{"id":38230,"date":"2025-08-21T13:28:39","date_gmt":"2025-08-21T13:28:39","guid":{"rendered":"https:\/\/publicknowledge.org\/?p=38230"},"modified":"2025-08-21T14:23:01","modified_gmt":"2025-08-21T14:23:01","slug":"weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users","status":"publish","type":"post","link":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/","title":{"rendered":"Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users"},"content":{"rendered":"\n<p>Today Public Knowledge launched a new white paper, \u201c<a href=\"https:\/\/publicknowledge.org\/policy\/the-kids-arent-alright-online-how-to-build-a-safer-better-internet-for-everyone\/\">The Kids Aren\u2019t Alright Online: How To Build a Safer, Better Internet for Everyone<\/a>,\u201d to weigh in on the heated debate on child safety online. While lawmakers across the country are eager to pass legislation aimed at protecting young users online, many of these well-intentioned efforts are, in our view, overrestrictive and fail to address underlying contributors to harm.&nbsp;<\/p>\n\n\n\n<p>Our paper argues that the responsibility should be placed on technology companies to design safer products by default, while preserving the substantial benefits that platforms can offer to the learning, creativity, and social development of kids and adolescents. Among our various policy recommendations in our child safety framework as outlined in this paper, one stands out as particularly relevant given recent legal and legislative momentum: our proposal for risk-based age verification.<\/p>\n\n\n\n<p><strong>Age Verification v. Age Assurance<\/strong><\/p>\n\n\n\n<p>Before diving into this approach, it&#8217;s important to distinguish between two related but distinct concepts that may get conflated in policy discussions. <em>Age verification<\/em> refers to definitive processes that confirm a person&#8217;s exact age through official documents like government IDs. <em>Age assurance, <\/em>on the other hand, encompasses a broader range of methods to establish reasonable confidence about someone&#8217;s age range, including age verification as <em>one option<\/em> alongside less invasive approaches like age estimation technology, online behavioral analysis, or account history review. Our risk-based framework considers this spectrum of age assurance tools, applying more rigorous verification only where the risks truly warrant it, rather than defaulting to the most invasive approach for <em>every<\/em> online interaction any user \u2013 regardless of age \u2013 could have.<\/p>\n\n\n\n<p><strong>The Supreme Court Green Lights Age Verification, But That May Not Be the Best Approach in All Circumstances.<\/strong><\/p>\n\n\n\n<p>This summer, in <a href=\"https:\/\/www.supremecourt.gov\/opinions\/24pdf\/23-1122_3e04.pdf\"><em>Free Speech Coalition v. Paxton<\/em><\/a><em>,<\/em> the U.S. Supreme Court overturned prior precedent on internet age-gating, upholding a Texas law requiring websites to verify users&#8217; ages before allowing access to sexually explicit content. As Public Knowledge Legal Director John Bergmayer explained in his post, \u201c<a href=\"https:\/\/publicknowledge.org\/protecting-kids-shouldnt-mean-weakening-the-first-amendment\/\">Protecting Kids Shouldn\u2019t Mean Weakening the First Amendment<\/a>,\u201d the legal reasoning in this decision lowers the level of constitutional scrutiny applied to content-based restrictions on <em>adult<\/em> speech. This decision may provide an opening for other vague, privacy-invasive platform policies under the pretense of \u201cprotecting the children.&#8221; In fact, a few weeks after the <em>Free Speech Coalition <\/em>decision, the Supreme Court <a href=\"https:\/\/www.npr.org\/2025\/08\/14\/nx-s1-5482925\/scotus-netchoice\">declined to review<\/a> a lower court ruling that upheld Mississippi&#8217;s law mandating social media platforms to verify users&#8217; ages. While everyone can agree that access by minors to pornography has no social benefit and very real harms, the same cannot be said of all social media. Here, the balance of potential benefits and potential harms becomes much more complicated.&nbsp;&nbsp;<\/p>\n\n\n\n<p>While Public Knowledge would rather <em>not <\/em>see the government erect unnecessary barriers and friction within the Open Internet, there is clear momentum toward a federal law that mandates some sort of age assurance to access online platforms like social media. Rather than focusing on restricting access to lawful, perhaps even beneficial, content with \u201call or nothing\u201d age verification mandates, age assurance mandates could be applied narrowly, targeting features and functionalities that pose a heightened risk to minors. If a federal age assurance mandate were to happen, policymakers should prioritize policy approaches that 1) are privacy protective and 2) minimize the burden on adults to access online content.&nbsp;<\/p>\n\n\n\n<p>The Supreme Court decision may have given the go-ahead to the 24 states that have <a href=\"https:\/\/avpassociation.com\/4271-2\/\">passed laws requiring age verification<\/a> to access obscene-for-minors content online. Add the dozen states that have age verification bills moving through their legislatures, and we have a majority of the country blocking access to platforms with adult content. While these laws are largley focused on restricting access to pornographic content, it is likely that the effects will be felt <a href=\"https:\/\/www.wired.com\/story\/the-age-checked-internet-has-arrived\/\">more widely<\/a>. As other states follow the example of Mississippi and expand the range of platforms subject to age verification, adults across the United States will have to prove they are old enough to engage in online discourse, access speech, and express themselves online \u2013 in other words, <em>those in America will have to demonstrate that they\u2019re old enough to use the internet<\/em>. Age-gating risks restricting free online expression for adults unless they share personally identifiable information, which can be easily hacked and leaked. We just saw this happen with the Tea Dating Advice app, a platform where women share details about their dates. The app required users to submit ID to verify they are women. 4Chan users, perhaps predictably, <a href=\"https:\/\/www.npr.org\/2025\/08\/02\/nx-s1-5483886\/tea-app-breach-hacked-whisper-networks\">hacked<\/a> Tea\u2019s data, leaking users\u2019 government IDs to trolls online, exposing these women to online harassment and potential fraud.&nbsp;<\/p>\n\n\n\n<p><strong>Learning From Our Peers<\/strong><\/p>\n\n\n\n<p>There will probably be a lot to learn from our friends across the pond who are testing out a nationwide age verification requirement. The United Kingdom\u2019s \u201cOnline Safety Act\u201d went into effect in July of 2025; it mandates social media and search services to require age assurance to access content deemed harmful to children (not just pornography, but content that promotes self-harm, eating disorders, suicide, and other destructive behaviors). So far, reports suggest that implementing the age verification requirements has been <a href=\"https:\/\/reason.com\/2025\/08\/06\/10-examples-of-absurd-fallout-from-the-u-k-s-online-safety-act\/\">less than perfect<\/a>. Platforms are struggling to implement an effective age verification process that satisfies the law\u2019s requirements, but without much success. To be fair, as \u201cLove Island\u201d U.K. contestants <a href=\"https:\/\/www.theringer.com\/2019\/07\/09\/tv\/love-island-dictionary\">often say,<\/a> &#8220;It&#8217;s still early days.\u201d But as of the writing of this article, over half a million people have signed a <a href=\"https:\/\/petition.parliament.uk\/petitions\/722903\">petition<\/a> for the U.K. parliament to repeal the \u201cOnline Safety Act.\u201d&nbsp;<\/p>\n\n\n\n<p>The \u201cOnline Safety Act,\u201d like most U.S. age verification bills, does not specify <em>how<\/em> online platforms must verify user ages. Many platforms are offering a variety of verification options, ranging from biometric face scanning to uploading an ID or entering a payment card. These different age verification approaches have mixed <a href=\"https:\/\/www.newamerica.org\/oti\/briefs\/exploring-privacy-preserving-age-verification\/#:~:text=Age%20verification%20mandates'%20potential%20to,means%20of%20achieving%20that%20interest.\">efficacy<\/a> and provoke different <a href=\"https:\/\/fpf.org\/blog\/new-fpf-infographic-analyzes-age-assurance-technology-privacy-tradeoffs\/#:~:text=Age%20declaration%2C%20including%20age%20gate,and\/or%20unexpected%20data%20uses.\">tradeoffs<\/a>. Biometric face scanning, for one, merely <em>estimates<\/em> age rather than verifies it, and has <a href=\"https:\/\/www.eff.org\/deeplinks\/2025\/01\/face-scans-estimate-our-age-creepy-af-and-harmful\">mistakenly classified adults as adolescents<\/a>, restricting over-18s from adult-appropriate content (the opposite can happen, too, where adolescents are mistakenly deemed to look more mature than their actual age and are allowed access to adult content).&nbsp;<\/p>\n\n\n\n<p>Many users have apparently chosen not to bother with any of this madness by using virtual private networks (VPNs) to disguise their IP address and geographic location, enabling them to access websites as if they are in a different country. As the BBC <a href=\"https:\/\/www.bbc.com\/news\/articles\/cn72ydj70g5o\">reported<\/a>, half of the top 10 free apps in the Apple App Store in the U.K. in July were for VPN services, with one VPN app maker claiming it saw a 1,800% increase in downloads since the \u201cOnline Safety Act\u201d went into effect. This is not unlike the <a href=\"https:\/\/www.washingtonian.com\/2023\/06\/30\/virginia-age-verification-law-vpns\/\">increase in search traffic for information about VPNs<\/a> that occurred once Virginia\u2019s age verification law went into effect in 2023.&nbsp;<\/p>\n\n\n\n<p>There\u2019s a reason free expression <a href=\"https:\/\/www.aclu.org\/podcast\/internet-censorship-wont-make-kids-safe\">civil society<\/a> <a href=\"https:\/\/cdt.org\/insights\/cdt-aclu-fight-for-the-future-oti-call-on-house-commerce-committee-to-fix-kosa-to-avoid-censorship-risks\/\">groups<\/a> <a href=\"https:\/\/www.thefire.org\/research-learn\/fire-statement-age-based-restrictions-social-media-access\">hammer<\/a> <a href=\"https:\/\/www.eff.org\/deeplinks\/2025\/01\/impact-age-verification-measures-goes-beyond-porn-sites\">home<\/a> that age verification requirements will almost certainly impede the speech of adults. The rollout of the U.K. \u201cOnline Safety Act\u201d provides a key example, where platforms feeling the pressure to comply will sweep up broad categories of content that could, if you squint, be indecent for children, all while cutting off adults from accessing speech.&nbsp;<\/p>\n\n\n\n<p>It is not simply a question of blocking adults from engaging in controversial speech. The all-or-nothing approach of age verification, combined with the fear of prosecution by platform operators, means that children will be blocked from non-harmful, even educational and useful, speech. Those going online in the U.K. are documenting the parts of the internet that are unexpectedly blocked. Reddit, for one, <a href=\"https:\/\/www.theverge.com\/analysis\/714587\/uk-online-safety-act-age-verification-reactions\">blocked access for unverified users<\/a> to subreddits like r\/stopsmoking or r\/stopdrinking \u2013 communities which, ostensibly, provide resources and support for healthier behaviors. Clips of protests were <a href=\"https:\/\/freespeechunion.org\/protest-footage-blocked-as-online-safety-act-comes-into-force\/\">reportedly blocked on X<\/a>, formerly Twitter. Spotify users find themselves unable to watch certain music videos or stream songs labeled 18+.&nbsp;<\/p>\n\n\n\n<p>But is a kid perusing the subreddit r\/stopsmoking meaningfully different from participating at an anti-smoking campaign at their school?&nbsp; Are teenagers made better off by remaining ignorant of protest movements in their country or around the world? Exposure to controversial content is not inherently harmful, and locking down this kind of material can strip young people of both knowledge and agency. Content gating, like the \u201cOnline Safety Act,\u201d assumes all children are passive subjects needing constant control by <a href=\"https:\/\/publicknowledge.org\/the-battle-for-control-tiktok-parental-consent-and-the-rights-of-children\/\">their parents<\/a> or the state. Public Knowledge rejects this framing and proposes a different solution \u2013 one that recognizes that children and adults being able to freely access information without government intervention is a First Amendment right worth preserving.<\/p>\n\n\n\n<p><strong>A Better Approach \u2013 Focus on Harmful Platform Features Rather Than Content<\/strong><\/p>\n\n\n\n<p>Age verification requirements coming to the U.S. may seem inevitable, but there are still opportunities to influence the shape of these requirements. We have shown that when these requirements are applied too broadly, they cause significant friction for users, particularly <em>adult<\/em> users, which incentivizes them to seek workarounds \u2013 like VPNs. The challenge in enforcing an age verification mandate also means regulators will concentrate on ensuring the law is properly implemented, rather than pursuing <em>actual harms<\/em> to children.<\/p>\n\n\n\n<p>In our view, rather than mandating blanket age gates, lawmakers should adopt a risk-based standard that scales requirements according to the potential harm of specific features. In our report, we focus intentionally on platform <em>features<\/em> \u2013 not content types \u2013 as defining what content is inappropriate for children is largely subjective. We believe content-based age gating would, as we\u2019ve witnessed in the U.K.\u2019s \u201cOnline Safety Act,\u201d result in platforms imposing overly broad restrictions on content to avoid liability to the detriment of both adults and the children they are trying to protect.&nbsp;<\/p>\n\n\n\n<p>In our view, <strong>the worst online harms to children stem not simply from exposure to indecent content, but from design features that facilitate harmful interactions or compulsive use<\/strong>, like nudge notifications, infinite scroll, and gamification. It also includes features that connect users to unfamiliar contacts, like map features where you can see other users (SnapMap and the recently launched <a href=\"https:\/\/www.washingtonpost.com\/technology\/2025\/08\/07\/instagram-map-location-sharing-privacy\/\">Instagram Map<\/a>), or options to quickly add suggested connections \u2013 even strangers \u2013 or send direct messages to users you are not connected with. Looking to features as conduits of harm rather than content gets at more insidious dangers that a focus on content does not address.&nbsp;<\/p>\n\n\n\n<p>Rather than burden all users with verifying their ages to view content online, risky features should be age-gated, while low-risk activities \u2013 such as basic content browsing or accessing educational material \u2013 should remain unrestricted. Medium-risk features, like posting publicly on social networks, interacting with user-generated content (e.g., likes and comments), or receiving algorithmic recommendations, could rely on age estimation using existing data. Targeted advertising has long used demographic information to deliver campaigns to the intended audience, and large platforms are now implementing more formal, transparent age assurance tools.<\/p>\n\n\n\n<p>For example, Google <a href=\"https:\/\/blog.google\/technology\/safety-security\/age-assurance-measures-safer-online-kids-teens-us\/\">recently introduced<\/a> a machine learning age estimation system that interprets account data to determine whether a user is likely over 18 \u2013 such as recognizing that a Gmail account created 15 years ago is unlikely to belong to a child \u2013 and allows users incorrectly labeled as under 18 to verify their age with a selfie or ID. Age estimation can serve as a practical compliance tool, but only if implemented with strong privacy safeguards that avoid expanded collection, retention, or sharing of personal data beyond what is strictly necessary. The appeals process must also be streamlined, transparent, and easily navigable for adults, ensuring lawful access to content and services is not unduly burdened. Poorly designed systems that impose excessive costs or technical requirements risk entrenching dominant platforms \u2013 which can more easily absorb these burdens \u2013 while disadvantaging smaller competitors and limiting consumer choice. Given that platforms benefiting financially from targeted advertising have used age estimation tools for years, requiring them to leverage these same tried-and-true methods to make their products safer for children is a reasonable regulatory burden.<\/p>\n\n\n\n<p>High-risk features, like \u201cgoing live\u201d on a video stream or engaging in stranger-to-stranger messaging, could require stricter age assurance, like using biometric data or a government identification. <a href=\"https:\/\/bsky.social\/about\/blog\/07-10-2025-age-assurance\">Bluesky\u2019s U.K. model<\/a>, where unverified users can still browse feeds but must verify their age to access direct messaging and adult content, is one example of striking a better balance between free expression and child safety for high-risk features.&nbsp;<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>The risk-based age verification framework we\u2019ve outlined here and in our white paper, \u201cThe Kids Aren\u2019t Alright Online: How To Build a Safer, Better Internet for Everyone,\u201d offers a smarter alternative to blunt-force solutions that dominate policy debates on child safety online. By scaling verification requirements to be commensurate with actual risk levels, rather than treating all online experiences as equally dangerous, we can protect child users while preserving their rights to learn, explore, and connect online without punishing adults for accessing the internet.<\/p>\n\n\n\n<p>But age verification is just one piece of creating a truly safer internet for children. Real progress requires addressing the underlying design choices and business practices that prioritize engagement over well-being; implementing privacy-protective defaults; and integrating safety into products from the ground up. Our white paper, \u201c<a href=\"https:\/\/publicknowledge.org\/policy\/the-kids-arent-alright-online-how-to-build-a-safer-better-internet-for-everyone\/\">The Kids Aren\u2019t Alright Online: How To Build a Safer, Better Internet for Everyone<\/a>,\u201d provides lawmakers with recommendations reflecting such principles. You can also join us in Washington, D.C. for a paper presentation and discussion at our September 8 event, \u201c<a href=\"https:\/\/www.eventbrite.com\/e\/the-kids-arent-alright-online-building-a-safer-better-internet-tickets-1602862327369\">The Kids Aren&#8217;t Alright Online: Building a Safer, Better Internet.<\/a>\u201d<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The worst online harms to children stem not simply from exposure to indecent content, but from design features that facilitate harmful interactions or compulsive use.<\/p>\n","protected":false},"author":224,"featured_media":38231,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[14],"class_list":["post-38230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","tag-platform-regulation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users - Public Knowledge<\/title>\n<meta name=\"description\" content=\"The worst online harms to children stem not simply from exposure to indecent content, but from design features that facilitate harmful interactions or compulsive use.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users\" \/>\n<meta property=\"og:description\" content=\"The worst online harms to children stem not simply from exposure to indecent content, but from design features that facilitate harmful interactions or compulsive use.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Public Knowledge\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-21T13:28:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-21T14:23:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2025\/08\/dark-side-of-social-e1755786144561.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Morgan Wilsmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Morgan Wilsmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/\"},\"author\":{\"name\":\"Morgan Wilsmann\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/a312938cf3bbc40e7d7ca33241e5fba5\"},\"headline\":\"Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users\",\"datePublished\":\"2025-08-21T13:28:39+00:00\",\"dateModified\":\"2025-08-21T14:23:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/\"},\"wordCount\":2266,\"publisher\":{\"@id\":\"https:\/\/publicknowledge.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2025\/08\/dark-side-of-social-e1755786144561.png\",\"keywords\":[\"Platform Regulation\"],\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/\",\"url\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/\",\"name\":\"Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users - Public Knowledge\",\"isPartOf\":{\"@id\":\"https:\/\/publicknowledge.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2025\/08\/dark-side-of-social-e1755786144561.png\",\"datePublished\":\"2025-08-21T13:28:39+00:00\",\"dateModified\":\"2025-08-21T14:23:01+00:00\",\"description\":\"The worst online harms to children stem not simply from exposure to indecent content, but from design features that facilitate harmful interactions or compulsive use.\",\"breadcrumb\":{\"@id\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#primaryimage\",\"url\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2025\/08\/dark-side-of-social-e1755786144561.png\",\"contentUrl\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2025\/08\/dark-side-of-social-e1755786144561.png\",\"width\":2000,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/publicknowledge.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/publicknowledge.org\/#website\",\"url\":\"https:\/\/publicknowledge.org\/\",\"name\":\"Public Knowledge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/publicknowledge.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/publicknowledge.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/publicknowledge.org\/#organization\",\"name\":\"Public Knowledge\",\"url\":\"https:\/\/publicknowledge.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png\",\"contentUrl\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png\",\"width\":400,\"height\":200,\"caption\":\"Public Knowledge\"},\"image\":{\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/a312938cf3bbc40e7d7ca33241e5fba5\",\"name\":\"Morgan Wilsmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b186755896a13c6aa4a8602cf636522b3c4dffed3d20a4bc846c82e572bde9e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b186755896a13c6aa4a8602cf636522b3c4dffed3d20a4bc846c82e572bde9e1?s=96&d=mm&r=g\",\"caption\":\"Morgan Wilsmann\"},\"url\":\"https:\/\/publicknowledge.org\/author\/morgan-wilsmann\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users - Public Knowledge","description":"The worst online harms to children stem not simply from exposure to indecent content, but from design features that facilitate harmful interactions or compulsive use.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/","og_locale":"en_US","og_type":"article","og_title":"Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users","og_description":"The worst online harms to children stem not simply from exposure to indecent content, but from design features that facilitate harmful interactions or compulsive use.","og_url":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/","og_site_name":"Public Knowledge","article_published_time":"2025-08-21T13:28:39+00:00","article_modified_time":"2025-08-21T14:23:01+00:00","og_image":[{"width":2000,"height":1000,"url":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2025\/08\/dark-side-of-social-e1755786144561.png","type":"image\/png"}],"author":"Morgan Wilsmann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Morgan Wilsmann","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#article","isPartOf":{"@id":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/"},"author":{"name":"Morgan Wilsmann","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/a312938cf3bbc40e7d7ca33241e5fba5"},"headline":"Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users","datePublished":"2025-08-21T13:28:39+00:00","dateModified":"2025-08-21T14:23:01+00:00","mainEntityOfPage":{"@id":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/"},"wordCount":2266,"publisher":{"@id":"https:\/\/publicknowledge.org\/#organization"},"image":{"@id":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#primaryimage"},"thumbnailUrl":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2025\/08\/dark-side-of-social-e1755786144561.png","keywords":["Platform Regulation"],"articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/","url":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/","name":"Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users - Public Knowledge","isPartOf":{"@id":"https:\/\/publicknowledge.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#primaryimage"},"image":{"@id":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#primaryimage"},"thumbnailUrl":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2025\/08\/dark-side-of-social-e1755786144561.png","datePublished":"2025-08-21T13:28:39+00:00","dateModified":"2025-08-21T14:23:01+00:00","description":"The worst online harms to children stem not simply from exposure to indecent content, but from design features that facilitate harmful interactions or compulsive use.","breadcrumb":{"@id":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#primaryimage","url":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2025\/08\/dark-side-of-social-e1755786144561.png","contentUrl":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2025\/08\/dark-side-of-social-e1755786144561.png","width":2000,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/publicknowledge.org\/weighing-in-on-the-age-verification-debate-risk-based-approaches-to-minimizing-harm-for-child-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/publicknowledge.org\/"},{"@type":"ListItem","position":2,"name":"Weighing in on the Age Verification Debate: Risk-Based Approaches To Minimizing Harm for Child Users"}]},{"@type":"WebSite","@id":"https:\/\/publicknowledge.org\/#website","url":"https:\/\/publicknowledge.org\/","name":"Public Knowledge","description":"","publisher":{"@id":"https:\/\/publicknowledge.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/publicknowledge.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/publicknowledge.org\/#organization","name":"Public Knowledge","url":"https:\/\/publicknowledge.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/","url":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png","contentUrl":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png","width":400,"height":200,"caption":"Public Knowledge"},"image":{"@id":"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/a312938cf3bbc40e7d7ca33241e5fba5","name":"Morgan Wilsmann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b186755896a13c6aa4a8602cf636522b3c4dffed3d20a4bc846c82e572bde9e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b186755896a13c6aa4a8602cf636522b3c4dffed3d20a4bc846c82e572bde9e1?s=96&d=mm&r=g","caption":"Morgan Wilsmann"},"url":"https:\/\/publicknowledge.org\/author\/morgan-wilsmann\/"}]}},"_links":{"self":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts\/38230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/users\/224"}],"replies":[{"embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/comments?post=38230"}],"version-history":[{"count":0,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts\/38230\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/media\/38231"}],"wp:attachment":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/media?parent=38230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/categories?post=38230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/tags?post=38230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}