this post was submitted on 06 Aug 2023
122 points (88.1% liked)

Asklemmy

43438 readers
1403 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_[email protected]~

founded 5 years ago
MODERATORS
 

There are a lot of GOP-controller legislatures in the USA pushing through so-called “child protection” laws, but there’s a toll in the form of impacting people’s rights and data privacy. Most of these bills involve requiring adults to upload a copy of their photo ID.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 31 points 1 year ago (2 children)

There's no way for a government to do it that wouldn't interfere with adults' privacy.

[–] [email protected] 4 points 1 year ago (1 children)

There technically is, but it's going to be a while until the government is ok with it. It's called zero knowledge cryptography, where a user could prove they have an identification that is government issued, and that they are of age, without revealing any other information.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

There’s a vanishingly small chance that the government wouldn’t fuck that up. Here is what would happen:

  • bill gets signed
  • no bid contract is assigned to a technology firm with a history of incompetence at everything other than lobbying for billions of dollars
  • 3-letter agencies secretly inject back door stipulations into the system so that they can keep spying on everyone
  • years late and at double the budget, it releases
  • two months later, someone shows off the secret backdoor keys at DEFCON, along with instructions on how to dump the access database
  • years of extortion material for spy agencies and organized crime around the world
  • zero children protected: they learn an ancient technology called “torrenting”
  • new calls for even more draconian control of information to save the children from sexy terrorists
[–] [email protected] 1 points 1 year ago

Internet companies that are forced to take people's personal information could do it at their cost