<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-iab-agews-report-01" category="info" consensus="true" submissionType="IAB" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="AGEWS Report">Report from the IAB/W3C Workshop on Age-Based Restrictions on Content Access</title>
    <seriesInfo name="Internet-Draft" value="draft-iab-agews-report-01"/>
    <author fullname="Mark Nottingham">
      <organization/>
      <address>
        <email>mnot@mnot.net</email>
      </address>
    </author>
    <author fullname="Martin Thomson">
      <organization/>
      <address>
        <email>mt@lowentropy.net</email>
      </address>
    </author>
    <date year="2026" month="February" day="06"/>
    <keyword>IAB workshop</keyword>
    <keyword>age gate</keyword>
    <abstract>
      <?line 72?>

<t>The Workshop on Age-Based Restrictions on Content Access was convened by the Internet Architecture Board (IAB) and World Wide Web Consortium (W3C) in October 2025. This report summarizes its significant points of discussion and identifies topics that may warrant further consideration and work.</t>
      <t>Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB or W3C views and positions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://intarchboard.github.io/draft-iab-agews-report/draft-iab-agews-report.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-iab-agews-report/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/intarchboard/draft-iab-agews-report"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Regulators and legislators around the world are increasingly restricting what can be made available to young people on the Internet, in an effort to reduce the online harms that they encounter.</t>
      <t>In October 2025, the Internet Architecture Board and the World Wide Web Consortium convened the Workshop on Age-Based Restrictions on Content Access. It brought together technologists, civil society advocates, business interests, and government stakeholders to discuss the nuances of the introduction of such measures.</t>
      <t>The primary focus was "to perform a thorough examination of the technical and architectural choices that are involved in solutions for age-based restrictions on access to content", with a goal of "build[ing] a shared understanding of the properties of various proposed approaches."</t>
      <t>See the workshop announcement <xref target="ANNOUNCE"/> for details. This report summarises the proceedings of the workshop.</t>
      <section anchor="views-expressed-in-this-report">
        <name>Views Expressed in this Report</name>
        <t>This document is a report on the proceedings of the workshop. The views and positions documented in this report were expressed during the workshop by participants and do not necessarily reflect the IAB's or W3C's views and positions, nor those of all participants.</t>
        <t>Furthermore, the content of the report comes from presentations given by workshop participants and notes taken during the discussions, without interpretation or validation. Thus, the content of this report follows the flow and dialogue of the workshop but does not attempt to capture a consensus.</t>
      </section>
      <section anchor="chatham-house-rule">
        <name>Chatham House Rule</name>
        <t>Participants agreed to conduct the workshop under the Chatham House Rule <xref target="CHATHAM-HOUSE"/>, so this report does not attribute statements to individuals or organizations without express permission.  Most submissions to the workshop were public and thus attributable; they are used here to provide substance and context.</t>
        <t><xref target="participants"/> lists the workshop participants, unless they requested that this information be withheld.</t>
      </section>
    </section>
    <section anchor="overview-of-the-workshop">
      <name>Overview of the Workshop</name>
      <t>The IAB/W3C workshop on Age-Based Restrictions on Content Access brought together a diverse group of participants from technical, policy, regulatory, and research communities to examine how the Internet might accommodate demands for age-based access controls. Over three days, discussions traversed the intersection of technology, governance, human rights, and social expectations, with a recurring emphasis on privacy, accountability, and the preservation of the open architecture of the Internet.</t>
      <t>The workshop began with a framing session that emphasized the Internet's original design as a universal, non-segmented space. Participants observed that the web does not natively distinguish between adult and child users, and that governments are creating regulatory environments that shift responsibility from parents and individuals to service providers. The scope of discussion was tightly defined: not the morality or policy of age restrictions, but the technical, architectural, and human-rights implications of enforcing them. The challenge, many participants agreed, lay in building mechanisms that are accurate, respect privacy, maintain global interoperability, and avoid creating infrastructure that could be repurposed for censorship or surveillance.</t>
      <t>Early exchanges focused on terminology and scope: whether "age verification" should be understood narrowly as identity checking or more broadly as "age assurance." The conversation also touched on the diversity of cultural expectations about parental authority and the variety of legal frameworks emerging across jurisdictions. Some participants warned of "slippery slope" effects, where mechanisms designed for age checks might evolve into tools for broader identity enforcement. Several noted that while liability drives many policy decisions, technical design should aim to minimize harm and avoid over-centralization. The question of who bears responsibility for child safety -- platforms, regulators, or device manufacturers -- surfaced repeatedly.</t>
      <t>Human-rights principles were foregrounded as a basis for evaluation. Privacy was discussed not only in terms of data protection law (including techniques like minimization) but as protection from unwanted exposure or interaction. Freedom of expression and opinion was considered, particularly how adults and children both have rights to communicate, access information and associate, free from the chilling effects of surveillance or discrimination. The group revisited long-standing Internet design tenets, such as decentralization and the end-to-end principle, asking how they should inform modern architectures that could easily drift toward central control. Some argued that successful systems must remain open, interoperable, and reversible, while others cautioned that any solution -- even a well-intentioned one -- would inevitably reshape the Internet's social and economic balance.</t>
      <t>Technical sessions explored a spectrum of enforcement models: service-based, network-based, and device-based. Service-enforced systems place the compliance burden on websites, risking fragmentation and user fatigue from repeated verification flows. Network-based filtering -- already common in some jurisdictions -- offers broad coverage but limited accuracy and significant privacy trade-offs. Device-enforced models, in which operating systems mediate access based on a one-time verification, were praised for their potential usability and consistency but criticized for potential concentration of power among major vendors. Many participants noted that a pluralistic approach is more likely to be successful, recognizing that no single architecture can meet all requirements equally across jurisdictions.</t>
      <t>Privacy-enhancing technologies (PETs) such as anonymous credentials and zero-knowledge proofs were discussed as promising, though not necessarily sufficient, tools. In particular, PETs don't address all privacy concerns, and likewise don't address wider issues around access to underlying sources of truth. Furthermore, some participants cautioned that PETs cannot prevent circumvention or censorship, are relatively untested, and that open-sourcing code does not automatically make systems trustworthy. A recurring concern was that while credential-based verification may work well in countries with unified ID systems, it risks excluding people without access to such credentials and entrenching inequalities.</t>
      <t>Discussions on parental controls and network operator roles highlighted practical tensions between effectiveness, usability, and user rights. Although some participants saw value in layered approaches combining device, service, and network measures, others noted the high complexity and low adoption of parental-control tools even where available. The workshop also revisited the ethical dimension: whether designing better tools might unintentionally legitimize over-broad or intrusive regulation.</t>
      <t>By the third day, participants reflected on the need for collaboration across disciplines and institutions. Many acknowledged that while complete solutions are unlikely in the short term, articulating shared vocabulary, architectural roles, and evaluation properties was an essential foundation. There was broad agreement that future work should map risks against possible architectures, document trade-offs in neutral terms, and communicate clearly with policymakers to prevent outcomes that could undermine Internet openness.</t>
      <t>The meeting closed with reflections on what process might be followed to take proposed solutions through a standards process. Both IETF and W3C representatives outlined how exploratory work might proceed within their respective frameworks, stressing that standardization would require consensus, open participation, and time.</t>
      <t>While this workshop would not provide specific standards proposals or take positions on the advisability of regulatory proposals, it was suggested that leadership bodies, including the Internet Architecture Board and Technical Architecture Group, could be places to make such statements.</t>
      <t>While the current status quo -- piecemeal, opaque, and often privacy-eroding -- was unsatisfactory to most participants, many cautioned that hasty solutions could entrench worse problems. This led to growing recognition that protecting children online must not come at the expense of the Internet's foundational freedoms, and that sustained, multi-stakeholder collaboration is the only viable path forward.</t>
    </section>
    <section anchor="key-takeaways">
      <name>Key Takeaways</name>
      <t>This section highlights aspects of discussion at the workshop that appeared to be most impactful.</t>
      <section anchor="collaboration">
        <name>There is a Need for Cross-Cutting Collaboration</name>
        <t>Many participants remarked that the workshop allowed them to appreciate perspectives that they had not fully considered previously. Although several substantial efforts have included industry, civil society, government, and technologists, collaboration across all stakeholders appears to be rare.</t>
        <t>This was especially evident when considering the involvement of the technical community. Although there have been a number of consultations by governments and other bodies, involvement of the technical community is often limited to participation by the policy representatives of tech companies. This can lead to an underappreciation of the architectural impact and related harms of the design decisions made.</t>
        <t>Architectures effective for the goals and less likely to have profound harmful consequences may require the cooperation of multiple actors fulfilling different <xref target="roles"/>. To that end, standardization may be especially important for interoperable, collaborative development of architectures involving both servers and clients.</t>
        <t>Some participants also noted that approaches where liability rests only on one party -- for example, a content or platform provider -- are unlikely to lead to the desired results, because this creates disincentives for the cooperation that is necessary for meaningful reduction of harms. An approach that considers the roles of the young, their parents, device manufacturers, operating system vendors, content providers, and society overall was believed to be more likely to succeed.</t>
      </section>
      <section anchor="roles">
        <name>Identifying the Roles Involved is Important</name>
        <t>One of the more substantive discussions on architecture involved presentations on the functional roles involved in any system <xref target="HANSON"/>.</t>
        <t>Four key roles were identified:</t>
        <dl>
          <dt>Verifier:</dt>
          <dd>
            <t>The verifier role determines whether a person falls into a target age range.</t>
          </dd>
          <dt>Enforcer:</dt>
          <dd>
            <t>The enforcer is responsible for ensuring that a person who does not satisfy the verifier is unable to access age-restricted content or services.</t>
          </dd>
          <dt>Policy selector:</dt>
          <dd>
            <t>The policy selector is responsible for determining which policies should apply to the user, based on their jurisdiction, status or preferences.</t>
          </dd>
          <dt>Rater:</dt>
          <dd>
            <t>The rater is responsible for determining whether content or services require age restrictions and the age ranges that apply.</t>
          </dd>
        </dl>
        <t>In addition, it was noted that ratings and laws are often limited by geography or jurisdiction, so it is often necessary for services to first identify the applicable jurisdiction. It was generally accepted that this function often uses IP geolocation mappings, despite acknowledged limitations around accuracy and susceptibility to circumvention using VPNs.</t>
      </section>
      <section anchor="a-common-vocabulary-is-necessary">
        <name>A Common Vocabulary is Necessary</name>
        <t>Early discussions highlighted how not all participants used the same terminology when referring to different activities or functions. There was a recognition of the value of shared language, and some participants pointed to <xref target="ISO-IEC-27566-1"/>, which establishes key terms, including:</t>
        <dl>
          <dt>Age assurance:</dt>
          <dd>
            <t>Age assurance is an umbrella term for technology that provides some entity with information about the age of a person. This is understood to encompass multiple classes of specific methods, including age verification, age estimation, and age inference. Age assurance does not need to result in a specific age; age ranges are often preferred as these can have better privacy properties.</t>
          </dd>
          <dt>Age verification:</dt>
          <dd>
            <t>Age verification refers to gaining high assurance that a person is within a given age range. Strong assurances are often tied to official or governmental documentation, so age verification can involve the use of government-issued digital credentials.</t>
          </dd>
          <dt>Age estimation:</dt>
          <dd>
            <t>Age estimation uses statistical processes that process physical or behavioral characteristics of a person to produce a probabilistic value for how old someone is or whether their age is in a target range. A variety of techniques are used, the most common being facial age estimation, which uses machine learning models to estimate how old a person is based on still or moving images of their face.</t>
          </dd>
          <dt>Age inference:</dt>
          <dd>
            <t>Age inference draws on data sources to determine whether a person fits a given age range. This method can require identification information, such as an email address or phone number, to find relevant records. For example, evidence of online activity prior to a certain date in the past might support the view that a person is older than a target threshold.</t>
          </dd>
          <dt>Age gating:</dt>
          <dd>
            <t>Age gating is the process of restricting access to something based on the age of the person requesting access.</t>
          </dd>
        </dl>
        <t>Relating these functions to the roles described in <xref target="roles"/>, all age assurance types fit the "verifier" role, where age gating applies to the "enforcer" role.</t>
      </section>
      <section anchor="trust">
        <name>Privacy and Trust Expectations Need Further Discussion</name>
        <t>Privacy was a recurrent theme at the workshop, but it was clear that there are multiple considerations at play when talking about privacy. The question of privacy was often caught up in discussions of trust, where approaches each depend on different sorts of trust between the different actors.</t>
        <t>Participants identified privacy as important to maintaining trust in any system that involves age assurance or age gating.</t>
        <t>Where private information is used by the actors in a proposed architecture, those actors might need to be trusted to handle that private information responsibly. In that approach, the importance of different safeguards on personal information, such as the prompt disposal of any personal information -- a practice that many age verification providers promise -- becomes a core part of what might allow people to trust that system.</t>
        <t>Several people observed that the sort of trust that is asked from people might not correspond with the role that certain entities play in people's lives. This will depend on context, where "adult" content providers generally serve anonymous users, whereas social media often already has a lot of personal information on users.</t>
        <t>In either case, users might have no prior knowledge of -- or trust in -- providers that are contracted to provide age assurance functions. It was observed that one likely consequence of some arrangements is to train people to become more trusting of strange sites that ask for personal information.</t>
        <t>Alternatively, it might be that trust in the system is not vested in actors, but instead the system as a whole. This is possible if no information is made available to different actors, removing the need to trust their handling of private information. For this to be achievable, the use of zero-knowledge proofs or similar cryptographic techniques was seen as a way to limit what each entity learns. Some participants noted, however, that these techniques do not address circumvention or censorship risks, still introduce new information into the ecosystem, and may concentrate trust in particular software implementations.</t>
        <t>Other aspects of trust were considered equally important from different perspectives.  Services that rely on an independent age assurance provider need to trust that the provider makes an accurate determination of age, at least to the extent that they might be held liable in law.  They also need to trust that the service respects privacy, lest the use of a low-quality provider could create other forms of liability or drive away potential customers.</t>
      </section>
      <section anchor="waterfall">
        <name>More than One Approach will be Required</name>
        <t>A recurrent theme in discussion was the insufficiency of any particular age assurance technique in ensuring that people are not unjustifiably excluded. All age assurance methods discussed fail to correctly classify some subset of people:</t>
        <ul spacing="normal">
          <li>
            <t>Age verification that depends on government-issued credentials will fail when people do not hold accepted credentials. This includes people who do not hold credentials and those who hold credentials, but not those that are recognized.</t>
          </li>
          <li>
            <t>Age estimation produces probabilistic information about age that can be wrong by some number of years, potentially excluding people near threshold ages. This manifests as both false acceptance (people who are outside the target age range being accepted) and false rejection (people who are in the target age range being rejected). Where there is a goal of minimizing the false acceptance rate, that increases the number of false rejections.</t>
          </li>
          <li>
            <t>Age inference techniques can fail due to lack of information.</t>
          </li>
        </ul>
        <t>Discussion often came back to an approach that is increasingly recommended for use in age verification, where multiple methods are applied in series. Checks with lower friction -- those that require less active participation from people -- or that are less invasive of privacy are attempted first. Successive checks are only used when a definitive result cannot be achieved.</t>
        <t>Some participants noted that inconsistent friction and invasiveness create a different kind of discrimination, one that can exacerbate existing adverse discrimination. For example, the accuracy of age estimation for people with African heritage is often significantly lower than for those with European ancestry <xref target="FATE"/>. This is attributed to the models used being trained and validated using datasets that have less coverage of some groups. People who are affected by this bias are more likely to need to engage with more invasive methods.</t>
        <t>One consequence of having multiple imperfect techniques is the need to recognize that any system will be imperfect. That creates several tensions:</t>
        <ul spacing="normal">
          <li>
            <t>Some people will never be able to satisfy age assurance checks and will therefore be excluded by strict assurance mandates. Here, discussions acknowledged that purely technical systems are likely inadequate.</t>
          </li>
          <li>
            <t>Some people who should be blocked from accessing content or services will find ways to circumvent restrictions. In this context, the term "advanced persistent teenager" was recognized as characterizing the nature of the "adversary": individuals who are considered too young to access content, but who are highly motivated, technically sophisticated, and have time to spare.</t>
          </li>
          <li>
            <t>Offering more choices to people can improve privacy because they get to choose the method that suits them. However, when a chosen method fails, having to engage with additional methods has a higher privacy cost.</t>
          </li>
        </ul>
        <t>Some participants argued that accepting these risks is necessary in order to gain any of the benefits that age-based restrictions might confer. Other participants were unwilling to accept potential impositions on individual rights in light of the insufficiency of restrictions in providing meaningful protection; see <xref target="holistic"/>.</t>
      </section>
      <section anchor="risks">
        <name>Mapping the Risks for Architectures is a Useful Next Step</name>
        <t>How the identified roles (see <xref target="roles"/>) are arranged into architectures was some of the more substantive discussion. <xref target="JACKSON"/> describes some of the alternatives, along with some of the implications that arise from different arrangements.</t>
        <t>Throughout this discussion, it was acknowledged that active deployments tended to fall into a common pattern, where content providers are required to age-gate access and contract a third party to interpose that service. Several participants noted that this is a somewhat natural consequence of some of the constraints that actors are subject to.  <xref target="f-typical"/> shows the typical deployment model for age-gated content and services, along with the roles from <xref target="roles"/>.</t>
        <figure anchor="f-typical">
          <name>Typical Deployment Model</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="552" viewBox="0 0 552 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,32 L 32,80" fill="none" stroke="black"/>
                <path d="M 80,48 L 80,112" fill="none" stroke="black"/>
                <path d="M 128,120 L 128,304" fill="none" stroke="black"/>
                <path d="M 160,120 L 160,176" fill="none" stroke="black"/>
                <path d="M 184,48 L 184,112" fill="none" stroke="black"/>
                <path d="M 328,112 L 328,144" fill="none" stroke="black"/>
                <path d="M 328,240 L 328,272" fill="none" stroke="black"/>
                <path d="M 368,48 L 368,112" fill="none" stroke="black"/>
                <path d="M 368,144 L 368,240" fill="none" stroke="black"/>
                <path d="M 368,272 L 368,336" fill="none" stroke="black"/>
                <path d="M 464,48 L 464,112" fill="none" stroke="black"/>
                <path d="M 464,144 L 464,240" fill="none" stroke="black"/>
                <path d="M 464,272 L 464,336" fill="none" stroke="black"/>
                <path d="M 8,48 L 56,48" fill="none" stroke="black"/>
                <path d="M 80,48 L 184,48" fill="none" stroke="black"/>
                <path d="M 368,48 L 464,48" fill="none" stroke="black"/>
                <path d="M 192,80 L 360,80" fill="none" stroke="black"/>
                <path d="M 344,96 L 360,96" fill="none" stroke="black"/>
                <path d="M 80,112 L 184,112" fill="none" stroke="black"/>
                <path d="M 368,112 L 464,112" fill="none" stroke="black"/>
                <path d="M 368,144 L 464,144" fill="none" stroke="black"/>
                <path d="M 344,160 L 360,160" fill="none" stroke="black"/>
                <path d="M 176,192 L 360,192" fill="none" stroke="black"/>
                <path d="M 344,224 L 360,224" fill="none" stroke="black"/>
                <path d="M 368,240 L 464,240" fill="none" stroke="black"/>
                <path d="M 368,272 L 464,272" fill="none" stroke="black"/>
                <path d="M 344,288 L 360,288" fill="none" stroke="black"/>
                <path d="M 144,320 L 360,320" fill="none" stroke="black"/>
                <path d="M 368,336 L 464,336" fill="none" stroke="black"/>
                <path d="M 32,80 L 48,112" fill="none" stroke="black"/>
                <path d="M 16,112 L 32,80" fill="none" stroke="black"/>
                <path d="M 344,96 C 335.16936,96 328,103.16936 328,112" fill="none" stroke="black"/>
                <path d="M 344,160 C 335.16936,160 328,152.83064 328,144" fill="none" stroke="black"/>
                <path d="M 176,192 C 167.16936,192 160,184.83064 160,176" fill="none" stroke="black"/>
                <path d="M 344,224 C 335.16936,224 328,231.16936 328,240" fill="none" stroke="black"/>
                <path d="M 344,288 C 335.16936,288 328,280.83064 328,272" fill="none" stroke="black"/>
                <path d="M 144,320 C 135.16936,320 128,312.83064 128,304" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="368,320 356,314.4 356,325.6" fill="black" transform="rotate(0,360,320)"/>
                <polygon class="arrowhead" points="368,288 356,282.4 356,293.6" fill="black" transform="rotate(0,360,288)"/>
                <polygon class="arrowhead" points="368,192 356,186.4 356,197.6" fill="black" transform="rotate(0,360,192)"/>
                <polygon class="arrowhead" points="368,160 356,154.4 356,165.6" fill="black" transform="rotate(0,360,160)"/>
                <polygon class="arrowhead" points="368,80 356,74.4 356,85.6" fill="black" transform="rotate(0,360,80)"/>
                <circle cx="32" cy="32" r="6" class="opendot" fill="white" stroke="black"/>
                <g class="text">
                  <text x="268" y="68">Visits</text>
                  <text x="504" y="68">Rater</text>
                  <text x="536" y="68">+</text>
                  <text x="128" y="84">Browser</text>
                  <text x="416" y="84">Website</text>
                  <text x="508" y="84">Policy</text>
                  <text x="516" y="100">Selector</text>
                  <text x="252" y="132">Redirected</text>
                  <text x="308" y="132">To</text>
                  <text x="236" y="180">Evidence</text>
                  <text x="284" y="180">of</text>
                  <text x="312" y="180">Age</text>
                  <text x="416" y="180">Age</text>
                  <text x="416" y="196">Assurance</text>
                  <text x="516" y="196">Verifier</text>
                  <text x="416" y="212">Service</text>
                  <text x="252" y="260">Redirected</text>
                  <text x="308" y="260">To</text>
                  <text x="420" y="292">Age-</text>
                  <text x="252" y="308">Admitted</text>
                  <text x="416" y="308">Gated</text>
                  <text x="516" y="308">Enforcer</text>
                  <text x="416" y="324">Content</text>
                  <text x="212" y="340">or</text>
                  <text x="256" y="340">Blocked</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
   o
---+---  +------------+                      +-----------+
   |     |            |       Visits         |           |  Rater +
   +     |  Browser   |--------------------->|  Website  |  Policy
  / \    |            |                  .---|           |  Selector
 /   \   +------------+                 |    +-----------+
               |   |      Redirected To |
               |   |                    |    +-----------+
               |   |                     '-->|           |
               |   |     Evidence of Age     |    Age    |
               |    '----------------------->| Assurance |  Verifier
               |                             |  Service  |
               |                         .---|           |
               |                        |    +-----------+
               |          Redirected To |
               |                        |    +-----------+
               |                         '-->|    Age-   |
               |           Admitted          |   Gated   |  Enforcer
                '--------------------------->|  Content  |
                         or Blocked          +-----------+
]]></artwork>
          </artset>
        </figure>
        <t>Some participants also noted that certain approaches may carry higher path-dependence risk once widely deployed, even if they remain theoretically possible to withdraw or replace. This can arise from accumulated architectural dependencies, operational integration with third-party services, and evolving expectations among users and service providers. As a result, architectures that tightly couple functionality to external verification services or embed assumptions about routine age signalling may increase the practical cost of transition, should alternative approaches later emerge that address privacy, equity, or effectiveness concerns more effectively.</t>
        <t><xref target="f-device"/> shows a deployment model for parental control software, showing how the roles from <xref target="roles"/> might apply. Here, parental controls do any verification of age necessary and select policies; content ratings might be performed by websites or the parental control software on the device; enforcement is performed on-device.</t>
        <figure anchor="f-device">
          <name>Parental Control Deployment Model</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="536" viewBox="0 0 536 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,32 L 32,80" fill="none" stroke="black"/>
                <path d="M 80,48 L 80,112" fill="none" stroke="black"/>
                <path d="M 80,208 L 80,256" fill="none" stroke="black"/>
                <path d="M 128,120 L 128,200" fill="none" stroke="black"/>
                <path d="M 184,48 L 184,112" fill="none" stroke="black"/>
                <path d="M 184,208 L 184,256" fill="none" stroke="black"/>
                <path d="M 368,48 L 368,112" fill="none" stroke="black"/>
                <path d="M 464,48 L 464,112" fill="none" stroke="black"/>
                <path d="M 8,48 L 56,48" fill="none" stroke="black"/>
                <path d="M 80,48 L 184,48" fill="none" stroke="black"/>
                <path d="M 368,48 L 464,48" fill="none" stroke="black"/>
                <path d="M 192,64 L 360,64" fill="none" stroke="black"/>
                <path d="M 192,96 L 360,96" fill="none" stroke="black"/>
                <path d="M 80,112 L 184,112" fill="none" stroke="black"/>
                <path d="M 368,112 L 464,112" fill="none" stroke="black"/>
                <path d="M 80,208 L 184,208" fill="none" stroke="black"/>
                <path d="M 80,256 L 184,256" fill="none" stroke="black"/>
                <path d="M 32,80 L 48,112" fill="none" stroke="black"/>
                <path d="M 172,120 L 196,168" fill="none" stroke="black"/>
                <path d="M 16,112 L 32,80" fill="none" stroke="black"/>
                <path d="M 196,168 L 212,168" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="368,64 356,58.4 356,69.6" fill="black" transform="rotate(0,360,64)"/>
                <polygon class="arrowhead" points="200,96 188,90.4 188,101.6" fill="black" transform="rotate(180,192,96)"/>
                <polygon class="arrowhead" points="180,120 168,114.4 168,125.6" fill="black" transform="rotate(243.43494882292202,172,120)"/>
                <polygon class="arrowhead" points="136,120 124,114.4 124,125.6" fill="black" transform="rotate(270,128,120)"/>
                <circle cx="32" cy="32" r="6" class="opendot" fill="white" stroke="black"/>
                <g class="text">
                  <text x="268" y="52">Visits</text>
                  <text x="128" y="84">Browser</text>
                  <text x="248" y="84">(Rated)</text>
                  <text x="312" y="84">Content</text>
                  <text x="416" y="84">Website</text>
                  <text x="508" y="84">Rater*</text>
                  <text x="244" y="164">Rater*</text>
                  <text x="280" y="164">+</text>
                  <text x="252" y="180">Enforcer</text>
                  <text x="132" y="228">Parental</text>
                  <text x="236" y="228">Verifier</text>
                  <text x="280" y="228">+</text>
                  <text x="132" y="244">Controls</text>
                  <text x="228" y="244">Policy</text>
                  <text x="292" y="244">Selector</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
   o
---+---  +------------+       Visits         +-----------+
   |     |            |--------------------->|           |
   +     |  Browser   |    (Rated) Content   |  Website  |  Rater*
  / \    |            |<---------------------|           |
 /   \   +------------+                      +-----------+
               ^     ^
               |      \
               |       \__ Rater* +
               |           Enforcer
               |
         +------------+
         |  Parental  |  Verifier +
         |  Controls  |  Policy Selector
         +------------+
]]></artwork>
          </artset>
        </figure>
        <t>An observation was made that laws often seek to designate a single entity as being responsible for ensuring that age restrictions are effective. That lawmakers feel the need to designate a responsible entity is due to constraints on how laws function, but one that creates other constraints.</t>
        <t>Another constraint identified was the need for specialist expertise in order to administer all of the multiple different age assurance techniques; see <xref target="waterfall"/>. This means that there is a natural tendency for services to contract with specialist age assurance services.</t>
        <t>Some of the proposed architectures were better able to operate under these constraints. Others required greater amounts of coordination, further emphasizing the importance of collaboration identified in <xref target="collaboration"/>.</t>
        <t>In discussion of the constraints on different architectures, it was common for participants to point to a particular aspect of a given approach as carrying risks. Indeed, the final reckoning of risks produced a long list of potential issues that might need mitigation (see <xref target="impacts"/>).</t>
        <t>Architectures are not equally vulnerable to different risks, so a more thorough analysis is needed to identify how each risk applies to a different approach. An analysis that considers the constraints and assumptions necessary to successfully deploy different architectures is a contribution that would likely be welcomed by the community.</t>
      </section>
      <section anchor="holistic">
        <name>Safety Requires More than a Technical Solution</name>
        <t>Experts in child safety frequently acknowledged that restricting access to selected content cannot be assumed to be sufficient. The task of ensuring that children are both kept appropriately safe, while preparing them for the challenges they will face in their lifetimes, is a massively complex task.</t>
        <t>A recurrent theme was the old maxim, "it takes a village to raise a child". This concept transcends cultural boundaries and was recognized. The role of parents, guardians, educators, governments, and online services in creating an environment in which children can thrive and grow.</t>
        <t>Content and service restrictions are likely only a small part of a suite of actions that combine to provide children with protection, but also support and encouragement. This theme was raised several times, despite the goal of the discussion being to explore technical and architectural questions.</t>
        <t>Restrictions are necessarily binary and lacking in nuance. Though questions of what to restrict were out of scope for the workshop, discussions often identified subject matter that highlighted the challenges inherent in making simplistic classifications. Participants acknowledged the importance of the role of the adults who support children in their life journey. For example, on the subject of eating disorders, which can be challenging to classify, participants pointed to the importance of being able to recognize trends and inform and engage responsible adults. Ultimately, each child has their own challenges and the people around them are in the best position to provide the support that best suits the child.</t>
        <t>The concept of age-appropriate design was raised on several occasions. This presents significant privacy challenges in that it means providing more information about age to services. However, it was recognized that there are legal and moral obligations on services to cater to the needs of children of different age groups. This is a more complex problem space than binary age restrictions, as it requires a recognition of the different needs of children as they get older.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Age verification has a significant potential security impact upon the Internet; see <xref target="trust"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="ANNOUNCE" target="https://datatracker.ietf.org/group/agews/about/">
        <front>
          <title>IAB/W3C Workshop on Age-Based Restrictions on Content Access (agews)</title>
          <author>
            <organization>Internet Architecture Board</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="CHATHAM-HOUSE" target="https://www.chathamhouse.org/about-us/chatham-house-rule">
        <front>
          <title>Chatham House Rule</title>
          <author>
            <organization>Chatham House</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="HANSON" target="https://datatracker.ietf.org/doc/slides-agews-slides-where-enforcement-happens/">
        <front>
          <title>Where Enforcement Happens</title>
          <author fullname="Julia Hanson">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="FATE" target="https://nvlpubs.nist.gov/nistpubs/ir/2023/NIST.IR.8491.pdf">
        <front>
          <title>Face Analysis Technology Evaluation (FATE)</title>
          <author fullname="Mei Ngan">
            <organization/>
          </author>
          <author fullname="Patrick Grother">
            <organization/>
          </author>
          <author fullname="Austin Hom">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="JACKSON" target="https://datatracker.ietf.org/doc/slides-agews-where-enforcement-happens/">
        <front>
          <title>Where Enforcement Happens</title>
          <author fullname="Dean Jackson">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="ISO-IEC-27566-1" target="https://www.iso.org/standard/88143.html">
        <front>
          <title>Information security, cybersecurity and privacy protection — Age assurance systems Part 1: Framework</title>
          <author>
            <organization>ISO</organization>
          </author>
          <date/>
        </front>
      </reference>
    </references>
    <?line 304?>

<section anchor="workshop-agenda">
      <name>Workshop Agenda</name>
      <t>The following sections cover each of the main topics of discussion sessions.</t>
      <section anchor="topic-introduction">
        <name>Topic: Introduction</name>
        <t>We will launch the workshop with a greeting, a round of introductions, and an explanation of the terms of engagement, background, goals and non-goals of the workshop.</t>
      </section>
      <section anchor="topic-setting-the-scene">
        <name>Topic: Setting the Scene</name>
        <t>Successfully deploying age restrictions at Internet scale has many considerations and constraints. We will explore them at a high level in order. The goal is to discuss within the group about the scope of topics that the workshop will seek to address.</t>
      </section>
      <section anchor="topic-guiding-principles">
        <name>Topic: Guiding Principles</name>
        <t>Architectural principles give us a framework for evaluating additions and changes to the Internet. Technical principles are subject to a number of other considerations, in particular human rights principles. We will review the principles that might apply to age-based restrictions, explain their function, impact, and how they are applied. Including human rights impacts, such as:</t>
        <ul spacing="normal">
          <li>
            <t>Privacy and Security</t>
          </li>
          <li>
            <t>Safety and efficacy</t>
          </li>
          <li>
            <t>Censorship and Access</t>
          </li>
          <li>
            <t>Access to the Internet</t>
          </li>
          <li>
            <t>Freedom of Expression</t>
          </li>
        </ul>
        <t>And effects on the internet and web architecture, such as:</t>
        <ul spacing="normal">
          <li>
            <t>Deployment, Extensibility and Evolution</t>
          </li>
          <li>
            <t>Avoid Centralization</t>
          </li>
          <li>
            <t>End-to-End</t>
          </li>
          <li>
            <t>One Global Internet/Web</t>
          </li>
          <li>
            <t>Layering and Modularity</t>
          </li>
        </ul>
      </section>
      <section anchor="topic-potential-impacts">
        <name>Topic: Potential Impacts</name>
        <t>We now want to look at some of the higher-level considerations that apply regardless of approach. We will look at some different perspectives on how to think of the overall problem. Discussion will seek to find how those perspectives can be shaped to guide choices.</t>
      </section>
      <section anchor="topic-where-enforcement-happens">
        <name>Topic: Where Enforcement Happens</name>
        <t>The Internet standards community is in the unique position to make controlled changes to the architecture of the Internet, and so there are multiple ways and places to deploy age restrictions. We will examine the options, with an eye to the deployment properties of each location and configuration, as related to the architectural principles. In particular, it will consider the establishment of new roles as well as the use of existing ones.</t>
      </section>
      <section anchor="topic-available-techniques">
        <name>Topic: Available Techniques</name>
        <t>There are several active and proposed systems for age restriction on the Internet. We will review them from the perspective of their interaction with the architectural principles, potential impacts, and with consideration of the enforcement options. Including:</t>
        <ul spacing="normal">
          <li>
            <t>Age verification: including server-side solutions using government identity systems / ZKP</t>
          </li>
          <li>
            <t>Age estimation: including biometrics and data analysis</t>
          </li>
          <li>
            <t>Age "inference" approaches</t>
          </li>
          <li>
            <t>In-network solutions</t>
          </li>
          <li>
            <t>Classification and On-device / parental control designs</t>
          </li>
        </ul>
      </section>
      <section anchor="discussion">
        <name>Discussion</name>
        <t>We will follow up on incomplete discussions and revisit architectural learnings.</t>
      </section>
      <section anchor="summary-and-reflection">
        <name>Summary and Reflection</name>
        <t>We will summarise what we have discussed and learned thus far.</t>
      </section>
      <section anchor="outcomes">
        <name>Outcomes</name>
        <t>We will outline the potential outcomes, further actions and next steps.</t>
      </section>
    </section>
    <section anchor="participants">
      <name>Workshop Attendees</name>
      <t>Attendees of the workshop are listed with their primary affiliation. Attendees from the program committee (PC), the Internet Architecture Board (IAB), and W3C Technical Architecture Group (TAG) are also marked.</t>
      <ul spacing="normal">
        <li>
          <t>Steve Bellovin</t>
        </li>
        <li>
          <t>Hadley Beeman, TAG (PC)</t>
        </li>
        <li>
          <t>Matthew Bocci, IAB (Observer)</t>
        </li>
        <li>
          <t>Christian Bormann, SPRIND</t>
        </li>
        <li>
          <t>Marcos Cáceres, TAG (Observer)</t>
        </li>
        <li>
          <t>Andrew Campling, 419 Consulting</t>
        </li>
        <li>
          <t>Sofıa Celi, Brave</t>
        </li>
        <li>
          <t>David Cooke, Aylo</t>
        </li>
        <li>
          <t>Iain Corby, Age Verification Providers Association</t>
        </li>
        <li>
          <t>Dhruv Dhody, IAB (Observer)</t>
        </li>
        <li>
          <t>Nick Doty, Center for Democracy and Technology (PC)</t>
        </li>
        <li>
          <t>Sarah Forland, New America Open Technology Institute</t>
        </li>
        <li>
          <t>Jérôme Gorin, Ecole Polytechnique</t>
        </li>
        <li>
          <t>Alexis Hancock, Electronic Freedom Foundation</t>
        </li>
        <li>
          <t>Julia Hanson, Apple</t>
        </li>
        <li>
          <t>Wes Hardaker, University of Southern California Information Sciences Institute</t>
        </li>
        <li>
          <t>Kyle den Hartog, Brave</t>
        </li>
        <li>
          <t>Dennis Jackson, Mozilla</t>
        </li>
        <li>
          <t>Leif Johansson, SIROS Foundation</t>
        </li>
        <li>
          <t>Mallory Knodel, Article 19</t>
        </li>
        <li>
          <t>Mirja Kühlewind, IAB (Observer)</t>
        </li>
        <li>
          <t>Jonathan Langley, Ofcom UK</t>
        </li>
        <li>
          <t>Veronica Lin, Carnegie Mellon University</t>
        </li>
        <li>
          <t>Thibault Meunier, Cloudflare</t>
        </li>
        <li>
          <t>Tom Newton, Qoria</t>
        </li>
        <li>
          <t>Mark Nottingham, IAB (PC Co-Chair)</t>
        </li>
        <li>
          <t>Georgia Osborn, Ofcom UK</t>
        </li>
        <li>
          <t>Tommy Pauly, IAB (PC)</t>
        </li>
        <li>
          <t>John Perrino, Internet Society</t>
        </li>
        <li>
          <t>Eric Rescorla, Knight-Georgetown Institute</t>
        </li>
        <li>
          <t>Beatriz Rocha, Ceweb.br</t>
        </li>
        <li>
          <t>Omari Rodney, Yoti</t>
        </li>
        <li>
          <t>Gianpaolo Scalone, Vodafone</t>
        </li>
        <li>
          <t>Sarah Scheffler, Carnegie Mellon University</t>
        </li>
        <li>
          <t>Andrew Shaw, UK National Cyber Security Centre</t>
        </li>
        <li>
          <t>Aline Sylla, German Federal Commissioner for Data Protection and Freedom of Information</t>
        </li>
        <li>
          <t>Martin Thomson, TAG  (PC Co-Chair)</t>
        </li>
        <li>
          <t>Carmela Troncoso, EPFL, the Swiss Federal Institute of Technology in Lausanne</t>
        </li>
        <li>
          <t>Benjamin VanderSloot, Mozilla</t>
        </li>
        <li>
          <t>Tara Whalen, World Wide Web Consortium (PC)</t>
        </li>
      </ul>
    </section>
    <section anchor="impacts">
      <name>Potential Impacts</name>
      <t>During the workshop, participants were asked to name potential impacts -- whether positive or negative -- that could be seen in association with the introduction of an age control mechanism. This list is not exhaustive, focuses largely on the challenges surrounding the introduction of such a mechanism, and does not imply that all points were agreed to by all participants'</t>
      <section anchor="impact-on-children">
        <name>Impact on Children</name>
        <ol spacing="normal" type="1"><li>
            <t>Children encounter online harms</t>
          </li>
          <li>
            <t>Pushing kids to less safe resources</t>
          </li>
          <li>
            <t>Kids lose the ability to explore on their own</t>
          </li>
          <li>
            <t>Diminishing children's rights</t>
          </li>
        </ol>
      </section>
      <section anchor="ecosystem-impact">
        <name>Ecosystem Impact</name>
        <ol spacing="normal" type="1"><li>
            <t>Centralization</t>
          </li>
          <li>
            <t>Fragmentation of the Internet</t>
          </li>
          <li>
            <t>Increased costs for running a Web site</t>
          </li>
          <li>
            <t>Chilling effects on use of the Internet</t>
          </li>
          <li>
            <t>VPNs proliferate</t>
          </li>
          <li>
            <t>Chilling effects on the publication of borderline content</t>
          </li>
          <li>
            <t>Less content being available online</t>
          </li>
          <li>
            <t>Restricting people to a few platforms / services</t>
          </li>
          <li>
            <t>More use/utility of the Internet due to a perception of safety</t>
          </li>
          <li>
            <t>More (or all) online services require a verified login</t>
          </li>
        </ol>
      </section>
      <section anchor="implementation-and-deployment-difficulties">
        <name>Implementation and Deployment Difficulties</name>
        <ol spacing="normal" type="1"><li>
            <t>Device compatibility</t>
          </li>
          <li>
            <t>"Advanced Persistent Teenagers"</t>
          </li>
          <li>
            <t>Difficulties regarding jurisdiction checking</t>
          </li>
          <li>
            <t>Spillover to other software (e.g., VPNs)</t>
          </li>
          <li>
            <t>Displacing users from compliant to non-compliant sites</t>
          </li>
          <li>
            <t>False sense of addressing the problem</t>
          </li>
          <li>
            <t>Dealing with conflict of laws</t>
          </li>
          <li>
            <t>Operators pulling out of territories</t>
          </li>
          <li>
            <t>Increasing the footprint of the deep web</t>
          </li>
          <li>
            <t>Imposition of cultural norms on other jurisdictions</t>
          </li>
          <li>
            <t>Technical solutions are reused for other purposes (scope creep)</t>
          </li>
          <li>
            <t>Dealing with obsolete and non-compliant systems</t>
          </li>
        </ol>
      </section>
      <section anchor="security-and-privacy">
        <name>Security and Privacy</name>
        <ol spacing="normal" type="1"><li>
            <t>Increased cybersecurity risks</t>
          </li>
          <li>
            <t>Fingerprinting risk</t>
          </li>
          <li>
            <t>Ad targeting could get creepier</t>
          </li>
          <li>
            <t>Needing to trust someone on their word without evidence</t>
          </li>
          <li>
            <t>Normalizing online identity requests -- increase to phishing risk</t>
          </li>
          <li>
            <t>Data breaches</t>
          </li>
        </ol>
      </section>
      <section anchor="equity">
        <name>Equity</name>
        <ol spacing="normal" type="1"><li>
            <t>Lack of access (e.g. due to lack of device support)</t>
          </li>
          <li>
            <t>Refugees, stateless people, people without identity</t>
          </li>
          <li>
            <t>Harm to vulnerable people</t>
          </li>
          <li>
            <t>Not addressing other vulnerable groups (i.e., not age-based)</t>
          </li>
          <li>
            <t>Lack of availability of redress mechanisms</t>
          </li>
          <li>
            <t>Users' rights to restitution</t>
          </li>
          <li>
            <t>Loss of control over and access to data</t>
          </li>
          <li>
            <t>Risk to anonymity</t>
          </li>
          <li>
            <t>Loss of ability to run software of your choice</t>
          </li>
        </ol>
      </section>
      <section anchor="societal-impacts">
        <name>Societal Impacts</name>
        <ol spacing="normal" type="1"><li>
            <t>Air cover for blocking the Internet</t>
          </li>
          <li>
            <t>User control of the content they see online</t>
          </li>
          <li>
            <t>Costs to society (e.g., regulatory overhead)</t>
          </li>
          <li>
            <t>Increased online tracking and state surveillance</t>
          </li>
          <li>
            <t>Use as a censorship mechanism</t>
          </li>
          <li>
            <t>Advancing foreign policy goals with censorship</t>
          </li>
          <li>
            <t>Abuse of guardians who don't cut off their wards</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="desirable-and-essential-properties-of-a-solution">
      <name>Desirable and Essential Properties of a Solution</name>
      <t>During the workshop, participants were asked to nominate the properties that they believed would be advantageous or even essential for a solution in this space to have. This set of requirements and desiderata was recognised as not all being achievable, as some goals are in tension with others.</t>
      <section anchor="functional">
        <name>Functional</name>
        <ol spacing="normal" type="1"><li>
            <t>Underage don't access content that's inappropriate</t>
          </li>
          <li>
            <t>Not trivially by-passable</t>
          </li>
          <li>
            <t>Flexible enough to be provided through different means</t>
          </li>
          <li>
            <t>Bound to the user</t>
          </li>
          <li>
            <t>Reliable</t>
          </li>
          <li>
            <t>Handles user-generated content</t>
          </li>
          <li>
            <t>Enables differential experiences or age-appropriate design (not just blocking)</t>
          </li>
          <li>
            <t>Agile by design -- assume adversarial engagement</t>
          </li>
          <li>
            <t>Difficult to bypass</t>
          </li>
          <li>
            <t>Accurate</t>
          </li>
        </ol>
      </section>
      <section anchor="accountability-and-transparency">
        <name>Accountability and Transparency</name>
        <ol spacing="normal" type="1"><li>
            <t>Transparency and accountability regarding what is blocked</t>
          </li>
          <li>
            <t>Minimises the need for trust decisions</t>
          </li>
          <li>
            <t>Can be independently / publicly verifiable and tested</t>
          </li>
          <li>
            <t>Auditability</t>
          </li>
          <li>
            <t>Appeal mechanism for incorrect labelling of content</t>
          </li>
        </ol>
      </section>
      <section anchor="privacy-and-security">
        <name>Privacy and Security</name>
        <ol spacing="normal" type="1"><li>
            <t>Issuer-Verifier and Verifier-Verifier unlinkability</t>
          </li>
          <li>
            <t>Unlinkability across components</t>
          </li>
          <li>
            <t>Purpose limitation of the data processed</t>
          </li>
          <li>
            <t>Security of data processed</t>
          </li>
          <li>
            <t>Phishing-resistant</t>
          </li>
          <li>
            <t>Doesn't process or transfer any more data than is necessary</t>
          </li>
          <li>
            <t>Avoids becoming a tracking vector</t>
          </li>
        </ol>
      </section>
      <section anchor="equity-1">
        <name>Equity</name>
        <ol spacing="normal" type="1"><li>
            <t>Inclusive</t>
          </li>
          <li>
            <t>Fair -- avoids or minimises bias</t>
          </li>
          <li>
            <t>Does not create inequalities (e.g., across education, other properties)</t>
          </li>
          <li>
            <t>Discriminates solely upon age, not other properties</t>
          </li>
          <li>
            <t>Works on open devices</t>
          </li>
          <li>
            <t>Device independence</t>
          </li>
          <li>
            <t>Usable by people of all ages to increase their safety online</t>
          </li>
          <li>
            <t>User choice in who verifies their age, and how</t>
          </li>
          <li>
            <t>No clear losers</t>
          </li>
          <li>
            <t>Accessible to people with disabilities</t>
          </li>
          <li>
            <t>Includes appeal mechanisms for incorrect age determinations</t>
          </li>
        </ol>
      </section>
      <section anchor="jurisdiction-and-geopolitical">
        <name>Jurisdiction and Geopolitical</name>
        <ol spacing="normal" type="1"><li>
            <t>Able to handle arbitrary composition of different jurisdictional requirements (possibly down to school level)</t>
          </li>
          <li>
            <t>Applicable globally</t>
          </li>
          <li>
            <t>Applies the rule of law in the jurisdiction where it applies universally</t>
          </li>
          <li>
            <t>No concentration of power in any one entity (or small group of them)</t>
          </li>
          <li>
            <t>No concentration of power in any country</t>
          </li>
          <li>
            <t>Aligned to legal duties</t>
          </li>
          <li>
            <t>Based upon a valid legal basis</t>
          </li>
        </ol>
      </section>
      <section anchor="usability">
        <name>Usability</name>
        <ol spacing="normal" type="1"><li>
            <t>Economically sustainable</t>
          </li>
          <li>
            <t>Low friction for adults</t>
          </li>
          <li>
            <t>Fast</t>
          </li>
          <li>
            <t>Comprehensible by users</t>
          </li>
        </ol>
      </section>
      <section anchor="implementation-and-deployment">
        <name>Implementation and Deployment</name>
        <ol spacing="normal" type="1"><li>
            <t>Low dependency on a single root of trust</t>
          </li>
          <li>
            <t>Enforceable by a good mix of technology and law</t>
          </li>
          <li>
            <t>Broad deployability -- not expensive or complex</t>
          </li>
          <li>
            <t>Decentralized</t>
          </li>
          <li>
            <t>Future-proof</t>
          </li>
          <li>
            <t>Ability to report / learn when there are issues in the system / telemetry</t>
          </li>
        </ol>
      </section>
      <section anchor="general-other">
        <name>General / Other</name>
        <ol spacing="normal" type="1"><li>
            <t>Not perfect</t>
          </li>
          <li>
            <t>Technically robust</t>
          </li>
          <li>
            <t>Not a single, sole solution</t>
          </li>
          <li>
            <t>Stable -- resilient</t>
          </li>
          <li>
            <t>Alignment of incentives among participants</t>
          </li>
          <li>
            <t>Simple to implement</t>
          </li>
          <li>
            <t>Resistance to repurposing for censorship</t>
          </li>
          <li>
            <t>Unable to be used for surveillance</t>
          </li>
          <li>
            <t>Addresses risk of verification becoming over-prevalent</t>
          </li>
          <li>
            <t>Accountable governance</t>
          </li>
          <li>
            <t>Open Standards-based</t>
          </li>
        </ol>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
