this post was submitted on 30 Nov 2024
128 points (99.2% liked)

Programming

17672 readers
52 users here now

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you're posting long videos try to add in some form of tldr for those who don't want to watch videos

Wormhole

Follow the wormhole through a path of communities [email protected]



founded 2 years ago
MODERATORS
 

Many might've seen the Australian ban of social media for <16 y.o with no idea of how to implement it. There have been mentions of "double blind age verification", but I can't find any information on it.

Out of curiosity, how would you implement this with privacy in mind if you really had to?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 15 points 3 weeks ago (1 children)

Doesn’t this assume the issuing agency has all employees who are morally sound and not leaking data, unnoticed by an internally badly designed system, which is designed by people who are out of touch? Most things like this are designed that way, irregardless of country .

I’m sure one can make it watertight but it’s so hard and still depends in trusting people. The conversation here is about one thing of a larger system. There are probably a hundred moving parts in any bureaucracy.

[–] [email protected] 36 points 3 weeks ago (2 children)

This is the understanding ANYWHERE. How do we know there aren’t back doors in our OS’s? We literally have no clue. We do THE BEST WE CAN using the clues we have.

[–] [email protected] 19 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

Yeah, these things quickly boil down to the trusting trust thing (see Ken Thompson's Turing award lecture). You can't trust any system until you've designed every bit from scratch.

You gotta put your trust somewhere, or you won't be able to implement jack.

[–] [email protected] 1 points 3 weeks ago

This isn't as limiting as it seems at first glance though. Sending pictures of a true one time pad cipher doesn't rely on the security of the transport or the camera. From there you can choose to make a compromise of convenience and get to things like Private key cryptography where the ciphers are done via basic xor arithmetic you can do by hand.

[–] [email protected] 5 points 3 weeks ago

I don’t know anything about cryptology; I have an imagination about how many things can go wrong hooking up parts and running them.

If it’s the law to make an age verification system then it will be made.

But I think one either has an age verification or privacy, but not both, in any country in the world.

I’m totally sure many of the discussions here about crypto are way above my head. But I’m equally sure while any one part will look fine in paper, the sum total will be used by an expanding government agency, crime, or both.