• Fluffy Kitty Cat@slrpnk.net
    link
    fedilink
    English
    arrow-up
    24
    arrow-down
    3
    ·
    2 days ago

    There is no such thing as an age verification system that doesn’t either directly lead back to your ID or is useless because it can be easily circumvented. If the certificates can’t be traced back to you you can just hand them out to every teenager on the internet and you have a moral obligation to do so, and if they can it’s the same as uploading your ID just to fix your steps, including a database that can be hacked to reveal all of the connections to all of the things or be accessed by a malicious government to persecute people who watch gay porn or something

      • Fluffy Kitty Cat@slrpnk.net
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 day ago

        what’s to stop me from verifying people who aren’t me with them? I’ll hand out zero-knowledge proof tokens to anyone who asks if they can’t be traced back to me

        • prole@lemmy.blahaj.zone
          link
          fedilink
          arrow-up
          3
          ·
          1 day ago

          I’m not the right person to ask, as I only really have a basic, cursory understanding of how they work… But if they can prevent anyone except me from spending my Monero, I imagine someone could figure it out.

          • AnyOldName3@lemmy.world
            link
            fedilink
            arrow-up
            3
            ·
            1 day ago

            They can’t stop you giving your Monero keys to someone else, and then they can spend it, too. You not wanting other people to spend your Monero is key to it working, and that doesn’t necessarily apply if, e.g. you’ve got family or close friends you’d be willing to have a shared wallet with.

        • Ronno@feddit.nl
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 day ago

          Client side verification, that only shares the verification/proof thumbs up to the requestor, could work in such scenario. Very similar to digital payment cards such as seen in Apple Pay. You verify with your biometrics, anyone can only use it in that brief moment of time, but you cannot share that card. When paying, the device will only quickly check key details of that card to execute payment.

          • Fluffy Kitty Cat@slrpnk.net
            link
            fedilink
            English
            arrow-up
            6
            ·
            1 day ago

            Client side verification is easy to bypass, so that doesn’t work for anything. You just send back a firmly response with a modified app or something

    • Fabian@lemmy.zip
      link
      fedilink
      arrow-up
      5
      arrow-down
      11
      ·
      2 days ago

      It works using encryption so it can’t be traced back. But yes, you could technically share it with others

      • ChicoSuave@lemmy.world
        link
        fedilink
        arrow-up
        13
        ·
        2 days ago

        The problem isn’t hacking. It’s buying a license to use the aggregate data for things like training and user data hoarding. It’s all legal and buried in the fine print of B2B agreements and sometimes the EULA or a pop up under the guise of “convenience” or “security”. Users usually agree to being safer or living easier.