DEV Community

CaraComp
CaraComp

Posted on • Originally published at go.caracomp.com

Discord Leaked 70,000 IDs Answering One Simple Question: Are You 18?

Analyzing the technical fallout of Discord's age verification breach

The news of 70,000 government-issued IDs being exposed due to Discord’s age-appeal process is a sobering case study in architectural over-collection. For developers working in computer vision and biometrics, this isn't just a security failure—it is a fundamental misunderstanding of the "minimum viable data" required to answer a binary question.

When a platform needs to know if a user is over 18, the engineering instinct often leans toward the most authoritative source: government ID. But by collecting a full scan of a driver's license to verify one bit of information (True/False), you are creating a high-value honeypot of PII. From a technical perspective, the Discord breach highlights the urgent need to move away from identity-linked verification and toward threshold-based estimation.

The Accuracy vs. Liability Trade-off

In the world of facial analysis, we deal with Mean Absolute Error (MAE). Research shows that facial age estimation tools can achieve an MAE of 1.3 years for the 13–17 age bracket. For most developers, this precision is statistically significant enough to handle age-gating without ever requiring a name, address, or license number.

The problem is that many compliance workflows confuse facial comparison (matching one face to another in a controlled environment) with biometric identification (linking a face to a government database). At CaraComp, we focus on the former because it serves the investigator's specific need—comparing a case photo against a suspect photo using Euclidean distance analysis—without the surveillance baggage of the latter.

Better Architectures: ZKP and ISO Standards

If you are building verification systems today, you should be looking at Zero-Knowledge Proofs (ZKP) and the ISO/IEC 18013-7 standard for digital credentials. These technologies allow a system to receive a cryptographic "attestation" that a user meets an age requirement without the raw document ever leaving the user’s device.

Mathematically, your backend should receive a proof, not a packet of sensitive data. When you store 70,000 driver's licenses, you aren't just storing images; you're storing 70,000 opportunities for identity theft.

Why This Matters for Private Investigators and OSINT

For the solo investigators and small firms we support at CaraComp, the Discord breach is a reminder of why tech caliber matters. Many investigators are still manually comparing faces across case photos, spending hours on what an algorithm can do in seconds. Others rely on cheap consumer tools that lack professional reliability or court-ready reporting.

We’ve seen the industry move toward enterprise tools that cost $1,800+ per year, often because they promise "total identity" solutions. But most investigators don't need a surveillance state; they need a reliable way to perform Euclidean distance analysis on their own case photos. We built CaraComp to provide that enterprise-grade comparison for $29/month, focusing on the math of the match rather than the collection of the identity.

In our field, "more data" isn't always better—it's often just more liability. Whether you're a developer building an age-gate or an investigator closing a fraud case, the goal is the same: answer the question with the minimum amount of data required to reach a confident conclusion.

How are you handling data minimization in your computer vision or biometric workflows to avoid creating these types of identity honeypots?

Top comments (0)