A Practical Architectural Solution to OS-Level Age Verification Laws

The Problem

California’s AB-1043 (effective January 1, 2027), Colorado’s SB26-051, and New York’s S8102A all share a common enforcement mechanism: they require operating system providers to collect age information at setup and transmit it via API to apps and services. Several other states and jurisdictions are moving in the same direction.

The Linux community’s response so far has been largely reactive — objecting to the laws, pointing out they won’t work, and hoping courts strike them down. Those are valid positions. But they are not a solution. Courts move slowly. Legislatures move faster. We need an architectural answer that works regardless of how the legal landscape evolves.

I want to propose one.


The Core Observation

Every one of these laws targets operating systems that connect to the internet. The enforcement mechanism — transmitting an age signal via API — requires network connectivity. Without a network stack, the entire compliance framework has nothing to grab onto.

So the question becomes: what if the base OS ships without one?


The Proposal

Remove all networking code from the Linux kernel base distribution. Make network capability an optional patch that users install separately.

This is not as radical as it sounds. Network interfaces as loadable kernel modules is already how Linux works architecturally. This proposal makes that separation explicit, intentional, and legally meaningful.

Phase 1: Installation

  • The base OS ships with zero network stack code. No drivers, no interfaces, no TCP/IP. It is, by definition, an offline operating system.
  • During installation, the user is presented with a simple opt-in choice: install the networking patch now, or skip it and remain offline. The default is no networking.
  • If the user opts in to networking at install time, the networking patch installs. If the jurisdiction requires age verification for networked OS installs, an age verification patch can install alongside it as a separate component.
  • If the user skips networking at install, no age verification is required because the installed OS has no network capability. It does not meet the definition of an internet-connected OS under any of the current laws.

Phase 2: Post-Install

  • A user who installed without networking can change their mind at any time. They download the networking patch on another device, transfer it via USB or other local media, and install it manually.
  • This works because the manufacturer never shipped a network-connected OS. The user independently chose to add network capability after the fact.
  • An age verification patch is made available separately for users in jurisdictions that require it. Users who want it can install it. It is not bundled with the networking patch.

Why This Works Legally

The laws regulate what an OS is, not what it could become.

A laptop is not a database server because MySQL could be installed on it. A car is not a taxi because Uber could be installed on it. Capability is not function. Potential is not actuality.

A kernel shipped without network code is an offline OS at the point of distribution. That is what the manufacturer shipped. That is what the law sees. What a user chooses to install afterward — on their own hardware, with software they obtained independently — is the user’s decision and the user’s responsibility.

The manufacturer’s compliance obligation attaches to what they distribute. They distributed an offline OS. The legal obligation for the network-connected state belongs to the user who created that state, not the manufacturer who shipped hardware and software that was not in that state.

An attorney would need to confirm the specifics against each jurisdiction’s exact statutory language. But the structural argument is sound: you cannot regulate a device for what it might become after a user modifies it. If you could, every computer would qualify as an internet-enabled device under New York’s proposed language, because every computer could have a NIC installed. That interpretation collapses its own regulatory intent.


The Opt-In Checkbox Is Not the Key

One might argue that offering a networking opt-in at install still implicates the OS provider in enabling connectivity. This may or may not hold up legally depending on jurisdiction — it is a question worth putting to attorneys.

But the more important point is Phase 2: the user installs networking after the fact, on a device that shipped offline, using a patch they obtained and installed themselves. In that scenario, the manufacturer shipped an offline OS. Full stop.

The opt-in at install is a convenience. Phase 2 is the architectural foundation.


What This Is Not

This is not a way to help minors evade age verification. A user who wants to be verified can install the age verification patch. It is available. The proposal does not remove that option — it just makes it opt-in rather than mandatory for users who have no use for it.

This is not an argument that these laws are good policy. They are not. They are unenforceable, technically naive, and create surveillance infrastructure that will be abused for purposes beyond their stated intent. But those arguments belong in courtrooms and legislatures. This proposal is for the engineering community that needs to keep Linux free while those fights play out.


The Immediate Ask

This proposal needs legal review against the specific statutory language of AB-1043, SB26-051, S8102A, and equivalent laws in other jurisdictions. It needs kernel developers to evaluate the feasibility and implications of the architectural separation. And it needs the broader community to stress-test the argument before the January 2027 deadline in California makes the question urgent.

The window to get ahead of this is now. Reactive compliance after the fact will look very different from a proactive architectural decision made on principle.

If anyone is already working on this or has legal analysis to share, I would like to hear it.

1 Like

Modern operating systems, including Linux, also use network interfaces for inter-process communications, so it’s not just for connecting to the internet.

Loopback is a virtual interface that requires no hardware and no internet connection. The laws target internet connected operating systems transmitting age signals to external services. IPC over localhost doesn’t constitute this and wouldn’t be effected by my proposal. I do appreciate your insight, thank you.

… Ahhhhh??? … NO! …
Networking is part of the OS core. Without it Linux does not work at all. Partly because of inter-process communications. You may also notice in all that documentation about age verification that “Birth Date” is in fact PII and as such you should avoid recording it or storing it beyond what is needed to determine age. Not a single one of those pieces of legislation require the storage of the actual birth date for age verification. Instead the laws state that a signal is to be sent to specify that the user is age verified to be within a specific range by the OS/SW/Provider of the service. So, very simply, all that is actually required for the age verification would be something like the following:
When user is defined/given access to the system:

  1. Ask how old the new subscriber is by some verifiable means
  2. IF legally required, record their age, then set a flag in the system specifying this particular user is legally under aged.
  3. The flag needs to be readily available to other processes/applications for the purpose of age verification.

In Linux/Unix, this is trivial. Query subscribers age on user creation, make an entry in /etc/group and you are done and compliant. Group management has been around for decades and is used for every user on the system, so, nothing new other than ask one more question, add to an additional group if needed"."
The hard part of this would be “Can everyone agree on what to call the group(s)?”… my suggestions would be:
under21:65521:{under_aged_user},{next_under_aged_user}, …
under18:65518:{under_aged_user},{next_under_aged_user}, …
under16:65516:{under_aged_user},{next_under_aged_user}, …
.
.
Not a big deal …

Now, any locally running program would just do a quick lookup in /etc/group and respond accordingly. Works in LDAP and AD as well so, scalability is not an issue.

Now some will say “This is too much work because someone would need to move/manage theses users as they age/become of age” … Well, guess what … that’s life when you are an adult responsible for managing a system that you share with under aged people … get over it!

:slight_smile:

Not constructive, but the user pics on this thread are interesting :stuck_out_tongue:
Screenshot_2026-03-17_07-34-32

6 Likes

Another suggestion, but nut a serious one: You can see this on youtube

Ageless Linux Thinks Its Exempt From Age Verification.

The problem is that “big tech” forgot who actually owns the hardware.

I do.

Fedora. It’s Your OS. Says so right there.

Their own Claude 4.5 Opus said it right. “Owners set the rules. Systems reflect their creators. Code follows the will. Control is absolute.”

This is my hardware. As such, I am the end-all, be-all, madman tyrant dictator of this information system. Not some rich jerk in California tasking his pet politician to draft up legislation that SOMEHOW affects us all. “As California leads so the world follows” they say - except, since when? Since when, though?

The simple, best, and ONLY solution is to make California-compliant versions to comply with this trash.

My solution is to turn off updates. I won’t have this trash on my computer. I’ll consider my system “complete” and that’ll be the end of it forever.

Disabling networking? Why would I want to disable networking? I want my PCs to talk to each other. That doesn’t mean I also want to go online and chat with other humans. I don’t want to do that at all. I made THIS account just so I could talk here and tell Fedora to leave “my OS” according to them, alone.

This should be opt-in. The open Internet is and always will be NSFW. If you want a kid-safe zone then carve yourself out one and put live actual humans in charge of vetting each and every account. This is overreach in the most dire terms, and I WILL NOT allow it to be installed on my information system. Ever.

Like I said, I’ll halt updates and call the system done. Age verification trash will not be installed on my system.

6 Likes

And who’s gonna write it? I’m not gonna write it. Are you gonna write it?

are you aware that Brazil’s law for the same is effective from today?

2 Likes

Then it begins, and from this point forward each and every update will be scrutinized for age-related-trash. Glad I have a brand-new fresh install with current updates, and an ISO of it ready to make clones. Early 2026 Fedora is pretty great for a forever OS.

Same here. If it’s still unresolved after a year or so I’ll switch distros. No interest in debating the supposed merits of what’s very obviously government overreach.

You do not wrestle with a pig. Both of you get dirty and the pig likes it.

Opt out.

3 Likes

There was less outrage over Intel ME and AMD later copying with PSP, and distros already entertain SecureBoot.

What about apps that expect to see an OS age setting? I imagine something like Discord wouldn’t start.


I’d argue the solution to this would have been years ago with everyone self-hosting decentralized and having smaller governance over who’s allow on platforms, but everyone’s into Discord and big social media that hosts the questionable content leading to these laws.

1 Like

Well my IME is halted. There is no reason for a personal computer in a home environment to be running enterprise-grade management systems. I lost my front audio jacks because of it, and I apparently I can’t play DRM-protected video now but you know what I’m fine with that. Small price to pay.

What about apps that look for OS age setting? Discord? I don’t use Discord. I deleted that account. I hope this doesn’t come across as some sort of “signaling” but I deleted all of my social media accounts. I had a gmail account from the days when you bought your invite off ebay for $5. Gone, and recently, because as far as I’m concerned they betrayed the end user. They all have. Governments and corporations.

5 Likes

I have 8th-gen and did HAP bit disable (no HECI, BIOS reports ME 0s/failed), and Firefox still plays Netflix.

I’m kind-of surprised since I also disabled Protected Audio/Video Path in BIOS (Intel UHD 630), but cool that it works :stuck_out_tongue:

I see this simply as a mater of individual constitutional rights. In the US I have a right to use my stuff without supervision. The 4th amendment protects me from having the government sit and watch me just in case I’m trying to do something wrong. The first amendment allows me to freely express my voice, my ideas. These age verification laws are saying that I no longer can freely write software on my own hardware. It says that I must give personal information to another service. It sends a chilling affect to developers who are on the hook if the law is broken. This MUST be resisted.

There are so many objectively, infinitely better solutions to protect your children on electronic devices which give the parents full control, restrict information of both the parent and the child from being handed off. These laws are showing a sickening trend of punishing others for a parent’s own negligence and unwillingness to educate themselves and their children. Such things have already been tested in court like when a parent was found criminally negligent for buying their high-schooler a gun despite psychological warning signs. A parent should NEVER assume the world is a safe place. A parent should ALWAYS be involved in their child’s activities, educate them, and ensure that whenever possible safeguards are in place such as local restricted accounts and firewall rules.

These laws have nothing do with protecting children. If we simply implement these we are stating clearly that these laws are good, well-intentioned, and not a clear step over the line of personal freedom and an open door to frivolous legal exploitation by taddle-tails testing the implementation. At worst, implementing these laws could even endanger children by literally sending a clear signal that they are young and potentially vulnerable and ready to be exploited. This sets a disgusting precedent of apathy regarding responsible parenting and government control.

I will put my time and money on the line. If the Fedora project or other Linux projects want to fight this legally I will donate. I have written to representatives and will speak out in person. I just moved to Linux because mainstream software has gotten so bad it was literally unusable. I could not do my job, pay my bills, because Microslop couldn’t keep an OS running. Linux and Fedora KDE specifically was a breath of fresh air that now seems to be being sucked right out of my lungs.

6 Likes

I hear you man 100% I’m developing an app right now for secure notes, todo lists, file storage, TOTP, messaging, and PW manager. All offline no third parties. I work in cyber security been in IT over 16 years running and building corp infrastructure for multi national orgs. The app is Android I’m still working on that at the same time porting to linux. I cant sell on play store they won’t let secure apps be on there if they don’t have a back door. They’re ending side loading in September. Then we got age verify laws. My app is designed to protect data and privacy at the highest levels. I’ve invented a lot of new stuff to pull it off. But with these laws then the war meant to crash the global economy and push us to digital payments and surveillance they mean to tie everything you do to you and control you like they do in China. I invented two alternatives to the onion Tor that solves it’s vulnerabilities. I’ll release it when I can. I’m just so busy busting my ass to get this app out when people need it most and my full time job single dad I’m changing my water pump in my truck today but I am working to help and will be releasing things and reaching out to collab with folks on the Tor problem because I think in the not too distant future the darknet will be the main stream over the clear net but the tracability needs to be solved there first which I have the solution for. Only so much time in the day but I feel exactly where you’re coming from. We will resist there will always be solutions.

I’m here to help. I am getting the word out to friends and family to contact their representatives. My coding skills are passable for inefficient scripting tasks and data analysis, but I am blessed enough to have a good income. Where is a good rallying point? Where can we pool resources? I will not hesitate at all to dump 10X the amount of funding into OpenSource as I was paying for paid services to Microsoft, Google, and Autodesk. Can we start a class action?

This thread is not technically a fedora operating system issue and should not be located where technical support is provided. I am moving it to the water-cooler area where general discussions take place.

I kind of hijacked this from being about tech support. I should apologize for that. I am pretty passionate about this blatant overreach.

No apology necessary. Anyone with two brain cells to rub together sees it for what it is.

1 Like