logo
Australia's teen social media ban put to ultimate test: skeptical kids

Australia's teen social media ban put to ultimate test: skeptical kids

Yahoo2 days ago

STORY: When 15-year-old Emanuel Casa tested the age-checking software Australia might use to enforce a social media ban for minors, he got a glimpse into his future.
Six months from now, the system could ban him from social media.
And he was shocked by how well it worked:
"Some of them would be like pretty bang on, just like 14 years, and other ones would be like 16.087654 like a bunch of decimal numbers, but yeah."
From December, social media companies like Facebook, Instagram, Snapchat, and TikTok could face fines of more than $30 million if they don't take 'reasonable steps' to block underage users in Australia.
This is in an effort by the government to protect younger users' mental and physical health.
The platforms currently require users to be at least 13 to sign up.
The country is now trialing a photo-based age-checking software to help enforce the new law.
14-year-old Charlie Price also participated in a trial that tested four software options with 60 peers, and his age was guessed correctly.
But it wasn't foolproof.
"Most of mine were accurate, I had a couple of friends that, one of them said that they were like 20-something so, you know, a bit here and there, but mine were usually on point."
While Price says he wouldn't try to get around the ban, he thinks others might.
"So when it got my age right, it would be pretty difficult to get around that. Like if somehow I got my age wrong then I could get through that, but if it doesn't get my age wrong then I can't find a workaround by myself."
His experience highlights a key concern for child protection advocates, tech firms and even trial organizers themselves:
Even if the software works in trials, young people may still find ways to bypass it in real life.
Andrew Hammond is a general manager at tech contractor KJR who helped run the trial, said the software works but isn't perfect and could be fooled.
"I mean, personally, my personal opinion is yeah. I'm a father of three daughters, they are all over 16 now, but we lived through the social media, sort of the adoption of social media with my eldest daughter, and then the younger two sort of came through when it was more common place and so, I think as a parent and a technologist, I think the technology, it's not foolproof and there's no silver bullet solution to every use case that there is, but I think this is a, it's a move in the right direction."
Trial organizers, including Hammond, won't recommend specific products, but will present findings on June 20 and give a full report to the government by the end of July.
This will help the country's eSafety Commissioner advise ministers, who want to reduce risks like cyberbullying and harmful online content.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Tech-fueled misinformation distorts Iran-Israel fighting
Tech-fueled misinformation distorts Iran-Israel fighting

Yahoo

time2 hours ago

  • Yahoo

Tech-fueled misinformation distorts Iran-Israel fighting

AI deepfakes, video game footage passed off as real combat, and chatbot-generated falsehoods -- such tech-enabled misinformation is distorting the Israel-Iran conflict, fueling a war of narratives across social media. The information warfare unfolding alongside ground combat -- sparked by Israel's strikes on Iran's nuclear facilities and military leadership -- underscores a digital crisis in the age of rapidly advancing AI tools that have blurred the lines between truth and fabrication. The surge in wartime misinformation has exposed an urgent need for stronger detection tools, experts say, as major tech platforms have largely weakened safeguards by scaling back content moderation and reducing reliance on human fact-checkers. After Iran struck Israel with barrages of missiles last week, AI-generated videos falsely claimed to show damage inflicted on Tel Aviv and Ben Gurion Airport. The videos were widely shared across Facebook, Instagram and X. Using a reverse image search, AFP's fact-checkers found that the clips were originally posted by a TikTok account that produces AI-generated content. There has been a "surge in generative AI misinformation, specifically related to the Iran-Israel conflict," Ken Jon Miyachi, founder of the Austin-based firm BitMindAI, told AFP. "These tools are being leveraged to manipulate public perception, often amplifying divisive or misleading narratives with unprecedented scale and sophistication." - 'Photo-realism' - GetReal Security, a US company focused on detecting manipulated media including AI deepfakes, also identified a wave of fabricated videos related to the Israel-Iran conflict. The company linked the visually compelling videos -- depicting apocalyptic scenes of war-damaged Israeli aircraft and buildings as well as Iranian missiles mounted on a trailer -- to Google's Veo 3 AI generator, known for hyper-realistic visuals. The Veo watermark is visible at the bottom of an online video posted by the news outlet Tehran Times, which claims to show "the moment an Iranian missile" struck Tel Aviv. "It is no surprise that as generative-AI tools continue to improve in photo-realism, they are being misused to spread misinformation and sow confusion," said Hany Farid, the co-founder of GetReal Security and a professor at the University of California, Berkeley. Farid offered one tip to spot such deepfakes: the Veo 3 videos were normally eight seconds in length or a combination of clips of a similar duration. "This eight-second limit obviously doesn't prove a video is fake, but should be a good reason to give you pause and fact-check before you re-share," he said. The falsehoods are not confined to social media. Disinformation watchdog NewsGuard has identified 51 websites that have advanced more than a dozen false claims -- ranging from AI-generated photos purporting to show mass destruction in Tel Aviv to fabricated reports of Iran capturing Israeli pilots. Sources spreading these false narratives include Iranian military-linked Telegram channels and state media sources affiliated with the Islamic Republic of Iran Broadcasting (IRIB), sanctioned by the US Treasury Department, NewsGuard said. - 'Control the narrative' - "We're seeing a flood of false claims and ordinary Iranians appear to be the core targeted audience," McKenzie Sadeghi, a researcher with NewsGuard, told AFP. Sadeghi described Iranian citizens as "trapped in a sealed information environment," where state media outlets dominate in a chaotic attempt to "control the narrative." Iran itself claimed to be a victim of tech manipulation, with local media reporting that Israel briefly hacked a state television broadcast, airing footage of women's protests and urging people to take to the streets. Adding to the information chaos were online clips lifted from war-themed video games. AFP's fact-checkers identified one such clip posted on X, which falsely claimed to show an Israeli jet being shot down by Iran. The footage bore striking similarities to the military simulation game Arma 3. Israel's military has rejected Iranian media reports claiming its fighter jets were downed over Iran as "fake news." Chatbots such as xAI's Grok, which online users are increasingly turning to for instant fact-checking, falsely identified some of the manipulated visuals as real, researchers said. "This highlights a broader crisis in today's online information landscape: the erosion of trust in digital content," BitMindAI's Miyachi said. "There is an urgent need for better detection tools, media literacy, and platform accountability to safeguard the integrity of public discourse." burs-ac/jgc

Sonoma man arrested after police say they found him with meth, guns
Sonoma man arrested after police say they found him with meth, guns

San Francisco Chronicle​

time3 hours ago

  • San Francisco Chronicle​

Sonoma man arrested after police say they found him with meth, guns

Police officials in Santa Rosa and Petaluma arrested a Sonoma man Wednesday on suspicion of possession of methamphetamine and firearms, authorities said. Police identified the suspect as Kelly James Roach, 59, who is a convicted felon and prohibited from possessing firearms, officials said. On the 5300 block of Old Redwood Highway in Petaluma, detectives initiated a traffic stop on Roach, searched his vehicle and discovered a loaded 1911 Colt .45 in a Crown Royal bag on the floorboard, police said. About 2½ ounces of suspected methamphetamine was found under Roach's seat cover, authorities said. Roach was booked into the Sonoma County Jail. Detectives also executed search warrants at two storage units on the 6000 block of Commerce Drive in Rohnert Park on Wednesday, according to a Facebook post by the Santa Rosa police. There, they located a stockpile of handguns, rifles, rounds of ammunition and firearm parts. It was not clear if the storage units belonged to Roach. Santa Rosa police did not immediately respond to a request for comment.

Billions of login credentials have been leaked online, Cybernews researchers say
Billions of login credentials have been leaked online, Cybernews researchers say

Yahoo

time3 hours ago

  • Yahoo

Billions of login credentials have been leaked online, Cybernews researchers say

NEW YORK (AP) — Researchers at cybersecurity outlet Cybernews say that billions of login credentials have been leaked and compiled into datasets online, giving criminals 'unprecedented access' to accounts consumers use each day. According to a report published this week, Cybernews researchers have recently discovered 30 exposed datasets that each contain a vast amount of login information — amounting to a total of 16 billion compromised credentials. That includes user passwords for a range of popular platforms including Google, Facebook and Apple. Sixteen billion is roughly double the amount of people on Earth today, signaling that impacted consumers may have had credentials for more than one account leaked. Cybernews notes that there are most certainly duplicates in the data and so 'it's impossible to tell how many people or accounts were actually exposed.' It's also important to note that the leaked login information doesn't span from a single source, such as one breach targeting a company. Instead, it appears that the data was stolen through multiple events over time, and then compiled and briefly exposed publicly, which is when Cybernews reports that its researchers discovered it. Various infostealers are most likely the culprit, Cybernews noted. Infostealers are a form of malicious software that breaches a victim's device or systems to take sensitive information. Many questions remain about these leaked credentials, including whose hands the login credentials are in now. But, as data breaches become more and more common in today's world, experts continue to stress the importance of maintaining key 'cyber hygiene.' If you're worried about your account data potentially being exposed in a recent breach, the first thing you can do is change your password — and avoid using the same or similar login credentials on multiple sites. If you find it too hard to memorize all your different passwords, consider a password manager or passkey. And also add multifactor authentication, which can serve as a second layer of verification through your phone, email or USB authenticator key.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store