Prove You're 18 Without Showing Who You Are: The Cryptography Big Tech Won't Use
Prove You're 18 Without Showing Who You Are: The Cryptography Big Tech Won't Use
This episode is based on our article:
Read the full article →Prove You're 18 Without Showing Who You Are: The Cryptography Big Tech Won't Use
Full Episode Transcript
Three out of four people now say they're more worried about their personal data than they were five years ago. And only seventeen percent fully trust the companies holding that data. So every time a website asks you to upload your driver's license just to prove you're old enough to be there, you're handing your full identity to an organization you probably don't believe will protect it.
That tension affects everyone
That tension affects everyone. If you've ever typed your birthdate into a website, or photographed your I.D. to sign up for something, this is already your problem. And if that makes you uneasy, that unease is rational. Every uploaded license lands in a database. Every database is a target. But there's a branch of cryptography that can answer the question "are you over eighteen" without ever learning your name, your birthdate, or anything else about you. It's called a zero-knowledge proof. The technology already exists. It's just not widely deployed yet. So why not, and how does it actually work?
Most age verification today is really identity verification wearing a disguise. A site asks your age, but to answer, you hand over a passport or a license — a document packed with your full name, your address, your date of birth, your photo. The site only needed one bit of information: yes or no, are you above the threshold? Instead, it got everything. That's like a bouncer at a bar making a photocopy of your I.D. and filing it in a cabinet behind the door. He only needed to confirm you're twenty-one. Now he's got your home address. And every other patron's address is in that same cabinet. That cabinet is what security researchers call a honeypot — a growing pool of sensitive data that attracts attackers precisely because it's so valuable.
A zero-knowledge proof flips that model entirely. It lets you prove a statement is true without revealing any information beyond the fact that the statement is true. So how does the math pull that off? The system takes two inputs. One is a secret, called a witness — in this case, your actual birthdate. The other is a public statement — "this person is eighteen or older." Both get fed into what's called an arithmetic circuit, basically a set of mathematical operations that outputs true only if the conditions hold. The circuit then generates a cryptographic proof. That proof confirms the circuit's output — yes, the person meets the age threshold — without ever exposing the witness. The verifier on the other end, the website or the app, receives a single binary signal. Yes or no. They literally cannot extract your birthdate from that signal, even if they tried. That's not a side effect. That's the entire design goal.
For professionals building compliance systems, this
For professionals building compliance systems, this means age gates can satisfy regulatory requirements without creating liability-heavy data stores. For the rest of us, it means you could verify your age on a dozen different platforms and none of them could link those visits together or learn who you are.
Now, there's a catch that's important to be honest about. Not every system labeled "zero-knowledge" actually delivers on the promise. According to researchers studying deployed protocols, some systems described as zero-knowledge in their documentation fail to meet rigorous formal definitions. That means they might leak private information they weren't supposed to, or worse, they might be forgeable — someone could fake a proof. The cryptography is theoretically sound. The implementation is where things get fragile. It's the difference between a lock that's unpickable on paper and the one actually bolted to your door.
And there's a deeper paradox. Even a perfect zero-knowledge system has to trust someone at the very beginning of the chain. Somebody has to issue the cryptographic credential that says your birthdate is real. A government, a bank, some trusted authority. That issuer becomes a target. Researchers call this the trust cascade problem. You've moved the sensitive data away from every website, which is a huge improvement. But you've concentrated it at the source. For investigators and analysts, that single point of issuance is where the real scrutiny belongs. For everyone else, it's worth asking: who issued your credential, and do you trust them more than the fifty websites that used to hold your I.D.?
The Bottom Line
Age verification and identity verification are two completely different questions that got bundled together by accident — not by necessity. One asks "is this person above a threshold?" The other asks "who is this person?" We've been answering both at once only because that was easiest to build. The math to separate them has existed for decades.
So here's what to carry with you. Most age checks today force you to prove who you are just to answer a yes-or-no question. Zero-knowledge proofs can answer that question with a single cryptographic signal that reveals nothing else. The technology works in theory, but real-world systems are fragile, and someone still has to issue the credential you start with. Whether you're designing compliance systems or just trying to keep your kids safe online without surrendering your own privacy, the important thing to know is that the tradeoff between safety and privacy isn't inevitable. It's a design choice. And better designs already exist. The full story's in the description if you want the deep dive.
Ready for forensic-grade facial comparison?
2 free comparisons with full forensic reports. Results in seconds.
Run My First SearchMore Episodes
Deepfakes Just Broke Evidence: Why Investigators Must Authenticate Before They Analyze
Over the past two years, researchers counted a hundred and fifty-six deepfakes targeting U.S. government officials. One person — Donald Trump — appeared in more than half of them. The top three most-
PodcastChina's Deepfake Rules Just Rewrote the Evidence Playbook — And Investigators Have 18 Months to Catch Up
On 4-3-2026, China's internet regulator published draft rules that would require signed consent before anyone's face can be used to create an A.I. avatar or a deepfake. E
PodcastAge Verification Just Changed Forever: Your Face Gets Checked Once — Then Never Again
A network of seven million people across the U.K. can now prove they're old enough to buy a drink — without ever showing their face. Not a photo I.D. Not a selfie. Not even their
