And how does that process guarantee that your token identifies only you? It seems that an adult can go to the store at different times and get n tokens, which they can then give to minors.
To your edits, indeed, the server handling is what I was alluding at previously with possible issues, specifically in the verification part. But that’s the good part that there’s an open source project, where these questions can be raised. It seems more complicated, but maybe not impossible to guarantee privacy on a trustless way also there.
As to the use, I imagine that it can be extended to other things such as proving that you’re a human, which is becoming pretty much impossible. It might be the most effective solution for “dead internet”.
Yes, an adult could give them, just as nowadays an adult can forge fake IDs to sell to kids, but it would be a crime. If they were caught, they would suffer appropriate consequences.
And what about online-only services (which is the majority)? Seems a partial and error prone solution not worth the effort over no verification at all.
And how does that process guarantee that your token identifies only you? It seems that an adult can go to the store at different times and get n tokens, which they can then give to minors.
To your edits, indeed, the server handling is what I was alluding at previously with possible issues, specifically in the verification part. But that’s the good part that there’s an open source project, where these questions can be raised. It seems more complicated, but maybe not impossible to guarantee privacy on a trustless way also there.
As to the use, I imagine that it can be extended to other things such as proving that you’re a human, which is becoming pretty much impossible. It might be the most effective solution for “dead internet”.
Yes, an adult could give them, just as nowadays an adult can forge fake IDs to sell to kids, but it would be a crime. If they were caught, they would suffer appropriate consequences.
And what about online-only services (which is the majority)? Seems a partial and error prone solution not worth the effort over no verification at all.
Adapt or perish.
And no verification at all will be always the ideal, of course.