't come from Alice.

Grace is a trusted third party. If Alice doesn't care about privacy, and is okay with Grace knowing that Alice talked to Bob and with Bob knowing Alice's identity, Alice can just tell Bob, "here's proof that I'm Alice. Show this to Grace and she'll confirm that I can be here." This is SSO, essentially.

If Alice doesn't want Bob to know who she is, but is ok with Grace knowing that Alice talked to Bob, she can ask Grace to give her a secret code, and give that code to Bob, who can check with Grace to know whether or not that code corresponds to someone who is authorized.

If Alice doesn't want Grace to know that she's talking to Bob, though, she runs into a problem. Because there's no way for Grace to send Bob a message without knowing who Bob is, he can't ask anonymously, and because there's no way for Grace to confirm that Alice is authorized without knowing who she is, Grace will always know that Alice has asked for authentication to talk to Bob.

Adding Dave in as a trusted fourth party could solve the problem—Alice asks Dave to check with Grace, and lock his answer in a bag with a unique key that only Dave has. Then Grace could give the bag to Bob, who doesn't need to know who Grace is to pass the bag to Dave and ask him to unlock it. But Alice would be trusting that Dave won't keep records on which bag corresponds to which person.

I don't think that's a surmountable problem. I'll have to think about it some more.

load more comments (13 replies)
[–] sharkfucker420@lemmy.ml 5 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

It's possible but it would defeat the purpose of age verification

load more comments (1 replies)
[–] quick_snail@feddit.nl 5 points 2 weeks ago

Yes, but your government doesn't want that.

[–] pdqcp@lemmy.dbzer0.com 4 points 2 weeks ago

Yes, it is, see quark ID as an example of decentralized open source project by the city of Buenos Aires, in Argentina, which leverages zero knowledge proofs:

https://quarkid.org/
https://github.com/ssi-quarkid

[–] Archangel1313@lemmy.ca 4 points 2 weeks ago (1 children)

It's only possible as long as you trust the people you're giving your information to. So...no.

load more comments (1 replies)
load more comments
view more: next ›