• iii@mander.xyz
    link
    fedilink
    English
    arrow-up
    1
    ·
    17 hours ago

    If it happens at scale, it will be flagged pretty quickly.

    How? In a correct implementation, the 3rd parties only receive proof-of-age, no identity. How will re-use and sharing be detected?

    • General_Effort@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      15 hours ago

      There are 3 parties:

      1. the user
      2. the age-gated site
      3. the age verification service

      The site (2) sends the request to the user (1), who passes it on to the service (3) where it is signed and returned the same way. The request comes with a nonce and a time stamp, making reuse difficult. An unusual volume of requests from a single user will be detected by the service.

      • iii@mander.xyz
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        7 hours ago

        from a single user

        Neither 2 nor 3 should receive information about the identity of the user, making it difficult to count the volume of requests by user?