{"id":108037,"date":"2025-03-25T11:13:21","date_gmt":"2025-03-25T15:13:21","guid":{"rendered":"https:\/\/cdt.org\/?post_type=insight&#038;p=108037"},"modified":"2025-03-25T12:34:08","modified_gmt":"2025-03-25T16:34:08","slug":"using-internet-standards-to-keep-kids-away-from-adult-content-online","status":"publish","type":"insight","link":"https:\/\/cdt.org\/insights\/using-internet-standards-to-keep-kids-away-from-adult-content-online\/","title":{"rendered":"Using Internet Standards to Keep Kids Away from Adult Content Online"},"content":{"rendered":"\n<p>In an effort to block kids from online content intended for adults, some have argued that age-verification or age-assurance tools offer the possibility of simple, effective guardrails.&nbsp;<\/p>\n\n\n\n<p>In <a href=\"https:\/\/cdt.org\/insights\/cdt-files-amicus-brief-in-free-speech-coalition-v-paxton-challenging-tx-age-verification-law\/\">our brief to the Supreme Court last year,<\/a> CDT laid out serious concerns these tools raise regarding privacy and First Amendment freedoms \u2013 in addition to questions about their efficacy.&nbsp;<\/p>\n\n\n\n<p>But that doesn\u2019t mean technical solutions can\u2019t address some valid concerns about adult content. In particular, two policies related to internet standards are worth pursuing right now.<\/p>\n\n\n\n<p>First, parents can already set most children&#8217;s devices to block adult websites, which depends on sites labeling themselves as adults-only via metadata. Most adult content sites are happy to label themselves as adults-only: it&#8217;s cheap and easy, and allowing children to view their content raises legal, regulatory, ethical and commercial concerns that sites would rather avoid. Making these tools more robust \u2014 well-defined standards, widely adopted by websites and interpreted by web browsers and parental control tools \u2014 can make them more effective.<\/p>\n\n\n\n<p>Alternatively, just as we allow users to request \u201csafe mode\u201d of Google search or YouTube, devices could be configured to request \u201csafe mode\u201d of other sites on the internet. Proactively alerting sites that there\u2019s a young person (or just someone avoiding NSFW content) on the other end of the connection has the advantage of working on platforms that contain content appropriate for general audiences alongside content for adults only.<\/p>\n\n\n\n<p>There\u2019s plenty of work to do to implement these tools, but standards for <a href=\"https:\/\/www.rtalabel.org\/\">sites to self-label<\/a> and for users to <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc8674\">indicate their content preference<\/a>s are already being proposed.<\/p>\n\n\n\n<p>It\u2019s possible that in the future age-verification and age-assurance systems will be able to avoid the worst problems of the current systems, perhaps by associating a government-issued ID with unlinkable digital tokens that can be presented to a website without requiring someone to send a photo of an actual ID card or revealing a government-issued identifier. But for the time being, standards-based solutions like these provide the most practical opportunities <em>both <\/em>to protect children from adult content <em>and<\/em> to protect the rights of adults to access the content they want, while also avoiding severe privacy and security issues.<\/p>\n","protected":false},"featured_media":86099,"template":"","content_type":[7251],"area-of-focus":[76,77,813],"class_list":["post-108037","insight","type-insight","status-publish","has-post-thumbnail","hentry","content_type-blog","area-of-focus-cybersecurity-standards","area-of-focus-free-expression","area-of-focus-internet-standards"],"acf":[],"_links":{"self":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/108037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/types\/insight"}],"version-history":[{"count":1,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/108037\/revisions"}],"predecessor-version":[{"id":108038,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/108037\/revisions\/108038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/media\/86099"}],"wp:attachment":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/media?parent=108037"}],"wp:term":[{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/content_type?post=108037"},{"taxonomy":"area-of-focus","embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/area-of-focus?post=108037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}