• 5 Posts
  • 73 Comments
Joined 19 days ago
cake
Cake day: November 10th, 2025

help-circle




  • Prohibition leads to the propagation of means of evasion. By attempting to ban teenagers from popular means of communications they will incentivize mass adoption of “illicit means” of communications, and create another generation both familiar and comfortable with “illegal online activity” like the Napster generation. Just like Napster, this will also accidentally push youth into online platforms and channels where they are more likely to encounter content not suitable for minors and malware.

    The only “truly effective” form that this type of internet control can take is requiring a digital ID verification to establish a connection to the network at the ISP, and that is a nightmare setup we should be prepared to fight tooth and nail.


  • I have suggested a couple of times now that ActivityPub should implement an encryption layer for user authentication of requests and pings. It already has a system for instances vauching for each other. The situation is that users of “walled garden” instances in ActivityPub lack means of interfacing with public facing instances that doesnt leave the network open for scraping. I believe a pivot towards default registered users only content service built on encrypted handshakes, with the ability for servers to opt-in to serving content to unregistered users would make the whole network much more robust and less dependent on third party contingencies like CloudFlare.

    Then again, maybe I should just be looking for a different network, I’m sure there are services in the blockchain/cryptosphere that take that approach, I just would rather participate in a network built on commons rather than financialization at it’s core. Where is the protocol doing both hardened network and distributed volunteer instances?






  • Yes, the idea of the physical ID card they discuss makes a lot of sense, however that has the problem of associating your device with your ID.

    When it gets to cloud hosting the personal data and an intermediary validation service that’s where I get even more skeptical.

    I have a vague idea about a system that uses a time and topology based encryption where a person’s private information is encrypted and can generate a public key pair that will only match within a set time frame so that the data is held on government servers fully encrypted and when the user issues a “consent” that consent enables validation of a check-sum when both the user and the website provide the public keys without directly querying the government database. So basically the website is issued a public key by the server that works for all citizens that are above an age limit, and the users are sent private keys from their government data store whenever new data is encrypted. If the user’s age is above the limit, the user’s key will validate the age check, and because the key changes rapidly over time it cant be used to correlate the individual across multiple validation checks.

    Users can host a version of the data store locally, that can be validated as matching the government store using the query “is there a match to the shape of this encrypted data” rather than querying a specific citizen info store (this is blockchain tech, but can be centralized). This could be used to fight against identity theft, which is certain to be a crime that spikes with any digital ID system. Thats not the most clear but I think you’ll get the gist, no intermediaries necessary.

    All this said, in the US there are private services that validate physical ID cards using the codes on the back or a scan of a photo of the ID, so clearly the information has already been made available to private industry from the government through some channel. So that might be even worse than proposed systems in other nations already, I dont know.


  • A pretty good system, the crucial implementation being a robust consent management system for data access, and Metadata tracking to make sure the account identifier isn’t being used behind the scenes as a de-facto tracker by the public sector.

    To me the risk of Digital ID is two fold, one it gives the government a centralized means of tracking individual behavior and thereby crushing dissent (from a Social Credit System, to straight up Russian style gulagging the opposition). On the flip side it gives private sector actors a central immutable identifiers to associate behavior with that can’t be erased by deleting or abandoning an account.

    Age Verification is the point where these two concerns are merging into one. Abolishing online anonymity is tantamount to universal surveillance by both the state and private actors, setting up a system of automated persecution tyrants have dreamed of for ages but hasn’t been possible until today with Machine Learning making mass data processing automation both viable and feasible.

    Fascist population control and the “final solution” weren’t possible in the way they were implemented until IBM sold the Germans early tabulating machines / computers. ML is the next phase of that same arc of development.

    Use of Digital ID to log internet activity is what makes individual data streams continuous, contiguous, and compileable by default.

    The consequences are clear, the question is what we can do to prevent it from happening.