this post was submitted on 30 Nov 2024
126 points (99.2% liked)

Programming

17671 readers
156 users here now

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you're posting long videos try to add in some form of tldr for those who don't want to watch videos

Wormhole

Follow the wormhole through a path of communities [email protected]



founded 2 years ago
MODERATORS
 

Many might've seen the Australian ban of social media for <16 y.o with no idea of how to implement it. There have been mentions of "double blind age verification", but I can't find any information on it.

Out of curiosity, how would you implement this with privacy in mind if you really had to?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 10 points 3 weeks ago (1 children)

All I can think of are some variations of you trusting a service to validate your id and give you a token that just asserts your id has been validated.

But it's still not really privacy preserving because it relies on trusting both parties to not collaborate against your privacy. if at some point the id provider decides to start keeping records of what tokens were generated from your id, and the service provider tracking what was consumes with that token, then you can still put it all back together.

[–] [email protected] 1 points 3 weeks ago (1 children)

That's when you add an extra ~~point of failure~~ validator.
Server 1 generates a token for server 2 to validate.
You send the token to server 2, who validates and generates you a token for server 3. Then finally server 3 validates the token and grants/denies your access.

The more nodes you have across different countries, the harder it is for the last server to discover your identity.

Definitely not without its flaws, but I wonder if a decentralised node setup similar to the tor network could work.

[–] [email protected] 2 points 3 weeks ago (1 children)

Could we add a blockchain somewhere? They're really good with the investors.

[–] [email protected] 2 points 3 weeks ago (1 children)

We can, but blockchain is old technology.
We should use an LLM to create and verify the tokens.

[–] [email protected] 1 points 3 weeks ago

Oh, right, I haven't been keeping up it seems.