this post was submitted on 06 Aug 2023
122 points (88.1% liked)
Asklemmy
43945 readers
638 users here now
A loosely moderated place to ask open-ended questions
If your post meets the following criteria, it's welcome here!
- Open-ended question
- Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
- Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
- Not ad nauseam inducing: please make sure it is a question that would be new to most members
- An actual topic of discussion
Looking for support?
Looking for a community?
- Lemmyverse: community search
- sub.rehab: maps old subreddits to fediverse options, marks official as such
- !lemmy411@lemmy.ca: a community for finding communities
~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
If the service is open source, I could actually see this working.
No. Open Source does not make violations of freedom somehow okay.
I thought it was obvious, but I guess I'm gonna go step-by-step. So, what's needed to verify if you're 18? Exactly one thing - a flag telling the other system yes/no! Very privacy friendly, porn site doesn't know anything else about you. And obviously the auth system shouldn't log that you verified for a porn site. That's why it should be open source, so you can trust it.
If it's private and secure and isn't linked to your identity, we will share it and it will be useless because everyone who shares the same login is the same over-18 person.
If it is in any way linked to your identity, the data is online and a target for breach which will expose said identity.
There is no realistic way to implement this which both actually does anything at all, AND does not require adding attack surface for breaches.
Please reread what I wrote. And regarding attack surface, everything you use adds attack surface.
Please reread what I wrote. And regarding everything you use adding attack surface, that is the absolute best argument to not use an additional service such as the aforementioned 3rd party auth.
What are we doing here?