<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-iab-agews-report-02" category="info" consensus="true" submissionType="IAB" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="AGEWS Report">Report from the IAB/W3C Workshop on Age-Based Restrictions on Content Access</title>
    <seriesInfo name="Internet-Draft" value="draft-iab-agews-report-02"/>
    <author fullname="Mark Nottingham">
      <organization/>
      <address>
        <email>mnot@mnot.net</email>
      </address>
    </author>
    <author fullname="Martin Thomson">
      <organization/>
      <address>
        <email>mt@lowentropy.net</email>
      </address>
    </author>
    <date year="2026" month="February" day="16"/>
    <keyword>IAB workshop</keyword>
    <keyword>age gate</keyword>
    <abstract>
      <?line 72?>

<t>The Workshop on Age-Based Restrictions on Content Access was convened by the Internet Architecture Board (IAB) and World Wide Web Consortium (W3C) in October 2025. This report summarizes its significant points of discussion and identifies topics that may warrant further consideration and work.</t>
      <t>Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB or W3C views and positions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://intarchboard.github.io/draft-iab-agews-report/draft-iab-agews-report.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-iab-agews-report/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/intarchboard/draft-iab-agews-report"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Regulators and legislators around the world are increasingly restricting what can be made available to young people on the Internet, in an effort to reduce the online harms that they encounter.</t>
      <t>In October 2025, the Internet Architecture Board and the World Wide Web Consortium convened the Workshop on Age-Based Restrictions on Content Access. It brought together technologists, civil society advocates, business interests, and government stakeholders to discuss the nuances of the introduction of such measures.</t>
      <t>The primary focus was "to perform a thorough examination of the technical and architectural choices that are involved in solutions for age-based restrictions on access to content", with a goal of "build[ing] a shared understanding of the properties of various proposed approaches."</t>
      <t>See the workshop announcement <xref target="ANNOUNCE"/> for details; papers and presentation materials are linked from the announcement. This report summarises the proceedings of the workshop.</t>
      <section anchor="views-expressed-in-this-report">
        <name>Views Expressed in this Report</name>
        <t>This document is a report on the proceedings of the workshop. The views and positions documented in this report were expressed during the workshop by participants and do not necessarily reflect the IAB's or W3C's views and positions, nor those of all participants.</t>
        <t>Furthermore, the content of the report comes from presentations given by workshop participants and notes taken during the discussions, without interpretation or validation. Thus, the content of this report follows the flow and dialogue of the workshop but does not attempt to capture a consensus.</t>
      </section>
      <section anchor="chatham-house-rule">
        <name>Chatham House Rule</name>
        <t>Participants agreed to conduct the workshop under the Chatham House Rule <xref target="CHATHAM-HOUSE"/>, so this report does not attribute statements to individuals or organizations without express permission.  Most submissions to the workshop were public and thus attributable; they are used here to provide substance and context.</t>
        <t><xref target="participants"/> lists the workshop participants, unless they requested that this information be withheld.</t>
      </section>
    </section>
    <section anchor="overview-of-the-workshop">
      <name>Overview of the Workshop</name>
      <t>The IAB/W3C workshop on Age-Based Restrictions on Content Access brought together a diverse group of participants from technical, policy, regulatory, and research communities to examine how the Internet might accommodate demands for age-based access controls. Over three days, discussions traversed the intersection of technology, governance, human rights, and social expectations, with a recurring emphasis on privacy, accountability, and the preservation of the open architecture of the Internet.</t>
      <t>The workshop began with a framing session that emphasized the Internet's original design as a universal, non-segmented space. Participants observed that the web does not natively distinguish between adult and child users, and that governments are creating regulatory environments that shift responsibility from parents and individuals to service providers. The scope of discussion was tightly defined: not the morality or policy of age restrictions, but the technical, architectural, and human-rights implications of enforcing them. The challenge, many participants agreed, lay in building mechanisms that are accurate, respect privacy, maintain global interoperability, and avoid creating infrastructure that could be repurposed for censorship or surveillance.</t>
      <t>Early exchanges focused on terminology and scope: whether "age verification" should be understood narrowly as identity checking or more broadly as "age assurance." The conversation also touched on the diversity of cultural expectations about parental authority and the variety of legal frameworks emerging across jurisdictions. Some participants warned of "slippery slope" effects, where mechanisms designed for age checks might evolve into tools for broader identity enforcement. Several noted that while liability drives many policy decisions, technical design should aim to minimize harm and avoid over-centralization. The question of who bears responsibility for child safety -- platforms, regulators, or device manufacturers -- surfaced repeatedly.</t>
      <t>Human-rights principles were foregrounded as a basis for evaluation. Privacy was discussed not only in terms of data protection law (including techniques like minimization) but as protection from unwanted exposure or interaction. Freedom of expression and opinion was considered, particularly how adults and children both have rights to communicate, access information and associate, free from the chilling effects of surveillance or discrimination. The group revisited long-standing Internet design tenets, such as decentralization and the end-to-end principle, asking how they should inform modern architectures that could easily drift toward central control. Some argued that successful systems must remain open, interoperable, and reversible, while others cautioned that any solution -- even a well-intentioned one -- would inevitably reshape the Internet's social and economic balance.</t>
      <t>Technical sessions explored a spectrum of enforcement models: service-based, network-based, and device-based. Service-enforced systems place the compliance burden on websites, risking fragmentation and user fatigue from repeated verification flows. Network-based filtering -- already common in some jurisdictions -- offers broad coverage but limited accuracy and significant privacy trade-offs. Device-enforced models, in which operating systems mediate access based on a one-time verification, were praised for their potential usability and consistency but criticized for potential concentration of power among major vendors. Many participants noted that a pluralistic approach is more likely to be successful, recognizing that no single architecture can meet all requirements equally across jurisdictions.</t>
      <t>Privacy-enhancing technologies (PETs) such as anonymous credentials and zero-knowledge proofs were discussed as promising, though not necessarily sufficient, tools. In particular, PETs don't address all privacy concerns, and likewise don't address wider issues around access to underlying sources of truth. Furthermore, some participants cautioned that PETs cannot prevent circumvention or censorship, are relatively untested, and that open-sourcing code does not automatically make systems trustworthy. A recurring concern was that while credential-based verification may work well in countries with unified ID systems, it risks excluding people without access to such credentials and entrenching inequalities.</t>
      <t>Discussions on parental controls and network operator roles highlighted practical tensions between effectiveness, usability, and user rights. Although some participants saw value in layered approaches combining device, service, and network measures, others noted the high complexity and low adoption of parental-control tools even where available. The workshop also revisited the ethical dimension: whether designing better tools might unintentionally legitimize over-broad or intrusive regulation.</t>
      <t>By the third day, participants reflected on the need for collaboration across disciplines and institutions. Many acknowledged that while complete solutions are unlikely in the short term, articulating shared vocabulary, architectural roles, and evaluation properties was an essential foundation. There was broad agreement that future work should map risks against possible architectures, document trade-offs in neutral terms, and communicate clearly with policymakers to prevent outcomes that could undermine Internet openness.</t>
      <t>The meeting closed with reflections on what process might be followed to take proposed solutions through a standards process. Both IETF and W3C representatives outlined how exploratory work might proceed within their respective frameworks, stressing that standardization would require consensus, open participation, and time.</t>
      <t>While this workshop would not provide specific standards proposals or take positions on the advisability of regulatory proposals, it was suggested that leadership bodies, including the Internet Architecture Board and Technical Architecture Group, could be places to make such statements.</t>
      <t>While the current status quo -- piecemeal, opaque, and often privacy-eroding -- was unsatisfactory to most participants, many cautioned that hasty solutions could entrench worse problems. This led to growing recognition that protecting children online must not come at the expense of the Internet's foundational freedoms, and that sustained, multi-stakeholder collaboration is the only viable path forward.</t>
    </section>
    <section anchor="key-takeaways">
      <name>Key Takeaways</name>
      <t>This section highlights aspects of discussion at the workshop that appeared to be most impactful.</t>
      <section anchor="collaboration">
        <name>There is a Need for Cross-Cutting Collaboration</name>
        <t>Many participants remarked that the workshop allowed them to appreciate perspectives that they had not fully considered previously. Although several substantial efforts have included industry, civil society, government, and technologists, collaboration across all stakeholders appears to be rare.</t>
        <t>This was especially evident when considering the involvement of the technical community. Although there have been a number of consultations by governments and other bodies, involvement of the technical community is often limited to participation by the policy representatives of tech companies. This can lead to an underappreciation of the architectural impact and related harms of the design decisions made.</t>
        <t>Architectures effective for the goals and less likely to have profound harmful consequences may require the cooperation of multiple actors fulfilling different <xref target="roles"/>. To that end, standardization may be especially important for interoperable, collaborative development of architectures involving both servers and clients.</t>
        <t>Some participants also noted that approaches where liability rests only on one party -- for example, a content or platform provider -- are unlikely to lead to the desired results, because this creates disincentives for the cooperation that is necessary for meaningful reduction of harms. An approach that considers the roles of the young, their parents, device manufacturers, operating system vendors, content providers, and society overall was believed to be more likely to succeed.</t>
      </section>
      <section anchor="roles">
        <name>Identifying the Roles Involved is Important</name>
        <t>One of the more substantive discussions on architecture involved presentations on the functional roles involved in any system <xref target="HANSON"/>.</t>
        <t>Four key roles were identified:</t>
        <dl>
          <dt>Verifier:</dt>
          <dd>
            <t>The verifier role determines whether a person falls into a target age range.</t>
          </dd>
          <dt>Enforcer:</dt>
          <dd>
            <t>The enforcer is responsible for ensuring that a person who does not satisfy the verifier is unable to access age-restricted content or services.</t>
          </dd>
          <dt>Policy selector:</dt>
          <dd>
            <t>The policy selector is responsible for determining which policies should apply to the user, based on their jurisdiction, status or preferences.</t>
          </dd>
          <dt>Rater:</dt>
          <dd>
            <t>The rater is responsible for determining whether content or services require age restrictions and the age ranges that apply.</t>
          </dd>
        </dl>
        <t>In addition, it was noted that ratings and laws are often limited by geography or jurisdiction, so it is often necessary for services to first identify the applicable jurisdiction. It was generally accepted that this function often uses IP geolocation mappings, despite acknowledged limitations around accuracy and susceptibility to circumvention using VPNs.</t>
      </section>
      <section anchor="a-common-vocabulary-is-necessary">
        <name>A Common Vocabulary is Necessary</name>
        <t>Early discussions highlighted how not all participants used the same terminology when referring to different activities or functions. There was a recognition of the value of shared language, and some participants pointed to <xref target="ISO-IEC-27566-1"/>, which establishes key terms, including:</t>
        <dl>
          <dt>Age assurance:</dt>
          <dd>
            <t>Age assurance is an umbrella term for technology that provides some entity with information about the age of a person. This is understood to encompass multiple classes of specific methods, including age verification, age estimation, and age inference. Age assurance does not need to result in a specific age; age ranges are often preferred as these can have better privacy properties.</t>
          </dd>
          <dt>Age verification:</dt>
          <dd>
            <t>Age verification refers to gaining high assurance that a person is within a given age range. Strong assurances are often tied to official or governmental documentation, so age verification can involve the use of government-issued digital credentials.</t>
          </dd>
          <dt>Age estimation:</dt>
          <dd>
            <t>Age estimation uses statistical processes that process physical or behavioral characteristics of a person to produce a probabilistic value for how old someone is or whether their age is in a target range. A variety of techniques are used, the most common being facial age estimation, which uses machine learning models to estimate how old a person is based on still or moving images of their face.</t>
          </dd>
          <dt>Age inference:</dt>
          <dd>
            <t>Age inference draws on data sources to determine whether a person fits a given age range. This method can require identification information, such as an email address or phone number, to find relevant records. For example, evidence of online activity prior to a certain date in the past might support the view that a person is older than a target threshold.</t>
          </dd>
          <dt>Age gating:</dt>
          <dd>
            <t>Age gating is the process of restricting access to something based on the age of the person requesting access.</t>
          </dd>
        </dl>
        <t>Relating these functions to the roles described in <xref target="roles"/>, all age assurance types fit the "verifier" role, where age gating applies to the "enforcer" role.</t>
      </section>
      <section anchor="trust">
        <name>Privacy and Trust Expectations Need Further Discussion</name>
        <t>Privacy was a recurrent theme at the workshop, but it was clear that there are multiple considerations at play when talking about privacy. The question of privacy was often caught up in discussions of trust, where approaches each depend on different sorts of trust between the different actors.</t>
        <t>Participants identified privacy as important to maintaining trust in any system that involves age assurance or age gating.</t>
        <t>Where private information is used by the actors in a proposed architecture, those actors might need to be trusted to handle that private information responsibly. In that approach, the importance of different safeguards on personal information, such as the prompt disposal of any personal information -- a practice that many age verification providers promise -- becomes a core part of what might allow people to trust that system.</t>
        <t>Several people observed that the sort of trust that is asked from people might not correspond with the role that certain entities play in people's lives. This will depend on context, where "adult" content providers generally serve anonymous users, whereas social media often already has a lot of personal information on users.</t>
        <t>In either case, users might have no prior knowledge of -- or trust in -- providers that are contracted to provide age assurance functions. It was observed that one likely consequence of some arrangements is to train people to become more trusting of strange sites that ask for personal information.</t>
        <t>Alternatively, it might be that trust in the system is not vested in actors, but instead the system as a whole. This is possible if no information is made available to different actors, removing the need to trust their handling of private information. For this to be achievable, the use of zero-knowledge proofs or similar cryptographic techniques was seen as a way to limit what each entity learns. Some participants noted, however, that these techniques do not address circumvention or censorship risks, still introduce new information into the ecosystem, and may concentrate trust in particular software implementations.</t>
        <t>Other aspects of trust were considered equally important from different perspectives.  Services that rely on an independent age assurance provider need to trust that the provider makes an accurate determination of age, at least to the extent that they might be held liable in law.  They also need to trust that the service respects privacy, lest the use of a low-quality provider could create other forms of liability or drive away potential customers.</t>
      </section>
      <section anchor="waterfall">
        <name>More than One Approach will be Required</name>
        <t>A recurrent theme in discussion was the insufficiency of any particular age assurance technique in ensuring that people are not unjustifiably excluded. All age assurance methods discussed fail to correctly classify some subset of people:</t>
        <ul spacing="normal">
          <li>
            <t>Age verification that depends on government-issued credentials will fail when people do not hold accepted credentials. This includes people who do not hold credentials and those who hold credentials, but not those that are recognized.</t>
          </li>
          <li>
            <t>Age estimation produces probabilistic information about age that can be wrong by some number of years, potentially excluding people near threshold ages. This manifests as both false acceptance (people who are outside the target age range being accepted) and false rejection (people who are in the target age range being rejected). Where there is a goal of minimizing the false acceptance rate, that increases the number of false rejections.</t>
          </li>
          <li>
            <t>Age inference techniques can fail due to lack of information.</t>
          </li>
        </ul>
        <t>Discussion often came back to an approach that is increasingly recommended for use in age verification, where multiple methods are applied in series. Checks with lower friction -- those that require less active participation from people -- or that are less invasive of privacy are attempted first. Successive checks are only used when a definitive result cannot be achieved.</t>
        <t>Some participants noted that inconsistent friction and invasiveness create a different kind of discrimination, one that can exacerbate existing adverse discrimination. For example, the accuracy of age estimation for people with African heritage is often significantly lower than for those with European ancestry <xref target="FATE"/>. This is attributed to the models used being trained and validated using datasets that have less coverage of some groups. People who are affected by this bias are more likely to need to engage with more invasive methods.</t>
        <t>One consequence of having multiple imperfect techniques is the need to recognize that any system will be imperfect. That creates several tensions:</t>
        <ul spacing="normal">
          <li>
            <t>Some people will never be able to satisfy age assurance checks and will therefore be excluded by strict assurance mandates. Here, discussions acknowledged that purely technical systems are likely inadequate.</t>
          </li>
          <li>
            <t>Some people who should be blocked from accessing content or services will find ways to circumvent restrictions. In this context, the term "advanced persistent teenager" was recognized as characterizing the nature of the "adversary": individuals who are considered too young to access content, but who are highly motivated, technically sophisticated, and have time to spare.</t>
          </li>
          <li>
            <t>Offering more choices to people can improve privacy because they get to choose the method that suits them. However, when a chosen method fails, having to engage with additional methods has a higher privacy cost.</t>
          </li>
        </ul>
        <t>Some participants argued that accepting these risks is necessary in order to gain any of the benefits that age-based restrictions might confer. Other participants were unwilling to accept potential impositions on individual rights in light of the insufficiency of restrictions in providing meaningful protection; see <xref target="holistic"/>.</t>
      </section>
      <section anchor="risks">
        <name>Mapping the Risks for Architectures is a Useful Next Step</name>
        <t>How the identified roles (see <xref target="roles"/>) are arranged into architectures was some of the more substantive discussion. <xref target="JACKSON"/> describes some of the alternatives, along with some of the implications that arise from different arrangements.</t>
        <t>Throughout this discussion, it was acknowledged that active deployments tended to fall into a common pattern, where content providers are required to age-gate access and contract a third party to interpose that service. Several participants noted that this is a somewhat natural consequence of some of the constraints that actors are subject to.  <xref target="f-typical"/> shows the typical deployment model for age-gated content and services, along with the roles from <xref target="roles"/>.</t>
        <figure anchor="f-typical">
          <name>Typical Deployment Model</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="552" viewBox="0 0 552 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,32 L 32,80" fill="none" stroke="black"/>
                <path d="M 80,48 L 80,112" fill="none" stroke="black"/>
                <path d="M 128,120 L 128,304" fill="none" stroke="black"/>
                <path d="M 160,120 L 160,176" fill="none" stroke="black"/>
                <path d="M 184,48 L 184,112" fill="none" stroke="black"/>
                <path d="M 328,112 L 328,144" fill="none" stroke="black"/>
                <path d="M 328,240 L 328,272" fill="none" stroke="black"/>
                <path d="M 368,48 L 368,112" fill="none" stroke="black"/>
                <path d="M 368,144 L 368,240" fill="none" stroke="black"/>
                <path d="M 368,272 L 368,336" fill="none" stroke="black"/>
                <path d="M 464,48 L 464,112" fill="none" stroke="black"/>
                <path d="M 464,144 L 464,240" fill="none" stroke="black"/>
                <path d="M 464,272 L 464,336" fill="none" stroke="black"/>
                <path d="M 8,48 L 56,48" fill="none" stroke="black"/>
                <path d="M 80,48 L 184,48" fill="none" stroke="black"/>
                <path d="M 368,48 L 464,48" fill="none" stroke="black"/>
                <path d="M 192,80 L 360,80" fill="none" stroke="black"/>
                <path d="M 344,96 L 360,96" fill="none" stroke="black"/>
                <path d="M 80,112 L 184,112" fill="none" stroke="black"/>
                <path d="M 368,112 L 464,112" fill="none" stroke="black"/>
                <path d="M 368,144 L 464,144" fill="none" stroke="black"/>
                <path d="M 344,160 L 360,160" fill="none" stroke="black"/>
                <path d="M 176,192 L 360,192" fill="none" stroke="black"/>
                <path d="M 344,224 L 360,224" fill="none" stroke="black"/>
                <path d="M 368,240 L 464,240" fill="none" stroke="black"/>
                <path d="M 368,272 L 464,272" fill="none" stroke="black"/>
                <path d="M 344,288 L 360,288" fill="none" stroke="black"/>
                <path d="M 144,320 L 360,320" fill="none" stroke="black"/>
                <path d="M 368,336 L 464,336" fill="none" stroke="black"/>
                <path d="M 32,80 L 48,112" fill="none" stroke="black"/>
                <path d="M 16,112 L 32,80" fill="none" stroke="black"/>
                <path d="M 344,96 C 335.16936,96 328,103.16936 328,112" fill="none" stroke="black"/>
                <path d="M 344,160 C 335.16936,160 328,152.83064 328,144" fill="none" stroke="black"/>
                <path d="M 176,192 C 167.16936,192 160,184.83064 160,176" fill="none" stroke="black"/>
                <path d="M 344,224 C 335.16936,224 328,231.16936 328,240" fill="none" stroke="black"/>
                <path d="M 344,288 C 335.16936,288 328,280.83064 328,272" fill="none" stroke="black"/>
                <path d="M 144,320 C 135.16936,320 128,312.83064 128,304" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="368,320 356,314.4 356,325.6" fill="black" transform="rotate(0,360,320)"/>
                <polygon class="arrowhead" points="368,288 356,282.4 356,293.6" fill="black" transform="rotate(0,360,288)"/>
                <polygon class="arrowhead" points="368,192 356,186.4 356,197.6" fill="black" transform="rotate(0,360,192)"/>
                <polygon class="arrowhead" points="368,160 356,154.4 356,165.6" fill="black" transform="rotate(0,360,160)"/>
                <polygon class="arrowhead" points="368,80 356,74.4 356,85.6" fill="black" transform="rotate(0,360,80)"/>
                <circle cx="32" cy="32" r="6" class="opendot" fill="white" stroke="black"/>
                <g class="text">
                  <text x="268" y="68">Visits</text>
                  <text x="504" y="68">Rater</text>
                  <text x="536" y="68">+</text>
                  <text x="128" y="84">Browser</text>
                  <text x="416" y="84">Website</text>
                  <text x="508" y="84">Policy</text>
                  <text x="516" y="100">Selector</text>
                  <text x="252" y="132">Redirected</text>
                  <text x="308" y="132">To</text>
                  <text x="236" y="180">Evidence</text>
                  <text x="284" y="180">of</text>
                  <text x="312" y="180">Age</text>
                  <text x="416" y="180">Age</text>
                  <text x="416" y="196">Assurance</text>
                  <text x="516" y="196">Verifier</text>
                  <text x="416" y="212">Service</text>
                  <text x="252" y="260">Redirected</text>
                  <text x="308" y="260">To</text>
                  <text x="420" y="292">Age-</text>
                  <text x="252" y="308">Admitted</text>
                  <text x="416" y="308">Gated</text>
                  <text x="516" y="308">Enforcer</text>
                  <text x="416" y="324">Content</text>
                  <text x="212" y="340">or</text>
                  <text x="256" y="340">Blocked</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
   o
---+---  +------------+                      +-----------+
   |     |            |       Visits         |           |  Rater +
   +     |  Browser   |--------------------->|  Website  |  Policy
  / \    |            |                  .---|           |  Selector
 /   \   +------------+                 |    +-----------+
               |   |      Redirected To |
               |   |                    |    +-----------+
               |   |                     '-->|           |
               |   |     Evidence of Age     |    Age    |
               |    '----------------------->| Assurance |  Verifier
               |                             |  Service  |
               |                         .---|           |
               |                        |    +-----------+
               |          Redirected To |
               |                        |    +-----------+
               |                         '-->|    Age-   |
               |           Admitted          |   Gated   |  Enforcer
                '--------------------------->|  Content  |
                         or Blocked          +-----------+
]]></artwork>
          </artset>
        </figure>
        <t>Some participants also noted that certain approaches may carry higher path-dependence risk once widely deployed, even if they remain theoretically possible to withdraw or replace. This can arise from accumulated architectural dependencies, operational integration with third-party services, and evolving expectations among users and service providers. As a result, architectures that tightly couple functionality to external verification services or embed assumptions about routine age signalling may increase the practical cost of transition, should alternative approaches later emerge that address privacy, equity, or effectiveness concerns more effectively.</t>
        <t><xref target="f-device"/> shows a deployment model for parental control software, showing how the roles from <xref target="roles"/> might apply. Here, parental controls do any verification of age necessary and select policies; content ratings might be performed by websites or the parental control software on the device; enforcement is performed on-device.</t>
        <figure anchor="f-device">
          <name>Parental Control Deployment Model</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="536" viewBox="0 0 536 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,32 L 32,80" fill="none" stroke="black"/>
                <path d="M 80,48 L 80,112" fill="none" stroke="black"/>
                <path d="M 80,208 L 80,256" fill="none" stroke="black"/>
                <path d="M 128,120 L 128,200" fill="none" stroke="black"/>
                <path d="M 184,48 L 184,112" fill="none" stroke="black"/>
                <path d="M 184,208 L 184,256" fill="none" stroke="black"/>
                <path d="M 368,48 L 368,112" fill="none" stroke="black"/>
                <path d="M 464,48 L 464,112" fill="none" stroke="black"/>
                <path d="M 8,48 L 56,48" fill="none" stroke="black"/>
                <path d="M 80,48 L 184,48" fill="none" stroke="black"/>
                <path d="M 368,48 L 464,48" fill="none" stroke="black"/>
                <path d="M 192,64 L 360,64" fill="none" stroke="black"/>
                <path d="M 192,96 L 360,96" fill="none" stroke="black"/>
                <path d="M 80,112 L 184,112" fill="none" stroke="black"/>
                <path d="M 368,112 L 464,112" fill="none" stroke="black"/>
                <path d="M 80,208 L 184,208" fill="none" stroke="black"/>
                <path d="M 80,256 L 184,256" fill="none" stroke="black"/>
                <path d="M 32,80 L 48,112" fill="none" stroke="black"/>
                <path d="M 172,120 L 196,168" fill="none" stroke="black"/>
                <path d="M 16,112 L 32,80" fill="none" stroke="black"/>
                <path d="M 196,168 L 212,168" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="368,64 356,58.4 356,69.6" fill="black" transform="rotate(0,360,64)"/>
                <polygon class="arrowhead" points="200,96 188,90.4 188,101.6" fill="black" transform="rotate(180,192,96)"/>
                <polygon class="arrowhead" points="180,120 168,114.4 168,125.6" fill="black" transform="rotate(243.43494882292202,172,120)"/>
                <polygon class="arrowhead" points="136,120 124,114.4 124,125.6" fill="black" transform="rotate(270,128,120)"/>
                <circle cx="32" cy="32" r="6" class="opendot" fill="white" stroke="black"/>
                <g class="text">
                  <text x="268" y="52">Visits</text>
                  <text x="128" y="84">Browser</text>
                  <text x="248" y="84">(Rated)</text>
                  <text x="312" y="84">Content</text>
                  <text x="416" y="84">Website</text>
                  <text x="508" y="84">Rater*</text>
                  <text x="244" y="164">Rater*</text>
                  <text x="280" y="164">+</text>
                  <text x="252" y="180">Enforcer</text>
                  <text x="132" y="228">Parental</text>
                  <text x="236" y="228">Verifier</text>
                  <text x="280" y="228">+</text>
                  <text x="132" y="244">Controls</text>
                  <text x="228" y="244">Policy</text>
                  <text x="292" y="244">Selector</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
   o
---+---  +------------+       Visits         +-----------+
   |     |            |--------------------->|           |
   +     |  Browser   |    (Rated) Content   |  Website  |  Rater*
  / \    |            |<---------------------|           |
 /   \   +------------+                      +-----------+
               ^     ^
               |      \
               |       \__ Rater* +
               |           Enforcer
               |
         +------------+
         |  Parental  |  Verifier +
         |  Controls  |  Policy Selector
         +------------+
]]></artwork>
          </artset>
        </figure>
        <t>An observation was made that laws often seek to designate a single entity as being responsible for ensuring that age restrictions are effective. That lawmakers feel the need to designate a responsible entity is due to constraints on how laws function, but one that creates other constraints.</t>
        <t>Another constraint identified was the need for specialist expertise in order to administer all of the multiple different age assurance techniques; see <xref target="waterfall"/>. This means that there is a natural tendency for services to contract with specialist age assurance services.</t>
        <t>Some of the proposed architectures were better able to operate under these constraints. Others required greater amounts of coordination, further emphasizing the importance of collaboration identified in <xref target="collaboration"/>.</t>
        <t>In discussion of the constraints on different architectures, it was common for participants to point to a particular aspect of a given approach as carrying risks. Indeed, the final reckoning of risks produced a long list of potential issues that might need mitigation (see <xref target="impacts"/>).</t>
        <t>Architectures are not equally vulnerable to different risks, so a more thorough analysis is needed to identify how each risk applies to a different approach. An analysis that considers the constraints and assumptions necessary to successfully deploy different architectures is a contribution that would likely be welcomed by the community.</t>
      </section>
      <section anchor="holistic">
        <name>Safety Requires More than a Technical Solution</name>
        <t>Experts in child safety frequently acknowledged that restricting access to selected content cannot be assumed to be sufficient. The task of ensuring that children are both kept appropriately safe, while preparing them for the challenges they will face in their lifetimes, is a massively complex task.</t>
        <t>A recurrent theme was the old maxim, "it takes a village to raise a child". This concept transcends cultural boundaries and was recognized. The role of parents, guardians, educators, governments, and online services in creating an environment in which children can thrive and grow.</t>
        <t>Content and service restrictions are likely only a small part of a suite of actions that combine to provide children with protection, but also support and encouragement. This theme was raised several times, despite the goal of the discussion being to explore technical and architectural questions.</t>
        <t>Restrictions are necessarily binary and lacking in nuance. Though questions of what to restrict were out of scope for the workshop, discussions often identified subject matter that highlighted the challenges inherent in making simplistic classifications. Participants acknowledged the importance of the role of the adults who support children in their life journey. For example, on the subject of eating disorders, which can be challenging to classify, participants pointed to the importance of being able to recognize trends and inform and engage responsible adults. Ultimately, each child has their own challenges and the people around them are in the best position to provide the support that best suits the child.</t>
        <t>The concept of age-appropriate design was raised on several occasions. This presents significant privacy challenges in that it means providing more information about age to services. However, it was recognized that there are legal and moral obligations on services to cater to the needs of children of different age groups. This is a more complex problem space than binary age restrictions, as it requires a recognition of the different needs of children as they get older.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Age verification has a significant potential security impact upon the Internet; see <xref target="trust"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="ANNOUNCE" target="https://datatracker.ietf.org/group/agews/about/">
        <front>
          <title>IAB/W3C Workshop on Age-Based Restrictions on Content Access (agews)</title>
          <author>
            <organization>Internet Architecture Board</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="CHATHAM-HOUSE" target="https://www.chathamhouse.org/about-us/chatham-house-rule">
        <front>
          <title>Chatham House Rule</title>
          <author>
            <organization>Chatham House</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="HANSON" target="https://datatracker.ietf.org/doc/slides-agews-slides-where-enforcement-happens/">
        <front>
          <title>Where Enforcement Happens</title>
          <author fullname="Julia Hanson">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="FATE" target="https://nvlpubs.nist.gov/nistpubs/ir/2023/NIST.IR.8491.pdf">
        <front>
          <title>Face Analysis Technology Evaluation (FATE)</title>
          <author fullname="Mei Ngan">
            <organization/>
          </author>
          <author fullname="Patrick Grother">
            <organization/>
          </author>
          <author fullname="Austin Hom">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="JACKSON" target="https://datatracker.ietf.org/doc/slides-agews-where-enforcement-happens/">
        <front>
          <title>Where Enforcement Happens</title>
          <author fullname="Dean Jackson">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="ISO-IEC-27566-1" target="https://www.iso.org/standard/88143.html">
        <front>
          <title>Information security, cybersecurity and privacy protection — Age assurance systems Part 1: Framework</title>
          <author>
            <organization>ISO</organization>
          </author>
          <date/>
        </front>
      </reference>
    </references>
    <?line 304?>

<section anchor="workshop-agenda">
      <name>Workshop Agenda</name>
      <t>The following sections cover each of the main topics of discussion sessions.</t>
      <section anchor="topic-introduction">
        <name>Topic: Introduction</name>
        <t>We will launch the workshop with a greeting, a round of introductions, and an explanation of the terms of engagement, background, goals and non-goals of the workshop.</t>
      </section>
      <section anchor="topic-setting-the-scene">
        <name>Topic: Setting the Scene</name>
        <t>Successfully deploying age restrictions at Internet scale has many considerations and constraints. We will explore them at a high level in order. The goal is to discuss within the group about the scope of topics that the workshop will seek to address.</t>
      </section>
      <section anchor="topic-guiding-principles">
        <name>Topic: Guiding Principles</name>
        <t>Architectural principles give us a framework for evaluating additions and changes to the Internet. Technical principles are subject to a number of other considerations, in particular human rights principles. We will review the principles that might apply to age-based restrictions, explain their function, impact, and how they are applied. Including human rights impacts, such as:</t>
        <ul spacing="normal">
          <li>
            <t>Privacy and Security</t>
          </li>
          <li>
            <t>Safety and efficacy</t>
          </li>
          <li>
            <t>Censorship and Access</t>
          </li>
          <li>
            <t>Access to the Internet</t>
          </li>
          <li>
            <t>Freedom of Expression</t>
          </li>
        </ul>
        <t>And effects on the internet and web architecture, such as:</t>
        <ul spacing="normal">
          <li>
            <t>Deployment, Extensibility and Evolution</t>
          </li>
          <li>
            <t>Avoid Centralization</t>
          </li>
          <li>
            <t>End-to-End</t>
          </li>
          <li>
            <t>One Global Internet/Web</t>
          </li>
          <li>
            <t>Layering and Modularity</t>
          </li>
        </ul>
      </section>
      <section anchor="topic-potential-impacts">
        <name>Topic: Potential Impacts</name>
        <t>We now want to look at some of the higher-level considerations that apply regardless of approach. We will look at some different perspectives on how to think of the overall problem. Discussion will seek to find how those perspectives can be shaped to guide choices.</t>
      </section>
      <section anchor="topic-where-enforcement-happens">
        <name>Topic: Where Enforcement Happens</name>
        <t>The Internet standards community is in the unique position to make controlled changes to the architecture of the Internet, and so there are multiple ways and places to deploy age restrictions. We will examine the options, with an eye to the deployment properties of each location and configuration, as related to the architectural principles. In particular, it will consider the establishment of new roles as well as the use of existing ones.</t>
      </section>
      <section anchor="topic-available-techniques">
        <name>Topic: Available Techniques</name>
        <t>There are several active and proposed systems for age restriction on the Internet. We will review them from the perspective of their interaction with the architectural principles, potential impacts, and with consideration of the enforcement options. Including:</t>
        <ul spacing="normal">
          <li>
            <t>Age verification: including server-side solutions using government identity systems / ZKP</t>
          </li>
          <li>
            <t>Age estimation: including biometrics and data analysis</t>
          </li>
          <li>
            <t>Age "inference" approaches</t>
          </li>
          <li>
            <t>In-network solutions</t>
          </li>
          <li>
            <t>Classification and On-device / parental control designs</t>
          </li>
        </ul>
      </section>
      <section anchor="discussion">
        <name>Discussion</name>
        <t>We will follow up on incomplete discussions and revisit architectural learnings.</t>
      </section>
      <section anchor="summary-and-reflection">
        <name>Summary and Reflection</name>
        <t>We will summarise what we have discussed and learned thus far.</t>
      </section>
      <section anchor="outcomes">
        <name>Outcomes</name>
        <t>We will outline the potential outcomes, further actions and next steps.</t>
      </section>
    </section>
    <section anchor="participants">
      <name>Workshop Attendees</name>
      <t>Attendees of the workshop are listed with their primary affiliation. Attendees from the program committee (PC), the Internet Architecture Board (IAB), and W3C Technical Architecture Group (TAG) are also marked.</t>
      <ul spacing="normal">
        <li>
          <t>Steve Bellovin</t>
        </li>
        <li>
          <t>Hadley Beeman, TAG (PC)</t>
        </li>
        <li>
          <t>Matthew Bocci, IAB (Observer)</t>
        </li>
        <li>
          <t>Christian Bormann, SPRIND</t>
        </li>
        <li>
          <t>Marcos Cáceres, TAG (Observer)</t>
        </li>
        <li>
          <t>Andrew Campling, 419 Consulting</t>
        </li>
        <li>
          <t>Sofıa Celi, Brave</t>
        </li>
        <li>
          <t>David Cooke, Aylo</t>
        </li>
        <li>
          <t>Iain Corby, Age Verification Providers Association</t>
        </li>
        <li>
          <t>Dhruv Dhody, IAB (Observer)</t>
        </li>
        <li>
          <t>Nick Doty, Center for Democracy and Technology (PC)</t>
        </li>
        <li>
          <t>Sarah Forland, New America Open Technology Institute</t>
        </li>
        <li>
          <t>Jérôme Gorin, Ecole Polytechnique</t>
        </li>
        <li>
          <t>Alexis Hancock, Electronic Freedom Foundation</t>
        </li>
        <li>
          <t>Julia Hanson, Apple</t>
        </li>
        <li>
          <t>Wes Hardaker, University of Southern California Information Sciences Institute</t>
        </li>
        <li>
          <t>Kyle den Hartog, Brave</t>
        </li>
        <li>
          <t>Dennis Jackson, Mozilla</t>
        </li>
        <li>
          <t>Leif Johansson, SIROS Foundation</t>
        </li>
        <li>
          <t>Mallory Knodel, Article 19</t>
        </li>
        <li>
          <t>Mirja Kühlewind, IAB (Observer)</t>
        </li>
        <li>
          <t>Jonathan Langley, Ofcom UK</t>
        </li>
        <li>
          <t>Veronica Lin, Carnegie Mellon University</t>
        </li>
        <li>
          <t>Thibault Meunier, Cloudflare</t>
        </li>
        <li>
          <t>Tom Newton, Qoria</t>
        </li>
        <li>
          <t>Mark Nottingham, IAB (PC Co-Chair)</t>
        </li>
        <li>
          <t>Georgia Osborn, Ofcom UK</t>
        </li>
        <li>
          <t>Tommy Pauly, IAB (PC)</t>
        </li>
        <li>
          <t>John Perrino, Internet Society</t>
        </li>
        <li>
          <t>Eric Rescorla, Knight-Georgetown Institute</t>
        </li>
        <li>
          <t>Beatriz Rocha, Ceweb.br</t>
        </li>
        <li>
          <t>Omari Rodney, Yoti</t>
        </li>
        <li>
          <t>Gianpaolo Scalone, Vodafone</t>
        </li>
        <li>
          <t>Sarah Scheffler, Carnegie Mellon University</t>
        </li>
        <li>
          <t>Andrew Shaw, UK National Cyber Security Centre</t>
        </li>
        <li>
          <t>Aline Sylla, German Federal Commissioner for Data Protection and Freedom of Information</t>
        </li>
        <li>
          <t>Martin Thomson, TAG  (PC Co-Chair)</t>
        </li>
        <li>
          <t>Carmela Troncoso, EPFL, the Swiss Federal Institute of Technology in Lausanne</t>
        </li>
        <li>
          <t>Benjamin VanderSloot, Mozilla</t>
        </li>
        <li>
          <t>Tara Whalen, World Wide Web Consortium (PC)</t>
        </li>
      </ul>
    </section>
    <section anchor="impacts">
      <name>Potential Impacts</name>
      <t>During the workshop, participants were asked to name potential impacts -- whether positive or negative -- that could be seen in association with the introduction of an age control mechanism. This list is not exhaustive, focuses largely on the challenges surrounding the introduction of such a mechanism, and does not imply that all points were agreed to by all participants'</t>
      <section anchor="impact-on-children">
        <name>Impact on Children</name>
        <ol spacing="normal" type="1"><li>
            <t>Children encounter online harms</t>
          </li>
          <li>
            <t>Pushing kids to less safe resources</t>
          </li>
          <li>
            <t>Kids lose the ability to explore on their own</t>
          </li>
          <li>
            <t>Diminishing children's rights</t>
          </li>
        </ol>
      </section>
      <section anchor="ecosystem-impact">
        <name>Ecosystem Impact</name>
        <ol spacing="normal" type="1"><li>
            <t>Centralization</t>
          </li>
          <li>
            <t>Fragmentation of the Internet</t>
          </li>
          <li>
            <t>Increased costs for running a Web site</t>
          </li>
          <li>
            <t>Chilling effects on use of the Internet</t>
          </li>
          <li>
            <t>VPNs proliferate</t>
          </li>
          <li>
            <t>Chilling effects on the publication of borderline content</t>
          </li>
          <li>
            <t>Less content being available online</t>
          </li>
          <li>
            <t>Restricting people to a few platforms / services</t>
          </li>
          <li>
            <t>More use/utility of the Internet due to a perception of safety</t>
          </li>
          <li>
            <t>More (or all) online services require a verified login</t>
          </li>
        </ol>
      </section>
      <section anchor="implementation-and-deployment-difficulties">
        <name>Implementation and Deployment Difficulties</name>
        <ol spacing="normal" type="1"><li>
            <t>Device compatibility</t>
          </li>
          <li>
            <t>"Advanced Persistent Teenagers"</t>
          </li>
          <li>
            <t>Difficulties regarding jurisdiction checking</t>
          </li>
          <li>
            <t>Spillover to other software (e.g., VPNs)</t>
          </li>
          <li>
            <t>Displacing users from compliant to non-compliant sites</t>
          </li>
          <li>
            <t>False sense of addressing the problem</t>
          </li>
          <li>
            <t>Dealing with conflict of laws</t>
          </li>
          <li>
            <t>Operators pulling out of territories</t>
          </li>
          <li>
            <t>Increasing the footprint of the deep web</t>
          </li>
          <li>
            <t>Imposition of cultural norms on other jurisdictions</t>
          </li>
          <li>
            <t>Technical solutions are reused for other purposes (scope creep)</t>
          </li>
          <li>
            <t>Dealing with obsolete and non-compliant systems</t>
          </li>
        </ol>
      </section>
      <section anchor="security-and-privacy">
        <name>Security and Privacy</name>
        <ol spacing="normal" type="1"><li>
            <t>Increased cybersecurity risks</t>
          </li>
          <li>
            <t>Fingerprinting risk</t>
          </li>
          <li>
            <t>Ad targeting could get creepier</t>
          </li>
          <li>
            <t>Needing to trust someone on their word without evidence</t>
          </li>
          <li>
            <t>Normalizing online identity requests -- increase to phishing risk</t>
          </li>
          <li>
            <t>Data breaches</t>
          </li>
        </ol>
      </section>
      <section anchor="equity">
        <name>Equity</name>
        <ol spacing="normal" type="1"><li>
            <t>Lack of access (e.g. due to lack of device support)</t>
          </li>
          <li>
            <t>Refugees, stateless people, people without identity</t>
          </li>
          <li>
            <t>Harm to vulnerable people</t>
          </li>
          <li>
            <t>Not addressing other vulnerable groups (i.e., not age-based)</t>
          </li>
          <li>
            <t>Lack of availability of redress mechanisms</t>
          </li>
          <li>
            <t>Users' rights to restitution</t>
          </li>
          <li>
            <t>Loss of control over and access to data</t>
          </li>
          <li>
            <t>Risk to anonymity</t>
          </li>
          <li>
            <t>Loss of ability to run software of your choice</t>
          </li>
        </ol>
      </section>
      <section anchor="societal-impacts">
        <name>Societal Impacts</name>
        <ol spacing="normal" type="1"><li>
            <t>Air cover for blocking the Internet</t>
          </li>
          <li>
            <t>User control of the content they see online</t>
          </li>
          <li>
            <t>Costs to society (e.g., regulatory overhead)</t>
          </li>
          <li>
            <t>Increased online tracking and state surveillance</t>
          </li>
          <li>
            <t>Use as a censorship mechanism</t>
          </li>
          <li>
            <t>Advancing foreign policy goals with censorship</t>
          </li>
          <li>
            <t>Abuse of guardians who don't cut off their wards</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="desirable-and-essential-properties-of-a-solution">
      <name>Desirable and Essential Properties of a Solution</name>
      <t>During the workshop, participants were asked to nominate the properties that they believed would be advantageous or even essential for a solution in this space to have. This set of requirements and desiderata was recognised as not all being achievable, as some goals are in tension with others.</t>
      <section anchor="functional">
        <name>Functional</name>
        <ol spacing="normal" type="1"><li>
            <t>Underage don't access content that's inappropriate</t>
          </li>
          <li>
            <t>Not trivially by-passable</t>
          </li>
          <li>
            <t>Flexible enough to be provided through different means</t>
          </li>
          <li>
            <t>Bound to the user</t>
          </li>
          <li>
            <t>Reliable</t>
          </li>
          <li>
            <t>Handles user-generated content</t>
          </li>
          <li>
            <t>Enables differential experiences or age-appropriate design (not just blocking)</t>
          </li>
          <li>
            <t>Agile by design -- assume adversarial engagement</t>
          </li>
          <li>
            <t>Difficult to bypass</t>
          </li>
          <li>
            <t>Accurate</t>
          </li>
        </ol>
      </section>
      <section anchor="accountability-and-transparency">
        <name>Accountability and Transparency</name>
        <ol spacing="normal" type="1"><li>
            <t>Transparency and accountability regarding what is blocked</t>
          </li>
          <li>
            <t>Minimises the need for trust decisions</t>
          </li>
          <li>
            <t>Can be independently / publicly verifiable and tested</t>
          </li>
          <li>
            <t>Auditability</t>
          </li>
          <li>
            <t>Appeal mechanism for incorrect labelling of content</t>
          </li>
        </ol>
      </section>
      <section anchor="privacy-and-security">
        <name>Privacy and Security</name>
        <ol spacing="normal" type="1"><li>
            <t>Issuer-Verifier and Verifier-Verifier unlinkability</t>
          </li>
          <li>
            <t>Unlinkability across components</t>
          </li>
          <li>
            <t>Purpose limitation of the data processed</t>
          </li>
          <li>
            <t>Security of data processed</t>
          </li>
          <li>
            <t>Phishing-resistant</t>
          </li>
          <li>
            <t>Doesn't process or transfer any more data than is necessary</t>
          </li>
          <li>
            <t>Avoids becoming a tracking vector</t>
          </li>
        </ol>
      </section>
      <section anchor="equity-1">
        <name>Equity</name>
        <ol spacing="normal" type="1"><li>
            <t>Inclusive</t>
          </li>
          <li>
            <t>Fair -- avoids or minimises bias</t>
          </li>
          <li>
            <t>Does not create inequalities (e.g., across education, other properties)</t>
          </li>
          <li>
            <t>Discriminates solely upon age, not other properties</t>
          </li>
          <li>
            <t>Works on open devices</t>
          </li>
          <li>
            <t>Device independence</t>
          </li>
          <li>
            <t>Usable by people of all ages to increase their safety online</t>
          </li>
          <li>
            <t>User choice in who verifies their age, and how</t>
          </li>
          <li>
            <t>No clear losers</t>
          </li>
          <li>
            <t>Accessible to people with disabilities</t>
          </li>
          <li>
            <t>Includes appeal mechanisms for incorrect age determinations</t>
          </li>
        </ol>
      </section>
      <section anchor="jurisdiction-and-geopolitical">
        <name>Jurisdiction and Geopolitical</name>
        <ol spacing="normal" type="1"><li>
            <t>Able to handle arbitrary composition of different jurisdictional requirements (possibly down to school level)</t>
          </li>
          <li>
            <t>Applicable globally</t>
          </li>
          <li>
            <t>Applies the rule of law in the jurisdiction where it applies universally</t>
          </li>
          <li>
            <t>No concentration of power in any one entity (or small group of them)</t>
          </li>
          <li>
            <t>No concentration of power in any country</t>
          </li>
          <li>
            <t>Aligned to legal duties</t>
          </li>
          <li>
            <t>Based upon a valid legal basis</t>
          </li>
        </ol>
      </section>
      <section anchor="usability">
        <name>Usability</name>
        <ol spacing="normal" type="1"><li>
            <t>Economically sustainable</t>
          </li>
          <li>
            <t>Low friction for adults</t>
          </li>
          <li>
            <t>Fast</t>
          </li>
          <li>
            <t>Comprehensible by users</t>
          </li>
        </ol>
      </section>
      <section anchor="implementation-and-deployment">
        <name>Implementation and Deployment</name>
        <ol spacing="normal" type="1"><li>
            <t>Low dependency on a single root of trust</t>
          </li>
          <li>
            <t>Enforceable by a good mix of technology and law</t>
          </li>
          <li>
            <t>Broad deployability -- not expensive or complex</t>
          </li>
          <li>
            <t>Decentralized</t>
          </li>
          <li>
            <t>Future-proof</t>
          </li>
          <li>
            <t>Ability to report / learn when there are issues in the system / telemetry</t>
          </li>
        </ol>
      </section>
      <section anchor="general-other">
        <name>General / Other</name>
        <ol spacing="normal" type="1"><li>
            <t>Not perfect</t>
          </li>
          <li>
            <t>Technically robust</t>
          </li>
          <li>
            <t>Not a single, sole solution</t>
          </li>
          <li>
            <t>Stable -- resilient</t>
          </li>
          <li>
            <t>Alignment of incentives among participants</t>
          </li>
          <li>
            <t>Simple to implement</t>
          </li>
          <li>
            <t>Resistance to repurposing for censorship</t>
          </li>
          <li>
            <t>Unable to be used for surveillance</t>
          </li>
          <li>
            <t>Addresses risk of verification becoming over-prevalent</t>
          </li>
          <li>
            <t>Accountable governance</t>
          </li>
          <li>
            <t>Open Standards-based</t>
          </li>
        </ol>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
