19 Dec 2025
Planet Mozilla
Mozilla Privacy Blog: Behind the Manifesto: Moments that Mattered in our Fight for the Open Web (2025)
Welcome to the blog series "Behind the Manifesto," where we unpack core issues that are critical to Mozilla's mission. The Mozilla Manifesto represents our commitment to advancing an open, global internet that gives people meaningful choice in their online experiences, promotes transparency and innovation and protects the public interest over private walled gardens. This blog series digs deeper on our vision for the web and the people who use it and how these goals are advanced in policymaking and technology.
In 2025, global tech policy raced to keep up with technological change and opportunity. In the midst of this evolution, Mozilla sought to ensure that solutions remained centered on openness, competition and user agency.
From AI Agents and the future of the open web to watershed antitrust cases, competition debates surged. Efforts to drive leadership and innovation in AI led governments across the globe to evaluate priorities. Perennial privacy and security questions remained on the radar, with US states intensifying efforts to pass laws and the EU working to streamline rules on AI, cybersecurity and data. Debates amongst industry, civil society and policymakers reflected the intensity of these moments.
Just as we have for over 20 years, Mozilla showed up to build, convene, debate and advocate. It's clear that more than ever, there must be urgency to truly put people first. Below are a selection of some key moments we're reflecting on, as we head into 2026.
FEBRUARY 2025
Mozilla Participates in Paris AI Action Summit as Part of the Steering Committee
Mozilla participated in the Paris AI Action Summit as Part of the Steering Committee with an 'action packed' schedule that included appearances on panels, a live recording of the podcast "Computer Says Maybe" and a reception to reflect on discussions and thank all the officials and researchers who had worked so hard to make the Summit a success.
Additionally, Mozilla and other partners, including Hugging Face, Microsoft and OpenAI, launched Robust Open Online Safety Tools (ROOST) at the Paris AI Action Summit. The entity is designed to create open source foundations for safer and more responsible AI development, ensuring that safety and transparency remain central to innovation.
The launch of ROOST happened at exactly the right time and in the right place. The Paris AI Action Summit provided a global backdrop for launching work that will ultimately help make AI safety a field that everyone can shape and improve.
Mozilla Event: AI & Competition featuring the President of the German Competition Authority
On February 12, we hosted a public event in Berlin on AI & competition, in partnership with German daily newspaper Tagesspiegel. Addressing the real risk of market concentration at various elements of the AI stack, the President of the German competition authority (Bundeskartellamt), Andreas Mundt, delivered a keynote address setting out his analysis of competition in AI and the role of his authority in ensuring contestable markets as technology rapidly evolves.
MARCH 2025
America's AI Action Plan
In March, Mozilla responded to the White House's request for information on AI policy, urging policymakers to ensure that AI remained open, competitive and accountable. The comments also warned that concentrated control by a few tech giants threatened innovation and public trust, and called for stronger support of open source AI, public AI infrastructure, transparent energy use and workforce development. Mozilla underscored these frameworks are essential to building an AI ecosystem that serves the public interest rather than purely corporate bottom lines.
Mozilla Mornings: Promoting a privacy-preserving online ads ecosystem
The same month, we also hosted a special edition of Mozilla Mornings focused on the future of online advertising and the role Privacy-Enhancing Technologies (PETs) can play in reshaping it. The conversation came at a critical moment in Europe, amidst discussions on updating privacy legislation while enforcing existing rules.
The session brought together policymakers, technologists, and civil-society experts to examine how Europe can move toward a fairer and more privacy-respecting advertising ecosystem. Speakers explored the limitations of today's surveillance-driven model and outlined how PETs and Privacy-Preserving Technologies (PPTs) could offer a viable alternative that protects users while sustaining the economic foundations of the open web. The event underscored Mozilla's commitment to advancing privacy-respecting technologies and ensuring that both policy and technical design converge toward a healthier online advertising ecosystem.
MAY 2025
CPDP: The Evolution of PETs in Digital Ads
At the Brussels 2025 International CPDP Conference, Mozilla organized and participated in a panel titled "The Evolution of PETs in Digital Ads: Genuine Privacy Innovation or Market Power Play?" The discussion explored how Privacy-Enhancing Technologies (PETs) - tools designed to minimize data collection and protect user privacy - are reshaping the digital advertising landscape. Panelists debated how to encourage genuine privacy innovation without reinforcing existing power structures, and how regulations like the GDPR and the Digital Markets Act (DMA) can help ensure PETs foster transparency and competition.
Competition in Focus: U.S. vs Google
The U.S. v. Google remedies trial was a defining moment - not just for 2025, but for the future of browser and search competition. While the remedies phase was about creating competition in the search market, some of the proposed remedies risked weakening independent browsers like Firefox, the very players that make real choice possible.
In early May, Mozilla's CFO, Eric Muhlheim, testified to this very point. Muhlheim's testimony, and Mozilla's amicus brief in the case, spoke to the vital role of small, independent browsers in driving competition and innovation across the web and warned about the risks of harming their ability to select the search default that best serves their users. Ensuring a competitive search ecosystem while avoiding harm to browser competition remains an important issue in 2026.
JUNE 2025
Open by Design: How Nations Can Compete in the Age of AI
The choices governments make today, about who gets to build, access and benefit from AI, will shape economic competitiveness, national security and digital rights for decades. In June, Mozilla supported a new report by the UK think tank Demos, exploring how and why embracing openness in key AI resources can spur innovation and adoption. Enabling safer, more transparent development and boosting digital sovereignty is a recipe, if there ever was one, for 'winning' at AI.
EU Digital Summit: Advocating for Open and Secure Digital Ecosystems
Digital competitiveness depends on open, secure, and interoperable ecosystems that foster innovation while respecting users' rights. We spoke at the 2025 European Digital Summit-a flagship forum bringing together policymakers, regulators, industry leaders, and civil society-and argued that openness and security reinforce each other, that smart regulation has the potential to lower entry barriers and curb gatekeeping power, and that innovation does not require sacrificing privacy when incentives are aligned toward rights-respecting designs. The takeaway was clear: enforcing interoperability, safeguarding pro-competition rules, and embedding privacy-by-design incentives are essential to a resilient, innovative, and trustworthy open web.
JULY 2025
Joint Letter to the UK Secretary of State on DMCCA
When choice disappears, innovation stalls. In July, Mozilla sent an open letter to UK Ministers and the Competition & Markets Authority to urge faster implementation of the UK Digital Markets, Competition & Consumers Act (DMCCA). As an organisation that exists to create an internet that is open and accessible to all, Mozilla has long supported competitive digital markets. Since the EU Digital Markets Act took effect in 2024, users have begun to benefit from genuine choice for the first time, with interventions like browser choice screens offering people browser choice. The result? People are choosing independent alternatives to gatekeepers defaults: Firefox daily active users on iOS rose by 150% across the EU. The UK's DMCCA could be similarly revolutionary for UK consumers and the many challenger businesses taking on market dominance.
SEPTEMBER 2025
Digital Bootcamp: Bringing Internet Architecture to the Heart of EU Policymaking
In September, Mozilla officially launched its Digital Bootcamp initiative, developed in partnership with Cloudflare, Proton and CENTR, to strengthen policymakers' understanding of how the internet actually works and why this technical foundation is essential for effective regulation. We delivered interactive sessions across EU institutions, including a workshop for Members of the European Parliament, the European Commission, and representatives of the EU member states.
Across these workshops, we demystified the layered architecture of the internet, explained how a single website request moves through the stack, and clarified which regulatory obligations apply at each layer. By bridging the gap between engineering and policymaking, Digital Bootcamp is helping ensure EU digital laws remain grounded in technical reality, supporting evidence-based decisions that protect innovation, security and the long-term health of the open web.
OCTOBER 2025
Mozilla Meetup: The Future of Competition
On October 8, Mozilla hosted a Meetup on Competition in Washington, D.C., bringing together leading voices in tech policy - including Alissa Cooper (Knight-Georgetown Institute), Amba Kak (AI Now Institute), Luke Hogg (Foundation for American Innovation) and Kush Amlani (Mozilla) - to discuss the future of browser competition, antitrust enforcement and AI's growing influence on the digital landscape. Moderated by Bloomberg's Leah Nylen, the event reinforced our ongoing efforts to establish a more open and competitive internet, highlighting how policy decisions in these areas directly shape user choice, innovation, and the long-term health of the open web.
Global Encryption Day
On October 21, Mozilla marked Global Encryption Day by reaffirming our commitment to strong encryption as a cornerstone of online privacy, security, and trust. For years, Mozilla has played an active role in shaping the broader policy debate on encryption by consistently pushing back against efforts to weaken it and working with partners around the world to safeguard the technology that helps to keep people secure online - from joining the Global Encryption Coalition Steering Committee, to challenging U.S. legislation like the EARN IT Act and leading multi-year efforts in the EU to address encryption risks in the eIDAS Regulation.
California's Opt Me Out Act: A Continuation of the Fight For Privacy
The passage of California's Opt Me Out Act (AB 566) marked a major step forward in Mozilla's ongoing effort to strengthen digital privacy and give users control of their personal data. For years, Mozilla has spoken in support of Global Privacy Control (GPC) - a tool already integrated into Firefox - as a model for privacy-by-design solutions that can be both effective and user-friendly.
NOVEMBER 2025
Mozilla Submits Recommendations on the Digital Fairness Act
In November, Mozilla submitted its response to the European Commission's consultation on the Digital Fairness Act (DFA), framing it as a key opportunity to modernise consumer protection for AI-driven and highly personalised digital services. Mozilla argued that effective safeguards must tackle both interface design and underlying system choices, prohibit harmful design practices, and set clear fairness standards for personalization and advertising. A well-designed DFA can complement existing EU laws, strengthen user autonomy, provide legal certainty for innovators, and support a more competitive digital ecosystem built on genuine user choice.
Mozilla hosts AI breakfast in UK Parliament
Mozilla President, Mark Surman, hosted MPs and Peers for a breakfast in Parliament to discuss how policymakers can nurture AI that supports public good. As AI policy moves from principle to implementation, the breakfast offered insight into the models, trade-offs and opportunities that will define the next phase of the UK's AI strategy.
DECEMBER 2025
Mozilla Joins Tech Leaders at US House AI Caucus Briefing
Internet Works, an association of "Middle Tech" companies, organized a briefing with the Congressional AI Caucus. The goal was to provide members of congress and their staff a better understanding of the Middle Tech ecosystem and how smaller companies are adopting and scaling AI technologies. Mozilla spoke on the panel, lending valued technical expertise and setting out how we're thinking about keeping the web open for innovation, competition and user choice with this new technology stack.
eIDAS2 Regulation: Defending Web Security and Trust
In December, the EU published the final implementing rules for eIDAS2, closing a multi-year fight over proposals that would have required browsers to automatically trust government-mandated website certificates-putting encryption, user trust, and the open web at risk. Through sustained advocacy and deep technical engagement, Mozilla helped secure clear legal safeguards preserving independent browser root programs and strong TLS security. We also ensured that the final standards respect existing security norms and reflect how the web actually works. With all rules now published, users can continue to rely on browsers to verify websites independently with strict security requirements, governments are prevented from weakening web encryption by default, and a dangerous global precedent for state-controlled trust on the internet has been avoided.
This blog is part of a larger series. Be sure to follow Jenn Taylor Hodges on LinkedIn for further insights into Mozilla's policy priorities.
The post Behind the Manifesto: Moments that Mattered in our Fight for the Open Web (2025) appeared first on Open Policy & Advocacy.
19 Dec 2025 3:23pm GMT
Firefox Nightly: Closing out 2025 Strong – These Weeks in Firefox: Issue 193
Highlights
- Special shout-out to volunteer contributor Lorenz A for fixing a huge smattering of bugs in our DevTools code!
- Lorenz fixed the alignment of numeric values in Netmonitor and fixed an absolute ton of refactoring bugs (#1665702, #1709063, #1632071), including migrating old style function + prototype to proper ES classes (#2004038, #2004205, #2004203, #2004204, #2004206, #2004207, #2004222, #2004225, #2004231, #2004232, #2004208, #2004210, #2004211, #2004212, #2004213, #2004214, #2004216, #2004217, #2004215, #2004218, #2004219)
- The FirefoxDevTools social accounts have been renamed "Firefox For Web Developers". Come follow us!
- https://bsky.app/profile/webdevs.firefox.com
- https://mastodon.social/@firefoxwebdevs
- We've still got the same handle on Twitter ("Hacks" was turned into "Firefox For Web Dev" there)
- We are enabling the unified trust panel for testing in Nightly, which unifies the lock and shield into one item. This appears to the very left of the URLbar as a shield with a checkbox in it. If you notice any bugs, please file them in the Protections UI component
- The Desktop Integrations team is starting a controlled rollout of the new Backup feature, starting with users on Windows 10! This gives users more options and ability to move their data from machine to machine when getting new devices. (146 Release Notes)
Friends of the Firefox team
Resolved bugs (excluding employees)
Volunteers that fixed more than one bug
- Aloys
- Kipchumba Chelilim [:mrchumbastic]
- Lorenz A
New contributors (🌟 = first patch)
- Dominique
- Fix: Mocked a Fluent ID in testCommonSettingControlPropertiesSet to eliminate logspam errors.
- Aloys
- Fix: Removed unused browser.display.windows.non_native_menus preference.
- Fix: Removed unused identity.fxaccounts.migrateToDevEdition preference.
- Kipchumba Chelilim [:mrchumbastic]
- Fix: Fully removed confirm-auth prompts, related preferences, and test files.
- Fix: Enabled clear-search button and reveal-password preferences when launching Storybook.
- Khalid AlHaddad
- Fix: Added WebDriver classic tests for the "Get All Cookies" command.
- Lorenz A
- Bug 983296: Right-aligned numeric values in Netmonitor columns.
- Bug 1632071: Removed unnecessary exports from Front modules.
- Bug 1665702: Removed unused idGenerator argument from networkMessageUpdates.
- Bug 1709063: Stopped exposing toolbox.resourceCommand.
- Each of these updates converted an existing module into a modern ES class:
- Request.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004038
- toolbox-host-manager.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004203
- devtools.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004204
- panel.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004205
- grip-provider.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004206
- dom-view.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004207
- dom-decorator.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004208
- accessibility panel (devtools/client/accessibility/panel.js) - https://bugzilla.mozilla.org/show_bug.cgi?id=2004210
- accessibility-view.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004211
- protocol test head (xpcshell) - https://bugzilla.mozilla.org/show_bug.cgi?id=2004212
- network observer throttle test - https://bugzilla.mozilla.org/show_bug.cgi?id=2004213
- discovery tests - https://bugzilla.mozilla.org/show_bug.cgi?id=2004214
- heapsnapshot Match.sys.mjs - https://bugzilla.mozilla.org/show_bug.cgi?id=2004215
- server test actors - https://bugzilla.mozilla.org/show_bug.cgi?id=2004216
- layout reflows observer tests - https://bugzilla.mozilla.org/show_bug.cgi?id=2004217
- DevToolPanel test harness - https://bugzilla.mozilla.org/show_bug.cgi?id=2004218
- DevToolsStartup.sys.mjs - https://bugzilla.mozilla.org/show_bug.cgi?id=2004219
- worker-transport.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004222
- stream-utils.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004225
- lazy-pool.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004231
- Response.js - https://bugzilla.mozilla.org/show_bug.cgi?id=2004232
- Sajid Anwar [:sajidanwar]
- Fix: Updated WebDriver navigation to retain the URL when a navigation-committed event fires.
Project Updates
Add-ons / Web Extensions
Addon Manager & about:addons
- As part of the final steps to migrate WebExtensions and AddonManager telemetry analyses and dashboards away from legacy telemetry, we have introduced a new addons Glean ping to submit the list of active add-ons and themes (on startup, on updates and every 24h) - Bug 2000866
- NOTE: The glean addons.active_addons and addons.theme metrics will still be included in both the metrics and addons Glean pings. However the addons ping is expected to become the preferred source of data for add-ons related analyses, whereas the metrics ping may be better suited for analyses that correlate other metrics with the add-ons listed in the addons.active_addons metric.
WebExtension APIs
- Fixed a regression related to nativeMessaging API performance, previously regressed in Firefox 138 by Bug 1945470, longer term fix to reduce messages roundtrip time for Chrome Workers landed in Nightly 147 and workaround disabling the DOM Workers timer manager through prefs uplifted to ESR 140 - Bug 2002517
DevTools
- Alexandra Borovova [:Sasha] fixed setting navigator.maxTouchPoints in iframes when enabling touch simulation in Responsive Design Mode (#1706066)
- Alexandre Poirot [:ochameau] fixed taking memory snapshot for Fenix in about:debugging (#2002728)
- Nicolas Chevobbe [:nchevobbe] added a 0.01Ă— playback rate in the Animations panel (#2002248)
- Nicolas Chevobbe [:nchevobbe] fixed the "Add new rule" button for element in shadow-root (#1940930)
- Nicolas Chevobbe [:nchevobbe] add an anchor badge in the markup view for anchor elements (#1895196)
- Nicolas Chevobbe [:nchevobbe] added @position-try rules in Style Editor At-rules sidebar (#2003270)
- Julian Descottes [:jdescottes] improved target area for the Debugger left splitter (#1902661)
WebDriver
- Khalid AlHaddad added the previously missing WebDriver classic tests for the "Get All Cookies" command.
- Vincent Hilla removed code in our WebDriver BiDi implementation that handled HTTP 204 no-content responses, as this logic is no longer required with the updated about:blank behavior.
- Benjamin VanderSloot added WebDriver tests for Global Privacy Control support, which will ship with the next geckodriver release.
- Julian Descottes updated script.evaluate and script.callFunction to bypass CSP restrictions, which could prevent using eval or new Function. Note that this only impacts WebDriver BiDi, other consumers of the underlying Debugger API such as DevTools or WebExtension are not affected.
- Alexandra Borovova implemented a new "emulation.setScreenSettingsOverride" command to allow clients to emulate the screen dimensions for a list of browsing or user contexts.
- Henrik Skupin fixed the JSON serialization of Chrome windows in our WebDriver Classic (Marionette) implementation.
- Henrik Skupin fixed a bug in the "session.new" command for WebDriver BiDi that previously returned an invalid response payload due to the missing mandatory "setWindowRect" capability.
- Henrik Skupin improved the logic in Marionette and WebDriver tests to ensure newly opened Chrome windows are fully loaded before proceeding.
New Tab Page
- We have a train-hop coming up for next week (~Tuesday), presuming a green QA sign-off
- We've rolled out a change to transition more of our New Tab telemetry to use OHTTP by default world-wide, providing better privacy guarantees for our users.
- Scott [:thecount] Downe localized the Chinese version of default Top Sites to Chinese script, improving label readability and recognition for zh-CN users.
- dgrant@mozilla.com corrected focus ring theming on the New Tab Lists widget, bringing keyboard/high-contrast outlines in line with the active theme for better a11y.
- Scott [:thecount] Downe tuned SOV so sponsored/default tiles respect frecency order, reducing cases where promoted tiles displace organic frequent sites.
Search and Navigation
Urlbar
- Marco landed a patch to limit semantic history search to a list of supported locales (1992920)
- Dao and Moritz continued their searchbar widget work that falls under the larger multi-context address bar project (2003799, 2003804, 2003043, 2002799, 2002377, 1983016, 2001082)
- Dharma fixed a bug with the unified search button so that we show a different icon when the user is searching and their "keyword.enabled" pref is false (1922114)
- Dharma also landed a patch about the messaging to be shown to users when they organically navigate to google.com, bing.com or duckduckgo.com (1982133)
- James fixed a bug where autocomplete stopped working for certain URLs (2001284)
Firefox Suggest
- Drew and Daisuke have completed the implementation of the Firefox Suggest online flight status result suggestions (1982135)
- Drew fixed a flight result bug (2000873) and sports result bug (2000851) that affected screen readers
- Drew made several improvements to how online Ad Marketplace suggestions are dismissed (2003624, 2002383)
- Drew landed a patch that removes support for unmanaged Merino suggestions (2002141)
Places
- Marco landed a patch to shrink the size of the favicons database by removing expired favicon relations (1959694)
Storybook/Reusable Components/Acorn Design System
- Hanna Jones [:hjones] implemented a temporary moz-select icon rendering workaround in Toolkit so custom select options reliably show icons across platforms until a standards-compliant path lands.
- This was to support search engines in SRD
Settings Redesign
- Mark Striemer [:mstriemer] migrated Import Browser data to config-based prefs, reducing UI flicker and making the import entry point more reliable for first‑run and migration flows.
- Stephanie Cunnane [:scunnane] moved Default search engine to config-based prefs, making about:preferences#search more resilient to policy and locale changes and surfacing predictable engine defaults.
- akulyk implemented slot-based config for items/options in config-driven settings, enabling dynamic option lists and cleaner keyboard‑friendly rendering in Settings.
- Mark Striemer [:mstriemer] fixed missing margins when the first child input is hidden, restoring expected spacing in nested controls across Preferences and other settings panels.
- Harshit Sohaney [:hsohaney] fixed the visibility of the backup settings
- Mark Kennedy [:mkennedy] Updated keyboard focus when loading a sub-pane to the first setting Bug 2002958
- Mark Kennedy [:mkennedy] Updated the about:logins button to be a link Bug 2002931
- Mark Kennedy [:mkennedy] Fixed the focus ring being cut off on the back button of sub-panes Bug 2002923
- Tim Giles [:tgiles] Updated payment methods to be sorted by recently-added Bug 2002939
- Emma ZĂĽhlcke [:emz] converted the ETP top-level card to config-based prefs, tightening about:preferences#privacy load performance and enabling remote defaults/rollouts without code changes.
- Emma ZĂĽhlcke [:emz] added config-based ETP Advanced controls, unblocking granular privacy toggles that can ship or update via configuration and stay consistent across platforms.
- akulyk added a Firefox Support section to the SRD About Firefox page, SRD on only (new group to be shown later).
19 Dec 2025 3:19pm GMT
Mozilla Privacy Blog: Australia’s Social Media Ban: Why Age Limits Won’t Fix What Is Wrong With Online Platforms
On December 10th, Australia's controversial law banning access for under 16-year-olds to certain social media platforms entered into force. Since its adoption in 2024, the law has sparked a global debate on age verification online and has inspired governments across the world to restrict minors' access to parts of the web.
At Mozilla, privacy and user empowerment have always formed a core part of our mission. Mozilla supports strong, proportionate safeguards for minors, but we caution against approaches that rely on invasive identity checks, surveillance-based enforcement, or exclusionary defaults. Such interventions rely on the collection of personal and sensitive data and, thus, introduce major privacy and security risks. By following an approach of abstinence and access control, they undermine the rights of young people to express themselves online but do little to address the child safety risks policymakers might seek to address, such as insufficient content moderation, irresponsible data practices, and addictive design.
Rather than simply restricting access to some online platforms, policymakers should focus on fixing the systemic issues at play and incentivize the creation of online spaces that benefit young people and their development.
We are therefore disappointed by the blunt and disproportionate approach taken by the Australian government. We are also concerned about the impact this law, and others like it, will have on online privacy and security, on people's ability to express themselves and access information, and therefore on the health of the web itself.
The Australian law designates certain services as "age-restricted social media platforms". This category includes social media platforms like Instagram and TikTok, and video-sharing platforms like YouTube, and excludes certain categories of services, such as messaging providers, email services, and online games. Designated services must ensure that people under 16 years of age do not have accounts on their platforms. To do so, the ages of all users must be determined.
The Australian law provides almost no guidance on how service providers should balance privacy, security, and the robustness of age assurance technologies when performing age checks. Providers are thus left to choose from bad options. In the UK, a similar approach has resulted in users having to entrust some of their most sensitive data to a plethora of newly emerged commercial age assurance providers in order to retain access to the various services they use. These actors often ask for a lot of information while providing little accountability or transparency about their data handling practices. Beyond serious data breaches, this has also led to users losing access to messaging features and the censorship of content deemed sensitive, such as posts about the situation in Gaza or the war in Ukraine. But UK users have also demonstrated how ineffective the age-gating mechanisms of even some of the largest platforms are, using VPNs and video game features to bypass age barriers easily.
While many technologies exist to verify, estimate, or infer users' ages, fundamental tensions around effectiveness, accessibility, privacy, and security have not been resolved. Rather, the most common forms of age assurance technologies all come with their own significant limitations:
- Age estimation refers to AI-based systems that estimate a user's age, usually based on biometric data like facial images. They may perform well in placing users within broad age bands, but often struggle at key legal thresholds, such as distinguishing between 15 and 16 years old. More troubling are equity concerns: facial estimation systems often underperform for people with darker skin tones, women, and those with non-binary or non-normative facial features due to biased or limited training datasets.
- Age inference models are based on vast amounts of user data, such as browsing histories, to infer a user's age. Similar limitations as for biometric age estimation apply: determining a user's exact age along legal thresholds is challenging, and users exhibiting unusual behaviors might be profiled as younger or older than they are.
- Age verification usually refers to verifying someone's age by comparing it to a form of government-issued ID. This approach might lead to more precise outcomes, but risks excluding millions of people without access to government ID - many of them minors themselves. It also forces people to share some of their most sensitive data with private companies, where it will be at risk of surveillance, repurposing, or access by law enforcement. Zero-knowledge proofs (ZKPs) - a cryptographic way to prove whether a statement like "I am older than 18" is true without revealing one's exact age - can help people limit what information they share. Deploying a ZKP-based system that meets goals for veracity and privacy requires considerably more development in both technical and governance aspects than any government has been willing to support. Beyond technical investment, clear frameworks to limit the information companies can collect are needed.
The Australian approach sends a worrying signal: That mandatory age verification and blanket bans are magical solutions to complex societal challenges, regardless of their implications for fundamental rights online. We are convinced, however, that there are rights-respecting alternatives policymakers can pursue to empower young people online and improve their safety and well-being:
- Young people have a right to privacy, safety and expression, as put forward by the UN Convention on the Rights of the Child. Policymakers should adopt a child rights-based approach to online safety that balances young people's protection with their rights to societal participation, free expression, and access to media and information, and should adopt policies to allow young people to benefit from responsibly run online services.
- Blanket age-based bans and mandatory age verification should be rejected. Instead, parents and caregivers should be empowered to set age-appropriate limitations for their child on their devices. Policymakers should implement programs that focus on supporting children by providing them with the tools to learn to manage online risks as they grow and learn. This includes developing tools that parents, guardians, and schools can use in teaching and supervision in support of children as they grow.
- Rather than banning young people from accessing certain platforms, policymakers should create incentives, enforce existing laws and close regulatory gaps where necessary to address problematic practices that put all social media users' privacy, wellbeing, and security at risk. This includes extractive data practices and profiling, manipulative advertising, addictive design and dark patterns, and other harmful practices.
In Australia and elsewhere, we are committed to work alongside policymakers to advance meaningful protections for everyone online, while upholding fundamental rights, accessibility and user choice.
With special thanks to Martin Thomson, Distinguished Engineer at Mozilla, for his contributions to this blog.
The post Australia's Social Media Ban: Why Age Limits Won't Fix What Is Wrong With Online Platforms appeared first on Open Policy & Advocacy.
19 Dec 2025 8:59am GMT

