Australia is preparing to test various technologies to prevent minors under 16 from accessing social media and children under 18 from viewing pornographic content, according to focus.it. These measures, part of a broader strategy aimed at improving online safety, will be overseen by a consortium led by the UK-based Age Check Certification Scheme.
The initiative will evaluate three methods to verify user age, striving to balance accuracy, reliability, and privacy, with the ultimate goal of establishing a regulatory standard to govern minors’ access to online platforms.
The Proposed Methods:
- Credential-Based Verification:
This involves using official documents like digital IDs or passports to confirm age. While straightforward, this approach has vulnerabilities, such as the potential misuse of third-party credentials. To mitigate these risks, it may incorporate biometric verification via real-time photos, akin to facial recognition technology on smartphones. - Biometric and Behavioral Analysis:
This method relies on AI to assess biological and behavioral traits, such as facial features and vocal characteristics. However, previous trials reveal a notable margin of error, averaging 3 years and 8 months, with slightly improved accuracy for teenagers. - Contextual Data Analysis:
Referred to as the “conclusive” method, this involves analyzing user life data, such as the presence of a bank account, credit card, or government-verified email. However, it risks excluding eligible young adults without personal accounts or verified email addresses.
Challenges and Concerns:
Each of these approaches has critical limitations:
- Credential-Based Verification is powerful but requires stringent controls to prevent misuse.
- Biometric and Behavioral Analysis struggles with precision.
- Contextual Data Analysis risks excluding legitimate users.
Beyond technological challenges, privacy concerns loom large. Verifying identity through documents, biometric data, or financial details raises significant questions about user acceptance and data security. As such, addressing these issues will be crucial to the success and public acceptance of these measures.
CREATED by:
“KORÇA BOOM”