
Episode 753: We’re over 18 and we can prove it
The PC Pro Podcast
00:00
How easily can verification methods be bypassed?
Jon and Olivia examine weaknesses: fake IDs, photos, lack of depth sensing, and potential reuse when providers delete data.
Transcript
Play full episode


