Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Technicians and policymakers are counting on a generation defined problem on the Internet: although it can be a revolutionary force for unprecedented education and connection around the world, but it can also create danger during children’s completely neutral access.
Instead of surveying adults, there is no easy way to monitor children’s Internet access by facilitating the path of catastrophic online privacy.
Although some appreciate these laws as victory for children’s protection, many security experts warned that these laws were being passed with a proposed and defective implementation plan, which creates dangerous security risks for adult users.
Here is a primer of the age and identity verification where there is controversy and where these laws are being implemented.
When we talk about the age verification law, when you create a neopates account as a kid, we are not talking to check a box to ensure that you were at least 13 years old. In the United States, these types of age checks are the result of children’s Online Privacy Protection Act (COPPA), an Internet protection law has been passed in 1998 But you just click on a box that you say 13.
In the context of the laws that have been cropped in the 2020s, age verification usually refers to who they upload an official ID to a third -party verification system. Users can also upload biometric facial scans, such as the face face face to face on the iPhones.
Of course, Internet protection is not really about preventing children playing games like neopate. Parents and lawmakers are concerned about accessing the contents that are possible for the contents of the unfamiliar person with bad motives on information about the use of online pornography, illegal drugs, and social media sites where they can face strangers with bad motives.
TechCrunch event
San Francisco
|
October 27-29, 2025
These concerns are not baseless. Parents have come back to law makers to share Dawn How their kids died after buying fentanel drugs on Facebook, or how they took their lives after the uninterrupted bullying in Snapchat.
As technology becomes more sophisticated, the problem is getting worse: Meta’s AI chattubs are known FlirtWhen the character.A and Openai are facing Case About the suicide of children who are encouraged by companies’ chatbots.
We know the Internet is not bad, though. You can learn to play guitar or write code without leaving your home or spending any money. You can build meaningful friendships with people in the other side of the world. You can access specialized telehaleth care, even if you live somewhere where a doctor is not trained in your diagnosis. You can find the answer to any of the moments you can find (the capital of Madagascar is Antananarivo, by the way).
In this way, lawmakers globally have arrived, which they believe to be a sound -like compromise: they will not increase the entire Internet, but they will only put some contents behind a gate that you can unlock if you can prove an adult. However, in this case, you are not just clicking a box to confirm your age – you are uploading your official ID or scanning your biometric data to prove that you can access some content.
The protection of any digital security measure depends on its implementation.
Apple makes products like face id so that these biometric scans in your face never leave your iPhone – they can never be divided on clouds, which greatly limit the chances of gaining access to hackers.
But when any connection with another network is involved, the identity verification can be obtained. We have already seen how the technology is anything other than rock-solid, how these measures can play badly.
“No Age Verification Methods are both privacy-defensive and completely perfect,” the Electronic Frontier Foundation WroteThe “These methods do not fits anywhere in the spectrum of ‘more safe’ and ‘less safe’ or ‘more perfect’ and ‘less perfect’. They each fall into the spectrum of ‘the same hazard’ ” dangerously ”
In recent memories, when a company falls behind in its protection, there are some examples of how things can go badly.
In tea, an app that women use to share information about men seen in dating applications, users to prove that they are to upload their ID selfie and photos to prove that they are. However 4 chan users, a Misoginistic Web Forum, got that tea Left users exposed to dataThis means that bad actors can access the official ID, selfie and even direct messages on the platform, where women shared sensitive information about their dating experience. What was done as an app to protect women at once ended in the face of naughty harassment, giving bad actors access to personal information like their home address.
Despite the promise of tea, these hacks were possible that these images were not stored anywhere and were immediately removed (obviously, these claims were false).
This kind of thing always happens – just look at the TechCrunch Protection coverageThe But it is not just happening in new applications like tea. World government And Trillion Dollar Tech Giants Of course not exempted from data violation.
These laws have inspired a lot of reactions, but people are not ashamed to connect their porn visitors to their official ID.
Where people can be sued for political speech, the current events of the people are unidentified to discuss the current events and to allow people who are in power without fear of revenge. Corporate Whistle Bleewers If all their online activities are associated with their identity, an organization may be unable to report wrongdoing and the victims of domestic torture will find it more difficult to escape from dangerous situations.
In the United States, the idea of suing for someone’s political belief is becoming less theoretical. The President has Trump Threat To send in prison to his political opponents, and the government contains Withdrawal visa The Israeli government has criticized the government or international students who have participated in protest against the country’s military action.
In the United States, Twenty -three Until August 2021, the Age Verification Act has implemented the Act, while the laws of the two other states will be in effect by the end of September 2025.
These laws affect most websites that host certain percentage of “harmful sexual elements for minors” that change from state to state.
In practice, it means pornographic websites must verify a user’s identity before accessing their website. However some sites like pornhub have simply chosen Block traffic From the specified state.
“Since age verification software needs users to transfer highly sensitive information, it exposes the risk of data violations,” pornhub Wrote On its blog. “Whether or not your motives are good or not, the governments have fought to secure this data in the Histor.”
Depending on who is applying the law, the definition of this word changes.
At a time when LGBBTUTU is right In the attack There are workers in the US Careful These national laws can be used to categorize non-pornic information about LGBTUN community, as well as basic sex education, “harmful sexual elements for minors”. Has been given by President Trump’s administration, these concerns have been well established Reference to move From some government websites to the civil rights movement and LGBTNTU history.
Age Verification Act of Texas – which was Expulsion A judgment of the Supreme Court in June – at the same time imposed other legal restrictions on LGBBTUE community, including limited Public drag show And forbidden Gender-assured care For minors. The Drag Show Act was later considered unconstitutional for the first amendment violation.
The UK has applied laws Online Protection Act In July 2025, many online platforms are required to verify a user’s identity before allowing a user access. If a user is identified as a minor, they will not be allowed on specific websites. The law can be exposed to search engines, social media platforms, video sharing platforms, instant messaging services, cloud storage sites-you can face or talk to someone.
In practice, this means websites such as YouTube, Spotify, Google, X, and Reddit need UK users to verify their identity before accessing specific content. These requirements are not only applicable to porn or violent materials – people in the UK are banned from viewing important education and news sources, making it difficult to access information without expressing potential privacy concerns.
The United Kingdom does not use a specific way to verify anyone’s identity – the process of the unique websites can decide which process to use and the UK’s communication regulator offcom is supposed to oversee the implementation. However, as we explained with the example of tea, we cannot believe that any given authenticity equipment will be safe.
Now, the users who are subject to identity verification must decide whether they want to access the information or whether they want to express themselves at the risk of privacy.
Even if you are not in the UK, you can be influenced by pre-related technology platforms with these rules.
In the United States, YouTube has already begun to roll out technology that is supposed to Assume the age of the users Based on their activities, regardless of what age they listen to when they have an account of their account.
Yes, and the UK App Store Charts prove that – after the online security law came into effect, IOS had half of the top ten free apps VPNS (Virtual Private Network). We have also seen VPN downloads spikes after we have blocked the access to pornhubs in many USA.
When the pornhub was suspended in France, ProtonVPN said that articles were Spike by 1000% Within half an hour – the agency said that Tiktok was a big spike than temporarily blocked American users.
If you have logged in to your office desktop computer or if you have spread your own position you can see the free British seats in the United States, you have used a VPN before
It introduces another problem: Free VPNs do not always have great privacy practice, even if they are advertised.
If you would like to know more about VPN there is a TechCrunch guide All you need to know About VPN and How can you decide If you need to use one.