<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bab-agews-agevsyouth-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="age vs youth — tech helps with age">Age Verification: Age vs. Youth — One is not Like the Other</title>
    <seriesInfo name="Internet-Draft" value="draft-bab-agews-agevsyouth-00"/>
    <author initials="G." surname="Bransky" fullname="Gregor Bransky">
      <organization/>
      <address>
        <email>gregor.bransky@inoeg.de</email>
      </address>
    </author>
    <author initials="Q." surname="Anx" fullname="Quintessence Anx">
      <organization/>
      <address>
        <email>quintessence@nivenly.org</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization/>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <date year="2025" month="August" day="08"/>
    <area>General</area>
    <workgroup>agews</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 98?>

<t>Solely technical measures advertised to allow for the age verification of minors online face fundamental challenges on a conceptual and implementation level. Organizational measures, on the other hand, have been established as best practices by peer groups who are both high risk and digitally savvy, which exists to protect minors. These approaches can be strengthened via technical measures, and two such candidates are the Qualified Website Authentication Certificates (QWACS), introduced by the EU as part of eIDAS 2.0 <xref target="QWACS"/> and potentially the work of IETF's digital emblems working group <xref target="DIEM"/>.</t>
      <t>Based on early analysis of the use and abuse cases as well as privacy and security considerations, we provide arguments why non-scaling organizational measures are a necessity and strengthening these with technical measures is a way to enable the security for minors online.</t>
    </abstract>
  </front>
  <middle>
    <?line 104?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The current discourse around age verification is facing the challenge that the term "age verification" is both intuitively understood and also defined via almost all legal frameworks of modern societies, including but not limited to defining: legal drinking ages <xref target="DRINK"/>, marriageable ages <xref target="MARRIAGE"/>, and ages of consent <xref target="CONSENT"/>.
Alas, in the civic context of age verification, the two separate scenarios of "is older than x" and "is younger than y" are usually not differentiated.</t>
      <t>"Is older than x" scenarios can be solved solely by technical measures in all reasonable use cases, providing anonymity, unlinkability, and offline capacities. An example of this is verifying if an account holder is older than 16 by using a German eID card <xref target="TR-03127"/>.
This unfortunately is not the case for "is younger than y" scenarios.</t>
      <t>This position paper outlines the differences between both "older than x" and "younger than y" scenarios with regard to: users, use and abuse cases, as well as security considerations. It also presents arguments that, in the "is younger than y" scenario, technical solutions relying on user self-identification not only fail to address the core issue but also introduce additional risks for minors.</t>
      <t>As a result, a proposal for best practices of organizational measures as used by existing spaces for high risk youth and targeted youth communities are illustrated and an outline is provided that elaborates on how Qualified Website Authentication Certificates (QWACS) <xref target="QWACS"/> and potentially results of the DIEM <xref target="DIEM"/> working group may be able to help strengthening such organizational measures.</t>
      <t>Obtaining these digital certificates for organizations can be based on the already established best practices already in place to qualify organizations that work with minors, including but not limited to: child-care facilities, sports clubs, youth centers, schools and so forth.</t>
      <t>The authors are no legal scholars by training nor did they perform an extensive research in deeper legal intricacies involving the existence of legal drinking ages for alcohol <xref target="DRINK"/> as well as marriageable age <xref target="MARRIAGE"/> and age of consent <xref target="CONSENT"/>.
These are simply used to facilitate understanding of existing indicators for legal frameworks that provide the legal foothold for age verification processes.</t>
    </section>
    <section anchor="older-than-vs-younger-than-comparison-of-the-scenarios">
      <name>Older Than vs. Younger Than: Comparison of the Scenarios</name>
      <t>Age verification is a process that determines whether or not a user's age qualifies them to have access to a resource of some kind.
There are two statements about that user that are of interest: "is older than x" or "is younger than y".
On a fundamental level, the difference between these statements is that the statement "is older than x" will remain true with the passing of time, while "is younger than y" does not.
This has implications towards privacy and security aspects for technical implementations.
When considering the abuse-cases of an age verification process, the motivations, goals, and consequences for the potentially harmed parties of doing so vary dramatically.</t>
      <t>On an abstract level, it can be argued that in "is older than x" scenarios age verification is implemented to control access to either content, e.g. displays of violence or adult entertainment, or controlled substances, e.g. alcohol or tobacco due to online shopping.</t>
      <t>Thus, if an individual manages to circumvent an age verification process, the damaged party is the individual themselves and possibly their immediate peers on a non-scaling level. 
This resulting either in a group of friends watching a violent movie or consuming adult entertainment or consuming a bottle of hard liquor.
The extent of this harm should be limited to organizational measures outside of the digital realm, as harmful content as well as controlled goods can either be obtained in kiosk, supermarkets or with the help of slightly older peers.</t>
      <t>On the other hand, circumventing an "is younger than y" scenario age verification process usually leads to an incentivized adult gaining access to either amenities for young people like cheaper tickets and commit petty theft or — more relevant in the discussion — interact with a minor or a group of minors with abusive intent, possibly on a scaling level.</t>
      <t>While the statements above are of course not true in every case — as they do neither address access to weapons online or access to content that is recommended for teenagers but neither children or young children — limiting the scope of the following discussion seems to be reasonable due to the considerations below.</t>
      <t>Age verification may be only one component of an authorization process; e.g., buying weapons online legally requires the verification of additional attributes, such as name and address; thus use-cases including additional legal requirements are out of scope of this position paper.
Further the authors do believe that if a society decides to sell weapons online solely based on an age verification the arising problems exceed the harms that should be discussed in the context of age verification.</t>
      <t>The authors also propose to consider assigning a weight to the potential harm of providing unwanted access to content restricted for instance by the various levels of MPAA film rating system <xref target="MPAA"/>, many of which are not harmful for children in a live altering way.</t>
      <t>Thus, when comparing the "older than x" and "younger than y" scenarios we will assume that the "older than x" scenarios are addressing use-cases with x ≥ 16 and the "younger than y" scenarios addressing use-cases with y &lt; 16, in a self-service setup. We further forego the instances of petty theft of people obtaining benefits intended for teenagers and children.</t>
    </section>
    <section anchor="architecture-paradigms">
      <name>Architecture Paradigms</name>
      <t>On an abstract level access to digital systems has two aspects.</t>
      <t>On the one hand side use of the system requires the user to substantiate that they should have access, on the other hand the system has to provide evidence that the user can trust it.</t>
      <t>Following the distinction between technical and organizational measures we will show the following Tables to be true:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Is Older than X:</th>
            <th align="left">age verification</th>
            <th align="left">system verification</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">technical</td>
            <td align="left">X</td>
            <td align="left">-</td>
          </tr>
          <tr>
            <td align="left">organizational</td>
            <td align="left">-</td>
            <td align="left">-</td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Is Younger than Y:</th>
            <th align="left">age verification</th>
            <th align="left">system verification</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">technical</td>
            <td align="left">-</td>
            <td align="left">X</td>
          </tr>
          <tr>
            <td align="left">organizational</td>
            <td align="left">X</td>
            <td align="left">X</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Handing children any way to identify they are a minor online by themselves or via automation puts them at significant risk.
The general population is not able to withstand social engineering attacks in general, phishing being the most prominent example <xref target="PHISHING"/>.</t>
      <t>It is reasonable to assume that minors who are children or teenagers will be at least as susceptible to social engineering as the general population is, and thus allowing minors to either identify themselves online or put in place technical solutions who automatically identify them as minors would allow predators to set-up honey pots that not only specifically target minors but also would know when they are interacting with a minor.</t>
      <t>Additionally, privacy by design approaches should be practiced by when providing services to minors as the participation in online safe spaces for LGBTQIA+ minors, religious minorities or medical information (including questions of family planing, including abortion or vaccination) might lead to repercussions (including homicide) either by the minors communities or families who are not approving of the minors interests.</t>
      <t>At this point should also be pointed out that storing any data of minors also holds a relevant organizational risk as the European court of justice ruled that, even though no damages could proved in court, there are non-material damages if a minor person's data is part of a data breach.
This puts the organization serving minors at non-negligible financial risk, while youth work is already typically an underfunded sector <xref target="FederalJustice"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>For the "younger than y" scenarios, the focus of the threat model considered here is an incentivized adult that intends to mask as a minor. The focus of this threat model is for spaces that are intended for minors, as this would involve an adult circumventing "younger than y" age verification measures to gain access to the space.</t>
      <t>For the sake of completeness, in public spaces without age verification measures, there are also cases where an adult would impersonate a minor for the purpose of preying on minors in public spaces has to be mentioned. As by definition that type of space is unregulated, it exceeds the scope of the questions this position paper aims to address.</t>
      <t>A prominent security measure for remote identification of individuals is Videoident, which has been overcome regularly in the past <xref target="CCC-VIDEO1"/> <xref target="CCC-VIDEO2"/>.
Recent developments in generative AI (Gen AI) amplify this issue, e.g., currently allowing regular users of the open Internet to create eight-second videos for free <xref target="FREE-VIDEO"/>.
Gen AI is already used at scale to circumvent "Turing test based approaches" to identify humans <xref target="BYPASS"/>.
Given current technological developments, it is to be expected that Gen AI technology will enable individuals to circumvent any purely technological solution as well as those with minimal human involvement, e.g. "waving at a webcam and writing a sentence on a piece of paper".</t>
    </section>
    <section anchor="best-practices-moderated-safe-spaces">
      <name>Best Practices — Moderated Safe Spaces</name>
      <t>Given the presented security and privacy considerations, creating a safe space for minors online based solely on technical measures is implausible. 
If one forgoes the assumption that it is technically feasible to implement a scaling self-service age-verification solution to create safe spaces for minors, organizational measures can be part of designing a solution.
Solutions building purely on organizational measures are implemented by tech-savvy, high risk communities trying to provide safe spaces for minors, e.g. LGBTQIA+ teenagers, religious, racial or language minorities. 
These requirements can be created by collaboration between peer leadership (e.g. teens) and trusted adults to steward spaces for specific communities.</t>
      <t>Best practices include a layered trust system wherein teenagers can anonymously join chats moderated by adults without the possibility to directly message other participants.
They can then, due to constant participation, gain the trust of the community either due to constant participation or personal meetings allowing to gain privileges based on a documented peer review process. 
Such approaches benefit from users being able to verify themselves (e.g. <xref target="QWACS"/>), or solutions developed in the DIEM working group <xref target="DIEM"/>.
Thereby, allowing users to verify that the system is endorsed by third parties who have the users trust. This trust must be earned in much the same way as the processes that childcare facilities, sports clubs, youth centers, schools, and other youth-focused organizations are required to follow when working with minors.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="QWACS" target="https://en.wikipedia.org/wiki/Qualified_website_authentication_certificate">
        <front>
          <title>Qualified website authentication certificate</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="DIEM" target="https://datatracker.ietf.org/group/diem/about/">
        <front>
          <title>Digital Emblems (diem)</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="DRINK" target="https://en.wikipedia.org/wiki/Legal_drinking_age">
        <front>
          <title>Legal drinking age</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="MARRIAGE" target="https://en.wikipedia.org/wiki/Marriageable_age#Listed_by_country">
        <front>
          <title>Marriageable age</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CONSENT" target="https://en.wikipedia.org/wiki/Age_of_consent">
        <front>
          <title>Age of consent</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="TR-03127" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TR03127/BSI-TR-03127_en.pdf?__blob=publicationFile&amp;v=1">
        <front>
          <title>Technical Guideline TR-03127 — Architecture electronic Identity Card and electronic Resident Permit — Version 1.13</title>
          <author>
            <organization/>
          </author>
          <date year="2011" month="March" day="10"/>
        </front>
        <annotation>Section 4.4.3.4 Age Verification.</annotation>
      </reference>
      <reference anchor="MPAA" target="https://en.wikipedia.org/wiki/Motion_picture_content_rating_system">
        <front>
          <title>Motion Picture Content Rating Systme</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="PHISHING" target="https://www.researchgate.net/publication/350978906_Cross-National_Study_on_Phishing_Resilience">
        <front>
          <title>Cross-National Study on Phishing Resilience</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="CCC-VIDEO1" target="https://www.ccc.de/de/updates/2022/chaos-computer-club-hackt-video-ident">
        <front>
          <title>CCC | Chaos Computer Club hackt Video-Ident</title>
          <author initials="" surname="erdgeist" fullname="erdgeist">
            <organization/>
          </author>
          <date year="2022" month="August" day="10"/>
        </front>
      </reference>
      <reference anchor="CCC-VIDEO2" target="https://media.ccc.de/v/35c3-9616-circumventing_video_identification_using_augmented_reality">
        <front>
          <title>Circumventing video identification using augmented reality - media.ccc.de</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="FREE-VIDEO" target="https://dataconomy.com/2025/06/23/perplexitys-chatbot-now-generates-videos-on-x-for-free/">
        <front>
          <title>Perplexity's Chatbot Now Generates Videos On X For Free — Dataconomy</title>
          <author initials="K." surname="Gülen" fullname="Kerem Gülen">
            <organization/>
          </author>
          <date year="2025" month="June"/>
        </front>
      </reference>
      <reference anchor="BYPASS" target="https://serjhenrique.com/how-to-use-gemini-to-bypass-image-captcha-when-web-scraping/">
        <front>
          <title>How to use Gemini to bypass image captcha when web scraping</title>
          <author initials="S." surname="Henrique" fullname="Sergio Henrique">
            <organization/>
          </author>
          <date year="2025" month="March"/>
        </front>
      </reference>
      <reference anchor="FederalJustice" target="https://www.skwschwarz.de/en/news/immaterieller-schadensersatz-bei-datenschutzverstoessen">
        <front>
          <title>Federal Court of Justice rules on non-material damages for data protection violations</title>
          <author>
            <organization/>
          </author>
          <date year="2024" month="December" day="12"/>
        </front>
      </reference>
    </references>
    <?line 201?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors thank tech-savvy organizations supporting at-risk communities for sharing their threat assessment as well their reasoning to build the solutions the way they did.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
