<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-knodel-age-arch-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="age-arch">Age Verification Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-knodel-age-arch-00"/>
    <author fullname="Mallory Knodel">
      <organization>Social Web Foundation</organization>
      <address>
        <email>mallory.knodel@nyu.edu</email>
      </address>
    </author>
    <author fullname="Gianpaolo Angelo Scalone">
      <organization>Vodafone Group</organization>
      <address>
        <email>gianpaolo-angelo.scalone@vodafone.com</email>
      </address>
    </author>
    <author fullname="Tom Newton">
      <organization>Qoria</organization>
      <address>
        <email>tom.newton@qoria.com</email>
      </address>
    </author>
    <date year="2025" month="November" day="05"/>
    <keyword>age verification</keyword>
    <abstract>
      <?line 50?>

<t>This document describes solution-agnostic and technology-neutral schema for how various intermediaries can gate content and services based on age. The analysis of the architecture is done based on the effectiveness of permitting or restricting access based on age. The document concludes with recommendations as well as critical privacy, security and human rights considerations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-knodel-age-arch/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mallory/draft-knodel-age-arch"/>.</t>
    </note>
  </front>
  <middle>
    <?line 54?>

<section anchor="background">
      <name>Background</name>
      <t>Our goal is to describe the technical difficulties in any age-gating mechanism such that it is effective and does not introduce security and privacy risks as well as contravene human rights. We also hope to show that age verification mechanisms are wholly technical solutions that are separate from, albeit often motivated by, the means of protecting young people online.</t>
      <t>Prior focus on child safety has led to robust trust and safety measures taken by large user platforms whereby content and behaviour moderation became industry standard. Its phases: Define, detect, evaluate, enforce, appeal, educate. This cycle ensures that criminal and unlawful content is taken down. Platforms and services with user generated content can also use this cycle to ensure content or behavior that violates platform terms of service.</t>
      <t>In parallel, network operators have for many years implemented forms of age-based access control that rely on content categorization or DNS-level filtering rather than on the collection of personal data. In several jurisdictions, ISPs are required to offer or enforce filtering systems that restrict access to adult or otherwise unsuitable content for minors. These systems typically work by classifying destination domains or content types into broad categories—such as adult, gambling, or violence—and allowing or blocking them according to the subscriber’s or guardian’s chosen policy. Because they do not require identity documents or individual profiling, such network-assisted methods can provide a baseline of child protection with substantially lower privacy risk. These approaches cannot replace service-level moderation or legal accountability, nor should they be standalone solutions outside of parental controls or family management settings.</t>
      <t>Relatively new are proposals to protect children via age gate. Age gating in the analog world is typically enforced at the point of action, sale or entry through hard document checks at liquor stores, as one example. Replicating age gating in the online world has encountered consistent tensions between accuracy and privacy, often reducing the problem to one of feasibility. Often, online age verification has taken the form of requiring websites to show a prompt to the user to self-declare their age or birthdate before they can gain access to content or services.</t>
      <t>Some services, websites, or apps require uploading hard documents to verify identity, just as some services, websites or apps require payment with a credit card. These often create an illusion for policy makers that users could be required by any service to require sharing of the same hard documents or credit card details in order to verify age at scale, both for all users and for a wide variety of platforms and services. However any such system is expensive, difficult to scale, and introduces data protection liability and privacy risks to users— including potential data breaches or the exclusion of users who do not possess traditional identity documents but who would otherwise be lawful users. Hard document identity review in the context of general-use platforms like social media unnecessarily scales the risk of privacy, access, and equity harms from requisite age gating for all users on all apps all the time.</t>
      <t>Many age verification methods conflict with data-protection frameworks and data minimization principles and pose serious safety, data security, and privacy risks. As such risks will be present in nearly all alternative methods of age verification, an overview of this category of risk will be of some benefit, while we leave method-specific commentary to the security, privacy and human rights considerations sections. Requiring all users on all platforms to submit verifiable credentials can create large, sensitive data troves in centralized intermediaries that are vulnerable to breaches, fraud, or misuse. Once compromised, this information is difficult—if not impossible—to secure again. Compounding these concerns, precise location—required to determine compliance with jurisdiction-specific laws—is implicitly inferred in all methods, adding another layer of sensitive data to the name and age information being collected, processed, and stored.</t>
      <t>From an operational and architectural perspective, centralizing or repeatedly exchanging such verification data may also create systemic risks to resilience, security, and interoperability. Large-scale credential exchanges or cross-border look-ups introduce new attack surfaces and potential points of failure within authentication or content-delivery paths.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Language matters because it shapes how we think about these systems. "Assurance" is less official than "verification" and "estimation" admits inherent imprecision. <xref target="EFF-Age-Terminology"/></t>
        <t><strong>Age Verification</strong> – Process of confirming a user’s age using an authoritative or verifiable source (e.g., government ID, credential, or trusted record).</t>
        <t><strong>Age Assurance</strong> – Broader set of methods providing confidence about a user’s age or age range without requiring formal identity verification.</t>
        <t><strong>Age-gating</strong> - refers to age-based restrictions on access to online services. Age gating can be required by law or voluntarily imposed as a corporate decision.</t>
        <t><strong>Age Estimation</strong> - Instead of asking you directly, the system <em>guesses</em> your age based on data it collects about you.</t>
        <t><strong>Self-Attestation</strong> – User-declared statement of age or date of birth without third-party validation.</t>
        <t><strong>Guardian Attestation</strong> – Verification performed or consent provided by a parent or legal guardian on behalf of a minor.</t>
        <t><strong>Intermediary</strong> – Any actor between the user and a service, including device OS, application platform, content-delivery system, resolver, or network operator.</t>
        <t><strong>Service-Level Age Control</strong> – Mechanisms enforced by online platforms or applications (e.g., login requirements, content gating, or age tokens).</t>
        <t><strong>Network-Assisted Age Control</strong> – Privacy-preserving measures implemented at or near the connectivity layer, such as DNS or policy-based content filtering, typically based on user or guardian preference and without identity collection.</t>
        <t><strong>On-Device Assurance</strong> – Local verification or estimation methods executed on the user’s device (e.g., age-range inference, parental settings) where data does not leave the device.</t>
        <t><strong>Credential Provider</strong> – Entity that issues, stores, or validates user credentials used for age verification or assurance.</t>
        <t><strong>Data Minimization</strong> – Principle that personal data should be limited to what is necessary for a specific, explicit purpose (per frameworks such as GDPR).</t>
        <t><strong>Privacy-Preserving Signaling</strong> – Exchange of metadata or tokens between system components to enforce policy without exposing personal identifiers.</t>
        <t><strong>Shared-Responsibility Model</strong> – Architectural approach in which service, device, and network layers each contribute to age-appropriate access control within their scope, reducing centralization and single points of failure.</t>
        <t><strong>Circumvention</strong> – Any attempt by users or systems to bypass or falsify age-related controls or policies.</t>
        <t><strong>Jurisdictional Compliance</strong> – Ability of a system to align with local or national laws defining age-related content or access restrictions.</t>
      </section>
    </section>
    <section anchor="analysis-of-age-gating-methods">
      <name>Analysis of age gating methods</name>
      <t>In this section, we analyse purely based on the efficacy of providing and restricting access based on age. Efficacy means that it works, but also we consider feasibility, circumvention and accuracy.</t>
      <t>Efficacy should also reflect cooperation across layers—service, device, and network—so that no single actor bears full responsibility or control of user data. In/Feasibility also includes operational scalability—methods that add latency or centralize look-ups may weaken both reliability and privacy. Circumvention may occur not only by users but also through weak or misaligned intermediaries; distributing enforcement across independent layers limits large-scale bypass. In/accuracy of the method, false positives and negatives, and what users can do about it. Recourse and remedy, e.g. who is responsible and what happens when: the determination of age could be wrong; age-verification is inaccurate; no one adopts it and users don’t use it; people abuse it; companies abuse it; there is a breach; it can be circumvented.</t>
      <t>For all of these approaches, there are also a number of overarching issues that make them less desirable. For example, as noted above, many would require collection of precise location information to comply with jurisdiction-by-jurisdiction privacy laws or other requirements. Important to note that geolocating users remains an unsolved problem. Inaccurate geolocation means people will be unnecessarily excluded or have an incorrect set of laws applied to them. This problem is likely to get worse as IPv4 fragments further.</t>
      <t>These sorts of efforts would also create complex questions of how to obtain accurate age information from long-standing, existing users. Difficult questions also arise around how users can “age up” in platforms over time, retaking control of their accounts and data without oversight.</t>
      <t>Beyond these threshold issues, specific proposals for age gating or age verification may or may not be effective. We take effective to mean that they work for both those permitted and those restricted and that they are feasible, durable against circumvention, and accurate.</t>
      <t>Additionally, age gating naturally puts a barrier to entry on a given site. Publishers spend a lot of time optimising their sites for ease of use, and are now being asked to pay a third party to bounce away a lot of their customers - both legitimate and otherwise. As such the economic argument for publishers to ignore the law is strong, particularly for laws enacted in states where that publisher has no legal entity. Inevitably, in the often used example of pornography, there will be many more non-compliant sites than compliant sites, and these non-compliant sites are likely to be non-compliant in other ways - eg effectively age gating their content creators.</t>
      <section anchor="age-credentials">
        <name>Age credentials</name>
        <t>The State issues the credentials that are “ground truth,” however none provide age as the singular datum, thereby disclosing more data about the user than is specific to the mandate to verify age. Examples of the provisioning of credentials include: Issuance of a birth certificate; Issuance of a passport; Teens: Issuance of a driver’s licence (though only in the US would this be for a u18); Issuance of a social insurance number / SSN / generic international name (no birthdate).</t>
        <t>Other hard documents that risk being less accurate include credit card (no birthdate but demonstrates banked eligibility) or student ID (not standardized, often no birthdate but gives approximation through education level).</t>
        <t>Even in digital form, such as national eID or mobile driving-licence systems, these credentials expose more information than necessary.</t>
      </section>
      <section anchor="age-verification">
        <name>Age verification</name>
        <t>Age verification is performed when a guardian, the service or third party has direct, verified knowledge of the credential and assures a service of age. Hard document review would require the disclosure of documents containing a wide variety of sensitive information. This information would not be limited to a users’ age and would include data not necessary to determine whether or not a user should be permitted to use a social media platform (e.g., address, credit card number, etc.). Requiring such disclosures of all users would create substantial security and privacy concerns (e.g., risk of data breaches, exposure of additional personal information to platforms themselves).</t>
        <t>For credentials both physical and digital, unless they are coupled with selective-disclosure or verifiable zero-knowledge proof (ZKP) techniques. Using intermediaries at the device, service, or network layer to handle only minimal attributes (“over 16,” “over 18”) can preserve regulatory trust while limiting personal-data exposure. Verification frameworks could also rely on distributed attestations or policy-based tokens issued by trusted intermediaries, enabling services to confirm age eligibility without persistent identifiers or central repositories.</t>
        <t>Moreover, determined users may still falsify credentials or exploit systemic workarounds, undermining the effectiveness of these measures. Minors and adults alike may migrate to other extra jurisdictional platforms for comparable features rather than share the credentials required to clear a higher bar for age verification.</t>
        <t>Considerations for various intermediaries of age include the following.</t>
        <t>A guardian who is accountable for the child assures the child’s age. This can be limiting for those with nontraditional family structures, wards of the state, and also assumes guardianship duties are always performed in the best interest of the child.</t>
        <t>A jurisdiction or a governmental agency to be the arbiter of whether a citizen or resident would be allowed to have access to the internet or access specific websites and services. This would have both process and political consequences.</t>
        <t>KYC (know-your-customer laws in countries that define certain industries as sensitive, such as banks, telecoms, etc) could theoretically be extended to any industry including social media, education platforms or blogging websites. However, doing so would blur the line between financial compliance and social regulation, embedding surveillance logics into general internet use. It could also make access to general-use and basic communication services contingent on a financial transaction framework, which not all internet-accessible platforms and services provide.</t>
        <t>Operating system–level verification shifts responsibility to device vendors and app ecosystems. While this potentially removes redundancy for users who already have a trust relationship with these intermediaries, this approach would concentrate power in a few private actors. The few OS or app ecosystems could incentivize and or be required to facilitate wider-spread age data requests from apps. They could also be in a position to determine or enforce access across wider categories of apps or content beyond characteristics such as age. Such centralization would raise competition, transparency, and accountability concerns, particularly where OS providers operate globally but respond to local regulatory pressures.</t>
        <t>Other third-party intermediaries or age verification services could offer modular, privacy-preserving verification as a service layer. Yet without strong oversight and interoperability standards, these actors could create new forms of data brokerage, fragmentation, or lock-in. Their economic incentives—to monetize verification or analytics—may conflict with users’ social and cultural rights, especially if pricing or access varies across regions.</t>
        <t>In many jurisdictions, regulated entities such as banks or telecommunications operators already perform age or identity checks under audited privacy frameworks. Extending such existing infrastructures with additional privacy-preserving layers could bridge regulatory and technical feasibility.</t>
        <t>Verifiers should be held accountable in systems where they are disclosed information (no matter how privacy preserving). Those presenting proofs should have a way to report or contest a request or determination made within these systems. Especially in the case of denial of access. Treating the user as the only potentially hostile party would ignore the power dynamics in jurisdictions where age verification is mandatory. Also, verifiers should be held to a standard of reporting and registration of their scope of collection. Especially in countries where age verification systems are being developed in tandem with digital ID systems.</t>
      </section>
      <section anchor="age-assurance">
        <name>Age assurance</name>
        <t>Age assurance is an umbrella term often used to describe the various methods whereby the user, a guardian, the service, third party, or age verification service assures the service of age to the direct, or verified knowledge of the credential to various degrees of confidence.</t>
        <t>Age assurance can be performed by any of the age verification intermediaries listed in the previous section.</t>
        <t>The user can self-attest, which is status quo for almost every service at this time.</t>
        <t>A guardian can attest and be a legal guarantor to their children like Facebook Messenger Kids. This mechanism also serves to ensure a user is in fact a child, and not an adult impersonating a child.</t>
        <t>Connecting new users to parents’ accounts, COPPA “requires those operators to obtain verifiable consent from the children's parents before collecting, using, or disclosing children's personal information” and under GDPR they must “obtain this consent from a parent and make reasonable efforts to verify the identity of that parent.” (Epic Games, Kids Web Services (KWS) at “Welcome to Kids Web Services,” <eref target="https://dev.epicgames.com/docs/kids-web-services/welcome-to-kws">https://dev.epicgames.com/docs/kids-web-services/welcome-to-kws</eref>).</t>
        <t>An additional concern is that this measure proliferates rather severely user data, risking feasibility. Rather than minimizing data not just about the child but for the parent, this requires all parents to first verify their age (invoke recursion analysis). Verifiable consent is then required in addition to verifying a parent-child relationship between users, all of which invoke hard document review.</t>
        <t>Non-state institutional or contract-bound intermediary like a court-appointed guardian, a school or an employer. The linking of undergraduate and professional emails as methods by which social media platforms could increase the accuracy of their age verification processes fall short because these are typically only given to individuals of undergraduate or professional age, eg o18. At the same time requiring an undergraduate or professional email is likely to exclude a substantial number of adults. Users aged 13-17 who have not begun attending undergraduate institutions or working in professional environment will be unable to create accounts on the platform as a result Additionally, users from lower-income backgrounds, homeschool settings, or international markets where educational institutions do not provide email addresses will be irrationally excluded. Such an arbitrary and discriminatory outcome would amount to an unreasonable limit on access.</t>
        <t>The service itself could perform age verification, age estimation or age assurance via the user directly or a third party, eg guardian.</t>
      </section>
      <section anchor="age-estimation">
        <name>Age estimation</name>
        <t>Some examples of age estimation or inference of age have been proposed to use a variety of behavioural and context-specific signals, not all of which users explicitly opt in to. There are general concerns that the use of user data for the purposes of age estimation can contravene data privacy frameworks that limit data usage to specific consent structures. Nonetheless we elaborate a couple of mechanisms here:</t>
        <t>The behaviour of a user on a platform, including who they are friends with or what kind of content they engage in can provide some clues as to their age. However this data is limited to what service providers know about these users and is not as accurate for younger users since statistically there are fewer ways for the platform to know that its estimation is accurate.</t>
        <t>Biometric signals are considered age estimation rather than age assurance or verification because it’s not rooted in authoritative or ground truth. Biometric methods such as image or video facial scans are accompanied by a variety of flaws that prevent it from being a reasonable alternative. First, facial analysis technology is notoriously unreliable in estimating age, especially for teenagers, whose facial features change rapidly and vary widely. (Ngan, M. and P. Grother, Face Recognition Vendor Test (FRVT) Performance of Automated Age Estimation Algorithms, NIST Interagency Report 7995, Nat’l Inst. of Standards &amp; Tech. (Mar. 20, 2014), https://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7995.pdf) These tools can easily misclassify users depending on lighting, ethnicity, or facial expression. (Ganel, T., Sofer, C., &amp; Goodale, M. A. (2022). Biases in human perception of facial age are present and more exaggerated in current AI technology. Scientific reports, 12(1), 22519. <eref target="https://doi.org/10.1038/s41598-022-27009-w">https://doi.org/10.1038/s41598-022-27009-w</eref>)</t>
      </section>
      <section anchor="other">
        <name>Other</name>
        <t>There are perhaps other more indirect ways of achieving age appropriate use of online content and services. Perhaps broadly we could refer to these as market and content-based solutions.</t>
        <t>Market: The prohibition of advertising, marketing, or subscriptions targeting children under the allowed age supports harm reduction while preserving privacy by disincentivizing children from joining platforms. This is realizable through regulatory action and addresses risk without compelling platforms to surveil or profile young– or any– users by disallowing the acceptance of payments for advertisements to children under the allowed ages.</t>
        <t>At the infrastructure level, network or payment intermediaries can also enforce such prohibitions through category-based or transaction-type filtering that does not require user profiling. These methods are enforceable through consumer protections and guardrails that exist in the financial sector.</t>
        <t>Rather than continuous geolocation, minimal-exposure signaling between networks and services could meet jurisdictional needs without tracking individuals. Networks maintain awareness of user location and applicable jurisdiction through routing, addressing, and service-delivery functions. This contextual knowledge could support privacy-preserving determination of the user-to-jurisdiction link, avoiding the need for continuous device-level geolocation. However there are implications for enforcement at the network level given the broad surface available for network level censorship capability on a per-user basis.</t>
        <t>Content moderation more broadly is the commitment of services and platforms to ensure online experiences are fit for purpose, given the intended user base. For example certain k-12 educational websites with user generated content are certainly engaged in some strong degree of content moderation because the platform is for learning in schools, and not, say, popular culture or entertainment.</t>
      </section>
    </section>
    <section anchor="enforcement">
      <name>Enforcement</name>
      <t>Once age has been determined to a satisfactory degree, it’s important to interrogate the means by which content or a service is either accessible or not. This happens solely at the service level. In this section we expand on what happens once the service has obtained age assurance, or age verification if it has been party to hard documentation directly.</t>
      <t>It is generally important to note that the very definition of “adult content” is not universal. Material that one jurisdiction or culture classifies as adult—such as partial nudity, depictions of smoking, or the use of firearms—may be considered artistic, commercial, or sporting content elsewhere. As a result, even a compliant service might not be aware that some of its material would qualify as adult under another legal framework. This variability underscores the need for proportional, interoperable signaling systems rather than rigid or global classifications.</t>
      <t>Platforms and services enforce by limiting access or visibility of certain categories of content based on the verified age attribute of a user or account. This can take several forms: hard blocks on sign-up, “shadow” restrictions such as hiding posts from underage accounts, or algorithmic filtering that reduces exposure to sensitive material. Enforcement at the service level can also include requiring a logged-in session tied to an attested age, but this raises issues around traceability, persistent identifiers, and the erosion of anonymous access to lawful content.</t>
      <t>Devices enforce by interpreting or acting on signals from applications, browsers, or operating systems to restrict or permit access. For instance, parental-control settings or OS-level content ratings can automatically block apps or sites flagged as adult. Device-level enforcement is often marketed as a privacy-preserving solution because it happens locally, but it can also centralize control in a few proprietary ecosystems and create dependency on vendor-defined “age ratings.” This can entrench cultural biases or commercial interests rather than reflect nuanced or localized standards.</t>
      <t>Some considerations for networks that enforce age gating may be instructive for any system design as well, though content moderation at this lower network layer tends to be objectionable [[RFC 9505]]:</t>
      <ul spacing="normal">
        <li>
          <t>There exist internet standards for any service to signal to the user that it is adult-only. Any device, including web browsers, can elect to confirm this signal. It would be recommended to require all services that disallow users under a specific age to use this standard to use the “restricted to adults” label and that the OS, browser and app levels heed this signal. (RTA Label, available at <eref target="https://www.rtalabel.org/">https://www.rtalabel.org/</eref>) This should also be paired with self-attestation methods. Enforced by an ISP would be network level censorship.</t>
        </li>
        <li>
          <t>Similar signaling could extend to DNS or resolver functions, where privacy-preserving flags indicate that a domain hosts age-restricted material. [[cite <eref target="http://blog.cloudflare.com/introducing-1-1-1-1-for-families/">http://blog.cloudflare.com/introducing-1-1-1-1-for-families/</eref>]] Such information can guide optional filtering at the user or guardian’s request without content inspection or identity disclosure.</t>
        </li>
      </ul>
      <t>There is a view that common, interoperable approaches across service, device, and network layers could lower compliance costs and align incentives for safer adoption. However this lowering of barriers to implementation would be considered a negative if age-gating is considered a form of disenfranchisement and censorship, or if the age-gating capabilities are applied to additional attributes of end users.</t>
    </section>
    <section anchor="types-of-web-based-platforms-and-internet-services">
      <name>Types of web-based platforms and internet services</name>
      <t>We have described a range of methods for age gating, however we must acknowledge that not all content, platforms, and services need to take the same approach. Enforcement need not be uniform across all Internet services. Core infrastructure and access networks may implement category-level controls; devices and browsers can interpret standardized labels; and services can apply context-specific age checks. Aligning these layers reduces redundancy and minimizes risk.</t>
      <t>It is our hope that in this section we try to describe the type of platforms and services such that “no age assurance”, “self-attestation” and “hard document age verification” can vary in their approach, and also vary across age groups as well: under 13, teens, over 18/adult.</t>
      <t>Core Internet infrastructure — Physical connectivity, routing, DNS, and encryption layers. These should remain neutral and privacy-preserving, but can optionally support privacy-preserving signaling (e.g., domain-category metadata or parental-policy tokens) chosen by users or guardians.</t>
      <t>Governmental and intergovernmental services — Sites such as taxation, immigration, or public-sector portals (e.g., <eref target="http://irs.gov">irs.gov</eref>). These normally require verified identity and age by design and operate under statutory data-protection frameworks.</t>
      <t>Essential social, cultural, and economic rights (ESCR) services — Platforms providing access to banking, education, news, or health information. These typically must be broadly accessible regardless of age and should avoid unnecessary barriers.</t>
      <t>General-purpose platforms — Social-media, messaging, gaming, or e-commerce services serving mixed audiences. These are best suited to layered age-assurance approaches combining user, guardian, and optional network-assisted controls, depending on jurisdiction.</t>
      <t>Context-dependent or borderline content — Material whose classification varies by culture or law (e.g., artistic nudity, tobacco, weapons). Here, enforcement may rely on localized signaling or policy mapping at device or network level rather than global content bans.</t>
      <t>Adult-only services — Platforms distributing explicit sexual, gambling, or similar content (e.g., pornhub). These require high-assurance age verification but should implement it with minimal data disclosure and interoperable signaling for users and networks.</t>
    </section>
    <section anchor="types-of-platforms-and-services">
      <name>Types of Platforms and Services</name>
      <t>While age assurance can apply across many kinds of online services, the majority of user exposure and regulatory debate concerns general-use platforms—social-media, messaging, gaming, and app-distribution ecosystems that mix adult and minor audiences. These platforms collect large volumes of user data and operate globally, so privacy, feasibility, and jurisdictional diversity become the most acute design challenges.</t>
      <t>In some jurisdictions, regulations already mandate the blocking or restriction of specific platforms for users below a certain age—for instance, national orders prohibiting access to social-media services such as TikTok for minors. Such measures highlight both the policy urgency and the architectural complexity of enforcing age-based restrictions at scale, since these platforms often serve mixed audiences and operate across borders.</t>
      <t>General-use platforms can be further grouped according to how users interact and how moderation and access controls are applied:</t>
      <t>• Social-interaction platforms (e.g., social networks, video-sharing, live streaming) — rely heavily on user-generated content and recommendation algorithms; enforcement usually combines self-attestation, parental tools, and service-level moderation.</t>
      <t>• Communication platforms (e.g., messaging, voice, forums) — involve private or semi-private exchanges where content is not always visible to the provider; here, age assurance must operate without content inspection, typically through account-level or device-level signaling.</t>
      <t>• Gaming and virtual-world platforms — include interactive environments with in-app purchases and chat; suitable controls combine guardian consent, payment-based age hints, and optional network-assisted filtering for external links.</t>
      <t>• App stores and distribution platforms — act as aggregation points enforcing developer compliance and can apply uniform age labels or assurance tokens to downstream services.</t>
      <t>Beyond these general-use categories, several specialized domains require tailored approaches:</t>
      <t>• Adult-only or restricted-commerce services — high-assurance verification with minimal data disclosure.</t>
      <t>• Governmental and public-sector services — identity-bound by default within existing eID frameworks.</t>
      <t>• Essential-rights services (banking, health, news, education) — broad accessibility and minimal friction.</t>
      <t>• Core Internet infrastructure (DNS, routing, encryption) — privacy-preserving and neutral, supporting only optional signaling chosen by the user or guardian.</t>
      <t>Focusing the analysis on general-use platforms helps clarify where architectural guidance is most needed. Specialized or regulated sectors already have established compliance channels, whereas mixed-audience platforms face the hardest trade-offs between safety, usability, and privacy.</t>
    </section>
    <section anchor="concluding-recommendations">
      <name>Concluding recommendations</name>
      <ul spacing="normal">
        <li>
          <t>Reducing harm to children on the internet requires an incremental, all-hands approach and cannot be solved by age verification alone. A holistic approach would embrace privacy by design and data minimization principles that protect children as well as adults from platform overreach.</t>
        </li>
        <li>
          <t>If lawmakers are in a position to outlaw internet services for users of ages under 18 years old, they are in a position to define new credentialing systems that are fit for purpose rather than rely on hard documentation meant for operating automobiles, crossing national borders or social services entitlements.</t>
        </li>
        <li>
          <t>Introducing additional age-based signup requirements would risk harm to user privacy and free expression for all users of the web, not just to children, but especially to children.</t>
        </li>
        <li>
          <t>To date, jurisdictions around the world are considering various potential age-gating alternatives to mitigate potential safety risks to children without negatively impacting all social media users and without unduly compromising user privacy have reported evidence that advanced technical approaches to verify and assure age are currently infeasible or have significant downsides as compared to status quo approaches of self-reporting.</t>
        </li>
        <li>
          <t>Any mandate of age verification effectively regulates all users, rather than companies, to clear a compliance bar in which they must verify their age to the service to use an app. This approach does not address the central thrust of the problem statement, which seems to be that social media companies build platforms that are inclusive to children. Age assurance also regulates all users but has a lower bar and reduced friction for compliance making it a more inclusive choice overall.</t>
        </li>
        <li>
          <t>Content moderation of user generated content by platforms and services continues to be an established and effective way to ensure unlawful and disallowed content and behaviour is detected or reported and actioned with proper recourse and remedy mechanisms in the case of overreach.</t>
        </li>
        <li>
          <t>A more resilient approach may rely on a plurality of mechanisms operating at different layers of the Internet architecture—service, device, and network—each limited in scope and aligned with privacy-by-design principles. In this model, no single actor holds or processes all user information; rather, complementary methods (for example, self-attestation, trusted-service assurance, or privacy-preserving network-assisted filtering) can contribute to age-appropriate access control according to local regulation and user choice. Such diversity of methods can improve overall robustness and inclusiveness while reducing dependence on any single trust anchor. Contradicting data-protection principles like minimization means that if widely implemented without such safeguards, age-verification systems could still result in mass data collection on both adults and children, with far-reaching implications for user privacy and safety.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security considerations</name>
      <t>In general the cross-platform and over-the-wire exchange of information described in nearly all of the architectural choices above implicate security risks due to the complexity of the requirements, cooperation between several different parties and the expectation that this would be done at scale, for all users, not– perhaps naively assumed– just for youth.</t>
      <t>When security tools are considered services that need age-gating such as in proposals to not allow youth to use end-to-end encryption this puts them at great risk and would never be supported by security considerations. Nor would age-gating of encryption be possible without some kind of intervention akin to backdooring encryption.</t>
      <t>Hard document review – If instantiated, such measures would require the collection, processing, storage and securing of sensitive personal data from all users, including minors, which increases the risk of harm in the case of data breaches. (Privacy International, The Sustainable Development Goals, Identity, and Privacy: Does their implementation risk human rights? (Aug. 29, 2018), https://privacyinternational.org/long-read/2237/sustainable-development-goals-identity-and-privacy-does-their-implementation-risk) This processing and storage are vectors for mass and targeted surveillance by any State jurisdiction party to the UN Convention on Cybercrime.</t>
      <t>Guardian and parental controls – This approach leaves the responsibility for age verification to parents, which can be fraught in some of the most acute cases of child abuse. [[Lily Hay Newman, Apple Kills Its Plan to Scan Your Photos for CSAM. Here’s What’s Next, WIRED (Dec. 7, 2022), <eref target="https://www.wired.com/story/apple-photo-scanning-csam-communication-safety-messages/">https://www.wired.com/story/apple-photo-scanning-csam-communication-safety-messages/</eref>]] In short, outside the context of mandatory age verification, these mechanisms can be used as tools for abusive parental or guardian surveillance.</t>
      <t>If the surveillance power is given to the state instead, encouraging oversight by a potentially abusive regime is of real concern. Neither state nor parental control addresses in-person abuse of a child and technology can not solve that societal issue.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy considerations</name>
      <t>Risks previously mentioned fundamentally challenge data-minimization efforts and compliance with established data-protection frameworks such as the EU General Data Protection Regulation (GDPR), which requires that personal data be collected only for specific purposes and limited to what is strictly necessary for those purposes.</t>
      <t>General – Cross-platform tracking with methods that require all intermediary methods described above, spreading this information around rather than minimizing it.</t>
      <t>In general, any mandatory age verification will technically enforce limitations of being anonymous online and the right to access resources on the web without being bound to a general or long term identification process over time, which have implications for human rights.[[cite https://undocs.org/A/HRC/2932]]</t>
      <t>With third-party verification – the providers involved notwithstanding, the centralized risk of data being resold or mishandled increases.</t>
      <t>Guardian and parental controls – The main concern with these parental controls features is that they enable use but potentially, depending on how they are designed, surveilled use, which may harm children and teens by creating confusion about their privacy and autonomy. On the one hand they may feel a false sense of privacy and that their activities are insulated from the platform, and on the other hand they might self-censor out of concern for the oversight that the parental controls provide their caretakers. These proposals take a narrow view of parent-child relationships and fail to consider the harms as described briefly by CDT: “In particular, LGBTQ youth and children in abusive homes are especially vulnerable to injury and reprisals, including from their parents or guardians, and may inadvertently expose sensitive information about themselves or their friends to adults, with disastrous consequences.” [[cite CDT: Apple’s Changes to Messaging and Photo Services Threaten Users’ Security and Privacy, (Aug. 5, 2021), <eref target="https://cdt.org/press/cdt-apples-changes-to-messaging-and-photo-services-threaten-users-security-and-privacy">https://cdt.org/press/cdt-apples-changes-to-messaging-and-photo-services-threaten-users-security-and-privacy</eref>]]</t>
    </section>
    <section anchor="human-rights-considerations">
      <name>Human rights considerations</name>
      <t>There is also significant agreement amongst the civil liberties and human rights communities that age verification poses more peril than the promise because of, “the ways in which they are often inaccurate; can be circumvented; present privacy and security risks; and may be entirely inaccessible to certain groups, including undocumented immigrants, unbanked individuals, people with disabilities, and others who either do not have access to government ids or who might be more commonly misidentified by biometric technology.” [[cite Ruane, Branum, Doty, Jain, CDT Files Amicus Brief in Free Speech Coalition v. Paxton, Challenging TX Age Verification Law, Center for Democracy and Technology (Sept. 23, 2024), <eref target="https://cdt.org/insights/cdt-files-amicus-brief-in-free-speech-coalition-v-paxton-challenging-tx-age-verification-law/">https://cdt.org/insights/cdt-files-amicus-brief-in-free-speech-coalition-v-paxton-challenging-tx-age-verification-law/</eref>]]</t>
      <t>The Universal Declaration of Human Rights is fundamental to designing technical means of age-gating but also whether and how these means are implemented. [[RFC 8280]] Prior, we have addressed privacy in the previous section. Additionally are considerations for free expression and free association. Economic, Social and Cultural rights are also important to consider as these include the right to personhood eg hard documents issued by the state; but also how age-gating might impact a variety of aspects of life for young people in the digital age.</t>
      <section anchor="free-expression">
        <name>Free expression</name>
        <t>Any content gating risks limiting lawful access to information, disproportionately affecting most marginalized people’s ability to engage in political, educational, and artistic discourse. Overbroad implementation risks chilling participation in online spaces that are essential for learning, advocacy, and identity formation, undermining Article 19 of the UDHR.</t>
      </section>
      <section anchor="free-association">
        <name>Free association</name>
        <t>Mandatory identity checks for access to online services can deter participation in communities and movements that rely on pseudonymity for safety—such as youth networks, LGBTQ+ forums, or activist groups. This threatens the rights to assembly and association under Articles 20 and 23 of the UDHR by forcing users to trade anonymity for access.</t>
      </section>
      <section anchor="social-rights">
        <name>Social Rights</name>
        <t>Right to social security and social protection — Systems may require digital identity or proof-of-age to access benefits, which can exclude those without ID or those in marginalized groups (ICESCR art. 9). Think about kids "in the system" or as "wards of the state" here.</t>
        <t>Right to work and just conditions — Young workers might face barriers if age-verification systems are used in hiring or platform work, e.g., gig apps that require invasive ID scans. Kids 14-16 and up can often work in most places in the world, where bossware and other measures are increasingly in place.</t>
        <t>Right to health — Age-gating can affect access to online sexual and reproductive health information, mental-health support forums, harm-reduction services, or LGBTQ+ youth resources.</t>
      </section>
      <section anchor="cultural-rights">
        <name>Cultural Rights</name>
        <t>Right to participate in cultural life and access information — Content filters and strict age gates may overblock art, literature, or cultural expression, especially where sexuality or gender diversity is part of culture (ICESCR art. 15).</t>
        <t>Scientific progress and its benefits — Excessive identification hurdles can chill participation in online learning, open science communities, or software sharing.</t>
      </section>
      <section anchor="economic-rights">
        <name>Economic Rights</name>
        <t>Right to education and vocational training — Age verification that requires credit cards, government IDs, or costly processes can exclude minors or low-income students from MOOCs or online courses (ICESCR art. 13).</t>
        <t>Right to enjoy the benefits of one’s own creative work — Young creators and small businesses can be locked out of platforms if compliance costs are high or verification is inaccessible. There are a lot of famous kids on the internet making a lot of money from sponsorships and ads and this should be democratized and equally accessible globally.</t>
        <t>Non-discrimination in economic life — Systems that assume everyone has a passport, bank account, or biometric record can indirectly discriminate against migrants, refugees, undocumented people, or low-income families.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="EFF-Age-Terminology" target="https://www.eff.org/deeplinks/2025/10/age-verification-estimation-assurance-oh-my-guide-terminology">
        <front>
          <title>Age Assurance, Estimation, Verification—Oh My! A Guide to the Terminology</title>
          <author>
            <organization>Electronic Frontier Foundation (EFF)</organization>
          </author>
          <date year="2025" month="October"/>
        </front>
      </reference>
    </references>
    <?line 337?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
