Hacker News new | past | comments | ask | show | jobs | submit login

Simple questions: CD or vinyl? That will identify everyone old enough to remember. Then the classic: how do you tame a horse in minecraft, which identifies everyone under 18.



Understand the trick, but think we all know people are clever, especially when they’re motivated, and bypassing systems like that would likely be trivial and even potentially result in the endpoints requiring age verification helping bypass them covertly.


The goal isnt to actually block children. They goal is to satisfy the corporations legal obligations: whatever scheme requires the least effort, the least information from the applicant, but still meets the minimum standard.

Better idea: webcam verification of government ID. Client-side/in-browser AI software matches only name and birthday before passing OK to website. Zero information is actually transmited/stored. Patent please.


What is to stop someone from modifying chromium to always report "yes" in that case? Or is the idea that we will add another widevine style opaque binary blob to our system that handles this with an encrypted response that can't be examined by the user?


Nothing would stop someone from hacking the system if everything was client-side.


Not following, how would the system know the document was authentic without transmitting data; understand that client-side it would be easy to cross-reference the ID-face and Live-face and scan the barcode to extract any data attributes, such as age. Also, worth noting that assuming the individual had a smart phone, scanning document would likely provide no additional security and there numerous apps that provide real-time end user verification using biometrics.


Perfection is always the enemy of "good enough to meet legal oblugations". Compare the minimal ID checks for buying cigarettes ... or handguns.


This is not about perfection, as is, unless I missing something, your suggested solution does not solve the problem.

There are numerous ways for a system to authenticate a user without the endpoint requesting the authentication knowing who the user is — or the system verifying the user knowing what endpoint system is requesting the authentication; only the user knows both who they are and the endpoint they want access to.


If you attempted to set it to its dirtiest mode, the game Leisure Suit Larry would ask you a series of sports and pop culture questions from the 1970s in order to verify you were an adult (in the 1980s). Of course, kids just looked up the answers and swapped them on crib notes on the playground.


Somebody who was 10 when horses were added to minecraft is 19 now.

But minecraft has always been an "all ages" game, not a kids game. And it was first advertised/promoted on 4chan.


> CD or vinyl?

As someone who prefers tape I feel discriminated against.


You are. Tape is evil.


If having shock-resistant playback, analog audio, and easy recording is evil than call me Charles Manson, 'cause y'all can keep your record scratches and CD skips.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: