- From: Dan Kioria <dankioria@gmail.com>
- Date: Tue, 21 Feb 2023 10:49:41 +0300
- To: public-accessibility4children@w3.org
- Message-ID: <CAOuH79FJs4qEKU7mWgJO6RWr-xV5QmGJ6tnk8x1q-Xpoh8JpTg@mail.gmail.com>
Child protection has remained elusive because it is based on trying to determine the character and intention of the person on the other end of a stream of nodes. It has always been a cops and robbers game, with the robbers always a step ahead. Imagine telling a school receptionist, "Please determine the intentions of everyone who enters the building, and also determine whether they are good or bad people." If you think that's an unreasonable request, and you know how a building works, then you are better prepared to judge the current approaches to information security than the information security experts. Information security attempts to determine the intentions and character of a person through a stream of bits. In most cases, that is impossible. You cannot filter out the bad guys, because the bad guys know how to appear to be good guys. The problem at the root of online child protection and security problems can be solved by focusing on Identity instead of character and intention. Identity is the Foundation of Security. It establishes a foundational understanding of who we all are. We and our partners create visual means for people to determine the identity qualities of the people they interact with online. In other words, If you want to be able to see whether or not a person has had their identity validated in a face-to-face meeting with an identity professional, you can. And if when your child is online you want them to be able to interact only with children in a certain age group who have had their identity validated in a face-to-face meeting with an identity professional. Dan Kioria
Received on Tuesday, 21 February 2023 07:50:07 UTC