Age Verification Using Facial Scans

Discord is testing the feature:

“We’re currently running tests in select regions to age-gate access to certain spaces or user settings,” a spokesperson for Discord said in a statement. “The information shared to power the age verification method is only used for the one-time age verification process and is not stored by Discord or our vendor. For Face Scan, the solution our vendor uses operates on-device, which means there is no collection of any biometric information when you scan your face. For ID verification, the scan of your ID is deleted upon verification.”

I look forward to all the videos of people hacking this system using various disguises.

Posted on April 17, 2025 at 12:38 PM21 Comments

Comments

Bilateralrope April 17, 2025 12:44 PM

No need for disguises. Teenagers just need to point their phone at an adult when they hit the step that needs verification.

But that’s not going to stop people from trying every way they can think of to beat this.

Cigaes April 17, 2025 2:00 PM

Oh great, another app that will refuse to run on a phone we really own (i.e. a rooted one).

ratwithahat April 17, 2025 3:02 PM

Very skeptical that this will work enough that it would be implemented large scale. Some people just look young, and some people just look old. Face-based age-estimation just isn’t accurate enough.

More worrying is their mention of ID verification, which is more likely to go through. They claim that the ID scan would be “deleted on verification” but I’m pretty doubtful.

Clive Robinson April 17, 2025 4:50 PM

@ ALL,

Lets be honest nobody really cares if it works or not, or how accurate it is.

It’s reason to exist is to satisfy the Muppets employed by Brainless Politicians, to keep some vocal faux-parents and conservative nut-jobs happy.

Why am I saying this?

Because if humans with 20-20 vision can not tell the age of another human standing three feet in front of them with any great accuracy… Then how the heck do people think a computer can do it?

The simple fact is the legislation has three purposes,

1, Shut up annoying people who don’t have a clue but do now how to create noise.
2, Act as a way of raising significant revenue by way of fines.
3, A backdoor way to carry out sensorship.

@ Bruce, ALL,

With regards,

“I look forward to all the videos of people hacking this system using various disguises.”

You will need a very large barrel full of popcorn for that 😉

BUT I doubt that will be the way it gets cracked.

Note the,

“For Face Scan, the solution our vendor uses operates on-device, which means there is no collection of any biometric information when you scan your face.”

This is in effect a poor mans version of “See What You See”(SWYS) “client side scanning” on the user device.

A little bird on my shoulder is telling me it will be “full of juicy bugs” just waiting to be hooked for a new form of fish baiting 😉

MrSmith April 17, 2025 5:24 PM

Video or picture? One picture or many? Can you just point it at a magazine photo? Or at the guy next to me on the bus?

Just Me April 17, 2025 5:55 PM

It all depends on how you train your phone’s camera. It depends on what you feed it initially, during the first setup. Have a T-Shirt with Bob Dylan on it and use that to access your phone, to unlock it, I think Bob looks a lot over 18 so you should even be able to access all Pr0n (“adult”) sites as well, as an added bonus.

they want to MARK US ALL April 17, 2025 8:03 PM

“I look forward to all the videos of people hacking this system using various disguises.”

Just take a randomly generated adult pic from here:

https://thispersondoesnotexist.com/

and print it out and hold it up. How that be? Endless opportunities.

Today they want a face, tomorrow, your soul.

ResearcherZero April 18, 2025 1:46 AM

Aggh! Some children are coming to get me! With water pistols, lolly pops and drool.

Oh. They are just after the ice cream truck. False alarm.

@ALL, Clive

But seriously, electronic measures are just an easy way for politicians and the police to avoid the real work of investigation, properly collecting and securing physical evidence, properly equipping police stations with actual criminal psychologists and people properly trained in solving crime and with the ability to talk to people in a constructive manner.

The politicians do not even care about public safety. They claim that they have to remain independent of the legal system, apart from when it suits them not to be. Like when they start blabbering about criminals, terrorists and “youth crime”.

Any progress that had been made on reducing crime and public safety will now be reversed.

There will be extra mold in the courthouse roof. The buildings will be both physically and metaphorically rotting, as the funding is cut back and the prosecutors office (DA) is stacked with Yes Men and crooks. The mayor and the police chief will also be crooks.

On Feb. 14, 2025 Adams appears on “Fox and Friends” and claims there was “no quid pro quo”

Was it a coincidence the law on foreign bribery was paused ?

‘https://abcnews.go.com/Politics/eric-adams-federal-bribery-case-timeline/story?id=118824842

(The mayor actually is a crook and a former police captain)
https://www.usatoday.com/story/news/politics/2024/09/26/eric-adams-raid-indictment/75390007007/

Clive Robinson April 18, 2025 2:01 AM

@ ratwithahat,

Your point of,

“More worrying is their mention of ID verification, which is more likely to go through. They claim that the ID scan would be “deleted on verification” but I’m pretty doubtful.”

It’s claimed in the article that the ID scan is “alternatively”,

“The app will ask users to scan their face through a computer or smartphone webcam; alternatively, they can scan a driver’s license or other form of ID.”

Which begs the question what causes the software to switch from age guessing to ID-Checking and if it can be pre-adjusted in some way by “an external entity” like say “law enforcment”…

Why? Because we know that both the UK and Australian “Law Enforcement Authorities” and several other Nations set up and ran “encrypted phone systems”. That the LEAs had backdoored, to be sold/rented to anyone with sufficient money…

On basically the assumption that,

“A desire for secrecy and the money to pay for it”

Automatically made you a criminal…

And by default all your communications were recorded as evidence to that assumption. And I’m assuming by the way it was deliberately done unlawfully with “EncroChat” phones in the UK the records are still kept in France or another European Nation that was involved (I’ve mentioned my reasons for this “qualified” opinion here in the past).

So… lets spin it on it’s head. The public message is that the “images” of the users face and ID Document stay on device. So users might believe that is their mobile phone (it probably won’t be for various reasons).

Now think about not the “image data” but the Meta-Data created when assessing the images such as “facial recognition points” and “optical character recognition text” what happens to those?

The likes of Meta have spent probably billions in Image Identification to tie a real user ID to communications because it significantly enhances the value of the “users Private Data” they sell on to “Data Brokers” and the like.

Does anyone think that LEA’s would not salivate at doing the same to identify “Persons of Interest”?

Without caring if it was lawful or not EncroChat shows beyond doubt that the “Might is right” “The means justify the results” mentality is lets just say “overly strong” in some who have due to their unlawful acts been awarded with “British Honours”…

Thus I suspect it will not be long before someone “gets lent on” to put in the equivalent of a CALEA interface / backdoor, but again without it being lawful.

Because,

1, Might is right.
2, The means justifies the ends.
3, The “nothing to hide” fallacy.

And several other sociopathic arguments to “Do any damn thing they want to”

As Upton Sinclair observed over a hundred years ago,

“Not merely was my own mail opened, but the mail of all my relatives and friends — people residing in places as far apart as California and Florida. I recall the bland smile of a government official to whom I complained about this matter: “If you have nothing to hide you have nothing to fear.” My answer was that a study of many labor cases had taught me the methods of the agent provocateur. He is quite willing to take real evidence if he can find it; but if not, he has familiarized himself with the affairs of his victim, and can make evidence which will be convincing when exploited by the yellow press.”

Which he probably found to his shock made the now famous quote attributed to “Cardinal Richelieu” true,

“Give me six lines written by the hand of the most honest of men, and I’ll find enough within to hang him.”

If people think this can not or will not happen then “I’ve a nice bridge to sell them”.

ResearcherZero April 18, 2025 2:04 AM

You do not need services like Discord. You can just host your own services and your own VPN, DNS and admin your own channels. Then only let in the people you want.

You can even do this on Windows if you want that stuff for gaming. It then runs separately from what ever crappy services that those gaming platforms run. Choose your own codecs, sample rates and control all the user permissions etc. Boot weirdos when you like and have separate private channels for admins and selected users. More safe and secure.

Clive Robinson April 18, 2025 3:31 AM

@ ResearcherZero, ALL,

With regards,

“You do not need services like Discord”

True, you can “roll your own” it’s what we used to do back in the last two decades of the last century when I was just “a little bit” more than a lad.

But using an off-the-shelf app has certain advantages, such as it’s a few clicks to install, and people are often already familiar with it’s interface quirks.

Back in the 1980’s I spent nearly three years in my “spare time” developing a codec to digitise voice to encrypt it at a low enough bit rate that it could be sent across a telephone modem at “Bell Standard” rates or more importantly across an HF Radio link.

All I really got out of it was a significant mistrust for the NSA developed “Code Excited Linear Prediction”(CELP) algorithms.

Put simply recognisable human speech has an information rate down below 50bits/second,

https://sps.ewi.tudelft.nl/pubs/hendriks17icassp.pdf

It’s also continuous in nature in that there is natural “Inter Symbol Interference”(ISI) where symbols of information overlap each other (say “pine” then “spine” alternately to here it you will find the “s” effects the “ne” word ending softening it). If you take the digitised output from the CELP encoder you should in theory be able to convert it back to audio tones to go across an ordinary HF Radio link and in practice you can. However now “randomise by encryption” the CELP encoder output and try to convert it back to audio tones for that 2.5KHz audio bandwidth it just does not want to play.

I won’t say CELP is the worst possible voice codec to do secure speech with but it must be high on the list. I eventually went with a form of vocoder and ROM based table look up ISI on the encrypted encoder output which obviously pushed the transmitted symbol rate up… Which ment other changes along the chain.

It feels like CELP was deliberately designed so you could not encrypt it easily…

As it says in the abstract of the 2017 paper I link to above written a decade and a half after I’d tried to “roll my own”,

“The key to the success of speech-based technology is an understanding of human speech communication. While significant advances have been made, a unified theory of speech communication that is both comprehensive and quantitative is yet to emerge.”

A point worth remembering if you want to “roll your own” even today…

ResearcherZero April 18, 2025 5:21 AM

AI personas deployed to entrap the unwitting on social media.

‘https://www.wired.com/story/massive-blue-overwatch-ai-personas-police-suspects/

ResearcherZero April 18, 2025 5:30 AM

@Clive Robinson

The old ways still remain the best even after all this time, as they work.

Low enough bit rate to encrypt voice is still important today. Even with the high speeds of modern internet, performance is still very important and many of the solutions available are not great. Plus if anyone receiving is not well set up – exposed – it is pointless.

5G brings some benefits by encrypting identifiers, but again it is far from foolproof.

mi & yu April 18, 2025 9:15 AM

“the age verification method is only used for the one-time age verification process and is not stored by Discord or our vendor”

5 years later:
“Hackers released data from face scans after hacking a Discord vendor. Discord admits to having been less than truthful when stating that the data was not stored.”

Opesky April 18, 2025 7:32 PM

This is actually quite scary, Discord deserves to just die off. I miss the days of team speak and IRC. Back when things were simple and didn’t rely on centralized platforms. Yesterday they asked for a phone number, today they ask for ID, now what’s next?

Furthermore age gating platforms will make children go to more dangerous parts of the internet. If age verification is required for all legal platforms then kids will just go to illegal platforms and get groomed there. Plus illegal platforms where kids are allowed on won’t comply with law enforcement making more children in danger.

Clive Robinson April 19, 2025 4:20 AM

@ Opesky,

You asked,

“Yesterday they asked for a phone number, today they ask for ID, now what’s next?”

Ask your Government.

The purpose is not “age verification” but “digital branding”[1].

A necessary step in life long identifying an individual for the purpose of control or stigmatisation.

In effect giving them a mandatory unique life long record identifier.

The process was in democratic nations a method of keeping track of payments into a Government run “Social Security fund” used to make payments for disability, healthcare, pension, unemployment, or other compensation. A way of making basic,

“Humane provision for all national citizens.”

In less democratic nations the purpose was less benign and was a,

“Compulsory to carry National ID Card.”

Which quickly became associated with a “Papers Pleaze” proto police state or worse. Having to be produced where ever you went at any time.

In more Authoritarian States it was used not for “Humane Provision” but “Inhumane Prosecution” of discriminatory policy.

In Fascist States additionally people of designated groups were required to wear at all times a clearly visible “Group Identifier”. Those with authority had an item of clothing such as a red or brown shirt through to an entire uniform. Those in persecuted groups were required to wear a large easily seen board, badge or bright colored cloth symbol on their person. Historically such groups were religious or ethnic minorities subject to mandatory taxing or restrictions.

But prior even to this going back into antiquity, it was a way to designate social status in a class system. Your status was assigned to you from your parentage status. Known as the “Estates Of Man” there were three or for levels that had rights of fealty over lower estates that had a duty of homage to all higher estates. Most had no rights and were “tied to the land” and the lord of that land from birth untill death. Usually you were placed in the lower status of either sire or dam. Thus the system was designed as a “closed stud book” breeding or “blood lineage” system to control the title to land and labour thus power. Unfortunately as with all inbreeding systems it had genetic disadvantages.

But certain people actually think such “status systems” are desirable because they foolishly fantasize about being “High Status”.

Unfortunately such idiocy does not stop them gaining “Political Power” and making laws to enforce such inhumane systems for what they claim is “The common good”.

Usually such systems are broken by one or both of,

1, Pestilent epidemic (plague).
2, Insurrection from without or within (war).

Both of which were often preceded by “famine” caused by what these days we would call a “natural disaster” or “bad policy” giving rise to an “economic downturn”, “recession” and the likes of “hyperinflation”.

Because as once astutely observed,

“If you can not pay, you can not play, so a looser you will be.”

So in the modern world it is the politicians no matter how selected or self appointed that decides the answer to not just the question you ask, just remember though the story of “King Herod and the massacre of the innocents”[2]… Such things still happen in the modern world where we call it “ethnic cleansing” or just plain “Genocide”.

[1] BRANDING : noun
1 – Process in which a mark, usually a symbol or ornamental pattern, is burned into the skin of a living person or animal to indicate ownership

2 – The act of stigmatizing a person or group.

3 – Process of creating a unique identity for a product, organization, or individual by associating it with specific names, designs, symbols, and qualities that distinguish it from others for the purpose of trade.

So take your pick they are all common practice even today. Whilst we might not use branding irons we have “gang tattoos” and similar tribal markings. So like everything else making it “digital” is a logical step. Some people even tattoo QR or bar codes on themselves as “body art that is function over form”.

[2] The various “coming for the first born son” or “infant sons” stories are many not just in the bible. Because they are probably based on fact that has suffered the fate of “Chinese Whispers” in the multiple retellings of auditory record. One of the main reasons we have reason to believe they are fact based is that first sons were the inheritors of status, land, thus familial power as the next lord of the manor and upwards to the country as king. And it’s known from near contemporaneous surviving written record that Herod killed at least three male children in his own family to protect his position. He was not the first and certainly not the last to do this right into the middle ages and beyond.

One story in the bible is about the god of the Israelites visiting plagues on Egypt of which the Tenth Plague was “Death of the Firstborn” (Exodus 12:29). Whilst the cause is a myth such plagues did happen and were caused by “natural disasters” such as torrential rain and flooding up stream causing “wash down” and similar. The question of “why first born” is explained by food. As the inheritor of the family the first born received preferential treatment to all women and other children and in times of hardship even the father. So in times of shortage they would get the best and sufficient food whilst the other children would not. Thus contaminated food taken from poor storage –see ergot fungus and similar– or livestock would effect the first born more than the others. So why not the Israelite first born? Well you can put that down to cloven hoof herbivores v feral omnivore pigs and food customs. Pigs will eat just about anything including early rotting corpses and human waste, thus like rats they are primary disease vectors. Israelites by custom did not eat pigs thus any disease the feral pig population had would not be passed onto them, but would to those that did eat them. So Israelite first born would not be infected whilst those that did consume the flesh of the swine would, and as the first born would have eaten a share of any swine flesh, shortages would have ment the other children and even the adults probably would not have.

Peter A. April 22, 2025 7:47 AM

@All re: go back to IRC.

I have noted that many ‘acceptable use policies’ of various computing resources providers expressly forbid using or even installing not only IRC servers (a marginally justifiable clause as a popular server could put a considerable load on network resources – but on the other hand using more makes one pay more so why not take that money?) but also IRC clients. The acronym has become something like a curse word, or a stigma. Something of an irrational notion of “only [bad people of some sort] have/use [some tool]”. There were some cases in the past when I needed to contact a person I knew sits on IRC all the time and I had to speak raw IRC protocol by hand (using telnet, netcat[1] etc.), because there was no IRC client. Today, only a few remote Finnish acquaintances of mine still camp there…

It is just somewhat interesting and curious, why seemingly technical people and companies enforce such superstitions… I know IRC was used to spread/control some malware and thus got some bad press, but almost every protocol has been…

[1] Similarly, I once got flagged for having netcat installed (as a part of a greater software package) – because it was considered “a hacker’s tool”.[2] For explanation, netcat is a simple program that just shoves data from source to destination, whatever it is – a file on disk, a network connection of any sort, keyboard and screen, input or output of another program etc. This kind of nonsense is, unfortunately, widespread: that people having basic tools and skills to use them are “dangerous”, because they “can do anything” with them.[3]

[2] I had to remove netcat that does one specific thing as a piece of software, but I got to keep the C/C++ compiler which I could use to produce ANY software that can do ANYTHING… go figure.

[3] This is sometimes blown completely out of proportions and sense – at one workplace I was forbidden to carry a pocket knife past the gates “for security”, but once inside I had a whole workshop full of sharp implements and power tools at my disposal…

Leslie April 22, 2025 5:44 PM

Well, I don’t use my phone for apps, just for calling other people, so I suppose that my access to Discord will disappear, since I have (and will not have) a camera on my desktop computer. Thanks, Discord.

ResearcherZero April 29, 2025 3:18 AM

@Code of Conduck, Peter A.

IRC servers are full of cops monitoring criminal cyber activity and foreign spies tasking teenagers who naively believe they are part of a cool underground hacking community. Once the spooks are finished using those kids to obtain what they want, they ‘burn’ them.

A significant portion of ransomware and intrusion campaigns are overseen by operatives for foreign governments and some are even conducted by groups working directly for them.

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.