Protecting Kids Without Breaking the Internet

Mallory Knodel discusses an output from the IAB and W3C workshop, now open for feedback, outlining a neutral framework for age verification that maps where checks could occur while weighing privacy, security, and human rights impacts.

Protecting Kids Without Breaking the Internet
Photo by Inna Skosyreva / Unsplash

By Mallory Knodel

Last month, a closed-door workshop on Age-Based Restrictions on Content Access was convened by the Internet Architecture Board (IAB) and World Wide Web Consortium (W3C) Technical Architecture Group. It brought together engineers, standards developers, civil society advocates, academics, and industry representatives to examine the growing wave of laws that require age verification or age assurance online. For example, the UK’s Online Safety Act which IX’s Editor-in-Chief Audrey analyzed and Heather Burns also critiqued. The goal of the workshop was not to pick a single solution but to build a shared understanding of the properties and trade-offs of different approaches.

The workshop was a grand opportunity to build consensus between major technology companies, telecom operators, browser vendors, academics, child safety advocates, and civil society groups focused on privacy and digital rights. Across sessions, there was broad agreement that this is a complex, global problem with no single technical or regulatory solution. At the same time, discussions were wide-ranging and reflected both the breadth of the topic and some genuine disagreements over scope and approach. So what should the global standards setters for the web and internet say about age verification?

A collection of papers submitted in advance of the workshop has been published, offering a glimpse into the breadth of perspectives represented. Other related background documents that have been circulated include the Knight Georgetown Institute submission to the EU, and a comprehensive deep dive by the Open Technology Institute on age verification approaches and their implications.

These contributions span legal and policy analyses, critiques of existing age-verification mandates, and technical proposals for different forms of age gating. Some explore privacy-preserving filtering at the network layer; others warn of the security, privacy, and human rights risks of large-scale age verification systems. What they share is a recognition that policymakers are moving quickly to impose age-gating obligations, often without fully understanding how the internet’s architecture works or the practical consequences of different technical choices.

Much of this amounts to several ways to hold up the problem and admire it from different angles. Conversations about network censorship have a similar pattern: Good to understand the technical means already deployed for protocol standards engineers who want to correct for it, adversarially, but also offer advice for how to do it in such a way so that you don’t break the internet.

To that end an outcome of the workshop was the need for an elaboration of neutral, solution-agnostic architectural specification that could help ground future debates. Rather than endorsing any single method of age verification or assurance, such a document could map out where in the internet stack age gating might occur, for example at the network, device, or service layer, and examine trade-offs around effectiveness, feasibility, privacy, and human rights. 

From the draft, “Our goal is to describe the technical difficulties in any age-gating mechanism such that it is effective and does not introduce security and privacy risks as well as contravene human rights. We also hope to show that age verification mechanisms are wholly technical solutions that are separate from, albeit often motivated by, the means of protecting young people online.”

Titled Age Verification Architecture, the document will outline a technology-neutral schema for how different intermediaries could restrict or permit access to content and services based on age, alongside analysis of security, privacy, and human rights considerations. While the draft won’t prescribe a single “solution” to the problem, it aims to offer a clear, structured framework to inform future technical, policy, and regulatory discussions. The document is open for feedback through issue creation or pull requests on GitHub.


Find us at MozFest

Social Web Foundation: MozFest Fringe Event

https://luma.com/9tyqx0sz
Friday 7 November, 14:45 CET
We have only six places left for the MozFest Fringe gathering and lunch we are hosting with the Social Web Foundation. It's for folks working on the social web in order to gather actions that can help us strategize and plan for the coming year.

Encryption and Feminism: Reimagining Child Safety Without Surveillance 

https://mzf.st/160
Saturday 8 November,13:30 CET
Our session about how encryption can safeguard vulnerable communities while upholding privacy and human rights with Chayn’s Hera Hussain, Superbloom’s Georgia Bullen, APC’s Diana Bichanga, Courage Everywhere’s Lucy Purdon, UNICEF’s Gerda Binder, and IX’s Mallory Knodel, Ramma Shahid Cheema and Audrey Hingle.


Unlearning Systems


https://mzf.st/74
Sunday 9 November, 4:00 CET
Seyi Akiwowo's mainstage session about unlearning dominant ways of knowing and organizing, specifically through the lens of Indigenous knowledge and alternative economic systems with Keoni Mahelona and Luísa Franco Machado. 

Support the Internet Exchange

If you find our emails useful, consider becoming a paid subscriber! You'll get access to our members-only Signal community where we share ideas, discuss upcoming topics, and exchange links. Paid subscribers can also leave comments on posts and enjoy a warm, fuzzy feeling.

Not ready for a long-term commitment? You can always leave us a tip.

Become A Paid Subscriber

From The Feminist Communications Co-op

As you might have heard, IX has launched a feminist communications cooperative. We recently supported one of our first clients, Richard Reisman, in editing his latest article, now live on Bedrock Principle.

Need communication support?


Open Social Web

Internet Governance

Digital Rights

  • Keep Android Open is organizing to oppose Google’s new developer registration and verification policy, announced in August 2025, which will require all Android developers to register centrally with Google before creating or distributing apps. https://keepandroidopen.org 
  • Researchers from Cloudflare, University of Michigan, EPFL and University of Maryland find internet middleboxes are being weaponised for censorship and surveillance worldwide, mapping a hidden layer of interference across the global web. https://www.cs.umd.edu/~dml/papers/tampering_sigcomm23.pdf 

Technology for Society

Privacy and Security

Upcoming Events

Careers and Funding Opportunities

Opportunities to Get Involved

  •  FOSDEM 2026 – Social Web Devroom – Call For Participation. FOSDEM is an exciting free and open source software event in Brussels, Belgium that brings together thousands of enthusiasts from around the world. The event spans the weekend of January 31 to February 1, 2026 and features discussion tracks (“devrooms”) for scores of different technology topics. Submission Deadline: December 1. https://socialwebfoundation.org/2025/10/31/fosdem-2026-social-web-devroom-call-for-participation 

What did we miss? Please send us a reply or write to editor@exchangepoint.tech.

💡
Want to see some of our week's links in advance? Follow us on Mastodon, Bluesky or LinkedIn, and don't forget to forward and share!