Artwork
iconShare
 
Manage episode 513308625 series 1459731
Content provided by Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

In this episode, we discuss the surge of age verification laws spreading across the US, including the recent implementation in Ohio. These laws intend to shield children but come at a significant cost to privacy and cybersecurity. We’ll explore how third-party ID verification companies operate, the risks associated with these systems, and the broader definition of adult content beyond pornography. We also question the effectiveness and security of these measures as we share insights into the ease of bypassing verification systems. Are we protecting kids, or building a privacy nightmare?

** Links mentioned on the show **

Bluesky to verify ages under Ohio pornography ID law. Here’s when the law takes effect
https://www.dispatch.com/story/news/2025/09/30/bluesky-verify-ages-ohio-pornography-id-law/86423200007/

How to get around age verification checks
https://gist.github.com/mary-ext/6e27b24a83838202908808ad528b3318

Age verification service that Bluesky is using
https://www.kidswebservices.com/en-US/services/age-verification

** Watch this episode on YouTube **

https://youtu.be/Pc3zjOWNthY

** Become a Shared Security Supporter **

Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Become a supporter today! https://patreon.com/SharedSecurity

** Thank you to our sponsors! **

SLNT

Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.

Click Armor

To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity

** Subscribe and follow the podcast **

Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast

Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social

Follow us on Mastodon: https://infosec.exchange/@sharedsecurity

Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/

Visit our website: https://sharedsecurity.net

Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe

Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe

Leave us a rating and review: https://ratethispodcast.com/sharedsecurity

Contact us: https://sharedsecurity.net/contact

The post Age Verification Laws: A Privacy Disaster in the Making appeared first on Shared Security Podcast.

  continue reading

14 episodes