Feed aggregator

Report: ICE Using Palantir Tool That Feeds On Medicaid Data

EFF: Updates - Thu, 01/15/2026 - 3:30pm

EFF last summer asked a federal judge to block the federal government from using Medicaid data to identify and deport immigrants.  

We also warned about the danger of the Trump administration consolidating all of the government’s information into a single searchable, AI-driven interface with help from Palantir, a company that has a shaky-at-best record on privacy and human rights

Now we have the first evidence that our concerns have become reality. 

“Palantir is working on a tool for Immigration and Customs Enforcement (ICE) that populates a map with potential deportation targets, brings up a dossier on each person, and provides a “confidence score” on the person’s current address,” 404 Media reports today. “ICE is using it to find locations where lots of people it might detain could be based.” 

The tool – dubbed Enhanced Leads Identification & Targeting for Enforcement (ELITE) – receives peoples’ addresses from the Department of Health and Human Services (which includes Medicaid) and other sources, 404 Media reports based on court testimony in Oregon by law enforcement agents, among other sources. 

This revelation comes as ICE – which has gone on a surveillance technology shopping spree – floods Minneapolis with agents, violently running roughshod over the civil rights of immigrants and U.S. citizens alike; President Trump has threatened to use the Insurrection Act of 1807 to deploy military troops against protestors there. Other localities are preparing for the possibility of similar surges. 

Different government agencies necessarily collect information to provide essential services or collect taxes, but the danger comes when the government begins pooling that data and using it for reasons unrelated to the purpose it was collected.

This kind of consolidation of government records provides enormous government power that can be abused. Different government agencies necessarily collect information to provide essential services or collect taxes, but the danger comes when the government begins pooling that data and using it for reasons unrelated to the purpose it was collected. 

As EFF Executive Director Cindy Cohn wrote in a Mercury News op-ed last August, “While couched in the benign language of eliminating government ‘data silos,’ this plan runs roughshod over your privacy and security. It’s a throwback to the rightly mocked ‘Total Information Awareness’ plans of the early 2000s that were, at least publicly, stopped after massive outcry from the public and from key members of Congress. It’s time to cry out again.” 

In addition to the amicus brief we co-authored challenging ICE’s grab for Medicaid data, EFF has successfully sued over DOGE agents grabbing personal data from the U.S. Office of Personnel Management, filed an amicus brief in a suit challenging ICE’s grab for taxpayer data, and sued the departments of State and Homeland Security to halt a mass surveillance program to monitor constitutionally protected speech by noncitizens lawfully present in the U.S. 

But litigation isn’t enough. People need to keep raising concerns via public discourse and Congress should act immediately to put brakes on this runaway train that threatens to crush the privacy and security of each and every person in America.  

Efficient cooling method could enable chip-based trapped-ion quantum computers

MIT Latest News - Thu, 01/15/2026 - 1:00pm

Quantum computers could rapidly solve complex problems that would take the most powerful classical supercomputers decades to unravel. But they’ll need to be large and stable enough to efficiently perform operations. To meet this challenge, researchers at MIT and elsewhere are developing trapped-ion quantum computers based on ultra-compact photonic chips. These chip-based systems offer a scalable alternative to existing trapped-ion quantum computers, which rely on bulky optical equipment.

The ions in these quantum computers must be cooled to extremely cold temperatures to minimize vibrations and prevent errors. So far, such trapped-ion systems based on photonic chips have been limited to inefficient and slow cooling methods.

Now, a team of researchers at MIT and MIT Lincoln Laboratory has implemented a much faster and more energy-efficient method for cooling trapped ions using photonic chips. Their approach achieved cooling to about 10 times below the limit of standard laser cooling.

Key to this technique is a photonic chip that incorporates precisely designed antennas to manipulate beams of tightly focused, intersecting light.

The researchers’ initial demonstration takes a key step toward scalable chip-based architectures that could someday enable quantum computing systems with greater efficiency and stability.

“We were able to design polarization-diverse integrated-photonics devices, utilize them to develop a variety of novel integrated-photonics-based systems, and apply them to show very efficient ion cooling. However, this is just the beginning of what we can do using these devices. By introducing polarization diversity to integrated-photonics-based trapped-ion systems, this work opens the door to a variety of advanced operations for trapped ions that weren’t previously attainable, even beyond efficient ion cooling — all research directions we are excited to explore in the future,” says Jelena Notaros, the Robert J. Shillman Career Development Associate Professor of Electrical Engineering and Computer Science (EECS) at MIT, a member of the Research Laboratory of Electronics, and senior author of a paper on this architecture.

She is joined on the paper by lead authors Sabrina Corsetti, an EECS graduate student; Ethan Clements, a former postdoc who is now a staff scientist at MIT Lincoln Laboratory; Felix Knollmann, a graduate student in the Department of Physics; John Chiaverini, senior member of the technical staff at Lincoln Laboratory and a principal investigator in MIT’s Center for Quantum Engineering; as well as others at Lincoln Laboratory and MIT. The research appears today in two joint publications in Light: Science and Applications and Physical Review Letters.

Seeking scalability

While there are many types of quantum systems, this research is focused on trapped-ion quantum computing. In this application, a charged particle called an ion is formed by peeling an electron from an atom, and then trapped using radio-frequency signals and manipulated using optical signals.

Researchers use lasers to encode information in the trapped ion by changing its state. In this way, the ion can be used as a quantum bit, or qubit. Qubits are the building blocks of a quantum computer.

To prevent collisions between ions and gas molecules in the air, the ions are held in vacuum, often created with a device known as a cryostat. Traditionally, bulky lasers sit outside the cryostat and shoot different light beams through the cryostat’s windows toward the chip. These systems require a room full of optical components to address just a few dozen ions, making it difficult to scale to the large numbers of ions needed for advanced quantum computing. Slight vibrations outside the cryostat can also disrupt the light beams, ultimately reducing the accuracy of the quantum computer.

To get around these challenges, MIT researchers have been developing integrated-photonics-based systems. In this case, the light is emitted from the same chip that traps the ion. This improves scalability by eliminating the need for external optical components.

“Now, we can envision having thousands of sites on a single chip that all interface up to many ions, all working together in a scalable way,” Knollmann says.

But integrated-photonics-based demonstrations to date have achieved limited cooling efficiencies.

Keeping their cool

To enable fast and accurate quantum operations, researchers use optical fields to reduce the kinetic energy of the trapped ion. This causes the ion to cool to nearly absolute zero, an effective temperature even colder than cryostats can achieve.

But common methods have a higher cooling floor, so the ion still has a lot of vibrational energy after the cooling process completes. This would make it hard to use the qubits for high-quality computations.

The MIT researchers utilized a more complex approach, known as polarization-gradient cooling, which involves the precise interaction of two beams of light.

Each light beam has a different polarization, which means the field in each beam is oscillating in a different direction (up and down, side to side, etc.). Where these beams intersect, they form a rotating vortex of light that can force the ion to stop vibrating even more efficiently.

Although this approach had been shown previously using bulk optics, it hadn’t been shown before using integrated photonics.

To enable this more complex interaction, the researchers designed a chip with two nanoscale antennas, which emit beams of light out of the chip to manipulate the ion above it.

These antennas are connected by waveguides that route light to the antennas. The waveguides are designed to stabilize the optical routing, which improves the stability of the vortex pattern generated by the beams.

“When we emit light from integrated antennas, it behaves differently than with bulk optics. The beams, and generated light patterns, become extremely stable. Having these stable patterns allows us to explore ion behaviors with significantly more control,” Clements says.

The researchers also designed the antennas to maximize the amount of light that reaches the ion. Each antenna has tiny curved notches that scatter light upward, spaced just right to direct light toward the ion.

“We built upon many years of development at Lincoln Laboratory to design these gratings to emit diverse polarizations of light,” Corsetti says.

They experimented with several architectures, characterizing each to better understand how it emitted light.

With their final design in place, the researchers demonstrated ion cooling that was nearly 10 times below the limit of standard laser cooling, referred to as the Doppler limit. Their chip was able to reach this limit in about 100 microseconds, several times faster than other techniques.

“The demonstration of enhanced performance using optics integrated in the ion-trap chip lays the foundation for further integration that can allow new approaches for quantum-state manipulation, and that could improve the prospects for practical quantum-information processing,” adds Chiaverini. “Key to achieving this advance was the cross-Institute collaboration between the MIT campus and Lincoln groups, a model that we can build on as we take these next steps.”

In the future, the team plans to conduct characterization experiments on different chip architectures and demonstrate polarization-gradient cooling with multiple ions. In addition, they hope to explore other applications that could benefit from the stable light beams they can generate with this architecture.

Other authors who contributed to this research are Ashton Hattori (MIT), Zhaoyi Li (MIT), Milica Notaros (MIT), Reuel Swint (Lincoln Laboratory), Tal Sneh (MIT), Patrick Callahan (Lincoln Laboratory), May Kim (Lincoln Laboratory), Aaron Leu (MIT), Gavin West (MIT), Dave Kharas (Lincoln Laboratory), Thomas Mahony (Lincoln Laboratory), Colin Bruzewicz (Lincoln Laboratory), Cheryl Sorace-Agaskar (Lincoln Laboratory), Robert McConnell (Lincoln Laboratory), and Isaac Chuang (MIT).

This work is funded, in part, by the U.S. Department of Energy, the U.S. National Science Foundation, the MIT Center for Quantum Engineering, the U.S. Department of Defense, an MIT Rolf G. Locher Endowed Fellowship, and an MIT Frederick and Barbara Cronin Fellowship.

New Vulnerability in n8n

Schneier on Security - Thu, 01/15/2026 - 7:05am

This isn’t good:

We discovered a critical vulnerability (CVE-2026-21858, CVSS 10.0) in n8n that enables attackers to take over locally deployed instances, impacting an estimated 100,000 servers globally. No official workarounds are available for this vulnerability. Users should upgrade to version 1.121.0 or later to remediate the vulnerability.

Three technical links and two news links.

Energy set to dominate state politics in runup to midterms

ClimateWire News - Thu, 01/15/2026 - 6:16am
Electricity prices and data centers are emerging as major issues for both voters and legislators.

Senators hold bipartisan secret meeting to reshape FEMA

ClimateWire News - Thu, 01/15/2026 - 6:13am
The move by about a dozen senators came as President Donald Trump threatens to reduce the agency's role in disaster recovery.

Stricter California climate rules could boost green energy globally

ClimateWire News - Thu, 01/15/2026 - 6:12am
A proposal for sharper reductions in greenhouse gas emissions "will spur long-term investment" in solar panels, electric vehicles and other technologies.

Judge grills Trump admin on Empire Wind freeze

ClimateWire News - Thu, 01/15/2026 - 6:12am
The federal judge said he would rule soon on whether the wind project off the coast of New York can restart construction.

Senate Democrat files long-shot bill to help aging, disabled people during disasters

ClimateWire News - Thu, 01/15/2026 - 6:11am
California Sen. Adam Schiff is leading a bipartisan effort to improve emergency services for older adults and disabled people, after many were killed in last year's Los Angeles fires.

Glacier ice gets a new safehouse, far from climate change — and Trump

ClimateWire News - Thu, 01/15/2026 - 6:09am
Ancient ice could hold vital information for future scientists, but it is melting fast.

Sweden is retreating from its bold green ambitions

ClimateWire News - Thu, 01/15/2026 - 6:08am
Populist groups are pushing back against environmental initiatives, spurred in part by President Donald Trump’s anti-green agenda.

UK actuaries sound alarm on loss models downplaying climate risk

ClimateWire News - Thu, 01/15/2026 - 6:08am
The use of inadequate models has left banks, insurers and asset managers accepting a “chance of failure” that is a “hundred times greater than the chance we accept of insurance company failure,” said a researcher.

Nigeria looking to raise $1B via domestic green bond in 2026

ClimateWire News - Thu, 01/15/2026 - 6:07am
An official said the nation is working with the International Finance Corp. to help unlock private capital and relieve strain on public finances.

Accounting for ocean impacts nearly doubles the social cost of carbon

Nature Climate Change - Thu, 01/15/2026 - 12:00am

Nature Climate Change, Published online: 15 January 2026; doi:10.1038/s41558-025-02533-5

Oceans provide essential ecosystem services to human society, yet the climate impacts on blue capital have long been ignored. Incorporating the latest works on ocean science and economics, researchers show that accounting for the potential damage would almost double the social cost of carbon estimation.

Increased deciduous tree dominance reduces wildfire carbon losses in boreal forests

Nature Climate Change - Thu, 01/15/2026 - 12:00am

Nature Climate Change, Published online: 15 January 2026; doi:10.1038/s41558-025-02539-z

More frequent fires in the North American boreal are causing shifts from conifer to deciduous forests. This study finds that when deciduous forests burn, their carbon losses are driven by weather, but are lower than in conifer forests, potentially dampening climate–fire feedbacks.

At MIT, a continued commitment to understanding intelligence

MIT Latest News - Wed, 01/14/2026 - 4:50pm

The MIT Siegel Family Quest for Intelligence (SQI), a research unit in the MIT Schwarzman College of Computing, brings together researchers from across MIT who combine their diverse expertise to understand intelligence through tightly coupled scientific inquiry and rigorous engineering. These researchers engage in collaborative efforts spanning science, engineering, the humanities, and more. 

SQI seeks to comprehend how brains produce intelligence and how it can be replicated in artificial systems to address real-world problems that exceed the capabilities of current artificial intelligence technologies.

“In SQI, we are studying intelligence scientifically and generically, in the hope that by studying neuroscience and behavior in humans and animals, and also studying what we can build as intelligent engineering artifacts, we'll be able to understand the fundamental underlying principles of intelligence,” says Leslie Pack Kaelbling, SQI director of research and the Panasonic Professor in the MIT Department of Electrical Engineering and Computer Science.

“We in SQI believe that understanding human intelligence is one of the greatest open questions in science — right up there with the origin of the universe and our place in it, and the origin of life. The question of human intelligence has two parts: how it works, and where it comes from. If we understand those, we will see payoffs well beyond our current imaginings," says Jim DiCarlo, SQI director and the Peter de Florez Professor of Neuroscience in the MIT Department of Brain and Cognitive Sciences.

Exploring the great mysteries of the mind

The MIT Siegel Family Quest for Intelligence was recently renamed in recognition of a major gift from the Siegel Family Endowment that is enabling further growth in SQI’s research and activities.

SQI’s efforts are organized around missions — long-term, collaborative projects rooted in foundational questions about intelligence and supported by platforms — systems, and software that enable new research and create benchmarking and testing interfaces. 

“Ours is the only unit at MIT dedicated to building a scientific understanding of intelligence while working with researchers across the entire Institute,” DiCarlo says. “There has been remarkable progress in AI over the past decade, but I believe the next decade will bring even greater advances in our understanding of human intelligence — advances that will reshape what we call AI. By supporting us, David Siegel, the Siegel Family Endowment, and our other donors are demonstrating their confidence in our approach."

A legacy of interdisciplinary support

In 2011, David Siegel SM ’86, PhD ’91 founded the Siegel Family Endowment (SFE) to support organizations working at the intersections of learning, workforce, and infrastructure. SFE funds organizations addressing society’s most critical challenges while supporting innovative civic and community leaders, social entrepreneurs, researchers, and others driving this work forward. Siegel is a computer scientist, entrepreneur, and philanthropist. While in graduate school at MIT’s Artificial Intelligence Lab, he worked on robotics in the group of Tomás Lozano-Pérez — currently the School of Engineering Professor of Teaching Excellence — focusing on sensing and grasping. Later, he co-founded Two Sigma with the belief that innovative technology, AI, and data science could help uncover value in the world’s data. Today, Two Sigma drives transformation across the financial services industry in investment management, venture capital, private equity, and real estate.

Siegel explains, “The human brain may very well be the most complex physical system in the universe, yet most people haven't shown much interest in how it works. People take the mind for granted, yet wonder so much about other scientific mysteries, such as the origin of the universe. My fascination with the brain and its intersection with artificial intelligence stems from this. I don’t care whether there are commercial applications for this quest; instead, we should pursue research like that done at the MIT Siegel Family Quest for Intelligence to advance our understanding of ourselves. As we uncover more about human intelligence, I am hopeful that we will lay the groundwork not only for advancing artificial intelligence but also for extending our own thinking.”

As a long-time champion of the Center for Brains, Minds, and Machines (CBMM), a National Science Foundation-funded collaborative interdisciplinary research thrust, and one of the first donors to the MIT Quest for Intelligence, David Siegel helped lay the foundation for the research underway today. In early 2024, he founded Open Athena, a nonprofit that bridges the gap between academic research and the cutting edge of AI. Open Athena equips universities with elite AI and data engineering talent to accelerate breakthrough discoveries at scale. Siegel serves on the MIT Corporation Executive Committee, is vice-chair of the Scratch Foundation, and is a member of the Cornell Tech Council. He also sits on the boards of Re:Build Manufacturing, Khan Academy, NYC FIRST, and Carnegie Hall.

A Catalyst for Global Collaboration

MIT President Sally Kornbluth says, “Of all the donors and supporters whose generosity fueled the Quest for Intelligence, no one has been more important from the beginning than David Siegel. Without his longstanding commitment to CBMM and his support for the Quest, this community might never have formed. There’s every reason to think that David’s recent gift, which renames the Quest for Intelligence and also supports the Schwarzman College of Computing, will be even more powerful in shaping the future of this initiative and of the field itself.” She continues, “Fueled by generous donors — particularly David Siegel’s transformative gift — SQI is poised to take on an even more important role.”

SQI scientists and engineers are presenting their work broadly, publishing papers, and developing new tools and technologies that are used in research institutions worldwide, as they engage with colleagues in disciplines across the Institute and in universities and institutions around the globe. DiCarlo explains, “We're part of the Schwarzman College of Computing, at the nexus between the people interested in biology and various forms of intelligence and the people interested in AI. We're working with partners at other universities, in nonprofits, and in industry — we can't do it alone.”

“Fundamentally, we're not an AI effort. We're a human intelligence effort using the tools of engineering,” DiCarlo says. “That gives us, among other things, very useful insights for human learning and health, but also very useful tools for AI — including AI that will just work a lot better in a human world.” 

The entire SQI community of faculty, students, and staff is excited to face new challenges in the efforts to understand the fundamentals of intelligence.

New missions and next horizons

SQI research is broadening: Mission principal investigators are integrating their efforts across areas of interest, increasing their impact on the field. In the coming months, the organization plans to launch a new Social Intelligence Mission.

"We need to focus on problems that mirror natural and artificial intelligence — making sure that we are evaluating new models on tasks that mirror what humans and other natural intelligence can do,” says Nick Roy, SQI director of systems engineering and professor of aeronautics and astronautics at MIT. He predicts that SQI’s future research will rely on asking the right questions: “[While] we are good at picking tasks that test our computational models, and we're extremely good at picking tasks that kind of align with what our models can already do, we need to get better at choosing tasks and benchmarks that also elicit something about natural intelligence,” he says.

On November 24, 2025, faculty, staff, students, and supporters gathered at an event titled “The Next Horizon: Quest’s Future” to celebrate SQI’s next chapter. The event consisted of an afternoon of research updates, a panel discussion, and a poster session on new and evolving research, and was attended by David Siegel, representatives from the Siegel Family Endowment, and various members of the MIT Corporation. Recordings of the presentations from the event are available on SQI’s YouTube channel.

Generative AI tool helps 3D print personal items that sustain daily use

MIT Latest News - Wed, 01/14/2026 - 4:00pm

Generative artificial intelligence models have left such an indelible impact on digital content creation that it’s getting harder to recall what the internet was like before it. You can call on these AI tools for clever projects such as videos and photos — but their flair for the creative hasn’t quite crossed over into the physical world just yet.

So why haven’t we seen generative AI-enabled personalized objects, such as phone cases and pots, in places like homes, offices, and stores yet? According to MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) researchers, a key issue is the mechanical integrity of the 3D model.

While AI can help generate personalized 3D models that you can fabricate, those systems don’t often consider the physical properties of the 3D model. MIT Department of Electrical Engineering and Computer Science (EECS) PhD student and CSAIL engineer Faraz Faruqi has explored this trade-off, creating generative AI-based systems that can make aesthetic changes to designs while preserving functionality, and another that modifies structures with the desired tactile properties users want to feel.

Making it real 

Together with researchers at Google, Stability AI, and Northeastern University, Faruqi has now found a way to make real-world objects with AI, creating items that are both durable and exhibit the user’s intended appearance and texture. With the AI-powered “MechStyle” system, users simply upload a 3D model or select a preset asset of things like vases and hooks, and prompt the tool using images or text to create a personalized version. A generative AI model then modifies the 3D geometry, while MechStyle simulates how those changes will impact particular parts, ensuring vulnerable areas remain structurally sound. When you’re happy with this AI-enhanced blueprint, you can 3D print it and use it in the real world.

You could select a model of, say, a wall hook, and the material you’ll be printing it with (for example, plastics like polylactic acid). Then, you can prompt the system to create a personalized version, with directions like, “generate a cactus-like hook.” The AI model will work in tandem with the simulation module and generate a 3D model resembling a cactus while also having the structural properties of a hook. This green, ridged accessory can then be used to hang up mugs, coats, and backpacks. Such creations are possible thanks, in part, to a stylization process, where the system changes a model’s geometry based on its understanding of the text prompt, and working with the feedback received from the simulation module.

According to CSAIL researchers, 3D stylization used to come with unintended consequences. Their formative study revealed that only about 26 percent of 3D models remained structurally viable after they were modified, meaning that the AI system didn’t understand the physics of the models it was modifying.

“We want to use AI to create models that you can actually fabricate and use in the real world,” says Faruqi, who is a lead author on a paper presenting the project. “So MechStyle actually simulates how GenAI-based changes will impact a structure. Our system allows you to personalize the tactile experience for your item, incorporating your personal style into it while ensuring the object can sustain everyday use.”

This computational thoroughness could eventually help users personalize their belongings, creating a unique pair of glasses with speckled blue and beige dots resembling fish scales, for example. It also produced a pillbox with a rocky texture that’s checkered with pink and aqua spots. The system’s potential extends to crafting unique home and office decor, like a lampshade resembling red magma. It can even design assistive technology fit to users’ specifications, such as finger splints to aid with dexterous injuries and utensil grips to aid with motor impairments.

In the future, MechStyle could also be useful in creating prototypes for accessories and other handheld products you might sell in a toy shop, hardware store, or craft boutique. The goal, CSAIL researchers say, is for both expert and novice designers to spend more time brainstorming and testing out different 3D designs, instead of assembling and customizing items by hand.

Staying strong

To ensure MechStyle’s creations could withstand daily use, the researchers augmented their generative AI technology with a type of physics simulation called a finite element analysis (FEA). You can imagine a 3D model of an item, such as a pair of glasses, with a sort of heat map indicating which regions are structurally viable under a realistic amount of weight, and which ones aren’t. As AI refines this model, the physics simulations highlight which parts of the model are getting weaker and prevent further changes.

Faruqi adds that running these simulations every time a change is made drastically slows down the AI process, so MechStyle is designed to know when and where to do additional structural analyses. “MechStyle’s adaptive scheduling strategy keeps track of what changes are happening in specific points in the model. When the genAI system makes tweaks that endanger certain regions of the model, our approach simulates the physics of the design again. MechStyle will make subsequent modifications to make sure the model doesn’t break after fabrication.”

Combining the FEA process with adaptive scheduling allowed MechStyle to generate objects that were as high as 100 percent structurally viable. Testing out 30 different 3D models with styles resembling things like bricks, stones, and cacti, the team found that the most efficient way to create structurally viable objects was to dynamically identify weak regions and tweak the generative AI process to mitigate its effect. In these scenarios, the researchers found that they could either stop stylization completely when a particular stress threshold was reached, or gradually make smaller refinements to prevent at-risk areas from approaching that mark.

The system also offers two different modes: a freestyle feature that allows AI to quickly visualize different styles on your 3D model, and a MechStyle one that carefully analyzes the structural impacts of your tweaks. You can explore different ideas, then try the MechStyle mode to see how those artistic flourishes will affect the durability of particular regions of the model.

CSAIL researchers add that while their model can ensure your model remains structurally sound before being 3D printed, it’s not yet able to improve 3D models that weren’t viable to begin with. If you upload such a file to MechStyle, you’ll receive an error message, but Faruqi and his colleagues intend to improve the durability of those faulty models in the future.

What’s more, the team hopes to use generative AI to create 3D models for users, instead of stylizing presets and user-uploaded designs. This would make the system even more user-friendly, so that those who are less familiar with 3D models, or can’t find their design online, can simply generate it from scratch. Let’s say you wanted to fabricate a unique type of bowl, and that 3D model wasn’t available in a repository; AI could create it for you instead.

“While style-transfer for 2D images works incredibly well, not many works have explored how this transfer to 3D,” says Google Research Scientist Fabian Manhardt, who wasn’t involved in the paper. “Essentially, 3D is a much more difficult task, as training data is scarce and changing the object’s geometry can harm its structure, rendering it unusable in the real world. MechStyle helps solve this problem, allowing for 3D stylization without breaking the object’s structural integrity via simulation. This gives people the power to be creative and better express themselves through products that are tailored towards them.”

Farqui wrote the paper with senior author Stefanie Mueller, who is an MIT associate professor and CSAIL principal investigator, and two other CSAIL colleagues: researcher Leandra Tejedor SM ’24, and postdoc Jiaji Li. Their co-authors are Amira Abdel-Rahman PhD ’25, now an assistant professor at Cornell University, and Martin Nisser SM ’19, PhD ’24; Google researcher Vrushank Phadnis; Stability AI Vice President of Research Varun Jampani; MIT Professor and Center for Bits and Atoms Director Neil Gershenfeld; and Northeastern University Assistant Professor Megan Hofmann.

Their work was supported by the MIT-Google Program for Computing Innovation. It was presented at the Association for Computing Machinery’s Symposium on Computational Fabrication in November.

Feeding innovation to solve complex urban problems

MIT Latest News - Wed, 01/14/2026 - 3:40pm

The Mexico City Initiative at MIT, led by the Institute’s Norman B. Leventhal Center for Advanced Urbanism (LCAU), has conceived and modeled an impressive array of solutions for challenges facing urban areas in Mexico and beyond. Faculty and students have designed the repurposing of a vintage roller coaster as a public meeting space, modeled strategies to decarbonize a municipal neighborhood, and proposed plans to convert nearly 990 acres of what was once Latin America’s largest landfill into a model of ecological restoration and clean energy production. The initiative has also spawned a sustainable construction startup that’s contributing to local economies in both Mexico and the United States.

When asked what’s most impactful about their work, however, those leading and collaborating with the LCAU’s Mexico City Initiative point to something else: the cross-border human connections they say are essential to continuing the ideation, development, and implementation of projects designed for Mexico City, but likely to be scalable and beneficial in urban centers around the world.

“To really create change in cities, we need to build relationships, friendships, and new networks. And through building them together, we can go so much further,” says Sarah Williams, director of the LCAU, which leads the initiative in collaboration with the National Autonomous University of Mexico (UNAM), the Mexico City government, and the engineering firm Mota-Engil Mexico.

“I think one of the big things we’re proud of is there have been a lot of personal connections created between MIT and UNAM, and I think research collaboration will result from these connections,” says Onésimo Flores PhD ’13, director general of Mota-Engil Mexico’s transportation mobility division. “I think what we have contributed to building is deepening collaboration.”   

UNAM associate professor of architecture Elena Tudela agrees, noting that “beyond the projects themselves, we have developed a genuine friendship that I hope will continue long after this specific collaboration ends.”

“What I personally value most from these years of collaboration on Mexico City’s energy transition is the set of relationships we have built — with researchers, professors and especially the team at the LCAU,” says Tudela, an initiative collaborator. “For local students, the impact has been even more profound. It built bonds that transcend the workshop’s objectives, contributing to a deeper understanding of design as a collaborative, multidisciplinary practice.”

Williams credits Flores with helping to obtain Mota-Engil’s crucial financial support for the LCAU’s Mexico City Initiative. An MIT alumnus who earned his PhD in urban studies and planning in 2013 with Mota-Engil scholarship aid, Flores says the company’s support is meant to accomplish three goals: connect Mexican researchers with MIT, get Mexican students involved in MIT programs, and stimulate interest in projects relevant to cities like Mexico City among MIT faculty.   

“If you can find urban solutions for a city as complex as Mexico City, you can probably figure it out for any city in the world, particularly in the Global South,” he says.

Over the past three years, faculty and students from MIT and UNAM have worked on projects centered on energy transition. Project teams, collaborators, interested local officials, business leaders, and others gathered for a recent symposium showcasing the progress made on the Mexico City Initiative’s projects so far.

Held in Mexico City last fall and featuring presentations by several MIT faculty, the “Energy Transitions” symposium was hosted by the LCAU, UNAM, and Mota-Engil Mexico. Its purpose “was to make sure the research effort that was done together was presented to the public and private sectors — groups that might be able to take the research to the next level,” says Williams, an MIT associate professor of technology and urban planning.

“The lecture series was exciting because we saw an interest in extending all the projects. I also think the conversations and ideas that were had in the room spark the kind of civic debate needed to transform our cities,” Williams says.

Established in 2013, the LCAU’s work cuts across diverse research fields to create innovation in cities.

“There’s not one field that can transform our future cities — innovation happens when we cross disciplines,” says Williams, who became LCAU director four years ago and has since focused the center’s mission on building and maintaining long-term relationships with cities through “City Initiatives.”

Other City Initiatives have included collaborations in Boston, as well as Sydney, Australia; Beirut, Lebanon; Bogota, Colombia; and Pristina, Kosovo. Mexico City was among the first initiatives and is the LCAU’s longest-standing program. Activities have included several classes held between MIT and Mexico City, a public exhibition, a hackathon with MITdesignX, and numerous joint research projects.

Williams describes it as “a fantastic relationship,” which began with development of a strategic plan for a Mexico City Innovation Lab, leading to a decision to focus the initiative on themes playing out over the course of about two years. The current theme is Energy Intersections, which looks at the role design plays in transitioning to cleaner energy infrastructure. 

“This came from the group seeing that Mexico wanted to be a player in the global manufacturing marketplace and one of the barriers was how heavily polluted their energy infrastructure was,” Willliams says.

“The LCAU was founded for this idea that the work and research that we do about cities should be experimental, but also framed within contemporary policies and politics,” she says, adding that the team had considered other possible themes — from water and emergency planning to housing — but “as we started to think about energy, it just became so clearly important.”

Attracting about 70 attendees from Mexico City’s academic, government, and private sectors, the symposium was convened to enable MIT and UNAM researchers to share findings and discuss paths forward for several projects. Featured projects included:

  • Redesigning Vallejo-I — aimed at transforming Mexico City’s Vallejo Industrial Zone into a revitalized hub for industry, transportation and housing;
  • Decarbonize and Revitalize: Urban Regeneration for Mexico City’s Neighborhoods — which envisions ways for energy, equity, and design to regenerate Mexico City neighborhoods, using the Daniel Garza neighborhood as a model; and
  • Bordo Poniente: Territories of Industrial and Ecological Metabolism — which presents strategies for reinventing what was once the world’s third-largest solid waste landfill (Bordo Poniente).

Leading the Bordo Poniente panel was project leader Eran Ben-Joseph, professor of landscape architecture and urban planning at MIT. Developed with UNAM and Mota-Engil partners, the project involved 12 MIT School of Architecture and Planning graduate students working across disciplines to address four integrated objectives: converting waste into public value, advancing energy transition (through methane/leachate capture), promoting equity and environmental justice for neighboring communities, and generating actionable policy recommendations, Ben-Joseph says.

“This collaborative effort exemplifies how international courses can combine rigorous fieldwork, interdisciplinary expertise, and community engagement to reimagine a toxic site as a model of urban regeneration and ecological repair,” he says, adding that the project “reflects MIT’s commitments to climate action, urban innovation, and applied systems thinking.” With over 100,000 landfills worldwide, he says, “a replicable ‘Bordo Model’ positions MIT as a global leader in transformation of waste landscapes into energy, ecological, and civic assets.”

In a similar vein, the Vallejo project reimagines urban industrial blocks as engines of clean energy generation, water resilience, and sustainable mobility. Led by MIT Department of Architecture Lecturer Roi Salgueiro Barrio and moderated by UNAM associate professor of architecture and project collaborator Daniel Daou, the symposium’s Redesigning Vallejo panel discussed how the project establishes an actionable framework for energy and industrial transition that can inspire and guide the revival of other industrial areas.

Finally, MIT professor of architecture and urbanism and project leader Rafi Segal presented the team’s Daniel Garza neighborhood case study, which highlighted two replicable urban planning and community clean energy project designs resulting from work by MIT and UNAM researchers.

“The most impactful aspect of ‘Decarbonize and Revitalize’ is its ability to merge energy transition with urban regeneration at the neighborhood scale. The project does not fit neatly into a single disciplinary category; it operates at the intersection of energy, design, and social infrastructure,” says Daniela Martinez Chapa, a former MIT student and an architect and urban designer who served as research assistant on the MIT team. “The project exemplifies MIT’s commitment to collaborative, context-specific innovation,” she adds.

Like others involved with the Mexico City Initiative, UNAM’s Tudela pointed out how working across disciplines, institutions, and borders has benefited both UNAM and MIT.

“MIT brings cutting-edge tools and methodologies in fields such as energy and urban data science, while UNAM contributes deep local expertise, strong social perspectives, and long-standing engagement with communities,” Tudela says. “This combination has produced highly creative, context-sensitive outcomes.”

As for next steps, Williams is hopeful that conversations started at this fall’s symposium might push the team’s research into the local limelight, helping them go from research and strategies to on-the-ground reality. She pointed to the success of an earlier LCAU Mexico City project as an example of what can happen when the right ideas and stakeholders coalesce.

For the 2022 Mextropoli Architecture and City Festival in Mexico City, an MIT team presented “Sueños con Fiber/Timber, Earth/Concrete.”

“As part of that project, we took a decommissioned roller coaster and reused it as a public forum space. And so that was talking about reuse of wood and making sure that building materials are reused in unique ways,” Williams says.

Adjacent to the repurposed roller coaster, Caitlin Mueller, an associate professor in MIT’s departments of Architecture and Civil and Environmental Engineering, built a structure made of 3D printed bricks that capture the traditional style of Mexican construction, but with a fraction of the carbon footprint. Mueller has since taken the Sueños project further, co-founding a design and technology company (Forma Systems) focused on expanding access to high-quality, low-carbon affordable housing and building systems by reimagining widely available materials such as concrete and earth.

“Caitlin’s project with the bricks is just such a good example of what the Cities Initiative can do. We seeded collaborative research, and now there’s a startup based off the idea, and they are continuing to do the work,” Williams says. “I think that’s the idea — we help to fund research that combines deep local knowledge and MIT’s innovation environment to help inspire new ideas and technologies for cities.

“I would hope these new projects just presented in Mexico would have a similar trajectory,” she says. “The future is open.”

Hacking Wheelchairs over Bluetooth

Schneier on Security - Wed, 01/14/2026 - 2:22pm

Researchers have demonstrated remotely controlling a wheelchair over Bluetooth. CISA has issued an advisory.

CISA said the WHILL wheelchairs did not enforce authentication for Bluetooth connections, allowing an attacker who is in Bluetooth range of the targeted device to pair with it. The attacker could then control the wheelchair’s movements, override speed restrictions, and manipulate configuration profiles, all without requiring credentials or user interaction.

So, You’ve Hit an Age Gate. What Now?

EFF: Updates - Wed, 01/14/2026 - 12:08pm

This blog also appears in our Age Verification Resource Hub: our one-stop shop for users seeking to understand what age-gating laws actually do, what’s at stake, how to protect yourself, and why EFF opposes all forms of age verification mandates. Head to EFF.org/Age to explore our resources and join us in the fight for a free, open, private, and yes—safe—internet.

EFF is against age gating and age verification mandates, and we hope we’ll win in getting existing ones overturned and new ones prevented. But mandates are already in effect, and every day many people are asked to verify their age across the web, despite prominent cases of sensitive data getting leaked in the process.

At some point, you may have been faced with the decision yourself: should I continue to use this service if I have to verify my age? And if so, how can I do that with the least risk to my personal information? This is our guide to navigating those decisions, with information on what questions to ask about the age verification options you’re presented with, and answers to those questions for some of the top most popular social media sites. Even though there’s no way to implement mandated age gates in a way that fully protects speech and privacy rights, our goal here is to help you minimize the infringement of your rights as you manage this awful situation.

Follow the Data

Since we know that leaks happen despite the best efforts of software engineers, we generally recommend submitting the absolute least amount of data possible. Unfortunately, that’s not going to be possible for everyone. Even facial age estimation solutions where pictures of your face never leave your device, offering some protection against data leakage, are not a good option for all users: facial age estimation works less well for people of color, trans and nonbinary people, and people with disabilities. There are some systems that use fancy cryptography so that a digital ID saved to your device won’t tell the website anything more than if you meet the age requirement, but access to that digital ID isn’t available to everyone or for all platforms. You may also not want to register for a digital ID and save it to your phone, if you don’t want to take the chance of all the information on it being exposed upon request of an over-zealous verifier, or you simply don’t want to be a part of a digital ID system

If you’re given the option of selecting a verification method and are deciding which to use, we recommend considering the following questions for each process allowed by each vendor:

    • Data: What info does each method require?
    • Access: Who can see the data during the course of the verification process?
    • Retention: Who will hold onto that data after the verification process, and for how long?
    • Audits: How sure are we that the stated claims will happen in practice? For example, are there external audits confirming that data is not accidentally leaked to another site along the way? Ideally these will be in-depth, security-focused audits by specialized auditors like NCC Group or Trail of Bits, instead of audits that merely certify adherence to standards. 
    • Visibility: Who will be aware that you’re attempting to verify your age, and will they know which platform you’re trying to verify for?

We attempt to provide answers to these questions below. To begin, there are two major factors to consider when answering these questions: the tools each platform uses, and the overall system those tools are part of.

In general, most platforms offer age estimation options like face scans as a first line of age assurance. These vary in intrusiveness, but their main problem is inaccuracy, particularly for marginalized users. Third-party age verification vendors Private ID and k-ID offer on-device facial age estimation, but another common vendor, Yoti, sends the image to their servers during age checks by some of the biggest platforms. This risks leaking the images themselves, and also the fact that you’re using that particular website, to the third party. 

Then, there’s the document-based verification services, which require you to submit a hard identifier like a government-issued ID. This method thus requires you to prove both your age and your identity. A platform can do this in-house through a designated dataflow, or by sending that data to a third party. We’ve already seen examples of how this can fail. For example, Discord routed users' ID data through its general customer service workflow so that a third-party vendor could perform manual review of verification appeals. No one involved ever deleted users' data, so when the system was breached, Discord had to apologize for the catastrophic disclosure of nearly 70,000 photos of users' ID documents. Overly long retention periods expose documents to risk of breaches and historical data requests. Some document verifiers have retention periods that are needlessly long. This is the case with Incode, which provides ID verification for Tiktok. Incode holds onto images forever by default, though TikTok should automatically start the deletion process on your behalf.

Some platforms offer alternatives, like proving that you own a credit card, or asking for your email to check if it appears in databases associated with adulthood (like home mortgage databases). These tend to involve less risk when it comes to the sensitivity of the data itself, especially since credit cards can be replaced, but in general still undermine anonymity and pseudonymity and pose a risk of tracking your online activity. We’d prefer to see more assurances across the board about how information is handled.

Each site offers users a menu of age assurance options to choose from. We’ve chosen to present these options in the rough order that we expect most people to prefer. Jump directly to a platform to learn more about its age checks:

Meta – Facebook, Instagram, WhatsApp, Messenger, Threads Inferred Age

If Meta can guess your age, you may never even see an age verification screen. Meta, which runs Facebook, Threads, Instagram, Messenger, and WhatsApp, first tries to use information you’ve posted to guess your age, like looking at “Happy birthday!” messages. It’s a creepy reminder that they already have quite a lot of information about you.

If Meta cannot guess your age, or if Meta infers you're too young, it will next ask you to verify your age using either facial age estimation, or by uploading your photo ID. 

Face Scan

If you choose to use facial age estimation, you’ll be sent to Yoti, a third-party verification service. Your photo will be uploaded to their servers during this process. Yoti claims that “as soon as an age has been estimated, the facial image is immediately and permanently deleted.” Though it’s not as good as not having that data in the first place, Yoti’s security measures include a bug bounty program and annual penetration testing. Researchers from Mint Secure found that Yoti’s app and website are filled with trackers, so the fact that you’re verifying your age could be not only shared to Yoti, but leaked to third-party data brokers as well. 

You may not want to use this option if you’re worried about third parties potentially being able to know you’re trying to verify your age with Meta. You also might not want to use this if you’re worried about a current picture of your face accidentally leaking—for example, if elements in the background of your selfie might reveal your current location. On the other hand, if you consider a selfie to be less sensitive than a photograph of your ID, this option might be better. If you do choose (or are forced to) use the face check system, be sure to snap your selfie without anything you'd be concerned with identifying your location or embarrassing you in the background in case the image leaks.

Upload ID

If Yoti’s age estimation decides your face looks too young, or if you opt out of facial age estimation, your next recourse is to send Meta a photo of your ID. Meta sends that photo to Yoti to verify the ID. Meta says it will hold onto that ID image for 30 days, then delete it. Meanwhile, Yoti claims it will delete the image immediately after verification. Of course, bugs and process oversights exist, such as accidentally replicating information in logs or support queues, but at least they have stated processes. Your ID contains sensitive information such as your full legal name and home address. Using this option not only runs the (hopefully small, but never nonexistent) risk of that data getting leaked through errors or hacking, but it also lets Meta see the information needed to tie your profile to your identity—which you may not want. If you don’t want Meta to know your name and where you live, or rely on both Meta and Yoti to keep to their deletion promises, this option may not be right for you.

Google – Gmail, YouTube  Inferred Age

If Google can guess your age, you may never even see an age verification screen. Your Google account is typically connected to your YouTube account, so if (like mine) your YouTube account is old enough to vote, you may not need to verify your Google account at all. Google first uses information it already knows to try to guess your age, like how long you’ve had the account and your YouTube viewing habits. It’s yet another creepy reminder of how much information these corporations have on you, but at least in this case they aren’t likely to ask for even more identifying data.

If Google cannot guess your age, or decides you're too young, Google will next ask you to verify your age. You’ll be given a variety of options for how to do so, with availability that will depend on your location and your age.

Google’s methods to assure your age include ID verification, facial age estimation, verification by proxy, and digital ID. To prove you’re over 18, you may be able to use facial age estimation, give Google your credit card information, or tell a third-party provider your email address.

Face Scan

If you choose to use facial age estimation, you’ll be sent to a website run by Private ID, a third-party verification service. The website will load Private ID’s verifier within the page—this means that your selfie will be checked without any images leaving your device. If the system decides you’re over 18, it will let Google know that, and only that. Of course, no technology is perfect—should Private ID be mandated to target you specifically, there’s nothing to stop it from sending down code that does in fact upload your image, and you probably won’t notice. But unless your threat model includes being specifically targeted by a state actor or Private ID, that’s unlikely to be something you need to worry about. For most people, no one else will see your image during this process. Private ID will, however, be told that your device is trying to verify your age with Google and Google will still find out if Private ID thinks that you’re under 18.

If Private ID’s age estimation decides your face looks too young, you may next be able to decide if you’d rather let Google verify your age by giving it your credit card information, photo ID, or digital ID, or by letting Google send your email address to a third-party verifier.

Email Usage

If you choose to provide your email address, Google sends it on to a company called VerifyMy. VerifyMy will use your email address to see if you’ve done things like get a mortgage or paid for utilities using that email address. If you use Gmail as your email provider, this may be a privacy-protective option with respect to Google, as Google will then already know the email address associated with the account. But it does tell VerifyMy and its third-party partners that the person behind this email address is looking to verify their age, which you may not want them to know. VerifyMy uses “proprietary algorithms and external data sources” that involve sending your email address to “trusted third parties, such as data aggregators.” It claims to “ensure that such third parties are contractually bound to meet these requirements,” but you’ll have to trust it on that one—we haven’t seen any mention of who those parties are, so you’ll have no way to check up on their practices and security. On the bright side, VerifyMy and its partners do claim to delete your information as soon as the check is completed.

Credit Card Verification

If you choose to let Google use your credit card information, you’ll be asked to set up a Google Payments account. Note that debit cards won’t be accepted, since it’s much easier for many debit cards to be issued to people under 18. Google will then charge a small amount to the card, and refund it once it goes through. If you choose this method, you’ll have to tell Google your credit card info, but the fact that it’s done through Google Payments (their regular card-processing system) means that at least your credit card information won’t be sitting around in some unsecured system. Even if your credit card information happens to accidentally be leaked, this is a relatively low-risk option, since credit cards come with solid fraud protection. If your credit card info gets leaked, you should easily be able to dispute fraudulent charges and replace the card.

Digital ID

If the option is available to you, you may be able to use your digital ID to verify your age with Google. In some regions, you’ll be given the option to use your digital ID. In some cases, it’s possible to only reveal your age information when you use a digital ID. If you’re given that choice, it can be a good privacy-preserving option. Depending on the implementation, there’s a chance that the verification step will “phone home” to the ID provider (usually a government) to let them know the service asked for your age. It’s a complicated and varied topic that you can learn more about by visiting EFF’s page on digital identity.

Upload ID

Should none of these options work for you, your final recourse is to send Google a photo of your ID. Here, you’ll be asked to take a photo of an acceptable ID and send it to Google. Though the help page only states that your ID “will be stored securely,” the verification process page says ID “will be deleted after your date of birth is successfully verified.” Acceptable IDs vary by country, but are generally government-issued photo IDs. We like that it’s deleted immediately, though we have questions about what Google means when it says your ID will be used to “improve [its] verification services for Google products and protect against fraud and abuse.” No system is perfect, and we can only hope that Google schedules outside audits regularly.

TikTok Inferred Age

If TikTok can guess your age, you may never even see an age verification notification. TikTok first tries to use information you’ve posted to estimate your age, looking through your videos and photos to analyze your face and listen to your voice. By uploading any videos, TikTok believes you’ve given it consent to try to guess how old you look and sound.

If TikTok decides you’re too young, appeal to revoke their age decision before the deadline passes. If TikTok cannot guess your age, or decides you're too young, it will automatically revoke your access based on age—including either restricting features or deleting your account. To get your access and account back, you’ll have a limited amount of time to verify your age. As soon as you see the notification that your account is restricted, you’ll want to act fast because in some places you’ll have as little as 23 days before the deadline passes.

When you get that notification, you’re given various options to verify your age based on your location.

Face Scan

If you’re given the option to use facial age estimation, you’ll be sent to Yoti, a third-party verification service. Your photo will be uploaded to their servers during this process. Yoti claims that “as soon as an age has been estimated, the facial image is immediately and permanently deleted.” Though it’s not as good as not having that data in the first place, Yoti’s security measures include a bug bounty program and annual penetration testing. However, researchers from Mint Secure found that Yoti’s app and website are filled with trackers, so the fact that you’re verifying your age could be leaked not only to Yoti, but to third-party data brokers as well.

You may not want to use this option if you’re worried about third parties potentially being able to know you’re trying to verify your age with TikTok. You also might not want to use this if you’re worried about a current picture of your face accidentally leaking—for example, if elements in the background of your selfie might reveal your current location. On the other hand, if you consider a selfie to be less sensitive than a photograph of your ID or your credit card information, this option might be better. If you do choose (or are forced to) use the face check system, be sure to snap your selfie without anything you'd be concerned with identifying your location or embarrassing you in the background in case the image leaks.

Credit Card Verification

If you have a credit card in your name, TikTok will accept that as proof that you’re over 18. Note that debit cards won’t be accepted, since it’s much easier for many debit cards to be issued to people under 18. TikTok will charge a small amount to the credit card, and refund it once it goes through. It’s unclear if this goes through their regular payment process, or if your credit card information will be sent through and stored in a separate, less secure system. Luckily, these days credit cards come with solid fraud protection, so if your credit card gets leaked, you should easily be able to dispute fraudulent charges and replace the card. That said, we’d rather TikTok provide assurances that the information will be processed securely.

Credit Card Verification of a Parent or Guardian

Sometimes, if you’re between 13 and 17, you’ll be given the option to let your parent or guardian confirm your age. You’ll tell TikTok their email address, and TikTok will send your parent or guardian an email asking them (a) to confirm your date of birth, and (b) to verify their own age by proving that they own a valid credit card. This option doesn’t always seem to be offered, and in the one case we could find, it’s possible that TikTok never followed up with the parent. So it’s unclear how or if TikTok verifies that the adult whose email you provide is your parent or guardian. If you want to use credit card verification but you’re not old enough to have a credit card, and you’re ok with letting an adult know you use TikTok, this option may be reasonable to try.

Photo with a Random Adult?

Bizarrely, if you’re between 13 and 17, TikTok claims to offer the option to take a photo with literally any random adult to confirm your age. Its help page says that any trusted adult over 25 can be chosen, as long as they’re holding a piece of paper with the code on it that TikTok provides. It also mentions that a third-party provider is used here, but doesn’t say which one. We haven’t found any evidence of this verification method being offered. Please do let us know if you’ve used this method to verify your age on TikTok!

Photo ID and Face Comparison

If you aren’t offered or have failed the other options, you’ll have to verify your age by submitting a copy of your ID and matching photo of your face. You’ll be sent to Incode, a third-party verification service. In a disappointing failure to meet the industry standard, Incode itself doesn’t automatically delete the data you give it once the process is complete, but TikTok does claim to “start the process to delete the information you submitted,” which should include telling Incode to delete your data once the process is done. If you want to be sure, you can ask Incode to delete that data yourself. Incode tells TikTok that you met the age threshold without providing your exact date of birth, but then TikTok wants to know the exact date anyway, so it’ll ask for your date of birth even after your age has been verified.

TikTok itself might not see your actual ID depending on its implementation choices, but Incode will. Your ID contains sensitive information such as your full legal name and home address. Using this option not only runs the (hopefully small, but never nonexistent) risk of that data getting accidentally leaked through errors or hacking. If you don’t want TikTok or Incode to know your name, what you look like, and where you live—or if you don't want to rely on both TikTok and Incode to keep to their deletion promises—then this option may not be right for you.

Everywhere Else

We’ve covered the major providers here, but age verification is unfortunately being required of many other services that you might use as well. While the providers and processes may vary, the same general principles will apply. If you’re trying to choose what information to provide to continue to use a service, consider the “follow the data” questions mentioned above, and try to find out how the company will store and process the data you give it. The less sensitive information, the fewer people have access to it, and the more quickly it will be deleted, the better. You may even come to recognize popular names in the age verification industry: Spotify and OnlyFans use Yoti (just like Meta and Tiktok), Quora and Discord use k-ID, and so on. 

Unfortunately, it should be clear by now that none of the age verification options are perfect in terms of protecting information, providing access to everyone, and safely handling sensitive data. That’s just one of the reasons that EFF is against age-gating mandates, and is working to stop and overturn them across the United States and around the world.


Join EFF


Help protect digital privacy & free speech for everyone.

Upcoming Speaking Engagements

Schneier on Security - Wed, 01/14/2026 - 12:00pm

This is a current list of where and when I am scheduled to speak:

Pages