Viewing a single comment thread. View all comments

Marchello_E t1_iugktof wrote

Hacks are usually not a matter of If, but more a matter of When. It may not be a 'honeypot', but it sure attracts unwanted 'database users'.

>A variety of options for age verification has been offered during the roadmap’s development, including the use of third party companies, individual sites verifying ages using ID documents or credit card checks, and internet service providers or mobile phone operators being used to check users’ ages.

*Alarm bells*

And how will this system make the connection between the person to verify and the ID on file. What kind of token, mugshot or hardware+drivers+system requirements is required for this idiocy?

Basically, just like TV, the newspaper or whichever magazine, no one should need to know who's looking at some website, when and how. This may seem normalized because of ad-revenue and site-owner voyeurism, but it isn't normal.

3