DEV Community

Kevin Bridges
Kevin Bridges

Posted on

We Solved HTTPS. Why Haven’t We Solved Age Verification?

There’s something fundamentally broken about how the internet handles age verification.

Right now, most websites rely on a system that looks like this:

“Are you 18?” → Click yes → full access

That’s not a safeguard. It’s a checkbox with zero enforcement.

At the same time, social media companies and online platforms are increasingly being held responsible for protecting minors from harmful content, addictive design, and inappropriate interactions. The expectation is rising—but the infrastructure to support it hasn’t kept up.

We’re asking platforms to solve a hard, global identity problem… individually.

That’s the real issue.


The Wrong Problem

Most debates around age verification focus on edge cases:

  • What if a kid lies?
  • What if they use a parent’s account?
  • What about privacy?
  • What about global access?

These are valid concerns—but they miss the bigger picture.

The goal should not be:

“Make it impossible for minors to access restricted content”

That’s unrealistic.

Instead, the goal should be:

“Replace fake safeguards with real, reasonable friction—and give platforms a standard way to enforce it.”

We already accept this model in the physical world:

  • ID checks for alcohol
  • Age restrictions for movies
  • Gambling regulations

None are perfect. All are still worth doing.


The Real Problem: No Shared Infrastructure

Think about how the internet solved other hard problems:

  • Payments → Stripe, PayPal, Visa
  • Authentication → Google, Apple, OAuth
  • Security → TLS certificates (DigiCert, GoDaddy)

We don’t expect every website to:

  • Build its own payment processor
  • Create its own encryption standard
  • Design its own login system

We created shared infrastructure layers instead.

But for age verification?

Every platform is improvising.


A Better Model: Age Tokens as Infrastructure

What if age verification worked more like HTTPS?

Instead of every website collecting IDs or guessing ages, we introduce:

Age Tokens — simple, verifiable credentials that prove a user meets an age requirement (e.g., “18+”) without revealing identity.

How it would work:

  1. A user verifies their age with a trusted provider
  • PayPal, Google, a bank, telecom, or government system
  1. The provider issues a signed credential
  • “This user is over 18”
  1. A website requests proof when needed
  • e.g., accessing adult content or certain features
  1. The user shares a token
  • The site verifies the signature—not the identity

The PKI Analogy (Why This Scales)

This model mirrors how HTTPS works today:

HTTPS Age Verification
Certificate Authorities (DigiCert, GoDaddy) Age Providers (PayPal, Google, governments)
SSL Certificates Age Tokens
Browsers trust a list of CAs Platforms trust a list of providers

A website doesn’t need to know who you are—only that:

A trusted authority vouches for a specific property.

In this case:

“This user is over 18.”


Why This Approach Works

1. No Reinventing the Wheel

Platforms don’t need to build their own verification systems. They integrate once.


2. Better Privacy

Websites don’t collect:

  • IDs
  • birthdates
  • biometric data

They only receive a yes/no assertion.


3. Global Flexibility

Different regions can use different methods:

  • U.S. → private providers (Google, PayPal)
  • EU → privacy-focused digital identity wallets
  • China → state-backed systems
  • Developing regions → telecom-based verification

The platform doesn’t care how verification happens—only that the token is valid.


4. Clearer Accountability

Responsibility becomes shared and defined:

  • Providers → verify age correctly
  • Platforms → enforce access using tokens

Today, that line is blurry.


5. Realistic Enforcement

This doesn’t eliminate bypassing—and it doesn’t need to.

It:

  • Removes trivial access (“just click yes”)
  • Adds friction
  • Creates enforceable standards

That’s how most regulatory systems work.


Addressing the Obvious Objections

“What if kids bypass it?”

They will.

Just like:

  • fake IDs
  • borrowed accounts
  • sneaking into restricted content

The goal is harm reduction at scale, not perfection.


“What about weak providers?”

Not all providers should be equal.

We can define:

  • Trust levels (high, medium, low assurance)
  • Standards for inclusion
  • Revocation and auditing mechanisms

Just like certificate authorities today.


“Does this become a surveillance system?”

It could—if implemented poorly.

The safer design:

  • No identity sharing
  • One-time or unlinkable tokens
  • Minimal data disclosure

This is a design choice, not a limitation.


“What about people without ID?”

This is a real concern.

That’s why the system must support:

  • Multiple provider types
  • Region-specific solutions
  • Graduated access (not full lockout)

The goal is not:

“No token = no internet”

But:

“Higher-risk content requires stronger assurance”


What This Changes

Instead of:

“Why didn’t this company prevent harm?”

We can ask:

“Did this company implement reasonable, standardized safeguards?”

That’s a much more actionable and fair expectation.


The Bigger Shift

This idea reframes age verification from:

  • A feature each platform builds to
  • An infrastructure layer of the internet

That’s how the internet has historically solved complex problems.


Final Thought

Right now, we expect platforms to:

  • maximize engagement
  • protect users
  • verify age globally
  • respect privacy laws
  • and get it all right

Without giving them a shared system to do it.

That’s not sustainable.

If we want better outcomes, we shouldn’t just demand accountability—we should build the infrastructure that makes accountability possible.


We already solved trust for websites (HTTPS).
We already solved identity for login (OAuth).

Age verification doesn’t need to be reinvented 1,000 times.

It just needs to be treated like the infrastructure problem it is.

Top comments (0)