{"id":15861,"date":"2026-02-19T10:36:29","date_gmt":"2026-02-19T17:36:29","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=15861"},"modified":"2026-02-19T10:36:29","modified_gmt":"2026-02-19T17:36:29","slug":"hackers-expose-age-verification-software-powering-surveillance-web","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2026\/02\/19\/hackers-expose-age-verification-software-powering-surveillance-web\/","title":{"rendered":"Hackers Expose Age-Verification Software Powering Surveillance Web"},"content":{"rendered":"\n<p>It&#8217;s worth pointing out that Discord has been used for some of the more recent color revolution attempts around the world, so think CIA and US government. Now we see Discord were going to use Persona, linked to Peter Thiel who is heavily connected to western governments with Palantir&#8230; If a lot of the details below are accurate, it paints a disturbing picture of the coming digital Panopticon and how problem people will be locked out. And development is perhaps farther along than people realize.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.therage.co\/persona-age-verification\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.therage.co\/persona-age-verification\/<\/a><\/p>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_36352fb1-4ca0-4845-bfdf-8dd931ccd75c\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<h5 class=\"wp-block-heading\">Three hacktivists tried to find a workaround to Discord\u2019s age-verification software. Instead, they found its frontend exposed to the open internet.<\/h5>\n\n\n\n<p>By L0la L33tz<\/p>\n\n\n\n<p>Ten days ago, the social chat app Discord <a href=\"https:\/\/discord.com\/press-releases\/discord-launches-teen-by-default-settings-globally\" target=\"_blank\" rel=\"noreferrer noopener\"><u>announced<\/u><\/a> that it would launch \u201cteen-by-default\u201d settings for its global audience. As part of this update, all new and existing users worldwide will have a teen-appropriate experience, with updated communication settings, restricted access to age-gated spaces, and content filtering that preserves privacy and meaningful connections, the platform said.<\/p>\n\n\n\n<p>This, of course, means that to use Discord the way you are used to, you\u2019ll have to let it scan your face, and the internet wasn\u2019t happy. Many communities quickly announced their move to other platforms. Others, like the security researcher Celeste, who goes by the <a href=\"https:\/\/x.com\/vmfunc\" rel=\"noreferrer noopener\" target=\"_blank\">handle<\/a> vmfunc, were convinced there would be a workaround.&nbsp;<\/p>\n\n\n\n<p>Together with two other researchers, they set out to look into Persona, the San Francisco-based startup that\u2019s used by Discord for biometric identity verification \u2013 and found a Persona frontend exposed to the open internet on a US government authorized server.<\/p>\n\n\n\n<p>In 2,456 publicly accessible files, the code <a href=\"https:\/\/vmfunc.re\/blog\/persona\" target=\"_blank\" rel=\"noreferrer noopener\"><u>revealed<\/u><\/a> the extensive surveillance Persona software performs on its users, bundled in an interface that pairs facial recognition with financial reporting \u2013 and a parallel implementation that appears designed to serve federal agencies. On Monday, Discord <a href=\"https:\/\/redact.dev\/blog\/discord-persona-age-verification-experiment\" target=\"_blank\" rel=\"noreferrer noopener\"><u>stated<\/u><\/a> that it will not be proceeding with Persona for identity verification.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.therage.co\/content\/images\/2026\/02\/the-rage-persona-dashboard-1-1.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\">Screengrab of Persona&#8217;s exposed interface displaying a US government systems notification. <a href=\"https:\/\/vmfunc.re\/blog\/persona\" rel=\"noreferrer noopener\" target=\"_blank\">source<\/a><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"persona-beyond-age-verification\">Persona, Beyond Age Verification<\/h2>\n\n\n\n<p>Persona Identity, Inc. is a Peter Thiel-backed venture that offers Know Your Customer (KYC) and Anti-Money Laundering (AML) solutions that leverage biometric identity checks to estimate a user\u2019s age that use a proprietary \u201cliveliness check\u201d meant to distinguish between real people and AI-generated identities. At a $2 billion <a href=\"https:\/\/vcnewsdaily.com\/persona\/venture-capital-funding\/vbxfnzhjvl\" target=\"_blank\" rel=\"noreferrer noopener\"><u>valuation<\/u><\/a>, Persona powers identity verification processes for the likes of OpenAI, Roblox, Heritage Bank, and the ride-sharing service Lime.&nbsp;<\/p>\n\n\n\n<p>Persona feeds on a growing trend of age-verification legislation that is making its way around the world. From the EU\u2019s Chat Control to the UK\u2019s Online Safety Act and the KOSA and EARN IT Acts proposed in the US, governments argue that as long as we can verify anyone\u2019s age on the World Wide Web, we can keep children safe from the dangers of free information. This, it seems, is far from true.<\/p>\n\n\n\n<p>Beyond offering simple services to estimate your age, Persona\u2019s exposed code compares your selfie to watchlist photos using facial recognition, screens you against 14 categories of adverse media from mentions of terrorism to espionage, and tags reports with codenames from active intelligence programs consisting of public-private partnerships to combat online child exploitative material, cannabis trafficking, fentanyl trafficking, romance fraud, money laundering, and illegal wildlife trade.<\/p>\n\n\n\n<p>Once a user verifies their identity with Persona, the software performs 269 distinct verification checks and scours the internet and government sources for potential matches, such as by matching your face to politically exposed persons (PEPs), and generating risk and similarity scores for each individual. IP addresses, browser fingerprints, device fingerprints, government ID numbers, phone numbers, names, faces, and even selfie backgrounds are analyzed and retained for up to three years.<\/p>\n\n\n\n<p>The information the software evaluates on the images themselves includes \u201cSelfie Suspicious Entity Detection,\u201d a \u201cSelfie Age Inconsistency Comparison,\u201d similar background detection, which appears to be matched to other users in the database, and a \u201cSelfie Pose Repeated Detection,\u201d which seems to be used to determine whether you are using the same pose as in previous pictures.<\/p>\n\n\n\n<p>In short, the software \u201cflags you as a \u2018suspicious entity\u2019 based on your face alone,\u201d the researchers write. An act that may prove dangerous, as Persona\u2019s software has <a href=\"https:\/\/archive.ph\/YEx3E\" target=\"_blank\" rel=\"noreferrer noopener\"><u>reportedly<\/u><\/a> made significant mistakes when attempting to estimate the age of users in the past. When paired with AML reporting, such suspicious analysis can quickly <a href=\"https:\/\/www.cato.org\/blog\/how-suspicious-activity-can-get-you-debanked\" target=\"_blank\" rel=\"noreferrer noopener\"><u>lead<\/u><\/a> to the unjust termination of bank accounts. And that seems to be exactly what Persona was built to do.<\/p>\n\n\n\n<p>In addition to facial recognition, Persona\u2019s software is able to perform checks on financial data \u2014 including running checks on sanctions lists, running checks on cryptocurrency activity via the blockchain analysis firms Chainalysis and TRM Labs, and an interface to file suspicious activity reports (SARs) directly with US and Canadian federal agencies.<\/p>\n\n\n\n<p>It\u2019s nothing spectacular for a KYC\/AML program, but it marks a <a href=\"https:\/\/therage.co\/banks-aml-inefficient-access-to-social-media\/\" rel=\"noreferrer noopener\" target=\"_blank\">growing trend<\/a> in AML compliance where financial service providers increasingly utilize AI features, such as automated social media screening, to determine risk scores for their customers. This carries inherent risks of discrimination based on factors such as race or political affiliation.<\/p>\n\n\n\n<p>Identity verification efforts like these mislead people into thinking you\u2019re more protected. On the contrary, Celeste tells The Rage, \u201cyou&#8217;re making the internet less safe, not safer.\u201d \u201cNormies\u201d, they say, \u201cwon\u2019t be able to bypass these,\u201d while less benevolent people \u201cwill always find ways to exploit your system.\u201d&nbsp;<\/p>\n\n\n\n<p>Computer scientists have long sounded the alarm that a central database of thousands of ID documents will always be a lucrative target for attackers. Just last year, 70,000 ID photos were <a href=\"https:\/\/www.theguardian.com\/media\/2025\/oct\/09\/hack-age-verification-firm-discord-users-id-photos\" target=\"_blank\" rel=\"noreferrer noopener\"><u>stolen<\/u><\/a> from Discord and held at ransom. Every week, a <a href=\"https:\/\/archive.ph\/yjy7W\" target=\"_blank\" rel=\"noreferrer noopener\"><u>new leak<\/u><\/a> places people at the risk of identity theft.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"a-wake-up-call\">A Wake Up Call<\/h2>\n\n\n\n<p>At best, Persona can be used to create comprehensive surveillance graphs of users for the companies it serves, the researchers say. At worst, the software could file automated reports directly with the government.<\/p>\n\n\n\n<p>The exposed code, which has now been removed, sat at a US government authorized endpoint that appears to have been isolated from its regular work environment, according to the researchers. It is unusual for such a program to sit on dedicated infrastructure, and not on Cloudflare or Persona\u2019s shared systems, the researchers say.<\/p>\n\n\n\n<p>\u201cYou do this when the data requires compartmentalization. When the compliance requirements for the data you\u2019re collecting, demand that level of isolation. When the damage of a breach is bad enough to warrant dedicated infrastructure,\u201d the researchers say.<\/p>\n\n\n\n<p>From the publicly exposed domain, titled \u201copenai-watchlistdb.withpersona.com,\u201d which appears to query identity verification requests on an OpenAI database, the researchers found a FedRAMP-authorized parallel implementation of the software called \u201cwithpersona-gov.com.\u201d&nbsp;<\/p>\n\n\n\n<p>FedRAMP, or the Federal Risk and Authorization Management Program, is a United States federal government-wide compliance program founded in 2011 that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.&nbsp;<\/p>\n\n\n\n<p>The program, according to the researchers, performs product analytics and user behavior tracking on a government identity-verification platform, provides real-time user monitoring \u2014 every click, every page load \u2014 on a FedRAMP platform processing PII and biometrics, and includes financial identity-verification capabilities on the government platform. All of these features, the researchers note, may also be available in the implementation used by OpenAI, though no direct feedback between the two platforms could be determined.<\/p>\n\n\n\n<p>The difference seems to be that OpenAI may have created an internal database for Persona identity checks that spans all OpenAI users via its internal watchlistdb. \u201cThey quickly used this opportunity to go from comparing users against a single federal watchlist, to creating the watchlist of all users themselves,\u201d the researchers write, noting that this is not necessarily a new development. Persona\u2019s CEO has since personally reached out to the researchers, but the watchlist has not been addressed, says Celeste.<\/p>\n\n\n\n<p>The government implementation, on the other hand, features data that is served by an ONYX deployment \u2014 a mere coincidence in name, or a potential link to <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2025\/09\/18\/ice-spends-millions-on-social-media-spy-tech-banned-by-meta-facebook\/#:~:text=Fivecast%20Onyx%2C%20which%20claims%20to%20use%20AI%20to%20turbocharge%20open%20source%20intelligence.%20That%E2%80%99s%20part%20of%20a%20%244.1%20million%20contract%20signed%20in%202023%20under%20the%20Biden%20administration\" target=\"_blank\" rel=\"noreferrer noopener\"><u>Fivecast ONYX<\/u><\/a>, as the researchers point out \u2014 an AI-powered \u201copen source\u201d surveillance platform purchased by ICE for $4.2 million in 2023, the same year that Persona\u2019s now exposed service first came online.<\/p>\n\n\n\n<p>Fivecast ONYX offers the automated collection of multimedia data from social media and the dark web, the building of \u201cdigital footprints\u201d from biographical data, and can track shifts in sentiment and emotion, assign risk scores, search across 300+ platforms and 28+ billion data points, and identify people with \u201cviolent tendencies.\u201d Just like Persona, Fivecast ONYX specifically <a href=\"https:\/\/www.fivecast.com\/industry-segments\/financial-crime\/the-power-of-osint-for-kyc-and-aml-investigations\/\" target=\"_blank\" rel=\"noreferrer noopener\"><u>sells<\/u><\/a> its services for KYC\/AML to financial institutions.<\/p>\n\n\n\n<p>The researchers note that no direct link to a Fivecast ONYX implementation could be found. Persona Identity, Inc. does not appear to hold government procurement contracts at this time.<\/p>\n\n\n\n<p>The entire service appears to be powered by an OpenAI chatbot that runs on the same government platform that handles SARs, facial biometrics, and watchlist screening \u2014 operators using AI chat assistance while reviewing suspicious activity reports and facial recognition matches, the researchers say. \u201cThe code doesn\u2019t show PII flowing to OpenAI but honestly the questions about what context the copilot has access to are worth asking.\u201d&nbsp;<\/p>\n\n\n\n<p>The researchers hope that their findings will serve as a wake up call. \u201cThe internet was supposed to be the great equalizer. Information wants to be free, the network interprets censorship as damage and routes around it, all that beautiful optimism. And for a minute it was true,\u201d Celeste tells The Rage.<\/p>\n\n\n\n<p>But with surveillance capitalism as the default business model, \u201cthey took the most powerful communication technology in human history and turned it into a slot machine that makes you sad. We&#8217;re all rats in a skinner box pressing the lever for pellets of validation.\u201d<\/p>\n\n\n\n<p>\u201cThe state wants to see everything. The corporations want to see everything. And they&#8217;ve learned to work together.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s worth pointing out that Discord has been used for some of the more recent color revolution attempts around the world, so think CIA and US government. Now we see Discord were going to use Persona, linked to Peter Thiel who is heavily connected to western governments with Palantir&#8230; If a lot of the details [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,7],"tags":[],"class_list":["post-15861","post","type-post","status-publish","format-standard","hentry","category-tech","category-world"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/15861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=15861"}],"version-history":[{"count":1,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/15861\/revisions"}],"predecessor-version":[{"id":15862,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/15861\/revisions\/15862"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=15861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=15861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=15861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}