<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Fortunate Thoughts]]></title><description><![CDATA[Fortunate Thoughts]]></description><link>https://thoughts.viniciusfortuna.com</link><generator>RSS for Node</generator><lastBuildDate>Sat, 11 Apr 2026 07:32:06 GMT</lastBuildDate><atom:link href="https://thoughts.viniciusfortuna.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[The Illusion of Safety: Age Checks and Encryption Backdoors Don’t Fix the Real Problem]]></title><description><![CDATA[Age‑verification mandates and encryption backdoors (including client‑side scanning) offer a comforting story but miss the core reality: they don’t address where most child sexual abuse happens or how to prevent it. Meanwhile, they shift power to gove...]]></description><link>https://thoughts.viniciusfortuna.com/the-illusion-of-safety-age-checks-and-encryption-backdoors-dont-fix-the-real-problem</link><guid isPermaLink="true">https://thoughts.viniciusfortuna.com/the-illusion-of-safety-age-checks-and-encryption-backdoors-dont-fix-the-real-problem</guid><category><![CDATA[age verification]]></category><category><![CDATA[encryption]]></category><category><![CDATA[Policy]]></category><dc:creator><![CDATA[Vinicius Fortuna]]></dc:creator><pubDate>Sat, 13 Sep 2025 22:32:47 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1757802926604/727bddb5-8058-42af-9bc6-d7bb8665f74f.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Age‑verification mandates and encryption backdoors (including client‑side scanning) offer a comforting story but miss the core reality: <strong>they don’t address where most child sexual abuse happens or how to prevent it.</strong> Meanwhile, they shift power to governments and large platforms, erode privacy and security for everyone, and soak up political will that should go to real prevention</p>
<h2 id="heading-the-core-point-these-policies-dont-target-where-harm-actually-occurs">The Core Point: These Policies Don’t Target Where Harm Actually Occurs</h2>
<p>If we’re serious about protecting kids, we have to look at where abuse actually happens and how to stop it <strong>before</strong> it occurs.</p>
<ul>
<li><p><strong>Abuse is overwhelmingly offline and by known people.</strong> At least <strong>1 in 4 girls</strong> and <strong>1 in 20 boys</strong> in the U.S. experience sexual abuse, and <strong>~90%</strong> of perpetrators are family members or acquaintances—not anonymous strangers on encrypted apps. See the <a target="_blank" href="https://www.cdc.gov/child-abuse-neglect/about/about-child-sexual-abuse.html">CDC’s overview</a> and the <a target="_blank" href="https://www.unh.edu/ccrc/sites/default/files/media/2022-03/characteristics-of-crimes-against-juveniles_0.pdf">UNH Crimes Against Children Research Center’s breakdown by perpetrator type</a> (family ~26%, acquaintances ~63%).</p>
</li>
<li><p><strong>Age gates and scanning don’t touch those contexts.</strong> Uploading a driver’s license to visit a website or scanning every private device doesn’t prevent a coach, relative, or neighbor from grooming and abusing a child offline. These measures are, at best, <strong>after‑the‑fact</strong> tools to surface evidence—<strong>not prevention</strong>.</p>
</li>
<li><p><strong>Opportunity cost is huge.</strong> Every hour lawmakers spend on universal ID checks and backdoors is an hour not spent funding <strong>school‑based prevention curricula, parent training, community awareness, support for victims, and offender treatment</strong>—approaches with evidence of reducing abuse rates.</p>
</li>
</ul>
<p><strong>Bottom line:</strong> We’re prioritizing what’s visible and politically easy over what actually reduces harm.</p>
<h2 id="heading-why-age-verification-fails-in-practice">Why Age Verification Fails in Practice</h2>
<ul>
<li><p><strong>Easy to evade, blunt in effect.</strong> Determined teens route around age gates (VPNs, borrowed IDs). Hard cutoffs treat the day before 18 and the day after as radically different, which is unrealistic—and can block helpful resources for younger teens.</p>
</li>
<li><p><strong>Creates risky data troves.</strong> Age checks push platforms to collect sensitive IDs, biometrics, or payment data—creating breach‑prone honeypots and chilling lawful speech.</p>
</li>
<li><p><strong>Shifts power upward.</strong> Mandates move control from families to governments and large vendors who run verification pipelines and hold the data.</p>
</li>
</ul>
<h2 id="heading-why-backdoors-amp-clientside-scanning-make-us-less-safe">Why Backdoors &amp; Client‑Side Scanning Make Us Less Safe</h2>
<ul>
<li><p><strong>No such thing as a backdoor only “good guys” can use.</strong> The 2024 <strong>Salt Typhoon</strong> incident <a target="_blank" href="https://www.eff.org/deeplinks/2024/10/salt-typhoon-hack-shows-theres-no-security-backdoor-thats-only-good-guys">exploited lawful‑intercept systems</a>—exactly the kind of exceptional access policymakers keep proposing—demonstrating how these openings get abused.</p>
</li>
<li><p><strong>Client‑side scanning is surveillance by design.</strong> It scans everyone’s devices and is <strong>after‑the‑fact</strong> (harm already happened). It also invites mission creep: once the capability exists, governments can expand what must be scanned.</p>
</li>
<li><p><strong>Drowns investigators in noise.</strong> At internet scale, even low false‑positive rates produce huge volumes of bad leads, diverting attention from real victims.</p>
</li>
</ul>
<h2 id="heading-the-real-work-prevention-and-empowerment-what-to-fund-instead">The Real Work: Prevention and Empowerment (What to Fund Instead)</h2>
<ol>
<li><p><strong>Primary prevention in schools and communities.</strong> Evidence‑based curricula for children, parent education, and community campaigns have shown <strong>measurable reductions</strong> in substantiated abuse.</p>
</li>
<li><p><strong>Support for families and victims.</strong> Expand counseling, hotlines, and trauma‑informed services so kids can seek help early and safely.</p>
</li>
<li><p><strong>Targeted policing of open platforms.</strong> Invest in better moderation, anti‑grooming signals, and takedown workflows on non‑encrypted, public surfaces where platforms already have visibility.</p>
</li>
<li><p><strong>Usable parental controls—without central databases.</strong> Make device/app controls easier to set up and understand; provide pediatrician‑ and school‑backed guidance so parents can tailor protections locally.</p>
</li>
<li><p><strong>Keep strong end‑to‑end encryption.</strong> Private, secure channels protect families from stalking, doxxing, and data theft—and let victims reach help safely.</p>
</li>
</ol>
<h2 id="heading-policy-recommendations-for-lawmakers">Policy Recommendations for Lawmakers</h2>
<ul>
<li><p><strong>Stop</strong> blanket age‑verification and encryption‑backdoor mandates. Require <strong>privacy impact assessments</strong> for any youth‑safety proposal.</p>
</li>
<li><p><strong>Shift funding</strong> from performative tech mandates to <strong>prevention programs, parent training, and survivor services</strong>.</p>
</li>
<li><p><strong>Incentivize platform design changes</strong> that reduce grooming opportunities on public features (defaults, friction, and better reporting), rather than scanning everyone’s private content.</p>
</li>
<li><p><strong>Protect strong encryption in law.</strong> Explicitly bar requirements for client‑side scanning or exceptional‑access keys.</p>
</li>
<li><p><strong>Measure what matters.</strong> Tie policy renewal to <strong>prevention metrics</strong> (reduced substantiated cases, increased early disclosures), not volume of automated content flags.</p>
</li>
</ul>
<h2 id="heading-addressing-common-objections">Addressing Common Objections</h2>
<ul>
<li><p><strong>“If it saves one child, it’s worth it.”</strong> We should choose the interventions that save <strong>the most</strong> children with the <strong>least</strong> collateral harm. Universal surveillance harms many and diverts resources from prevention that saves more.</p>
</li>
<li><p><strong>“We already scan for known malware—why not go further?”</strong> Opt-in server‑side scanning of voluntarily uploaded cloud content is not the same as <strong>mandating spyware on every device</strong> or breaking encryption. Consent and control matter.</p>
</li>
<li><p><strong>“Can’t we do both?”</strong> Budgets, political will, and industry focus are finite. Every dollar poured into backdoors and age gates is a dollar <strong>not</strong> spent on programs that actually reduce abuse.</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Age Verification Doesn't Have to Kill Privacy: A Path Forward]]></title><description><![CDATA[The Supreme Court's recent decision allowing states to mandate age verification for adult websites has pushed a fierce debate into the spotlight. While the goal of protecting minors is clear, the methods proposed often create a privacy nightmare. But...]]></description><link>https://thoughts.viniciusfortuna.com/age-verification-doesnt-have-to-kill-privacy-a-path-forward</link><guid isPermaLink="true">https://thoughts.viniciusfortuna.com/age-verification-doesnt-have-to-kill-privacy-a-path-forward</guid><category><![CDATA[Privacy Pass]]></category><category><![CDATA[privacypolicy]]></category><category><![CDATA[privacy]]></category><category><![CDATA[Internet Standards]]></category><dc:creator><![CDATA[Vinicius Fortuna]]></dc:creator><pubDate>Fri, 27 Jun 2025 23:46:14 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1751068479825/f96c542d-104d-4d20-87c7-e61c1c81b762.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Supreme Court's <a target="_blank" href="https://www.theguardian.com/us-news/2025/jun/27/supreme-court-age-verification-pornography-websites">recent decision</a> allowing states to mandate age verification for adult websites has pushed a fierce debate into the spotlight. While the goal of protecting minors is clear, the methods proposed often create a privacy nightmare. But what if there was a better way? It turns out, we can have security without surveillance. New internet standards offer a way to verify age while protecting personal identity, though key questions about implementation and access remain.</p>
<h2 id="heading-the-problem-with-proving-your-age-online">The Problem with Proving Your Age Online</h2>
<p>Today's approach to online age verification is fundamentally broken. In an attempt to comply with regulations, we are forcing websites to become identity arbiters, compelling them to collect and store troves of sensitive personal data — driver’s licenses, birthdates, and more.</p>
<p>This strategy creates a "goldmine" of information that is irresistible to hackers and malicious actors. It puts businesses in an impossible position, caught between legal mandates and their duty to protect user data. The result is a digital landscape littered with vulnerable data repositories, each carrying immense liability and eroding the very foundation of digital trust. We can't keep building a safer internet by making it less private.</p>
<h2 id="heading-a-new-standard-for-privacy-introducing-privacy-pass">A New Standard for Privacy: Introducing Privacy Pass</h2>
<p>We must move beyond this flawed model. What if we could satisfy the need for verification without demanding identification? What if we could answer the question, “Is this user over 18?” without ever asking, “Who is this user?”</p>
<p>Enter <strong>Privacy Pass</strong>, an open protocol being developed at the <strong>Internet Engineering Task Force (IETF)</strong>, the primary body creating internet standards. Pioneered by Cloudflare, this technology offers a revolutionary approach to verification.</p>
<p>Think of Privacy Pass as a digital bouncer for the internet, but one with perfect discretion. Here’s a real-world analogy:</p>
<p>Imagine you want to get into a bar.</p>
<ol>
<li><p><strong>One-Time Verification:</strong> At the door, you show your ID once to a trusted verifier — the bouncer.</p>
</li>
<li><p><strong>Anonymous Token Issued:</strong> The bouncer doesn’t record your name. Instead, they give you a secure, anonymous "21+" stamp on your wrist. This is a cryptographic token.</p>
</li>
<li><p><strong>Frictionless, Private Access:</strong> For the rest of the night, you can order drinks by simply showing your wrist stamp. The bartender knows you’re of legal age without ever seeing your ID or learning who you are.</p>
</li>
</ol>
<blockquote>
<p>In the United States, getting carded at a bar is a routine check that doesn't violate your freedom of expression. Privacy Pass brings this accepted, real-world model to the digital realm.</p>
</blockquote>
<p>This simple but powerful idea flips the script from "prove who you are" to "prove you meet a criterion."</p>
<h2 id="heading-why-this-is-a-game-changer">Why This Is a Game-Changer</h2>
<p>This privacy-preserving approach offers a win-win solution:</p>
<ul>
<li><p><strong>For Users:</strong> Your privacy is finally respected. You no longer have to spray digital copies of your personal documents across the internet, hoping they aren't breached. This model removes the risk of your data being stolen from a random website's database and restores trust in the services you use.</p>
</li>
<li><p><strong>For Businesses:</strong> The liability of storing sensitive data vanishes. If you don't collect personal data for age verification, it can't be stolen from you. This strengthens security, dramatically reduces compliance headaches under regulations like GDPR, and demonstrates a genuine commitment to customer privacy.</p>
</li>
</ul>
<h2 id="heading-but-what-if-people-cheat-the-system"><strong>But What if People Cheat the System?</strong></h2>
<p>What stops someone from getting a valid token and selling it to minors? The protocol has built-in safeguards. It’s possible to cryptographically bind a token to a specific device, preventing it from being shared. Tokens can also be designed to be short-lived, expiring after a set time. Furthermore, the system can limit the number of active tokens a single identity can issue at once, making large-scale misuse impractical.</p>
<h2 id="heading-more-than-just-age-checks">More Than Just Age Checks</h2>
<p>While fixing age verification is a huge win, the underlying technology is a multitool for privacy. The same "prove an attribute without revealing identity" model can solve many other online frustrations:</p>
<ul>
<li><p><strong>Eliminating CAPTCHAs:</strong> Prove you're human without endlessly clicking on traffic lights.</p>
</li>
<li><p><strong>Location-Based Access:</strong> Prove you're in a specific country to watch a licensed stream without sharing your exact location.</p>
</li>
<li><p><strong>Fair Online Voting:</strong> Allow one vote per person in an online poll without tracking who voted for what.</p>
</li>
<li><p><strong>Discount Eligibility:</strong> Confirm you're a student or veteran to get a discount without uploading a copy of your ID.</p>
</li>
</ul>
<p>This isn't a single-purpose fix; it's a blueprint for a more respectful internet.</p>
<h2 id="heading-the-implementation-hurdles">The Implementation Hurdles</h2>
<p>This new model raises practical questions that needs to be addressed before age verification laws are imposed.</p>
<p><strong>1. Who gets to be the bouncer?</strong> This is a big challenge. For this system to work, we need trusted entities — or "Attesters" — that can verify a user's age once. Should this be a government agency, a bank, a telecom provider, or a new type of dedicated service? Answering this is complex. Relying only on state-level IDs creates a massive integration burden, while using only federal IDs could exclude many people, including international visitors. A trusted, accessible, and secure network of verifiers needs to be established.</p>
<p><strong>2. The infrastructure isn't ready yet.</strong> While the technology is standardized, the ecosystem to support it is not yet in place. Websites need time and resources to integrate Privacy Pass. More importantly, the network of trusted verifiers needs to be built. Enforcing age verification laws before this infrastructure exists is putting the cart before the horse.</p>
<h2 id="heading-conclusion-lets-build-a-better-door">Conclusion: Let's Build a Better Door</h2>
<p>The current approach to verification imposes an unacceptable privacy cost on everyone. We cannot keep patching security holes with more data collection.</p>
<p>Privacy Pass represents a fundamental shift in thinking — a move towards designing systems that are private and secure by default. The technology to build this better future exists today. The challenge is no longer technical; it is a matter of investment and political will. The path to a safer, more trustworthy internet isn't through building higher walls around our data, but by designing doors that don't require a key with our name on it.</p>
<h3 id="heading-for-further-reading"><strong>For Further Reading:</strong></h3>
<ul>
<li><p><a target="_blank" href="https://blog.cloudflare.com/privacy-pass-standard/"><strong>Cloudflare Blog: "Privacy Pass: upgrading to the latest protocol version"</strong></a>: An accessible overview from a key industry leader on the evolution and practical deployment of the protocol.</p>
</li>
<li><p><a target="_blank" href="https://datatracker.ietf.org/group/privacypass/about/"><strong>IETF Privacy Pass Working Group</strong></a><strong>:</strong> The official home for the group standardizing the protocol, with links to technical documents and participants.</p>
</li>
<li><p><a target="_blank" href="https://www.rfc-editor.org/rfc/rfc9576.html"><strong>RFC 9576: The Privacy Pass Architecture</strong></a><strong>:</strong> The core technical document defining the architecture and roles within the system.</p>
</li>
</ul>
]]></content:encoded></item></channel></rss>