mRr3b00t Profile picture
Aug 1 17 tweets 8 min read Read on X
What could happen when you ban or put barriers in front of things on the internet?

Surely nothing bad could happen, because you are restricting of banning the bad thing right! *inserts Anakin/Padme meme*

#OnlineSafetyAct #UK Image
So let's look at the scenario:

Controls have been placed in front of adult content sites (where the visitor is 'from the UK') Image
Introducing the Online Safety Act (a UK Law which applies to UK Citizens/UK Organisations) - sitting in a global internet! (that's important to recognise) Image
what doe the Act aim to tackle?

As you can see it's not just about children, it's also about:

> Illegal Content
> Adult Content Control
> Suicide and Self Harm Content Image
Now ok so we know the aim/intent of this act is to prevent/reduce harms to children! So what is one of then key mechanisms they are introducing?
> Age Verification of UK Citizens

(key part here is the standards of age verification and the target audience/applicability of LAW) Image
Ok so we know the Act is mandating age verification for pornography sites but you will see that (because of the board wording of the act) it does not just apply to these sites!

However, let's look at this use case. What are the standards for age verification? Image
so previous state required a YES/NO.

now we have 'age verification' controls (maybe not the best word to use here...)

Remember this is ring fenced to UK citizens only. Image
So the methods: what we have seen is most orgs are going for Facial age estimation or Photo ID matching...

But the key thing here is: The service provider get to choose.

the control must be:

'technically accurate, robust, reliable and fair.'

[legally I imagine that's some vague AF wording, what is accurate? what is robust? what is reliable? what is fair?]
################

Facial age estimation – you show your face via photo or video, and technology analyses it to estimate your age.

Photo-ID matching – this is similar to a check when you show a document. For example, you upload an image of a document that shows your face and age, and an image of yourself at the same time – these are compared to confirm if the document is yours.

Open banking – you give permission for the age-check service to securely access information from your bank about whether you are over 18. The age-check service then confirms this with the site or app.

Digital identity services – these include digital identity wallets, which can securely store and share information which proves your age in a digital format.

Credit card age checks – you provide your credit card details and a payment processor checks if the card is valid. As you must be over 18 to obtain a credit card this shows you are over 18.

Email-based age estimation – you provide your email address, and technology analyses other online services where it has been used – such as banking or utility providers - to estimate your age.

Mobile network operator age checks – you give your permission for an age-check service to confirm whether or not your mobile phone number has age filters applied to it. If there are no restrictions, this confirms you are over 18.
so a question here must be raised?
what harms are there to a 17 year old watching porn?
what harms are there to an 18 year old watching porn?

but also: are there any benefits to watching porn?

according to GROK there are benefits! (who knew!) Image
Image
so that's an open question:
> what are the harms? (if any)
> what are the benefits? (if any)

what other mediums could an under 18 potentially use?
> Adult Film/DVD/Blueray/Broadcast TV
> Adult Books
> Adult Magazines

we have to always look at actor motivation and incentives!

(also remember I'm talking legal content)

so we have a MOTIVATED and INCENTIVISED actor! (person for normal people speak)

they have MEANS, MOTIVE, CAPABILITY (they typically have better skills that the general population of adults when it comes to computers/internet)
We also have to ask about harms to the content creators/participants...... but given this is all legal and consensual that's out of scope for this.

this is focusing on the actor that is trying to view content!

So are there benefits to learning how to bypass controls?

I could easily argue that learning to 'hack' or 'bypass' controls on computers has a range of benefits....

but it also comes with risks!Image
By adding controls in around age verification, are we creating risk for the people we are trying to protect?

> are we making people under 18 into criminals?
> are we causing more harm than we are preventing?
>are we creating a next generation army of hackers? (that could be good or bad subject to how the skills are applied)

are we trying to solve a societal activity (I am not using the word problem on purpose)?

I would assume based on personal experience and the very nature of this act existing that a big chunk of under 18s watch adult content.....

if they do this.... is trying to stop them?
sensible?
useful?
achievable?

and will it reduce harm or create more?Image
What skills could someone learn by hacking or bypassing these age verifications? Image
What risks are we creating by sending all this PII everywhere? Image
In this thread I've tried to explore at a high level the fact that:

> censorship creates other risks
> controls create both opportunities and risks
> motivated actors who are innovative are hard to prohibit from achieving objectives (the youth)
> PII & Data processing/collection creates a range of risks (some are very significant)

If your families data was stolen and then criminals threatened to physically harm your children (or your family/friends) because they wanted to watch porn for 10 minutes.....

what if they managed to drain their bank accounts?

what harms are we preventing? (I'm struggling with seeing this here in the context of say a 17 year old watching adult content)

what harm potential have we crated?

It's never simple, it's never one sided.

Over simplification and reductionist thinking about this simply doesn't help.

But lastly..... since all of this can by bypassed with less skill than it takes to take down marks and Spencers.....

have we done the right thing?

have we created more risk/harm than we aimed to prevent?

#OnlineSafetyActImage
sorry forgot to include this earlier:

ARE WE FORCING PEOPLE INTO DARK CORNERS?

ARE WE EXPOSING THEM TO MORE HARM?

#OnlineSafetyAct #Internet #Privacy
and last part probably:

where is the data going? is any of it being sold? is any of it being used to train models?

there's a huge area of potential risk here outside of the criminals side ....

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with mRr3b00t

mRr3b00t Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @UK_Daniel_Card

Aug 17
Damn you demo gods!

Ok so WiFi pews!

We have a few things setup!

Firstly the TP-Link to show how poor their defaults are (on most of their kit I find ITW)

You can crack the key space here in 4 minutes on a laptop with not mega GPU

One of the WiFi participants managed to capture the key material and then crack the hashes from the TP-link so they won some swag! (A shadow router and a tp link usb WiFi adaptor #ironic)

What didn’t work during the workshop was capturing a hash from the WPA2 PSK network on the UniFi gear…. And I don’t know why!

So time to investigate!Image
Image
ok so to explain the UNIFI setup a bit:

we have a Unifi Express 7! This has an ethernet WAN port. So because we want to have this as a mobile lab, we combine it with a GL-iNet Router via ethernet then we can use that router to get an internet connection (either WIFI repeater, Ethernet, USB 4G Modem)

(we could use other kit but this works well)

so here we have the GL-AXT1800 in WIFI repeater mode! so now are UNIFI router has internet access!Image
so here we have the Unify Console dashboard!

Next step let's go check out the wireless networks! Image
Read 18 tweets
May 29
I just stole a load of files using AnyDesk from a machine with MDE on it (EDR) (this is a demo they aren’t real files and I’m the owner)

30 files stolen…..

How many are in the logs as being accessed? Image
Image
As you can see here there are not 30 device events

also I can't see any DeviceFIleEvents because there were no files created or deleted/modified etc. Image
Now I’m going to steal some CIA (fictional) files via the WhatsApp desktop app! Image
Read 13 tweets
Feb 21
I have hacked the Apple Advanced data protection disablement in the UK! Haha take that you bastards!!!! ✌️🤓 Image
😜🥸
Before people get their knickers in a twist I did no exploitation I simply decided to go back to my ancestorial roots!!
Read 8 tweets
Feb 11
lol

The government don’t use SQqqqqlllllllll 🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣

Oh boy 🤣🤣🤣🤣🤣🤣🤣🤣

What else don’t they use? Oracle? Windows? VMware sphere? Come on 🤣🤣🤣🤣🤣🤣🤣🤣 Image
I have some news for people! The internet is visible to people... I know shocking isn't it!

ROFL Image
ALSO: SHAREPOINT runs on SQL!

LOL LOL LOL LOL LOL LOL LOL LOL
Read 23 tweets
Jan 29
looks similar as almost every org I've worked with (super broad generalisation)

legacy systems oh my! wait till we see what runs in the private sector! (don't tell anyone about those 2008 servers!) Image
This might sound doom and gloom but having a view of maturity/resiliance across the government is a great thing! you can't address what you don't 'know' about!

This paragraph sounds in line with most orgs (IMHO)

I've been conducting maturity assessments for orgs of all shapes and sizes for a long long time! lots of people say they are a 3 when they are in fact a 1-2 (if we are using CMMi-SCV etc.)Image
Read 6 tweets
Nov 4, 2024
Morning world! Slept ‘ok’ (not great not terrible)

So yesterday I was doing some mitm6 over public WiFi (in the lab) and whilst I was speeding dns responses to Microsoft Google Facebook Twitter etc.

My web clients simply did not follow the responses and went to the actual sites!

Anyone know why? (It’s probably something like dnssec etc.)Image
Now in this instance it’s not even spoofing (you would see an event)

Let’s grab a windows laptop! Image
Now to show you the server is working here We have spoofs being sent! Image
Read 34 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(