That's directly analogous to this situation.
That's directly analogous to this situation.
Age verification while respecting user privacy / anonymity is the complicated bit. But still not impossible if it's done via some asymmetric key scheme.
Age verification while respecting user privacy / anonymity is the complicated bit. But still not impossible if it's done via some asymmetric key scheme.
How will you know if they can search a binary tree?!
How will you know if they can search a binary tree?!