mRr3b00t Profile picture
Aug 1 17 tweets 8 min read Read on X
What could happen when you ban or put barriers in front of things on the internet?

Surely nothing bad could happen, because you are restricting of banning the bad thing right! *inserts Anakin/Padme meme*

#OnlineSafetyAct #UK Image
So let's look at the scenario:

Controls have been placed in front of adult content sites (where the visitor is 'from the UK') Image
Introducing the Online Safety Act (a UK Law which applies to UK Citizens/UK Organisations) - sitting in a global internet! (that's important to recognise) Image
what doe the Act aim to tackle?

As you can see it's not just about children, it's also about:

> Illegal Content
> Adult Content Control
> Suicide and Self Harm Content Image
Now ok so we know the aim/intent of this act is to prevent/reduce harms to children! So what is one of then key mechanisms they are introducing?
> Age Verification of UK Citizens

(key part here is the standards of age verification and the target audience/applicability of LAW) Image
Ok so we know the Act is mandating age verification for pornography sites but you will see that (because of the board wording of the act) it does not just apply to these sites!

However, let's look at this use case. What are the standards for age verification? Image
so previous state required a YES/NO.

now we have 'age verification' controls (maybe not the best word to use here...)

Remember this is ring fenced to UK citizens only. Image
So the methods: what we have seen is most orgs are going for Facial age estimation or Photo ID matching...

But the key thing here is: The service provider get to choose.

the control must be:

'technically accurate, robust, reliable and fair.'

[legally I imagine that's some vague AF wording, what is accurate? what is robust? what is reliable? what is fair?]
################

Facial age estimation – you show your face via photo or video, and technology analyses it to estimate your age.

Photo-ID matching – this is similar to a check when you show a document. For example, you upload an image of a document that shows your face and age, and an image of yourself at the same time – these are compared to confirm if the document is yours.

Open banking – you give permission for the age-check service to securely access information from your bank about whether you are over 18. The age-check service then confirms this with the site or app.

Digital identity services – these include digital identity wallets, which can securely store and share information which proves your age in a digital format.

Credit card age checks – you provide your credit card details and a payment processor checks if the card is valid. As you must be over 18 to obtain a credit card this shows you are over 18.

Email-based age estimation – you provide your email address, and technology analyses other online services where it has been used – such as banking or utility providers - to estimate your age.

Mobile network operator age checks – you give your permission for an age-check service to confirm whether or not your mobile phone number has age filters applied to it. If there are no restrictions, this confirms you are over 18.
so a question here must be raised?
what harms are there to a 17 year old watching porn?
what harms are there to an 18 year old watching porn?

but also: are there any benefits to watching porn?

according to GROK there are benefits! (who knew!) Image
Image
so that's an open question:
> what are the harms? (if any)
> what are the benefits? (if any)

what other mediums could an under 18 potentially use?
> Adult Film/DVD/Blueray/Broadcast TV
> Adult Books
> Adult Magazines

we have to always look at actor motivation and incentives!

(also remember I'm talking legal content)

so we have a MOTIVATED and INCENTIVISED actor! (person for normal people speak)

they have MEANS, MOTIVE, CAPABILITY (they typically have better skills that the general population of adults when it comes to computers/internet)
We also have to ask about harms to the content creators/participants...... but given this is all legal and consensual that's out of scope for this.

this is focusing on the actor that is trying to view content!

So are there benefits to learning how to bypass controls?

I could easily argue that learning to 'hack' or 'bypass' controls on computers has a range of benefits....

but it also comes with risks!Image
By adding controls in around age verification, are we creating risk for the people we are trying to protect?

> are we making people under 18 into criminals?
> are we causing more harm than we are preventing?
>are we creating a next generation army of hackers? (that could be good or bad subject to how the skills are applied)

are we trying to solve a societal activity (I am not using the word problem on purpose)?

I would assume based on personal experience and the very nature of this act existing that a big chunk of under 18s watch adult content.....

if they do this.... is trying to stop them?
sensible?
useful?
achievable?

and will it reduce harm or create more?Image
What skills could someone learn by hacking or bypassing these age verifications? Image
What risks are we creating by sending all this PII everywhere? Image
In this thread I've tried to explore at a high level the fact that:

> censorship creates other risks
> controls create both opportunities and risks
> motivated actors who are innovative are hard to prohibit from achieving objectives (the youth)
> PII & Data processing/collection creates a range of risks (some are very significant)

If your families data was stolen and then criminals threatened to physically harm your children (or your family/friends) because they wanted to watch porn for 10 minutes.....

what if they managed to drain their bank accounts?

what harms are we preventing? (I'm struggling with seeing this here in the context of say a 17 year old watching adult content)

what harm potential have we crated?

It's never simple, it's never one sided.

Over simplification and reductionist thinking about this simply doesn't help.

But lastly..... since all of this can by bypassed with less skill than it takes to take down marks and Spencers.....

have we done the right thing?

have we created more risk/harm than we aimed to prevent?

#OnlineSafetyActImage
sorry forgot to include this earlier:

ARE WE FORCING PEOPLE INTO DARK CORNERS?

ARE WE EXPOSING THEM TO MORE HARM?

#OnlineSafetyAct #Internet #Privacy
and last part probably:

where is the data going? is any of it being sold? is any of it being used to train models?

there's a huge area of potential risk here outside of the criminals side ....

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with mRr3b00t

mRr3b00t Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @UK_Daniel_Card

May 29
I just stole a load of files using AnyDesk from a machine with MDE on it (EDR) (this is a demo they aren’t real files and I’m the owner)

30 files stolen…..

How many are in the logs as being accessed? Image
Image
As you can see here there are not 30 device events

also I can't see any DeviceFIleEvents because there were no files created or deleted/modified etc. Image
Now I’m going to steal some CIA (fictional) files via the WhatsApp desktop app! Image
Read 13 tweets
Feb 21
I have hacked the Apple Advanced data protection disablement in the UK! Haha take that you bastards!!!! ✌️🤓 Image
😜🥸
Before people get their knickers in a twist I did no exploitation I simply decided to go back to my ancestorial roots!!
Read 8 tweets
Feb 11
lol

The government don’t use SQqqqqlllllllll 🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣

Oh boy 🤣🤣🤣🤣🤣🤣🤣🤣

What else don’t they use? Oracle? Windows? VMware sphere? Come on 🤣🤣🤣🤣🤣🤣🤣🤣 Image
I have some news for people! The internet is visible to people... I know shocking isn't it!

ROFL Image
ALSO: SHAREPOINT runs on SQL!

LOL LOL LOL LOL LOL LOL LOL LOL
Read 23 tweets
Jan 29
looks similar as almost every org I've worked with (super broad generalisation)

legacy systems oh my! wait till we see what runs in the private sector! (don't tell anyone about those 2008 servers!) Image
This might sound doom and gloom but having a view of maturity/resiliance across the government is a great thing! you can't address what you don't 'know' about!

This paragraph sounds in line with most orgs (IMHO)

I've been conducting maturity assessments for orgs of all shapes and sizes for a long long time! lots of people say they are a 3 when they are in fact a 1-2 (if we are using CMMi-SCV etc.)Image
Read 6 tweets
Nov 4, 2024
Morning world! Slept ‘ok’ (not great not terrible)

So yesterday I was doing some mitm6 over public WiFi (in the lab) and whilst I was speeding dns responses to Microsoft Google Facebook Twitter etc.

My web clients simply did not follow the responses and went to the actual sites!

Anyone know why? (It’s probably something like dnssec etc.)Image
Now in this instance it’s not even spoofing (you would see an event)

Let’s grab a windows laptop! Image
Now to show you the server is working here We have spoofs being sent! Image
Read 34 tweets
Oct 25, 2023
twitter have rolled out audio calls on twitter using STUN.

Be warned if you call someone the recipient (and anyone in the traffic path) can see your egress IP.

Apple private relay does not cover this. Image
Microsoft teams uses STUN

basically every single P2P audio probably uses this:

Whats app
Facebook Messenger
Signal
Telegram
can you do audio calls in Snapchat?

This is the common protocol....

this IP leakage is in everything (signal has a feature to mask it) and for all the others you need to either accept how it works or use a vpn etc.

You know every time you visit a webpage your IP leaks right?

Or just use LTE/xG and CGNAT....
Image
Since I'm a cyber werido and I have an iphone tap setup...

I'll grab some of my test identities and will now do testing....

but we can probably just use google!
Read 19 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(