• pivot_root@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      1 day ago

      Not if they use cryptographic signing.

      Browser sends website the signed identity verification, then the website checks the signature against some key in a list of trusted identity verifiers. With the verification responsibility being pushed to the OS vendors, that will be a short list of tech megacorporations. And maybe Canonical or Red Hat, if we’re lucky.

      • Truscape@lemmy.blahaj.zone
        link
        fedilink
        arrow-up
        8
        ·
        1 day ago

        Indeed, but wouldn’t the inevitable database breach give ample “identities” for anonymous users to cycle through (similar to aurora for play store infrastructure)?

        To be clear, the circumstances are not good and ideally this destructive behavior is averted, but there will be maneuvers which can be taken if worst comes to worst.

        • pivot_root@lemmy.world
          link
          fedilink
          arrow-up
          5
          ·
          1 day ago

          Good point. I’m not keen on personally comitting fraud, but with the inevitable data breaches in mind, identity verification would do absolutely nothing to deter malicious actors.