• humanspiral@lemmy.ca
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    1 hour ago

    Once a user verifies their identity with Persona, the software performs 269 distinct verification checks and scours the internet and government sources for potential matches, such as by matching your face to politically exposed persons (PEPs), and generating risk and similarity scores for each individual. IP addresses, browser fingerprints, device fingerprints, government ID numbers, phone numbers, names, faces, and even selfie backgrounds are analyzed and retained for up to three years.

    Literaly Skynet surveillance database from a Peter Thiel owned company. The height of Liberal faced governments, an identidity behind all similar legislation, is to pursure total nazi control over all of us.

    • OrgunDonor@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 hours ago

      How can I boycott something I don’t participate in more?

      Fuck these ages verification checks, for now, embrace the VPN life

  • GMac@feddit.org
    link
    fedilink
    English
    arrow-up
    29
    ·
    edit-2
    9 hours ago

    This is ridiculous and clearly shows both nefarious intent and complete disregard for the GDPR and it’s core principle of data minimisation. There must be a simpler solution to this - maybe through attestation from a trusted third party who has already (legitimately) verified the user’s identity - like a bank. Imagine a user creating and providing a token that allows a one-time request through the open banking standards to receive an attestation on whether or not the user is over 18 - without disclosing the users actual dob or any other personal information except who and how the attestation was made. Not sure if it would even be necessary for companies to store precisely when the attestation was made if the banks themselves record the event.

    • NarrativeBear@lemmy.world
      link
      fedilink
      English
      arrow-up
      14
      ·
      5 hours ago

      I have posted this a few times before.

      Somehow everyone has forgotten about parental controls that have been apart of consumer grade home routers for years.

      Parental controls are there specifically to help parents. These settings allow a parent to block everything online only allowing access to “approved lists” of websites, generaly done through a “whitelist” of approved websites.

      What is missing at a government level is a “curation effort” of websites, similar to Libraries that classify books by genres and appropriate age levels.

      I would propose a government fund where Librarians or similar organizations can start this effort, and make these lists easily accessible within routers for non tech individuals, together with local initiatives and programs for parents that have a interest to learn more.

      For power users, lists like these already exists curated by public individuals very similar to pihole block lists and whitelists.

      This concept would be the most privacy respectful IMO giving parents the most power to parent, while respecting everyone else’s privacy online including children.

      But we all know this is not about “protecting the children”, but really about mass surveillance for the public at all age groups, and yet this topic keeps coming up.

    • linule@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      6 hours ago

      Government could generate anonymous time-limited access tokens for specific scopes like age, citizenship, etc.

    • Regrettable_incident@lemmy.world
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      1
      ·
      9 hours ago

      Yeah, steam determines that someone is an adult if they have a credit card on their account. This seems like a simple and effective method. Although I do still sometimes have an ‘Are you over 18?’ query, maybe that’s from individual games.

      • GMac@feddit.org
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        8 hours ago

        good example that works well on a data minimisation basis when they the need is for some indication of age appropriated trust. There are limits to it though. - to actually satisfy age-gates/verification they would also need to tie your identity to the ownership of the card, and ensure the card isn’t some kind of under 18 prepaid affair.

        • 0x0@infosec.pub
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          1
          ·
          7 hours ago

          Prepaid cards have numbers that identify them.

          If we imposed rules that only adults can use regular cards and kids can use the equivalent of a child card, which is available at all major card issuers, this entire problem could be solved by the banks that already use KYC for basically the same reason.

          But that wouldnt get us closer to palantirs one world government so it isnt an option

          • smh@slrpnk.net
            link
            fedilink
            English
            arrow-up
            2
            ·
            4 hours ago

            Prepaid cards have numbers that identify them.

            Which, btw, makes perfect sense. As a shop that takes credit cards, I would want to know if someone has signed up for a subscription service with a prepaid card, since the card may run out, prematurely cancelling the service.

            There’s a big database at the backend of the credit card processor that keeps track of all this stuff. The shop can tell a lot about you based on your card number.

  • Sims@lemmy.ml
    link
    fedilink
    English
    arrow-up
    29
    ·
    10 hours ago

    “The state wants to see everything. The corporations want to see everything. And they’ve learned to work together.” -> mostly we just call the unification of Capitalists scum and state for “Fascism”… Congratulations to Merica and its vassal states for reaching the end-state of Capitalism. You made it - faster than any other nation in history…

    • Obinice@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      7 hours ago

      Hey now, they care so much about protecting children that they’ll cover them in body armour and send them in big groups to far away lands (to keep them safe from domestic terrorism ofc)!

  • fiat_lux@lemmy.world
    link
    fedilink
    English
    arrow-up
    111
    ·
    15 hours ago

    Persona’s exposed code compares your selfie to watchlist photos using facial recognition, screens you against 14 categories of adverse media from mentions of terrorism to espionage, and tags reports with codenames from active intelligence programs consisting of public-private partnerships to combat online child exploitative material, cannabis trafficking, fentanyl trafficking, romance fraud, money laundering, and illegal wildlife trade

    In the 1930’s, IBM subsidiary companies were responsible for the census data and concentration camp cataloguing systems in Nazi Germany (and it’s invaded territories). The numbers tattooed on prisoners were five-digit IBM Hollerith numbers, corresponding to their dedicated punch card. With an estimated 40k+ camps of different types, the machine leases would have been very lucrative for IBM. They won’t say how lucrative, and they made sure they had complex financial setups through “neutral” countries.

    IBM systems also underpinned the concentration “internment” camps in the US holding people of Japanese background. But of course, they’re much louder about their 1930’s history in winning the US Social Security contract - older SSNs were also Hollerith numbers.

    It would be amusing that punch cards were a more secure system if history didn’t look like it was rapidly repeating.

    • Doomsider@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      edit-2
      5 hours ago

      It was even worse than this. IBM also helped figure out how many Jews needed to be hauled away in trains. They used their computing power to determine how many Jews needed to be killed to clear out the ghettos based on population and ability to kill them. They helped plan the logistics for the Holocaust.