There are a lot of GOP-controller legislatures in the USA pushing through so-called “child protection” laws, but there’s a toll in the form of impacting people’s rights and data privacy. Most of these bills involve requiring adults to upload a copy of their photo ID.

  • @sbv@sh.itjust.works
    link
    fedilink
    5
    edit-2
    11 months ago

    If the government really wanted to, it could provide citizens with a portal that would do oauth (or something similar) to authorize the porn access.

    They could do some crypto crap to avoid storing anything about the citizen, so, unless the system is subborned, it doesn’t store anything about users.

    EDIT: the point is that this kind of system can be implemented in a privacy-preserving manner. I’m ambivalent about the idea, but it has been enacted by a democratically elected government, so they should go about it in the most responsible manner possible.

    • @buckykat
      link
      2411 months ago

      No. Absofuckinglutely not.

        • @buckykat
          link
          1811 months ago

          No. Open Source does not make violations of freedom somehow okay.

          • Rikudou_Sage
            link
            fedilink
            111 months ago

            I thought it was obvious, but I guess I’m gonna go step-by-step. So, what’s needed to verify if you’re 18? Exactly one thing - a flag telling the other system yes/no! Very privacy friendly, porn site doesn’t know anything else about you. And obviously the auth system shouldn’t log that you verified for a porn site. That’s why it should be open source, so you can trust it.

            • @buckykat
              link
              6
              edit-2
              11 months ago

              The auth system knows you verified for something. The only way to actually preserve privacy is total anonymity to everyone.

              • Rikudou_Sage
                link
                fedilink
                111 months ago

                Nope, it doesn’t. Did you read what I wrote or did you just have a knee-jerk reaction?

                  • Rikudou_Sage
                    link
                    fedilink
                    111 months ago

                    What good is it for the system to know, if the system disregards that information right after auth? Effectively it’s like no one ever knew.

                • @buckykat
                  link
                  311 months ago

                  It is a basic tautological fact that you cannot verify an identity while keeping that identity private from the verifier.

                  • Rikudou_Sage
                    link
                    fedilink
                    111 months ago

                    Then you don’t know much about IT. Sure, the verifier must know your identity at the point of identification. Doesn’t mean it has to store any information about what you did. Unless of course you’re worried that the PC itself will magically come to life and do something with the information. In that case you need an entirely different kind of help. Source for my claims: Designing system architecture is literally my job.

            • Aetherielle
              link
              fedilink
              511 months ago

              If it’s private and secure and isn’t linked to your identity, we will share it and it will be useless because everyone who shares the same login is the same over-18 person.
              If it is in any way linked to your identity, the data is online and a target for breach which will expose said identity.
              There is no realistic way to implement this which both actually does anything at all, AND does not require adding attack surface for breaches.

              • Rikudou_Sage
                link
                fedilink
                111 months ago

                Please reread what I wrote. And regarding attack surface, everything you use adds attack surface.

                • Aetherielle
                  link
                  fedilink
                  211 months ago

                  Please reread what I wrote. And regarding everything you use adding attack surface, that is the absolute best argument to not use an additional service such as the aforementioned 3rd party auth.
                  What are we doing here?

        • @sbv@sh.itjust.works
          link
          fedilink
          111 months ago

          Yeah. It’s possible, but I’m guessing there isn’t a will or an understanding of available tools.

    • @CAPSLOCKFTW@lemmy.ml
      link
      fedilink
      1311 months ago

      I disagree. I could literally put some porn in this very comment. So the fediverse needs a porn barrier, and every file hoster, we can’t allow TOR, there is porn, and illegal porn as well. So please show us your id before entering TOR, pls.

      It is an authoritarian move. It is undermining privacy. It is censoring the web.

      It is parents and maybe schools responsabilty to teach kids how to interact with media, that porn exists and is not an actual representation of sex, and to restrict their access to pornography or media in general.

      Furthermore, on planet earth, there are no perfect democracies, and the democratic system of the USA is flawed to a degree where it is at least questionable if your leaders are elected democratically.