📰 Stay Informed with My Patriots Network!
💥 Subscribe to the Newsletter Today: MyPatriotsNetwork.com/Newsletter
🌟 Join Our Patriot Movements!
🤝 Connect with Patriots for FREE: PatriotsClub.com
🚔 Support Constitutional Sheriffs: Learn More at CSPOA.org
❤️ Support My Patriots Network by Supporting Our Sponsors
🚀 Reclaim Your Health: Visit iWantMyHealthBack.com
🛡️ Protect Against 5G & EMF Radiation: Learn More at BodyAlign.com
🔒 Secure Your Assets with Precious Metals: Kirk Elliot Precious Metals
💡 Boost Your Business with AI: Start Now at MastermindWebinars.com
🔔 Follow My Patriots Network Everywhere
🎙️ Sovereign Radio: SovereignRadio.com/MPN
🎥 Rumble: Rumble.com/c/MyPatriotsNetwork
▶️ YouTube: Youtube.com/@MyPatriotsNetwork
📘 Facebook: Facebook.com/MyPatriotsNetwork
📸 Instagram: Instagram.com/My.Patriots.Network
✖️ X (formerly Twitter): X.com/MyPatriots1776
📩 Telegram: t.me/MyPatriotsNetwork
🗣️ Truth Social: TruthSocial.com/@MyPatriotsNetwork
Summary
➡ The article discusses the potential dangers of age verification systems, arguing that they can be exploited by predators and lead to a loss of anonymity. It criticizes the shift of child protection from parents to tech companies and the government, and warns about the potential for increased surveillance. The article also highlights the challenges faced by alternative operating systems in complying with these laws, suggesting that they may lead to a two-tiered system where privacy-focused users face more difficulties. Finally, it urges readers to fight for privacy and the open internet.
➡ Braxtech.net is offering the Brax 3 phone and a new Linux tablet, both designed to protect your privacy from Big Tech tracking. The Brax 3 phone is currently available for pre-order after the first batch sold out quickly. The company appreciates the support from Patreon, locals, and YouTube members, which helps keep their channel going.
Transcript
Finally we’ll uncover what this all means for the future of the Google AOSP builds like BraxOS, LinuxOS, EODay, GrapheneOS and plain Linux distributions. By the time we’re done you will understand exactly why the state-specific porn laws are mostly theater you can bypass with a VPN and why California’s law and the OS level signals from Google and Microsoft are the real threats that will follow you on every device, every app, every single day. Let’s start at the beginning. Stay right there. Chapter 1. The two completely different animals. There are two completely different categories of eight verification mandates happening right now and if you mix them up that’s exactly how they get away with building all of this.
The first category is the state-specific porn site ID mandates. Right now more than 25 states have these on the books Texas, Utah, Louisiana, Arkansas, Missouri, Florida, Georgia and a bunch more. The strictest versions force any website or app where a substantial portion of the content is considered harmful to minors or straight-up pornography to verify that every single visitor is 18 plus. That usually means uploading a government-issued photo ID plus a live selfie for live disc detection or putting a credit card on file or doing a biometric facial estimation through a third-party service.
But here’s the part they never advertise. These laws are ridiculously easy to bypass. You just turn on a VPN, connect to a server outside that state, switch to a desktop browser instead of the app, go incognito and you’re done. Most sites simply geoblock the entire state or throw up a cheap app gate that you can get around in 10 seconds. For anyone who cares about privacy, these laws are mostly theater. They only hit adult content sites, they’re geofenced and they create isolated data troves that you can simply avoid if you know what you’re doing.
This is why I didn’t panic with this last year. The second category is where the real danger lives. The OS level and device level mandates. This is the California law that goes fully live on January 1, 2027 and there’s a mandatory catch-up period for every existing device by July 1, 2027. Colorado has almost the identical bill and it’s moving through committee right now. This law does not target porn sites, it targets every operating system provider Apple, Google, Microsoft, Linux distros, Steam OS, anybody who sells or updates devices that are used in California.
At the initial device or account setup and later on for older devices, the operating system has to prompt the user or a parent to self-report their birth date or age. That creates a simple encrypted age bracket signal with one of the four categories under 13, 13 to under 16, 16 to under 18 or 18 and up. Any app in a covered app store can request that signal when the app is downloaded or launched. The law says the signal has to be non-personally identifiable, it has to be the minimum amount of information necessary and it can’t be shared with third parties for unrelated purposes.
On paper this sounds privacy-forward, there’s no mandatory ID upload, no face scan, just self-adestation at setup. But paper and reality are two different things, especially when Google and Microsoft are involved. Chapter two, Google’s Play Age Signals API. Let’s start with Google because their implementation is the most documented right now and it really shows the pattern of what’s coming. In case you didn’t know, age verification as implemented by Google isn’t some direct app to device verification, it is actually an API on Google Play Services. This means that Google is directly tied to the age signal as a man in the middle.
Google already has complete device identity information through the Play Integrity API. It checks things like bootloader lock status, hardware attestation using OEM or Google root certificates, and so on. It returns a cryptographically signed data from the device’s secure enclave or TPM equivalent, but this device attestation has been voluntary for the app developers. It has not been a requirement. Google’s own documentation strongly recommends, and every developer who cares about compliance going to do this, wrapping the age signal call with a fresh Play Integrity check. Though in effect, any app that wants an age signal will actually be asking Google to supply that info.
So likely the flow becomes the app as for the integrity attestation. First, Google confirms attestation that this is a regular Google device, and then sends the age signal. Even though the law says not personally identifiable and minimum necessary, Google is logging everything internally, so they have audit trails in case the California Attorney General ever audits them for their good faith compliance defense. Now we get to the fingerprint nuclear option, install ID. This is part of the age signal. This is a Play generated alphanumeric string in UUID style, for example, something like this.
It is only generated and returned for supervised family link accounts, kids and teens under parental control. The app receives it directly in the response, and Google’s documentation explicitly tells developers to store the install ID on their back end. It is persistent for that specific user plus device plus app combination under supervision. For normal adult users, which is going to be the vast majority, install ID is null or empty. No value is generated at all, but the absence of install ID is itself a fingerprint. And due to this law, more apps will be forced to use Google Play integrity attestation, and the end result is that these apps will not work on the Google phones.
So the practical side is if you want to run certain apps, you will be told you have to use a normie phone. You’re already seeing this today on Google. Many apps are now emitting the message, this app cannot run on your device if you’re using a Google phone. So this law triggers two things. A, it forces you to use a tracking device with forced fingerprinting by Google, and B, it ensures that you will find less usefulness running the Google phones. Chapter three, Microsoft’s TPM plus MSA plus Xbox. Now let’s talk about Microsoft because they are doing the exact same thing, but with hardware native attestation through TPM, which makes it potentially even more locked in and persistent.
As of March 2026, Microsoft has not publicly released specific implementation details yet, but the law requires the same things. A self-report prompt at Microsoft account or Windows setup, and an API that apps can use to query the H bracket. Microsoft security stack is tailor-made for this. TPM 2.0 is mandatory on Windows 11. The TPM provides hardware rooted keys, the endorsement key, and the storage root key. Microsoft already uses this TPM attestation in Windows Hello and their Azure infrastructure, where the TPM proves compliance with hardware and secure boot, plus keeps your BitLocker keys.
For the H signal API, Microsoft is almost certainly going to wrap the H bracket response in a TPM attested context, exactly like they do for Windows Hello. The API call will return not just the plain bracket, but a signed and attested token that contains the bracket itself, plus device integrity proof, a TPM sign quote, with unique hardware public key elements. Again, the same result. It forces the TPM identity to be tied to the Microsoft account, and then apps will be forced to require the use of this attestation. This makes it unspoofable.
The effect of this, local account logins will then fail for those apps, since they cannot do an H signal, again, forcing you into the Microsoft surveillance infrastructure. No Microsoft account? Sorry, app won’t run. Sorry, no privacy for you, if you want to use this app. So both Google and Microsoft lock you down to surveillance devices with no opt-out of tracking and tie you to your Google ID and Microsoft ID. Chapter four, how protection flags become grooming tools. Now we get to the part that flips the entire narrative upside down, and it’s one of the most under discussed dangers of these systems.
The same flags that platforms use to restrict or block miners, the supervised status, the non null install ID on Google, the under 18 brackets, the TPM attested signals on Microsoft can be weaponized by bad actors to confirm they are talking to a real child. Imagine a malicious app developer or a predator who infiltrates or creates an innocent looking app or game or chat room, since the app called the H signal, a malicious actor, has verified proof that they are dealing with under 18 miners. Thus, they have a perfect grooming tool.
They can then tailor their grooming perfectly, start friendly, build trust, send each inappropriate content or move the conversation off platform to Discord or Snapchat or something else, all while knowing the target is almost certainly a child. The irony here is brutal. The system that is sold as protecting kids by restricting access ends up giving predators a verification tool to filter for real children more efficiently than ever before. This isn’t theoretical. Privacy groups like the Electronic Frontier Foundation and the ACLU have been warning for years that each verification creates discernible signals that bad actors can gain to identify vulnerable users, especially miners who self-report or get flagged as supervised.
The more effective the verification becomes, the more attested, persistent and logged it is, the more exploitable the signal becomes for the worst people on the internet. Predators don’t need perfect verification, they just need opportunities. These systems create new opportunities while eroding anonymity for everyone. Chapter 5. This sidelines parents and creates false security. Real child protection has always started at home. Tools like Screen Time, family-like Microsoft Family Safety, router-level filters, and actual conversations with your kids already put the power where it belongs with parents who know their own children best.
These laws say parents can’t be trusted so Big Tech and the government will handle it instead. You do one self-report at device setup and that signal follows you forever across every app. Parents get disempowered, kids who want to bypass simply learn to lie at setup or switch to VPNs and custom ROMs. The surveillance grid gets built anyway. Determined miners end up on riskier dark web corners, adults lose anonymity for everything from legitimate research to support groups to whistle-blowing. Chapter 6. Perfect cover for client-side scanning revival. And now we arrive at the part that should make your blood run cold.
Remember Apple’s 2021 announcement? They planned to do on-device CSAM scanning of every photo before it ever uploaded to iCloud. Perceptual hashing done right there on the device, even on encrypted phones. They called it safety. Privacy expert called it the end of meaningful end-to-end encryption because the device itself becomes the scanner. The backlash from EFF, signal, researchers, and users was massive, so Apple paused it and eventually killed the photo scanning part when they rolled out advanced data protection. They never abandoned the dream, they just needed a better political cover.
Each verification mandates are that cover. Once every device has a reliable age signal, whether self-reported or verified, and once platforms have already shipped on-device AI for things like facial age estimation, adding client-side scanning for CSAM, window-free call, then whatever the next moral panic happens to be becomes nothing more than a required safety update for miners. Look at what Discord is doing right now in March 2026. They launched teen by default globally back in February. More than 90% of users get auto-classified as adult through inference, account age, device data, behavior patterns.
Anyone they can confidently classify as an adult, or anyone who wants access to age-restricted servers, gets locked into restricted teen mode. To unlock full adult features, they offer two invasive options. Record a short live video selfie for on-device facial age estimation, or upload a government ID. That on-device AI inference is exactly the same technical capability needed for client-side scanning of uploads, camera rolls, or even chat content before it gets encrypted. The EU’s chat control proposal, the one that originally wanted mandatory scanning of encrypted messages, got watered down in November 2025.
The infrastructure being built under age verification makes the next push for it much easier. US lawmakers create duty-of-care obligations that point in exactly the same direction. This is not a coincidence. This is strategy. Protect the kids is the slogan. Permanent client-side surveillance is the outcome. Chapter 7 What Happens Next? So let’s talk about what happens next for the people who refuse to play this game. The de-googled AOSP builds like BraxOS, LinuxOS, EOD, GrapheneOS, and the plain Linux distributions like Ubuntu, Fedora, Arch, Gentoo, Manjaro, SteamOS. The law is written very broadly. It says any operating system provider has to add that age prompt at account or setup time and expose a real-time API that hands apps one of the four age brackets when they ask.
The definition is so wide that it explicitly sweeps in Linux distros and SteamOS. For de-googled AOSP builds, these are the ones that will feel the squeeze the most, but also have the easiest path to resistance. Since they’re built on pure AOSP and strip out Google Play services, the official Play Age Signals API isn’t there anyway, so the raw maintainers basically have three realistic choices. First, they can ignore it completely. This is the most likely path for small or community-driven projects. But the end result will be that many apps will not run on these operating systems, and we will be forced to use Windows, Google, Android, or iOS, these surveillance OSs.
Privacy-focused operating systems like Linux and de-googled phones running AOSP will be forced to have limited app functionality, as apps will be instituting attested proofs of age and will just likely fail on non-attested devices. So it’s almost pointless for these alternate OSs to even do any kind of age signaling. They will likely do it through some API that some app developer will likely not use, but this protects the Linux or distro or AOSP developer by saying they comply. With the practical side, apps will get a non-compliant OS type of signal. App developers are not going to use some custom API for Linux or the Google phones.
The bigger risk isn’t technical, it’s legal, but chasing anonymous or international open-source devs is a nightmare. For pure Linux distros, Ubuntu, Fedora, Manjaro, Gen2, Arch, and so on, and Steam OS, this is where things get almost comical. Most desktop Linux distributions have no centralized account system at all. You can boot a live USB and install without ever creating a user account in the Microsoft or Google sense, and many people run them that way. There is no account setup flow that matches what the law assumes. The community reaction so far on forums, Reddit, Distro Mailing List, and early March 2026 is mostly LOL.
Good luck enforcing this. A lot of distros are already talking about adding a simple disclaimer on their download page. This OS is not intended for use in California under AB1043 or geo-blocking download from California IPS, which is easy to do. Steam OS and Valve are the exception. Valve is a real company with real money in a store. They will almost certainly add the prompt and a simple API because they have too much to lose if California starts finding them or blocking Steam Deck sales. So Steam OS users in California will get the full experience, each prompt at first boot, signal to games and apps.
For the rest of Linux, most distros will probably do the absolute minimum or nothing. The AG isn’t going to sue every single Linux maintainer in the world. The law is clearly written for big commercial platforms, and applying it to volunteer open-source projects is a legal and PR disaster waiting to happen. Overall picture for the de-Googled and Linux world. In the short term, 2027 through 2028, California becomes a two-tier state. People on stock Google, Apple or Microsoft gets the seamless but fully tracked experience. People on the Google OSs will get a lot of app friction, but hopefully alternate apps will show up.
Right now even F-Droid is going to be blocked on Google Android, but it will thrive on the Google phones. In the long term, this could accelerate the shift to truly independent operating systems. The law might even get challenged or narrowed in court once the open-source community pushes back hard enough. The bottom line is this. The law assumes every OS works like iOS or Windows with a nice centralized account system and an app store. The politicians use normal devices and have no idea of privacy safe options. The Google AOSP builds and Linux will be messy, annoying, and sometimes not compliant for California users, but they will remain the best places to stay truly private.
The surveillance grid they’re trying to build has holes, and the open-source world is one of the biggest holes. Final thoughts So let’s summarize this with zero sugarcoating. The state-borne ID laws are narrow, geofence, and easily bypassed with a VPN. California’s AB1043 OS-level signals from Google, with its call calls plus play integrity attestation, and from Microsoft with TPM hardware attestation plus Microsoft account are systemic moves forcing us to use compliance surveillance devices and logins. Parents get sidelined, anonymity dies, predators get a verification tool they can use to target real children, and the plumbing for client-side scanning gets installed under the perfect cover story.
This is how they build the surveillance state. One safety law at a time. The open, private, anonymous internet is worth fighting for. So fight back. Folks, privacy is of course the main focus of this channel, and I teach you technology so you understand the risks technology adds to your life. We have people who discuss these issues at my platform Braxme. To support this channel, we have some products in our store that provide a toolkit to retain your privacy. They are awesome products. We have Braxmail, an email service with unlimited illnesses and identity protection.
Brax virtual phone, anonymous phone numbers, bytes VPN for anonymizing your IP address and evading this privacy invading laws. The Google phones, phones free from Big Tech tracking. The Brax 3 phone is on its second batch and it’s open for pre-order right now at Braxtech.net. The first batch sold out shortly after release. The new Brax open slate Linux tablet is also now a new project you can check out also on Braxtech.net. Big thanks to everyone supporting us on Patreon, locals and YouTube memberships. You keep this channel alive. See you next time. [tr:trw].
See more of Rob Braxman Tech on their Public Channel and the MPN Rob Braxman Tech channel.