{"id":51198,"date":"2026-03-09T20:32:15","date_gmt":"2026-03-10T00:32:15","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=51198"},"modified":"2026-03-17T14:21:59","modified_gmt":"2026-03-17T18:21:59","slug":"the-age-verification-trap","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2026\/03\/09\/the-age-verification-trap\/","title":{"rendered":"The Age Verification Trap"},"content":{"rendered":"<p><a href=\"https:\/\/spectrum.ieee.org\/age-verification\">Waydell D. Carvalho<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=47122715\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/spectrum.ieee.org\/age-verification\">\n<p>In cases when regulators demand real enforcement rather than symbolic rules, platforms run into a basic technical problem. The only way to prove that someone is old enough to use a site is to collect <a href=\"https:\/\/spectrum.ieee.org\/tag\/personal-data\">personal data<\/a> about who they are. And the only way to prove that you checked is to keep the data indefinitely. Age-restriction laws push platforms toward intrusive verification systems that often directly conflict with modern data-privacy law.<\/p>\n<p>This is the age-verification trap. Strong enforcement of age rules undermines <a href=\"https:\/\/spectrum.ieee.org\/tag\/data-privacy\">data privacy<\/a>.<\/p><h2><\/h2>\n<p>[&#8230;]<\/p>\n<p>When disputes reach regulators or courts, the question is simple: Can minors still access the platform easily? If the answer is yes, authorities tell companies to do more. Over time, &ldquo;reasonable steps&rdquo; become more invasive.<\/p><p>Repeated facial scans, escalating ID checks, and long-term logging become the norm. Platforms that collect less data start to look reckless by comparison. Privacy-preserving designs lose out to defensible ones.<\/p><p>This pattern is familiar, including online sales-tax enforcement. After courts settled that large platforms had an obligation to collect and remit sales taxes, companies began continuous tracking and storage of transaction destinations and customer location signals. That tracking is not abusive, but once enforcement requires proof over time, companies build systems to log, retain, and correlate more data. Age verification is moving the same way. What begins as a one-time check becomes an ongoing evidentiary system, with pressure to monitor, retain, and justify user-level data.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/developer.apple.com\/news\/?id=f5zj08ey\">Apple<\/a> (<a href=\"https:\/\/www.macrumors.com\/2026\/02\/24\/apple-updated-age-assurance-requirements\/\">MacRumors<\/a>):<\/p>\n<blockquote cite=\"https:\/\/developer.apple.com\/news\/?id=f5zj08ey\">\n<p>Today we&rsquo;re providing an update on the tools available for developers to meet their age assurance obligations under upcoming U.S. and regional laws, including in Brazil, Australia, Singapore, Utah, and Louisiana. Updates to the Declared Age Range API are now available in beta for testing.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/www.pcgamer.com\/software\/operating-systems\/a-new-california-law-says-all-operating-systems-including-linux-need-to-have-some-form-of-age-verification-at-account-setup\/\">Andy Edser<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=47181208\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.pcgamer.com\/software\/operating-systems\/a-new-california-law-says-all-operating-systems-including-linux-need-to-have-some-form-of-age-verification-at-account-setup\/\">\n<p>The government of California is implementing a law that requires operating system providers to implement some form of age verification into their account setup procedures.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/x.com\/LundukeJournal\/status\/2029212531194048660\">The Lunduke Journal<\/a>:<\/p>\n<blockquote cite=\"https:\/\/x.com\/LundukeJournal\/status\/2029212531194048660\">\n<p>Here&rsquo;s where each of the &ldquo;All Operating Systems must do age verification&rdquo; laws are as of today.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/blog.cryptographyengineering.com\/2026\/03\/02\/anonymous-credentials-an-illustrated-primer\/\">Matthew Green<\/a>:<\/p>\n<blockquote cite=\"https:\/\/blog.cryptographyengineering.com\/2026\/03\/02\/anonymous-credentials-an-illustrated-primer\/\">\n<p>This has bothered me, because every month that goes by I become more convinced that anonymous authentication the <em>most important <\/em>topic we could be talking about as cryptographers. This is because I&rsquo;m very worried that we&rsquo;re headed into a bit of a privacy dystopia, driven largely by bad legislation and the proliferation of AI.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/neilzone.co.uk\/2026\/03\/im-struggling-to-think-of-any-online-services-for-which-id-be-willing-to-verify-my-identity-or-age\/\">Neil<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=47232768\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/neilzone.co.uk\/2026\/03\/im-struggling-to-think-of-any-online-services-for-which-id-be-willing-to-verify-my-identity-or-age\/\">\n<p>I have yet to see a well-considered proposal.<\/p>\n<p>Worse, the question that they are trying answer is rarely stated clearly and concisely.<\/p>\n<p>And it is unusual to see any consideration of broader sociological issues, let alone an emphasis on this, with a focus instead on perceived &ldquo;quick win&rdquo; technosolutionism.<\/p>\n<p>But anyway&#8230;<\/p>\n<p>I was pondering last night for which services I, personally, would actually be willing to verify my age or identity.<\/p>\n<p>And&#8230; the answer is &ldquo;none&rdquo;.<\/p>\n<\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2026\/02\/20\/frances-social-media-ban\/\">France&rsquo;s Social Media Ban<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2026\/02\/20\/arizona-age-verification-bill\/\">Arizona Age Verification Bill<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2026\/01\/26\/uk-age-verification-for-vpns\/\">UK Age Verification for VPNs<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2026\/01\/13\/uk-child-protections-and-messaging-backdoor\/\">UK Child Protections and Messaging Backdoor<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2025\/12\/26\/texas-age-verification-suspended\/\">Texas Age Verification Suspended<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2025\/12\/17\/australias-social-media-ban\/\">Australia&rsquo;s Social Media Ban<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2025\/05\/23\/tim-cook-opposes-app-store-age-verification-bill\/\">Tim Cook Opposes App Store Age Verification Bill<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2025\/02\/28\/ios-declared-age-range-api\/\">iOS Declared Age Range API<\/a><\/li>\n<\/ul>\n\n<p id=\"the-age-verification-trap-update-2026-03-17\">Update (<a href=\"#the-age-verification-trap-update-2026-03-17\">2026-03-17<\/a>): <a href=\"https:\/\/www.cnbc.com\/2026\/03\/08\/social-media-child-safety-internet-ai-surveillance.html\">Barbara Booth<\/a> (via <a href=\"https:\/\/pxlnv.com\/linklog\/age-verification-surveillance\/\">Nick Heer<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.cnbc.com\/2026\/03\/08\/social-media-child-safety-internet-ai-surveillance.html\">\n<p>In many implementations, verification vendors &mdash; not the websites themselves &mdash; process and retain the identity information, returning only a pass-fail signal to the platform. <\/p><p>Gewirtz Little said Socure does not sell verification data and that in lightweight age-estimation scenarios, where platforms use quick facial analysis or other signals rather than government documentation, the company may store little or no information. But in fuller identity-verification contexts, such as gaming and fraud prevention that require ID scans, certain adult verification records may be retained to document compliance. She said Socure can keep some adult verification data for up to three years while following applicable privacy and purging rules.  <\/p>\n<p>Civil liberties&rsquo; advocates warn that concentrating large volumes of identity data among a small number of verification vendors can create attractive targets for hackers and government demands.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/github.com\/upper-up\/meta-lobbying-and-other-findings\">meta-lobbying-and-other-findings<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=47362528\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/github.com\/upper-up\/meta-lobbying-and-other-findings\">\n<p>An open-source intelligence investigation into how Meta Platforms built a multi-channel influence operation to pass age verification laws that shift regulatory burden from social media platforms onto Apple and Google&rsquo;s app stores.<\/p>\n<\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Waydell D. Carvalho (Hacker News): In cases when regulators demand real enforcement rather than symbolic rules, platforms run into a basic technical problem. The only way to prove that someone is old enough to use a site is to collect personal data about who they are. And the only way to prove that you checked [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2026-03-10T00:32:20Z","apple_news_api_id":"6b813d08-2042-4f91-a53f-af4226fc641e","apple_news_api_modified_at":"2026-03-17T18:22:04Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAA==","apple_news_api_share_url":"https:\/\/apple.news\/Aa4E9CCBCT5GlP69CJvxkHg","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[91,38,1979,2641,2896,1650,31,2741,209,2899,30,39,2742,2137,355,2897,2898],"class_list":["post-51198","post","type-post","status-publish","format-standard","hentry","category-technology","tag-appstore","tag-apple","tag-australia","tag-brazil","tag-california","tag-children","tag-ios","tag-ios-26","tag-legal","tag-louisiana","tag-mac","tag-macappstore","tag-macos-tahoe-26","tag-meta","tag-privacy","tag-singapore","tag-utah"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/51198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=51198"}],"version-history":[{"count":2,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/51198\/revisions"}],"predecessor-version":[{"id":51252,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/51198\/revisions\/51252"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=51198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=51198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=51198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}