There are a lot of GOP-controller legislatures in the USA pushing through so-called “child protection” laws, but there’s a toll in the form of impacting people’s rights and data privacy. Most of these bills involve requiring adults to upload a copy of their photo ID.

      • buckykat
        link
        fedilink
        arrow-up
        18
        ·
        1 year ago

        No. Open Source does not make violations of freedom somehow okay.

        • Rikudou_Sage@lemmings.world
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          I thought it was obvious, but I guess I’m gonna go step-by-step. So, what’s needed to verify if you’re 18? Exactly one thing - a flag telling the other system yes/no! Very privacy friendly, porn site doesn’t know anything else about you. And obviously the auth system shouldn’t log that you verified for a porn site. That’s why it should be open source, so you can trust it.

          • buckykat
            link
            fedilink
            arrow-up
            6
            ·
            edit-2
            1 year ago

            The auth system knows you verified for something. The only way to actually preserve privacy is total anonymity to everyone.

              • buckykat
                link
                fedilink
                arrow-up
                3
                ·
                1 year ago

                It is a basic tautological fact that you cannot verify an identity while keeping that identity private from the verifier.

                • Rikudou_Sage@lemmings.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  1 year ago

                  Then you don’t know much about IT. Sure, the verifier must know your identity at the point of identification. Doesn’t mean it has to store any information about what you did. Unless of course you’re worried that the PC itself will magically come to life and do something with the information. In that case you need an entirely different kind of help. Source for my claims: Designing system architecture is literally my job.

                  • buckykat
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    1 year ago

                    No verifier can ever be trusted. The only way to have privacy is anonymity.

          • Aetherielle@kbin.social
            link
            fedilink
            arrow-up
            5
            ·
            1 year ago

            If it’s private and secure and isn’t linked to your identity, we will share it and it will be useless because everyone who shares the same login is the same over-18 person.
            If it is in any way linked to your identity, the data is online and a target for breach which will expose said identity.
            There is no realistic way to implement this which both actually does anything at all, AND does not require adding attack surface for breaches.

              • Aetherielle@kbin.social
                link
                fedilink
                arrow-up
                2
                ·
                1 year ago

                Please reread what I wrote. And regarding everything you use adding attack surface, that is the absolute best argument to not use an additional service such as the aforementioned 3rd party auth.
                What are we doing here?

      • sbv@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        Yeah. It’s possible, but I’m guessing there isn’t a will or an understanding of available tools.

    • sbv@sh.itjust.works
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      Your original post said the last can’t be implemented in a privacy preserving manner. It can.