<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-iab-agews-report-03" category="info" consensus="true" submissionType="IAB" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="AGEWS Report">Report from the IAB/W3C Workshop on Age-Based Restrictions on Content Access</title>
    <seriesInfo name="Internet-Draft" value="draft-iab-agews-report-03"/>
    <author fullname="Mark Nottingham">
      <organization/>
      <address>
        <email>mnot@mnot.net</email>
      </address>
    </author>
    <author fullname="Martin Thomson">
      <organization/>
      <address>
        <email>mt@lowentropy.net</email>
      </address>
    </author>
    <date year="2026" month="April" day="15"/>
    <keyword>IAB workshop</keyword>
    <keyword>age gate</keyword>
    <abstract>
      <?line 72?>

<t>The Workshop on Age-Based Restrictions on Content Access was convened by the Internet Architecture Board (IAB) and World Wide Web Consortium (W3C) in October 2025. This report summarizes its significant points of discussion and identifies topics that may warrant further consideration and work.</t>
      <t>Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB or W3C views and positions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://intarchboard.github.io/draft-iab-agews-report/draft-iab-agews-report.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-iab-agews-report/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/intarchboard/draft-iab-agews-report"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Regulators and legislators around the world are increasingly restricting what can be made available to young people on the Internet, in an effort to reduce the online harms that they encounter.</t>
      <t>In October 2025, the Internet Architecture Board and the World Wide Web Consortium convened the Workshop on Age-Based Restrictions on Content Access. It brought together technologists, civil society advocates, business interests, and government stakeholders to discuss the nuances of the introduction of such measures.</t>
      <t>The primary focus was "to perform a thorough examination of the technical and architectural choices that are involved in solutions for age-based restrictions on access to content", with a goal of "build[ing] a shared understanding of the properties of various proposed approaches."</t>
      <t>See the workshop announcement <xref target="ANNOUNCE"/> for details; papers and presentation materials are linked from the announcement. This report summarises the proceedings of the workshop.</t>
      <section anchor="views-expressed-in-this-report">
        <name>Views Expressed in this Report</name>
        <t>This document is a report on the proceedings of the workshop. The views and positions documented in this report were expressed during the workshop by participants and do not necessarily reflect the IAB's or W3C's views and positions, nor those of all participants.</t>
        <t>Furthermore, the content of the report comes from presentations given by workshop participants and notes taken during the discussions, without interpretation or validation. Thus, the content of this report follows the flow and dialogue of the workshop but does not attempt to capture a consensus.</t>
      </section>
      <section anchor="chatham-house-rule">
        <name>Chatham House Rule</name>
        <t>Participants agreed to conduct the workshop under the Chatham House Rule <xref target="CHATHAM-HOUSE"/>, so this report does not attribute statements to individuals or organizations without express permission.  Most submissions to the workshop were public and thus attributable; they are used here to provide substance and context.</t>
        <t><xref target="participants"/> lists the workshop participants, unless they requested that this information be withheld.</t>
      </section>
    </section>
    <section anchor="overview-of-the-workshop">
      <name>Overview of the Workshop</name>
      <t>The IAB/W3C workshop on Age-Based Restrictions on Content Access brought together a diverse group of participants from technical, policy, regulatory, and research communities to examine how the Internet might accommodate demands for age-based access controls. Over three days, discussions traversed the intersection of technology, governance, human rights, and social expectations, with a recurring emphasis on privacy, accountability, and the preservation of the open architecture of the Internet.</t>
      <t>The workshop began with a framing session that emphasized the Internet's original design as a universal, non-segmented space. Participants observed that the web does not natively distinguish between adult and child users, and that governments are creating regulatory environments that shift responsibility from parents and individuals to service providers. The scope of discussion was tightly defined: not the morality or policy of age restrictions, but the technical, architectural, and human-rights implications of enforcing them. The challenge, many participants agreed, lay in building mechanisms that are accurate, respect privacy, maintain global interoperability, and avoid creating infrastructure that could be repurposed for censorship or surveillance.</t>
      <t>Early exchanges focused on terminology and scope: whether "age verification" should be understood narrowly as identity checking or more broadly as "age assurance." The conversation also touched on the diversity of cultural expectations about parental authority and the variety of legal frameworks emerging across jurisdictions. Some participants warned of "slippery slope" effects, where mechanisms designed for age checks might evolve into tools for broader identity enforcement. Several noted that while liability drives many policy decisions, technical design should aim to minimize harm and avoid over-centralization. The question of who bears responsibility for child safety -- platforms, regulators, or device manufacturers -- surfaced repeatedly.</t>
      <t>Human-rights principles were foregrounded as a basis for evaluation. Privacy was discussed not only in terms of data protection law (including techniques like minimization) but as protection from unwanted exposure or interaction. Freedom of expression and opinion was considered, particularly how adults and children both have rights to communicate, access information and associate, free from the chilling effects of surveillance or discrimination. The group revisited long-standing Internet design tenets, such as decentralization and the end-to-end principle, asking how they should inform modern architectures that could easily drift toward central control. Some argued that successful systems must remain open, interoperable, and reversible, while others cautioned that any solution -- even a well-intentioned one -- would inevitably reshape the Internet's social and economic balance.</t>
      <t>Technical sessions explored a spectrum of enforcement models: service-based, network-based, and device-based. Service-enforced systems place the compliance burden on websites, risking fragmentation and user fatigue from repeated verification flows. Network-based filtering -- already common in some jurisdictions -- offers broad coverage but limited accuracy and significant privacy trade-offs. Device-enforced models, in which operating systems mediate access based on a one-time verification, were praised for their potential usability and consistency but criticized for potential concentration of power among major vendors. Many participants noted that a pluralistic approach is more likely to be successful, recognizing that no single architecture can meet all requirements equally across jurisdictions.</t>
      <t>Privacy-enhancing technologies (PETs) such as anonymous credentials and zero-knowledge proofs were discussed as promising, though not necessarily sufficient, tools. In particular, PETs don't address all privacy concerns, and likewise don't address wider issues around access to underlying sources of truth. Furthermore, some participants cautioned that PETs cannot prevent circumvention or censorship, are relatively untested, and that open-sourcing code does not automatically make systems trustworthy. A recurring concern was that while credential-based verification may work well in countries with unified ID systems, it risks excluding people without access to such credentials and entrenching inequalities.</t>
      <t>Discussions on parental controls and network operator roles highlighted practical tensions between effectiveness, usability, and user rights. Although some participants saw value in layered approaches combining device, service, and network measures, others noted the high complexity and low adoption of parental-control tools even where available. The workshop also revisited the ethical dimension: whether designing better tools might unintentionally legitimize over-broad or intrusive regulation.</t>
      <t>By the third day, participants reflected on the need for collaboration across disciplines and institutions. Many acknowledged that while complete solutions are unlikely in the short term, articulating shared vocabulary, architectural roles, and evaluation properties was an essential foundation. There was broad agreement that future work should map risks against possible architectures, document trade-offs in neutral terms, and communicate clearly with policymakers to prevent outcomes that could undermine Internet openness.</t>
      <t>The meeting closed with reflections on what process might be followed to take proposed solutions through a standards process. Both IETF and W3C representatives outlined how exploratory work might proceed within their respective frameworks, stressing that standardization would require consensus, open participation, and time.</t>
      <t>While this workshop would not provide specific standards proposals or take positions on the advisability of regulatory proposals, it was suggested that leadership bodies, including the Internet Architecture Board and Technical Architecture Group, could be places to make such statements.</t>
      <t>While the current status quo -- piecemeal, opaque, and often privacy-eroding -- was unsatisfactory to most participants, many cautioned that hasty solutions could entrench worse problems. This led to growing recognition that protecting children online must not come at the expense of the Internet's foundational freedoms, and that sustained, multi-stakeholder collaboration is the only viable path forward.</t>
    </section>
    <section anchor="key-takeaways">
      <name>Key Takeaways</name>
      <t>This section highlights aspects of discussion at the workshop that appeared to be most impactful.</t>
      <section anchor="collaboration">
        <name>There is a Need for Cross-Cutting Collaboration</name>
        <t>Many participants remarked that the workshop allowed them to appreciate perspectives that they had not fully considered previously. Although several substantial efforts have included industry, civil society, government, and technologists, collaboration across all stakeholders appears to be rare.</t>
        <t>This was especially evident when considering the involvement of the technical community. Although there have been a number of consultations by governments and other bodies, involvement of the technical community is often limited to participation by the policy representatives of tech companies. This can lead to an underappreciation of the architectural impact and related harms of the design decisions made.</t>
        <t>Architectures effective for the goals and less likely to have profound harmful consequences may require the cooperation of multiple actors fulfilling different <xref target="roles"/>. To that end, standardization may be especially important for interoperable, collaborative development of architectures involving both servers and clients.</t>
        <t>Some participants also noted that approaches where liability rests only on one party -- for example, a content or platform provider -- are unlikely to lead to the desired results, because this creates disincentives for the cooperation that is necessary for meaningful reduction of harms. An approach that considers the roles of the young, their parents, device manufacturers, operating system vendors, content providers, and society overall was believed to be more likely to succeed.</t>
      </section>
      <section anchor="roles">
        <name>Identifying the Roles Involved is Important</name>
        <t>One of the more substantive discussions on architecture involved presentations on the functional roles involved in any system <xref target="HANSON"/>.</t>
        <t>Four key roles were identified:</t>
        <dl>
          <dt>Verifier:</dt>
          <dd>
            <t>The verifier role determines whether a person falls into a target age range.</t>
          </dd>
          <dt>Enforcer:</dt>
          <dd>
            <t>The enforcer is responsible for ensuring that a person who does not satisfy the verifier is unable to access age-restricted content or services.</t>
          </dd>
          <dt>Policy selector:</dt>
          <dd>
            <t>The policy selector is responsible for determining which policies should apply to the user, based on their jurisdiction, status or preferences.</t>
          </dd>
          <dt>Rater:</dt>
          <dd>
            <t>The rater is responsible for determining whether content or services require age restrictions and the age ranges that apply.</t>
          </dd>
        </dl>
        <t>In addition, it was noted that ratings and laws are often limited by geography or jurisdiction, so it is often necessary for services to first identify the applicable jurisdiction. It was generally accepted that this function often uses IP geolocation mappings, despite acknowledged limitations around accuracy and susceptibility to circumvention using VPNs.</t>
      </section>
      <section anchor="a-common-vocabulary-is-necessary">
        <name>A Common Vocabulary is Necessary</name>
        <t>Early discussions highlighted how not all participants used the same terminology when referring to different activities or functions. There was a recognition of the value of shared language, and some participants pointed to <xref target="ISO-IEC-27566-1"/>, which establishes key terms, including:</t>
        <dl>
          <dt>Age assurance:</dt>
          <dd>
            <t>Age assurance is an umbrella term for technology that provides some entity with information about the age of a person. This is understood to encompass multiple classes of specific methods, including age verification, age estimation, and age inference. Age assurance does not need to result in a specific age; age ranges are often preferred as these can have better privacy properties.</t>
          </dd>
          <dt>Age verification:</dt>
          <dd>
            <t>Age verification refers to gaining high assurance that a person is within a given age range. Strong assurances are often tied to official or governmental documentation, so age verification can involve the use of government-issued digital credentials.</t>
          </dd>
          <dt>Age estimation:</dt>
          <dd>
            <t>Age estimation uses statistical processes that process physical or behavioral characteristics of a person to produce a probabilistic value for how old someone is or whether their age is in a target range. A variety of techniques are used, the most common being facial age estimation, which uses machine learning models to estimate how old a person is based on still or moving images of their face.</t>
          </dd>
          <dt>Age inference:</dt>
          <dd>
            <t>Age inference draws on data sources to determine whether a person fits a given age range. This method can require identification information, such as an email address or phone number, to find relevant records. For example, evidence of online activity prior to a certain date in the past might support the view that a person is older than a target threshold.</t>
          </dd>
          <dt>Age gating:</dt>
          <dd>
            <t>Age gating is the process of restricting access to something based on the age of the person requesting access.</t>
          </dd>
        </dl>
        <t>Relating these functions to the roles described in <xref target="roles"/>, all age assurance types fit the "verifier" role, where age gating applies to the "enforcer" role.</t>
      </section>
      <section anchor="trust">
        <name>Privacy and Trust Expectations Need Further Discussion</name>
        <t>Privacy was a recurrent theme at the workshop, but it was clear that there are multiple considerations at play when talking about privacy. The question of privacy was often caught up in discussions of trust, where approaches each depend on different sorts of trust between the different actors.</t>
        <t>Participants identified privacy as important to maintaining trust in any system that involves age assurance or age gating.</t>
        <t>Where private information is used by the actors in a proposed architecture, those actors might need to be trusted to handle that private information responsibly. In that approach, the importance of different safeguards on personal information, such as the prompt disposal of any personal information -- a practice that many age verification providers promise -- becomes a core part of what might allow people to trust that system.</t>
        <t>Several people observed that the sort of trust that is asked from people might not correspond with the role that certain entities play in people's lives. This will depend on context, where "adult" content providers generally serve anonymous users, whereas social media often already has a lot of personal information on users.</t>
        <t>In either case, users might have no prior knowledge of -- or trust in -- providers that are contracted to provide age assurance functions. It was observed that one likely consequence of some arrangements is to train people to become more trusting of strange sites that ask for personal information.</t>
        <t>Alternatively, it might be that trust in the system is not vested in actors, but instead the system as a whole. This is possible if no information is made available to different actors, removing the need to trust their handling of private information. For this to be achievable, the use of zero-knowledge proofs or similar cryptographic techniques was seen as a way to limit what each entity learns. Some participants noted, however, that these techniques do not address circumvention or censorship risks, still introduce new information into the ecosystem, and may concentrate trust in particular software implementations.</t>
        <t>Other aspects of trust were considered equally important from different perspectives.  Services that rely on an independent age assurance provider need to trust that the provider makes an accurate determination of age, at least to the extent that they might be held liable in law.  They also need to trust that the service respects privacy, lest the use of a low-quality provider could create other forms of liability or drive away potential customers.</t>
      </section>
      <section anchor="waterfall">
        <name>More than One Approach will be Required</name>
        <t>A recurrent theme in discussion was the insufficiency of any particular age assurance technique in ensuring that people are not unjustifiably excluded. All age assurance methods discussed fail to correctly classify some subset of people:</t>
        <ul spacing="normal">
          <li>
            <t>Age verification that depends on government-issued credentials will fail when people do not hold accepted credentials. This includes people who do not hold credentials and those who hold credentials, but not those that are recognized.</t>
          </li>
          <li>
            <t>Age estimation produces probabilistic information about age that can be wrong by some number of years, potentially excluding people near threshold ages. This manifests as both false acceptance (people who are outside the target age range being accepted) and false rejection (people who are in the target age range being rejected). Where there is a goal of minimizing the false acceptance rate, that increases the number of false rejections.</t>
          </li>
          <li>
            <t>Age inference techniques can fail due to lack of information.</t>
          </li>
        </ul>
        <t>Discussion often came back to an approach that is increasingly recommended for use in age verification, where multiple methods are applied in series. Checks with lower friction -- those that require less active participation from people -- or that are less invasive of privacy are attempted first. Successive checks are only used when a definitive result cannot be achieved.</t>
        <t>Some participants noted that inconsistent friction and invasiveness create a different kind of discrimination, one that can exacerbate existing adverse discrimination. For example, the accuracy of age estimation for people with African heritage is often significantly lower than for those with European ancestry <xref target="FATE"/>. This is attributed to the models used being trained and validated using datasets that have less coverage of some groups. People who are affected by this bias are more likely to need to engage with more invasive methods.</t>
        <t>One consequence of having multiple imperfect techniques is the need to recognize that any system will be imperfect. That creates several tensions:</t>
        <ul spacing="normal">
          <li>
            <t>Some people will never be able to satisfy age assurance checks and will therefore be excluded by strict assurance mandates. Here, discussions acknowledged that purely technical systems are likely inadequate.</t>
          </li>
          <li>
            <t>Some people who should be blocked from accessing content or services will find ways to circumvent restrictions. In this context, the term "advanced persistent teenager" was recognized as characterizing the nature of the "adversary": individuals who are considered too young to access content, but who are highly motivated, technically sophisticated, and have time to spare.</t>
          </li>
          <li>
            <t>Offering more choices to people can improve privacy because they get to choose the method that suits them. However, when a chosen method fails, having to engage with additional methods has a higher privacy cost.</t>
          </li>
        </ul>
        <t>Some participants argued that accepting these risks is necessary in order to gain any of the benefits that age-based restrictions might confer. Other participants were unwilling to accept potential impositions on individual rights in light of the insufficiency of restrictions in providing meaningful protection; see <xref target="holistic"/>.</t>
      </section>
      <section anchor="risks">
        <name>Mapping the Risks for Architectures is a Useful Next Step</name>
        <t>How the identified roles (see <xref target="roles"/>) are arranged into architectures was some of the more substantive discussion. <xref target="JACKSON"/> describes some of the alternatives, along with some of the implications that arise from different arrangements.</t>
        <t>Throughout this discussion, it was acknowledged that active deployments tended to fall into a common pattern, where content providers are required to age-gate access and contract a third party to interpose that service. Several participants noted that this is a somewhat natural consequence of some of the constraints that actors are subject to.  <xref target="f-typical"/> shows the typical deployment model for age-gated content and services, along with the roles from <xref target="roles"/>.</t>
        <figure anchor="f-typical">
          <name>Typical Deployment Model</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="352" width="552" viewBox="0 0 552 352" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,32 L 32,80" fill="none" stroke="black"/>
                <path d="M 80,48 L 80,112" fill="none" stroke="black"/>
                <path d="M 128,120 L 128,304" fill="none" stroke="black"/>
                <path d="M 160,120 L 160,176" fill="none" stroke="black"/>
                <path d="M 184,48 L 184,112" fill="none" stroke="black"/>
                <path d="M 328,112 L 328,144" fill="none" stroke="black"/>
                <path d="M 328,240 L 328,272" fill="none" stroke="black"/>
                <path d="M 368,48 L 368,112" fill="none" stroke="black"/>
                <path d="M 368,144 L 368,240" fill="none" stroke="black"/>
                <path d="M 368,272 L 368,336" fill="none" stroke="black"/>
                <path d="M 464,48 L 464,112" fill="none" stroke="black"/>
                <path d="M 464,144 L 464,240" fill="none" stroke="black"/>
                <path d="M 464,272 L 464,336" fill="none" stroke="black"/>
                <path d="M 8,48 L 56,48" fill="none" stroke="black"/>
                <path d="M 80,48 L 184,48" fill="none" stroke="black"/>
                <path d="M 368,48 L 464,48" fill="none" stroke="black"/>
                <path d="M 192,80 L 360,80" fill="none" stroke="black"/>
                <path d="M 344,96 L 360,96" fill="none" stroke="black"/>
                <path d="M 80,112 L 184,112" fill="none" stroke="black"/>
                <path d="M 368,112 L 464,112" fill="none" stroke="black"/>
                <path d="M 368,144 L 464,144" fill="none" stroke="black"/>
                <path d="M 344,160 L 360,160" fill="none" stroke="black"/>
                <path d="M 176,192 L 360,192" fill="none" stroke="black"/>
                <path d="M 344,224 L 360,224" fill="none" stroke="black"/>
                <path d="M 368,240 L 464,240" fill="none" stroke="black"/>
                <path d="M 368,272 L 464,272" fill="none" stroke="black"/>
                <path d="M 344,288 L 360,288" fill="none" stroke="black"/>
                <path d="M 144,320 L 360,320" fill="none" stroke="black"/>
                <path d="M 368,336 L 464,336" fill="none" stroke="black"/>
                <path d="M 32,80 L 48,112" fill="none" stroke="black"/>
                <path d="M 16,112 L 32,80" fill="none" stroke="black"/>
                <path d="M 344,96 C 335.16936,96 328,103.16936 328,112" fill="none" stroke="black"/>
                <path d="M 344,160 C 335.16936,160 328,152.83064 328,144" fill="none" stroke="black"/>
                <path d="M 176,192 C 167.16936,192 160,184.83064 160,176" fill="none" stroke="black"/>
                <path d="M 344,224 C 335.16936,224 328,231.16936 328,240" fill="none" stroke="black"/>
                <path d="M 344,288 C 335.16936,288 328,280.83064 328,272" fill="none" stroke="black"/>
                <path d="M 144,320 C 135.16936,320 128,312.83064 128,304" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="368,320 356,314.4 356,325.6" fill="black" transform="rotate(0,360,320)"/>
                <polygon class="arrowhead" points="368,288 356,282.4 356,293.6" fill="black" transform="rotate(0,360,288)"/>
                <polygon class="arrowhead" points="368,192 356,186.4 356,197.6" fill="black" transform="rotate(0,360,192)"/>
                <polygon class="arrowhead" points="368,160 356,154.4 356,165.6" fill="black" transform="rotate(0,360,160)"/>
                <polygon class="arrowhead" points="368,80 356,74.4 356,85.6" fill="black" transform="rotate(0,360,80)"/>
                <circle cx="32" cy="32" r="6" class="opendot" fill="white" stroke="black"/>
                <g class="text">
                  <text x="268" y="68">Visits</text>
                  <text x="504" y="68">Rater</text>
                  <text x="536" y="68">+</text>
                  <text x="128" y="84">Browser</text>
                  <text x="416" y="84">Website</text>
                  <text x="508" y="84">Policy</text>
                  <text x="516" y="100">Selector</text>
                  <text x="252" y="132">Redirected</text>
                  <text x="308" y="132">To</text>
                  <text x="236" y="180">Evidence</text>
                  <text x="284" y="180">of</text>
                  <text x="312" y="180">Age</text>
                  <text x="416" y="180">Age</text>
                  <text x="416" y="196">Assurance</text>
                  <text x="516" y="196">Verifier</text>
                  <text x="416" y="212">Service</text>
                  <text x="252" y="260">Redirected</text>
                  <text x="308" y="260">To</text>
                  <text x="420" y="292">Age-</text>
                  <text x="252" y="308">Admitted</text>
                  <text x="416" y="308">Gated</text>
                  <text x="516" y="308">Enforcer</text>
                  <text x="416" y="324">Content</text>
                  <text x="212" y="340">or</text>
                  <text x="256" y="340">Blocked</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
   o
---+---  +------------+                      +-----------+
   |     |            |       Visits         |           |  Rater +
   +     |  Browser   |--------------------->|  Website  |  Policy
  / \    |            |                  .---|           |  Selector
 /   \   +------------+                 |    +-----------+
               |   |      Redirected To |
               |   |                    |    +-----------+
               |   |                     '-->|           |
               |   |     Evidence of Age     |    Age    |
               |    '----------------------->| Assurance |  Verifier
               |                             |  Service  |
               |                         .---|           |
               |                        |    +-----------+
               |          Redirected To |
               |                        |    +-----------+
               |                         '-->|    Age-   |
               |           Admitted          |   Gated   |  Enforcer
                '--------------------------->|  Content  |
                         or Blocked          +-----------+
]]></artwork>
          </artset>
        </figure>
        <t>Some participants also noted that certain approaches may carry higher path-dependence risk once widely deployed, even if they remain theoretically possible to withdraw or replace. This can arise from accumulated architectural dependencies, operational integration with third-party services, and evolving expectations among users and service providers. As a result, architectures that tightly couple functionality to external verification services or embed assumptions about routine age signalling may increase the practical cost of transition, should alternative approaches later emerge that address privacy, equity, or effectiveness concerns more effectively.</t>
        <t><xref target="f-device"/> shows a deployment model for parental control software, showing how the roles from <xref target="roles"/> might apply. Here, parental controls do any verification of age necessary and select policies; content ratings might be performed by websites or the parental control software on the device; enforcement is performed on-device.</t>
        <figure anchor="f-device">
          <name>Parental Control Deployment Model</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="536" viewBox="0 0 536 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,32 L 32,80" fill="none" stroke="black"/>
                <path d="M 80,48 L 80,112" fill="none" stroke="black"/>
                <path d="M 80,208 L 80,256" fill="none" stroke="black"/>
                <path d="M 128,120 L 128,200" fill="none" stroke="black"/>
                <path d="M 184,48 L 184,112" fill="none" stroke="black"/>
                <path d="M 184,208 L 184,256" fill="none" stroke="black"/>
                <path d="M 368,48 L 368,112" fill="none" stroke="black"/>
                <path d="M 464,48 L 464,112" fill="none" stroke="black"/>
                <path d="M 8,48 L 56,48" fill="none" stroke="black"/>
                <path d="M 80,48 L 184,48" fill="none" stroke="black"/>
                <path d="M 368,48 L 464,48" fill="none" stroke="black"/>
                <path d="M 192,64 L 360,64" fill="none" stroke="black"/>
                <path d="M 192,96 L 360,96" fill="none" stroke="black"/>
                <path d="M 80,112 L 184,112" fill="none" stroke="black"/>
                <path d="M 368,112 L 464,112" fill="none" stroke="black"/>
                <path d="M 80,208 L 184,208" fill="none" stroke="black"/>
                <path d="M 80,256 L 184,256" fill="none" stroke="black"/>
                <path d="M 32,80 L 48,112" fill="none" stroke="black"/>
                <path d="M 172,120 L 196,168" fill="none" stroke="black"/>
                <path d="M 16,112 L 32,80" fill="none" stroke="black"/>
                <path d="M 196,168 L 212,168" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="368,64 356,58.4 356,69.6" fill="black" transform="rotate(0,360,64)"/>
                <polygon class="arrowhead" points="200,96 188,90.4 188,101.6" fill="black" transform="rotate(180,192,96)"/>
                <polygon class="arrowhead" points="180,120 168,114.4 168,125.6" fill="black" transform="rotate(243.43494882292202,172,120)"/>
                <polygon class="arrowhead" points="136,120 124,114.4 124,125.6" fill="black" transform="rotate(270,128,120)"/>
                <circle cx="32" cy="32" r="6" class="opendot" fill="white" stroke="black"/>
                <g class="text">
                  <text x="268" y="52">Visits</text>
                  <text x="128" y="84">Browser</text>
                  <text x="248" y="84">(Rated)</text>
                  <text x="312" y="84">Content</text>
                  <text x="416" y="84">Website</text>
                  <text x="508" y="84">Rater*</text>
                  <text x="244" y="164">Rater*</text>
                  <text x="280" y="164">+</text>
                  <text x="252" y="180">Enforcer</text>
                  <text x="132" y="228">Parental</text>
                  <text x="236" y="228">Verifier</text>
                  <text x="280" y="228">+</text>
                  <text x="132" y="244">Controls</text>
                  <text x="228" y="244">Policy</text>
                  <text x="292" y="244">Selector</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
   o
---+---  +------------+       Visits         +-----------+
   |     |            |--------------------->|           |
   +     |  Browser   |    (Rated) Content   |  Website  |  Rater*
  / \    |            |<---------------------|           |
 /   \   +------------+                      +-----------+
               ^     ^
               |      \
               |       \__ Rater* +
               |           Enforcer
               |
         +------------+
         |  Parental  |  Verifier +
         |  Controls  |  Policy Selector
         +------------+
]]></artwork>
          </artset>
        </figure>
        <t>An observation was made that laws often seek to designate a single entity as being responsible for ensuring that age restrictions are effective. That lawmakers feel the need to designate a responsible entity is due to constraints on how laws function, but one that creates other constraints.</t>
        <t>Another constraint identified was the need for specialist expertise in order to administer all of the multiple different age assurance techniques; see <xref target="waterfall"/>. This means that there is a natural tendency for services to contract with specialist age assurance services.</t>
        <t>Some of the proposed architectures were better able to operate under these constraints. Others required greater amounts of coordination, further emphasizing the importance of collaboration identified in <xref target="collaboration"/>.</t>
        <t>In discussion of the constraints on different architectures, it was common for participants to point to a particular aspect of a given approach as carrying risks. Indeed, the final reckoning of risks produced a long list of potential issues that might need mitigation (see <xref target="impacts"/>).</t>
        <t>Architectures are not equally vulnerable to different risks, so a more thorough analysis is needed to identify how each risk applies to a different approach. An analysis that considers the constraints and assumptions necessary to successfully deploy different architectures is a contribution that would likely be welcomed by the community.</t>
      </section>
      <section anchor="holistic">
        <name>Safety Requires More than a Technical Solution</name>
        <t>Experts in child safety frequently acknowledged that restricting access to selected content cannot be assumed to be sufficient. The task of ensuring that children are both kept appropriately safe, while preparing them for the challenges they will face in their lifetimes, is a massively complex task.</t>
        <t>A recurrent theme was the old maxim, "it takes a village to raise a child". This concept transcends cultural boundaries and was recognized. The role of parents, guardians, educators, governments, and online services in creating an environment in which children can thrive and grow.</t>
        <t>Content and service restrictions are likely only a small part of a suite of actions that combine to provide children with protection, but also support and encouragement. This theme was raised several times, despite the goal of the discussion being to explore technical and architectural questions.</t>
        <t>Restrictions are necessarily binary and lacking in nuance. Though questions of what to restrict were out of scope for the workshop, discussions often identified subject matter that highlighted the challenges inherent in making simplistic classifications. Participants acknowledged the importance of the role of the adults who support children in their life journey. For example, on the subject of eating disorders, which can be challenging to classify, participants pointed to the importance of being able to recognize trends and inform and engage responsible adults. Ultimately, each child has their own challenges and the people around them are in the best position to provide the support that best suits the child.</t>
        <t>The concept of age-appropriate design was raised on several occasions. This presents significant privacy challenges in that it means providing more information about age to services. However, it was recognized that there are legal and moral obligations on services to cater to the needs of children of different age groups. This is a more complex problem space than binary age restrictions, as it requires a recognition of the different needs of children as they get older.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Age verification has a significant potential security impact upon the Internet; see <xref target="trust"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="ANNOUNCE" target="https://datatracker.ietf.org/group/agews/about/">
        <front>
          <title>IAB/W3C Workshop on Age-Based Restrictions on Content Access (agews)</title>
          <author>
            <organization>Internet Architecture Board</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="CHATHAM-HOUSE" target="https://www.chathamhouse.org/about-us/chatham-house-rule">
        <front>
          <title>Chatham House Rule</title>
          <author>
            <organization>Chatham House</organization>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="HANSON" target="https://datatracker.ietf.org/doc/slides-agews-slides-where-enforcement-happens/">
        <front>
          <title>Where Enforcement Happens</title>
          <author fullname="Julia Hanson">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="FATE" target="https://nvlpubs.nist.gov/nistpubs/ir/2023/NIST.IR.8491.pdf">
        <front>
          <title>Face Analysis Technology Evaluation (FATE)</title>
          <author fullname="Mei Ngan">
            <organization/>
          </author>
          <author fullname="Patrick Grother">
            <organization/>
          </author>
          <author fullname="Austin Hom">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="JACKSON" target="https://datatracker.ietf.org/doc/slides-agews-where-enforcement-happens/">
        <front>
          <title>Where Enforcement Happens</title>
          <author fullname="Dean Jackson">
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="ISO-IEC-27566-1" target="https://www.iso.org/standard/88143.html">
        <front>
          <title>Information security, cybersecurity and privacy protection — Age assurance systems Part 1: Framework</title>
          <author>
            <organization>ISO</organization>
          </author>
          <date/>
        </front>
      </reference>
    </references>
    <?line 304?>

<section anchor="workshop-agenda">
      <name>Workshop Agenda</name>
      <t>The following sections cover each of the main topics of discussion sessions.</t>
      <section anchor="topic-introduction">
        <name>Topic: Introduction</name>
        <t>We will launch the workshop with a greeting, a round of introductions, and an explanation of the terms of engagement, background, goals and non-goals of the workshop.</t>
      </section>
      <section anchor="topic-setting-the-scene">
        <name>Topic: Setting the Scene</name>
        <t>Successfully deploying age restrictions at Internet scale has many considerations and constraints. We will explore them at a high level in order. The goal is to discuss within the group about the scope of topics that the workshop will seek to address.</t>
      </section>
      <section anchor="topic-guiding-principles">
        <name>Topic: Guiding Principles</name>
        <t>Architectural principles give us a framework for evaluating additions and changes to the Internet. Technical principles are subject to a number of other considerations, in particular human rights principles. We will review the principles that might apply to age-based restrictions, explain their function, impact, and how they are applied. Including human rights impacts, such as:</t>
        <ul spacing="compact">
          <li>
            <t>Privacy and Security</t>
          </li>
          <li>
            <t>Safety and efficacy</t>
          </li>
          <li>
            <t>Censorship and Access</t>
          </li>
          <li>
            <t>Access to the Internet</t>
          </li>
          <li>
            <t>Freedom of Expression</t>
          </li>
        </ul>
        <t>And effects on the internet and web architecture, such as:</t>
        <ul spacing="compact">
          <li>
            <t>Deployment, Extensibility and Evolution</t>
          </li>
          <li>
            <t>Avoid Centralization</t>
          </li>
          <li>
            <t>End-to-End</t>
          </li>
          <li>
            <t>One Global Internet/Web</t>
          </li>
          <li>
            <t>Layering and Modularity</t>
          </li>
        </ul>
      </section>
      <section anchor="topic-potential-impacts">
        <name>Topic: Potential Impacts</name>
        <t>We now want to look at some of the higher-level considerations that apply regardless of approach. We will look at some different perspectives on how to think of the overall problem. Discussion will seek to find how those perspectives can be shaped to guide choices.</t>
      </section>
      <section anchor="topic-where-enforcement-happens">
        <name>Topic: Where Enforcement Happens</name>
        <t>The Internet standards community is in the unique position to make controlled changes to the architecture of the Internet, and so there are multiple ways and places to deploy age restrictions. We will examine the options, with an eye to the deployment properties of each location and configuration, as related to the architectural principles. In particular, it will consider the establishment of new roles as well as the use of existing ones.</t>
      </section>
      <section anchor="topic-available-techniques">
        <name>Topic: Available Techniques</name>
        <t>There are several active and proposed systems for age restriction on the Internet. We will review them from the perspective of their interaction with the architectural principles, potential impacts, and with consideration of the enforcement options. Including:</t>
        <ul spacing="compact">
          <li>
            <t>Age verification: including server-side solutions using government identity systems / ZKP</t>
          </li>
          <li>
            <t>Age estimation: including biometrics and data analysis</t>
          </li>
          <li>
            <t>Age "inference" approaches</t>
          </li>
          <li>
            <t>In-network solutions</t>
          </li>
          <li>
            <t>Classification and On-device / parental control designs</t>
          </li>
        </ul>
      </section>
      <section anchor="discussion">
        <name>Discussion</name>
        <t>We will follow up on incomplete discussions and revisit architectural learnings.</t>
      </section>
      <section anchor="summary-and-reflection">
        <name>Summary and Reflection</name>
        <t>We will summarise what we have discussed and learned thus far.</t>
      </section>
      <section anchor="outcomes">
        <name>Outcomes</name>
        <t>We will outline the potential outcomes, further actions and next steps.</t>
      </section>
    </section>
    <section anchor="participants">
      <name>Workshop Attendees</name>
      <t>Attendees of the workshop are listed with their primary affiliation. Attendees from the program committee (PC), the Internet Architecture Board (IAB), and W3C Technical Architecture Group (TAG) are also marked.</t>
      <ul spacing="compact">
        <li>
          <t>Steve Bellovin</t>
        </li>
        <li>
          <t>Hadley Beeman, TAG (PC)</t>
        </li>
        <li>
          <t>Matthew Bocci, IAB (Observer)</t>
        </li>
        <li>
          <t>Christian Bormann, SPRIND</t>
        </li>
        <li>
          <t>Marcos Cáceres, TAG (Observer)</t>
        </li>
        <li>
          <t>Andrew Campling, 419 Consulting</t>
        </li>
        <li>
          <t>Sofıa Celi, Brave</t>
        </li>
        <li>
          <t>David Cooke, Aylo</t>
        </li>
        <li>
          <t>Iain Corby, Age Verification Providers Association</t>
        </li>
        <li>
          <t>Dhruv Dhody, IAB (Observer)</t>
        </li>
        <li>
          <t>Nick Doty, Center for Democracy and Technology (PC)</t>
        </li>
        <li>
          <t>Sarah Forland, New America Open Technology Institute</t>
        </li>
        <li>
          <t>Jérôme Gorin, Ecole Polytechnique</t>
        </li>
        <li>
          <t>Alexis Hancock, Electronic Freedom Foundation</t>
        </li>
        <li>
          <t>Julia Hanson, Apple</t>
        </li>
        <li>
          <t>Wes Hardaker, University of Southern California Information Sciences Institute</t>
        </li>
        <li>
          <t>Kyle den Hartog, Brave</t>
        </li>
        <li>
          <t>Dennis Jackson, Mozilla</t>
        </li>
        <li>
          <t>Leif Johansson, SIROS Foundation</t>
        </li>
        <li>
          <t>Mallory Knodel, Article 19</t>
        </li>
        <li>
          <t>Mirja Kühlewind, IAB (Observer)</t>
        </li>
        <li>
          <t>Jonathan Langley, Ofcom UK</t>
        </li>
        <li>
          <t>Veronica Lin, Carnegie Mellon University</t>
        </li>
        <li>
          <t>Thibault Meunier, Cloudflare</t>
        </li>
        <li>
          <t>Tom Newton, Qoria</t>
        </li>
        <li>
          <t>Mark Nottingham, IAB (PC Co-Chair)</t>
        </li>
        <li>
          <t>Georgia Osborn, Ofcom UK</t>
        </li>
        <li>
          <t>Tommy Pauly, IAB (PC)</t>
        </li>
        <li>
          <t>John Perrino, Internet Society</t>
        </li>
        <li>
          <t>Eric Rescorla, Knight-Georgetown Institute</t>
        </li>
        <li>
          <t>Beatriz Rocha, Ceweb.br</t>
        </li>
        <li>
          <t>Omari Rodney, Yoti</t>
        </li>
        <li>
          <t>Gianpaolo Scalone, Vodafone</t>
        </li>
        <li>
          <t>Sarah Scheffler, Carnegie Mellon University</t>
        </li>
        <li>
          <t>Andrew Shaw, UK National Cyber Security Centre</t>
        </li>
        <li>
          <t>Aline Sylla, German Federal Commissioner for Data Protection and Freedom of Information</t>
        </li>
        <li>
          <t>Martin Thomson, TAG  (PC Co-Chair)</t>
        </li>
        <li>
          <t>Carmela Troncoso, EPFL, the Swiss Federal Institute of Technology in Lausanne</t>
        </li>
        <li>
          <t>Benjamin VanderSloot, Mozilla</t>
        </li>
        <li>
          <t>Tara Whalen, World Wide Web Consortium (PC)</t>
        </li>
      </ul>
    </section>
    <section anchor="impacts">
      <name>Potential Impacts</name>
      <t>During the workshop, participants were asked to name potential impacts -- whether positive or negative -- that could be seen in association with the introduction of an age control mechanism. This list is not exhaustive, focuses largely on the challenges surrounding the introduction of such a mechanism, and does not imply that all points were agreed to by all participants'</t>
      <section anchor="impact-on-children">
        <name>Impact on Children</name>
        <ol spacing="compact" type="1"><li>
            <t>Children encounter online harms</t>
          </li>
          <li>
            <t>Pushing kids to less safe resources</t>
          </li>
          <li>
            <t>Kids lose the ability to explore on their own</t>
          </li>
          <li>
            <t>Diminishing children's rights</t>
          </li>
        </ol>
      </section>
      <section anchor="ecosystem-impact">
        <name>Ecosystem Impact</name>
        <ol spacing="compact" type="1"><li>
            <t>Centralization</t>
          </li>
          <li>
            <t>Fragmentation of the Internet</t>
          </li>
          <li>
            <t>Increased costs for running a Web site</t>
          </li>
          <li>
            <t>Chilling effects on use of the Internet</t>
          </li>
          <li>
            <t>VPNs proliferate</t>
          </li>
          <li>
            <t>Chilling effects on the publication of borderline content</t>
          </li>
          <li>
            <t>Less content being available online</t>
          </li>
          <li>
            <t>Restricting people to a few platforms / services</t>
          </li>
          <li>
            <t>More use/utility of the Internet due to a perception of safety</t>
          </li>
          <li>
            <t>More (or all) online services require a verified login</t>
          </li>
        </ol>
      </section>
      <section anchor="implementation-and-deployment-difficulties">
        <name>Implementation and Deployment Difficulties</name>
        <ol spacing="compact" type="1"><li>
            <t>Device compatibility</t>
          </li>
          <li>
            <t>"Advanced Persistent Teenagers"</t>
          </li>
          <li>
            <t>Difficulties regarding jurisdiction checking</t>
          </li>
          <li>
            <t>Spillover to other software (e.g., VPNs)</t>
          </li>
          <li>
            <t>Displacing users from compliant to non-compliant sites</t>
          </li>
          <li>
            <t>False sense of addressing the problem</t>
          </li>
          <li>
            <t>Dealing with conflict of laws</t>
          </li>
          <li>
            <t>Operators pulling out of territories</t>
          </li>
          <li>
            <t>Increasing the footprint of the deep web</t>
          </li>
          <li>
            <t>Imposition of cultural norms on other jurisdictions</t>
          </li>
          <li>
            <t>Technical solutions are reused for other purposes (scope creep)</t>
          </li>
          <li>
            <t>Dealing with obsolete and non-compliant systems</t>
          </li>
        </ol>
      </section>
      <section anchor="security-and-privacy">
        <name>Security and Privacy</name>
        <ol spacing="compact" type="1"><li>
            <t>Increased cybersecurity risks</t>
          </li>
          <li>
            <t>Fingerprinting risk</t>
          </li>
          <li>
            <t>Ad targeting could get creepier</t>
          </li>
          <li>
            <t>Needing to trust someone on their word without evidence</t>
          </li>
          <li>
            <t>Normalizing online identity requests -- increase to phishing risk</t>
          </li>
          <li>
            <t>Data breaches</t>
          </li>
        </ol>
      </section>
      <section anchor="equity">
        <name>Equity</name>
        <ol spacing="compact" type="1"><li>
            <t>Lack of access (e.g. due to lack of device support)</t>
          </li>
          <li>
            <t>Refugees, stateless people, people without identity</t>
          </li>
          <li>
            <t>Harm to vulnerable people</t>
          </li>
          <li>
            <t>Not addressing other vulnerable groups (i.e., not age-based)</t>
          </li>
          <li>
            <t>Lack of availability of redress mechanisms</t>
          </li>
          <li>
            <t>Users' rights to restitution</t>
          </li>
          <li>
            <t>Loss of control over and access to data</t>
          </li>
          <li>
            <t>Risk to anonymity</t>
          </li>
          <li>
            <t>Loss of ability to run software of your choice</t>
          </li>
        </ol>
      </section>
      <section anchor="societal-impacts">
        <name>Societal Impacts</name>
        <ol spacing="compact" type="1"><li>
            <t>Air cover for blocking the Internet</t>
          </li>
          <li>
            <t>User control of the content they see online</t>
          </li>
          <li>
            <t>Costs to society (e.g., regulatory overhead)</t>
          </li>
          <li>
            <t>Increased online tracking and state surveillance</t>
          </li>
          <li>
            <t>Use as a censorship mechanism</t>
          </li>
          <li>
            <t>Advancing foreign policy goals with censorship</t>
          </li>
          <li>
            <t>Abuse of guardians who don't cut off their wards</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="desirable-and-essential-properties-of-a-solution">
      <name>Desirable and Essential Properties of a Solution</name>
      <t>During the workshop, participants were asked to nominate the properties that they believed would be advantageous or even essential for a solution in this space to have. This set of requirements and desiderata was recognised as not all being achievable, as some goals are in tension with others.</t>
      <section anchor="functional">
        <name>Functional</name>
        <ol spacing="compact" type="1"><li>
            <t>Underage don't access content that's inappropriate</t>
          </li>
          <li>
            <t>Not trivially by-passable</t>
          </li>
          <li>
            <t>Flexible enough to be provided through different means</t>
          </li>
          <li>
            <t>Bound to the user</t>
          </li>
          <li>
            <t>Reliable</t>
          </li>
          <li>
            <t>Handles user-generated content</t>
          </li>
          <li>
            <t>Enables differential experiences or age-appropriate design (not just blocking)</t>
          </li>
          <li>
            <t>Agile by design -- assume adversarial engagement</t>
          </li>
          <li>
            <t>Difficult to bypass</t>
          </li>
          <li>
            <t>Accurate</t>
          </li>
        </ol>
      </section>
      <section anchor="accountability-and-transparency">
        <name>Accountability and Transparency</name>
        <ol spacing="compact" type="1"><li>
            <t>Transparency and accountability regarding what is blocked</t>
          </li>
          <li>
            <t>Minimises the need for trust decisions</t>
          </li>
          <li>
            <t>Can be independently / publicly verifiable and tested</t>
          </li>
          <li>
            <t>Auditability</t>
          </li>
          <li>
            <t>Appeal mechanism for incorrect labelling of content</t>
          </li>
        </ol>
      </section>
      <section anchor="privacy-and-security">
        <name>Privacy and Security</name>
        <ol spacing="compact" type="1"><li>
            <t>Issuer-Verifier and Verifier-Verifier unlinkability</t>
          </li>
          <li>
            <t>Unlinkability across components</t>
          </li>
          <li>
            <t>Purpose limitation of the data processed</t>
          </li>
          <li>
            <t>Security of data processed</t>
          </li>
          <li>
            <t>Phishing-resistant</t>
          </li>
          <li>
            <t>Doesn't process or transfer any more data than is necessary</t>
          </li>
          <li>
            <t>Avoids becoming a tracking vector</t>
          </li>
        </ol>
      </section>
      <section anchor="equity-1">
        <name>Equity</name>
        <ol spacing="compact" type="1"><li>
            <t>Inclusive</t>
          </li>
          <li>
            <t>Fair -- avoids or minimises bias</t>
          </li>
          <li>
            <t>Does not create inequalities (e.g., across education, other properties)</t>
          </li>
          <li>
            <t>Discriminates solely upon age, not other properties</t>
          </li>
          <li>
            <t>Works on open devices</t>
          </li>
          <li>
            <t>Device independence</t>
          </li>
          <li>
            <t>Usable by people of all ages to increase their safety online</t>
          </li>
          <li>
            <t>User choice in who verifies their age, and how</t>
          </li>
          <li>
            <t>No clear losers</t>
          </li>
          <li>
            <t>Accessible to people with disabilities</t>
          </li>
          <li>
            <t>Includes appeal mechanisms for incorrect age determinations</t>
          </li>
        </ol>
      </section>
      <section anchor="jurisdiction-and-geopolitical">
        <name>Jurisdiction and Geopolitical</name>
        <ol spacing="compact" type="1"><li>
            <t>Able to handle arbitrary composition of different jurisdictional requirements (possibly down to school level)</t>
          </li>
          <li>
            <t>Applicable globally</t>
          </li>
          <li>
            <t>Applies the rule of law in the jurisdiction where it applies universally</t>
          </li>
          <li>
            <t>No concentration of power in any one entity (or small group of them)</t>
          </li>
          <li>
            <t>No concentration of power in any country</t>
          </li>
          <li>
            <t>Aligned to legal duties</t>
          </li>
          <li>
            <t>Based upon a valid legal basis</t>
          </li>
        </ol>
      </section>
      <section anchor="usability">
        <name>Usability</name>
        <ol spacing="compact" type="1"><li>
            <t>Economically sustainable</t>
          </li>
          <li>
            <t>Low friction for adults</t>
          </li>
          <li>
            <t>Fast</t>
          </li>
          <li>
            <t>Comprehensible by users</t>
          </li>
        </ol>
      </section>
      <section anchor="implementation-and-deployment">
        <name>Implementation and Deployment</name>
        <ol spacing="compact" type="1"><li>
            <t>Low dependency on a single root of trust</t>
          </li>
          <li>
            <t>Enforceable by a good mix of technology and law</t>
          </li>
          <li>
            <t>Broad deployability -- not expensive or complex</t>
          </li>
          <li>
            <t>Decentralized</t>
          </li>
          <li>
            <t>Future-proof</t>
          </li>
          <li>
            <t>Ability to report / learn when there are issues in the system / telemetry</t>
          </li>
        </ol>
      </section>
      <section anchor="general-other">
        <name>General / Other</name>
        <ol spacing="compact" type="1"><li>
            <t>Not perfect</t>
          </li>
          <li>
            <t>Technically robust</t>
          </li>
          <li>
            <t>Not a single, sole solution</t>
          </li>
          <li>
            <t>Stable -- resilient</t>
          </li>
          <li>
            <t>Alignment of incentives among participants</t>
          </li>
          <li>
            <t>Simple to implement</t>
          </li>
          <li>
            <t>Resistance to repurposing for censorship</t>
          </li>
          <li>
            <t>Unable to be used for surveillance</t>
          </li>
          <li>
            <t>Addresses risk of verification becoming over-prevalent</t>
          </li>
          <li>
            <t>Accountable governance</t>
          </li>
          <li>
            <t>Open Standards-based</t>
          </li>
        </ol>
      </section>
    </section>
    <section numbered="false" anchor="iab-members-at-the-time-of-approval">
      <name>IAB Members at the Time of Approval</name>
      <t>Internet Architecture Board members at the time this document was approved for publication were:</t>
      <ul spacing="normal">
        <li>
          <t>Ali C. Begen</t>
        </li>
        <li>
          <t>Matthew Bocci</t>
        </li>
        <li>
          <t>Roman Danyliw</t>
        </li>
        <li>
          <t>Dhruv Dhody</t>
        </li>
        <li>
          <t>Jana Iyengar</t>
        </li>
        <li>
          <t>Suresh Krishnan</t>
        </li>
        <li>
          <t>Jason Livingood</t>
        </li>
        <li>
          <t>Warren Kumari</t>
        </li>
        <li>
          <t>Mark Nottingham</t>
        </li>
        <li>
          <t>Yingzhen Qu</t>
        </li>
        <li>
          <t>Alvaro Retana</t>
        </li>
        <li>
          <t>Yaroslav Rosomakho</t>
        </li>
        <li>
          <t>Nick Sullivan</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
