<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-iab-age-restrictions-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title>Architectural Considerations of Age Restriction</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-iab-age-restrictions-00"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Melbourne</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 42?>

<t>Around the world, policymakers are considering (and in some cases implementing) age restriction systems for Internet content. This document explores the unwanted impacts on the Internet that these systems are likely to have, and makes recommendations to increase their chances of becoming a successful part of the Internet infrastructure.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-iab-age-restrictions/"/>.
      </t>
      <t>
         information can be found at <eref target="https://mnot.github.io/I-D/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/I-D/labels/age"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Increasingly, policymakers are proposing and implementing regulation that restricts what content young people can access online. A recurring theme in these efforts is that it is no longer considered sufficient to rely on self-assertions of age, and so stronger guarantees are deemed necessary.</t>
      <t>Age restrictions are already deployed on the Internet: for example, some Web sites already require proof of age to create an account. However, when such deployments become more prevalent, they tend to have greater impact upon the Internet architecture, thereby endangering other properties that we depend upon for a healthy online ecosystem. Systems that are designed for deployment in a single, homogenous domain rarely are suitable for the diversity of requirements and considerations that apply to Internet-scale systems.</t>
      <t><xref target="risks"/> explores the unwanted impacts on the Internet that these systems are likely to have, and makes recommendations to increase their chances of becoming a successful part of the Internet infrastructure.</t>
    </section>
    <section anchor="risks">
      <name>Risks of Age Restriction</name>
      <t>This section catalogues risks that age restriction systems might encounter, expressed in terms of the Internet's architectural principles.</t>
      <section anchor="centralization">
        <name>Centralization</name>
        <t>One of the defining characteristics of the Internet's architecture is its avoidance of "gatekeeper" roles where a single entity (or small number of them) has unavoidable access to or control over communications. This architecture makes the Internet more resilient and avoids problematic concentrations of power.</t>
        <t>Inherently, any age restriction system involves controlling access to content and services on the Internet. When that system's use is legally required, it can be characterized as being centralized. However, that centralization is mitigated (to some degree) by the governance mechanisms that legitimize the legal basis of the system.</t>
        <t>However, other forms of centralization can occur in age verification systems that are more avoidable. For example, many proposed age restriction systems require verification by a single party. This is not how Internet-scale services are designed, because of the many risks incurred:</t>
        <t>First, that single operator will have access to a significant amount of sensitive information about people's activities on the Internet. Such a system is vulnerable to cyberattacks by organized criminals and nation-state actors. Centralizing so much sensitive data in one place creates an irresistible 'honey pot' for attackers.</t>
        <t>Second, that single operator will also have extraordinary access to that same data. Without very strong controls, they will be tempted to leverage that access (e.g., by reselling it, or 'insights' into the data collected). This is especially true if their incentives are not aligned with end users and services (e.g., if they have a profit motive and little opportunity for additional revenue).</t>
        <t>Third, any failure -- whether technical or business -- by that single operator creates an outage for all users dependant upon it. If the problem is significant, that outage may extend for a considerable amount of time.</t>
        <t>In all of these cases, having only one entity operating the system increases the associated risks dramatically.</t>
        <t>Even when multiple parties provide verification services, centralization can emerge if there is too much friction against user switching between them. For example, if Web sites rather than end users select the verification service used, this does not create a market that respects end user preferences; it only respects the self-interest of sites.</t>
        <t>Finally, age restriction systems can also have secondary effects that lead to centralization. For example, if an age restriction system requires use of a particular Web browser (or a small number of them), that effectively distorts the market for Web browsers.</t>
        <t>Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:</t>
        <ul spacing="normal">
          <li>
            <t>Avoid reliance on a single party to provide age verification services</t>
          </li>
          <li>
            <t>Provide some mechanism for easy switching between verification services by end users</t>
          </li>
          <li>
            <t>Avoid requiring use of an arbitrarily limited set of operating systems, Web browsers, client programs, or other software or hardware</t>
          </li>
        </ul>
        <t><xref target="CENTRALIZATION"/> explores these issues greater detail.</t>
      </section>
      <section anchor="privacy-and-security">
        <name>Privacy and Security</name>
        <t>It is technically challenging to design an age restriction system that exhibits the security and privacy properties expected of Internet standards. Exposing information about Internet users to third parties -- whether verifiers, services, or others -- creates powerful incentives. In particular, commercial interests desire access to it to be able to track activity across the Internet so that this can be sold (to advertisers, insurers and others), and so they will use (and abuse) any facility that offers such information to learn about what people are doing.</t>
        <t>In this context, age restriction systems can introduce several new risks to the Internet.</t>
        <t>Most immediately, a system that reveals the age (or birthdate) of Internet users to services on it is a privacy risk. A person's age is an attribute that can be used to discriminate against them without justification, and is legally protected by privacy law in many jurisdictions.</t>
        <t>Beyond that immediate risk, verifying services' potential access to personal information creates a powerful incentive for misuse -- whether as part of the business model of the verifying service, or by third parties (such as nation-state attackers).</t>
        <t>This is the case when verifying services over-collect such information (for example, age estimation services that use photos and biometrics), and it is also the case when users' activity is exposed to the verifying service when age restriction takes place. The latter risk is similar to the risk of tracking and profiling seen on the Web, which the Internet standards community has expended considerable effort to mitigate (see e.g., <xref target="RFC7258"/>).</t>
        <t>Furthermore, exposing information beyond age to services creates additional privacy and security risks. For example, an age verification system that also exposes the country a person is a citizen of allows sites to discriminate against that attribute, which is beyond the purpose of age restriction.</t>
        <t>Finally, even on its own a simple attribute like 'age in years' or 'birthdate' can be used to add entropy to an identifier for the end user (in combination with other information, such as IP addresses, browser characteristics, and so on), creating a new tracking vector when exposed to services that collect such information. See <xref target="TRACKING"/>.</t>
        <t>In all cases, the privacy and security of an age restriction system needs to be proven: considerable experience has shown that merely trusting assertions of these properties is ill-founded. Likewise, because data that is not collected cannot be shared or stolen, a system that uses technical means to limit data collection and usage is preferable over one that uses legal means (such as contractual terms).</t>
        <t>Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:</t>
        <ul spacing="normal">
          <li>
            <t>Avoid over-collection of information by age verifiers</t>
          </li>
          <li>
            <t>Avoid sharing information about service usage with age verifiers</t>
          </li>
          <li>
            <t>Avoid sharing information other than age information with services</t>
          </li>
          <li>
            <t>Minimise the amount of age information shared with services (e.g., using age brackets)</t>
          </li>
          <li>
            <t>Provide technical limitations to the collection and use of data</t>
          </li>
          <li>
            <t>Be based upon publicly available specifications that have had adequate security and privacy review to the level that Internet standards are held to</t>
          </li>
        </ul>
        <t>See also <xref target="PRIVACY"/>.</t>
      </section>
      <section anchor="barriers-to-access">
        <name>Barriers to Access</name>
        <t>Many existant proposals for age restriction systems require its users to have certain capabilities -- for example, a personal smartphone, a government credential, or a camera with certain resolution.</t>
        <t>Imposing these requirements means that some number of people will be disenfranchised from full use of the Internet – especially if age restriction becomes pervasive across many services. At the scale of the entire Internet (or even in a single country), this can be a large number of disenfranchised people.</t>
        <t>For example, many people only have Internet access from public computers (such as those in libraries), and do not have exclusive or reliable access to a smartphone. Others lack government-issued identity documents that some schemes rely upon.</t>
        <t>While such restrictions may be palatable in a closed system (such as on a single platform or in a single jurisdiction), they are not suitable for Internet-wide deployment.</t>
        <t>Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:</t>
        <ul spacing="normal">
          <li>
            <t>Avoid requiring hardware capabilities not widely available in desktop and mobile computers globally, both in terms of overall performance and specific features</t>
          </li>
          <li>
            <t>Avoid relying on a single mechanism for proving age</t>
          </li>
        </ul>
      </section>
      <section anchor="fragmentation">
        <name>Fragmentation</name>
        <t>The likelihood of incompatible age restriction systems being deployed in different jurisdictions around the world introduces a risk of fragmentation -- i.e., that the Internet will not work the same way in different places.</t>
        <t>Fragmentation is a growing concern for the Internet: various local requirements are creating friction against global deployment of new applications, protocols, and capabilities. As the Internet fragments, the benefits of having a single, globe-spanning networking technology are correspondingly lessened. Although a single factor (such as diverging approaches to age restriction) is unlikely to fragment the Internet on its own, the sum of such divergences increases the risk of fragmentation greatly, risking the viability of the Internet itself.</t>
        <t>In the context of age restriction, fragmentation is most concerning if someone were to need to understand and interact with (possibly after some onboarding procedure) a new system for each jurisdiction they visit. This would represent a significant barrier for users who travel, and would also present increased complexity and regulatory burden for businesses, potentially leading to further lack of competitiveness in some industries by increasing costs.</t>
        <t>Fragmentation is best addressed by adoption of common technical standards across jurisdictions.</t>
        <t>However, it is important to recognise that the mere existence of an international standard does not imply that it is suitable for deployment: experience has shown that voluntary adoption by implementers is important to prove their viability.</t>
        <t>Furthermore, standards do not necessarily enforce interoperability and the architectural goals that they espouse: if they allow too much interpretation of their application (for example, through optional-to-implement features, or too-generous extensibility mechanisms), they can fall short of these goals and only provide "air cover" for those who wish to claim standards compliance, without actually serving public interest goals -- thereby leading to fragmentation.</t>
        <t>Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:</t>
        <ul spacing="normal">
          <li>
            <t>Be based upon internationally recognised, open technical standards</t>
          </li>
          <li>
            <t>Be based upon technical standards that are voluntarily adopted by implementers</t>
          </li>
          <li>
            <t>Be specified in a manner that provides interoperability and ensures architectural alignment</t>
          </li>
          <li>
            <t>Be coordinated across jurisdictions wherever feasible</t>
          </li>
        </ul>
      </section>
      <section anchor="an-age-gated-internet">
        <name>An Age-Gated Internet</name>
        <t>The Internet is designed to be used without permission, both be servers and clients. Easy-to-use age restriction mechanisms risk creating a ‘papers please’ Internet, where a credential is required to access large portions of the Internet's services. Such an outcome would amplify the other harms listed.</t>
        <t>This risk is heightened if there are incentives for sites to deploy it, such as increased access to non-age data.</t>
        <t>Access to more granular age information also heightens many risks, because it makes a restriction system simultaneously useful in a broader variety of cases, and more attractive for misuse, because it offers more information about users.</t>
        <t>Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:</t>
        <ul spacing="normal">
          <li>
            <t>Make the use of age restrictions visible to end users</t>
          </li>
          <li>
            <t>Have a structural disincentive for indiscriminate use of age restriction</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no instructions for IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Age restriction systems undoubtedly have numerous security considerations, should they be deployed.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="CENTRALIZATION">
        <front>
          <title>Centralization, Decentralization, and Internet Standards</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
          <date month="December" year="2023"/>
          <abstract>
            <t>This document discusses aspects of centralization that relate to Internet standards efforts. It argues that, while standards bodies have a limited ability to prevent many forms of centralization, they can still make contributions that assist in the decentralization of the Internet.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9518"/>
        <seriesInfo name="DOI" value="10.17487/RFC9518"/>
      </reference>
      <reference anchor="PRIVACY">
        <front>
          <title>Privacy Considerations for Internet Protocols</title>
          <author fullname="A. Cooper" initials="A." surname="Cooper"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="J. Morris" initials="J." surname="Morris"/>
          <author fullname="M. Hansen" initials="M." surname="Hansen"/>
          <author fullname="R. Smith" initials="R." surname="Smith"/>
          <date month="July" year="2013"/>
          <abstract>
            <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6973"/>
        <seriesInfo name="DOI" value="10.17487/RFC6973"/>
      </reference>
      <reference anchor="TRACKING" target="https://www.w3.org/2001/tag/doc/unsanctioned-tracking/">
        <front>
          <title>Unsanctioned Web Tracking</title>
          <author>
            <organization>W3C TAG</organization>
          </author>
          <date year="2015" month="July"/>
        </front>
      </reference>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
    </references>
    <?line 180?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
