Conversion Hackers
Fealse: Tech News
Instagram’s new age verification tool – Week in security with Tony Anscombe
  • Security

Instagram’s new age verification tool – Week in security with Tony Anscombe

  • June 24, 2022
  • admin
Total
0
Shares
0
0
0

As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone’s age on the internet?

Instagram – which has come under fire in recent years over its potential impact on the mental health of teens – has just announced that it’s testing a new tool for age verification. Users who attempt to change their age from below 18 to above 18 will need to prove their age, using one of these three options – upload their ID, send a video selfie, or ask three adults to vouch for them. Available in the United States for now, the new method is designed to help the app better enforce age restrictions and ensure it offers age-appropriate content to its younger users.

In this video, Tony shares his thoughts in on Instagram’s move and weighs in on:

  • the implications of age verification
  • two ‘camps’ in the debate around age verification
  • why age-appropriateness is such a complex subject
Total
0
Shares
Share 0
Tweet 0
Pin it 0
admin

Previous Article
Stepico announces acquisition of game art studio Inkration | Pocket Gamer.biz
  • Games

Stepico announces acquisition of game art studio Inkration | Pocket Gamer.biz

  • June 24, 2022
  • admin
View Post
Next Article
Nothing Phone (1) will be powered by a mid-range chipset
  • Reviews

Nothing Phone (1) will be powered by a mid-range chipset

  • June 24, 2022
  • admin
View Post
You May Also Like
Hackers Come Home to Vibrant Community
View Post
  • Security

Hackers Come Home to Vibrant Community

  • admin
  • August 15, 2022
Most Q2 Attacks Targeted Old Microsoft Vulnerabilities
View Post
  • Security

Most Q2 Attacks Targeted Old Microsoft Vulnerabilities

  • admin
  • August 15, 2022
Transitioning From VPNs to Zero-Trust Access Requires Shoring Up Third-Party Risk Management
View Post
  • Security

Transitioning From VPNs to Zero-Trust Access Requires Shoring Up Third-Party Risk Management

  • admin
  • August 15, 2022
Credential Theft
View Post
  • Security

Credential Theft Is (Still) A Top Attack Method

  • admin
  • August 15, 2022
The Industry Must Better Secure Open Source Code From Threat Actors
View Post
  • Security

How and Why to Apply OSINT to Protect the Enterprise

  • admin
  • August 15, 2022
Black Hat and DEF CON Roundup
View Post
  • Security

Black Hat and DEF CON Roundup

  • admin
  • August 15, 2022
SOVA Android Banking Trojan
View Post
  • Security

SOVA Android Banking Trojan Returns With New Capabilities and Targets

  • admin
  • August 15, 2022
Black Hat USA 2022: Burnout, a significant issue
View Post
  • Security

Black Hat USA 2022: Burnout, a significant issue

  • admin
  • August 15, 2022

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories
  • Apps
  • Games
  • How To
  • News
  • Photography
  • Reviews
  • Security

Input your search keywords and press Enter.