• 6 Posts
  • 318 Comments
Joined 2 years ago
cake
Cake day: October 19th, 2023

help-circle
  • In general, we accept that the Government already knows who you are, how old you are, and where you live. That’s already a given. The purpose of a zero-knowledge age verification scheme is to allow a third party (not the Government) to be confident that a person is an adult, without being given any additional information or being able to deduce any additional information from what they’re given. So essentially, they get only 1 bit of information: whether the user is an adult (true/false). In practice, a perfect system is not possible, since the fact that you receive a response also means you get the answer to related questions, like whether the user possesses a Government-issued ID (obviously “true” if they can successfully complete the verification).

    So, here’s how such a scheme might work. There are many possible implementations.

    In the United States, we have (optional) digital ID cards. These are added to one’s digital wallet in a similar manner to payment cards and can be used for things like buying alcohol, getting through airport security, and driving. This digital infrastructure can be re-used.

    1. An organisation which wants to perform digital identity verification generates a cryptographic key pair and registers the public key with a Government server ahead of time. The public key is published to a Government-run public keyserver.
    2. A website who wants to verify a user’s age sends a verification request to a Government server, digitally signed with their private key. The server responds with a request ID, which is a random, but unique, string of characters.
    3. The website provides this string to the user. The user copies the string.
    4. The user opens their digital wallet, selects their ID card, and then opens the age verification feature. The user pastes the request ID into their digital wallet, which fetches information about the request from the Government server. Because the request which the request ID is associated with was signed using the organisation’s private key, the Government can tell the user who initiated the request.
    5. The user is asked to confirm/deny the age verification request. If the user confirms the request, then a biometric will be required to access their private key (these are stored in the device’s keystore), sign the approval response, and then sent that response to the Government server. The Government server checks that the signature is valid and tied to the key associated with that ID before marking the verification request as completed.
    6. After confirming, the user returns to the website and clicks a button which says “I’ve completed the verification.” The website then queries the request ID with the Government server (again, signing the request with their private key). The Government server responds with “completed” if the user has accepted the request, or “not completed” if the user has either not yet accepted the request or denied it.





  • The collection of texts today known as the Bible were not written at once. There’s actually a lot of interesting history about how it came to be, but the short of it is that there were a multitude of maybe-canon Christian texts floating around during the early period of Christianity. These texts were written decades or even centuries apart, and often falsely attributed to authors who did not write them. There was also the Septuagint, a Greek text which was a translation of various Jewish scriptures, many of which now form the Old Testament.

    The early Christian church decided which of these were deemed to be canon and which were non-canon. The canon texts were compiled together to form what is now the Bible. Everything else that was deemed not canon is called the Apocrypha. Many of these texts were also deemed heretical or blasphemous to read, publish, or teach by the various ecumenical councils.

    Each Christian denomination has a slightly different version of the Bible depending on which decisions and ecumenical councils they accept.

    The most interesting difference would be the Bible of the Church of Jesus Christ of Latter-Day Saints (also known as the Mormon Church), which has an additional text called the Book of Mormon. That was written in the 19th century by a guy named Joseph Smith, an American religious leader who founded Mormonism. According to Mormon theology, it contains the revalations he received from God about various other unknown saints who lived in America and other holy happenings which took place, making the US a second holy land of sorts. His group travelled to the western United States to find their own promised land and establish a Mormon theocracy (they were successful; it’s now the US state of Utah).

    There’s no historical evidence that any of these texts were intended to be read as anything other than religious scripture, but keep in mind that in Biblical times, people seemed to have had a really difficult time differentiating texts written by people having fever dreams versus actual genuine accounts of observed events or legitimate attempts to write scripture. If you want a fun time, you can read some of the Apocrypha, which are often similar in style to the canonical gospels but are slightly… weirder. The line between religion and insanity was not so easily found back then. Regardless of their authors’ original intent, the Apocrypha certainly can be read for entertainment in the 21st century.
















  • Look, I came into this expecting people to understand that most (arbitrary percentage greater than 50 but less than 100) interactions with anyone, ICE or not, are reasonable. You don’t hear about these, because they’re not interesting enough to get posted on the Internet. If your information comes from the Internet only, you will think everything is extreme. I don’t like to use the term “terminally online”, but it’s a problem common with people typically described as being “terminally online”—not realising that real life is a lot more boring than it would appear from clips that people share of ridiculous interactions.

    It’s always difficult to deal with these types of comments because despite it being obvious that they show an extremity bias because the person who made them has a viewpoint influence by an extremely cherry-picked data set, they technically are logically sound.

    Edit: I have managed to create a statistic for this. There are 22,000 agents which work for ICE, although this number was 12,000 prior to Trump’s hiring surge (source). ICE claims they made 26,600 arrests in 2025 (source). This means each agent makes about 2 arrests per year on average at most. So unless you believe that most agents are checking only three or four people a year, this would indicate most people are being let go.