The Quiet Construction of an American Social Credit System
The most dangerous technologies are not introduced as instruments of repression. They are introduced as instruments of protection. They arrive wrapped in the language of public safety and common sense, making them difficult to criticize without sounding careless about the vulnerable. The new wave of U.S. “App Store Accountability” laws, including Texas’s SB2420, which requires Apple and Google to verify users’ ages and link app usage to verified identity credentials, follows this pattern. On the surface, the laws are marketed as protecting children. But the infrastructure they create is indistinguishable from the foundations of digital control systems used by authoritarian states. Once the architecture of identity-linked surveillance exists, the only remaining variable is who gains the authority to expand and enforce it.
In authoritarian societies, the distinction between state and corporation is largely symbolic. When governments compel companies to collect and store sensitive identity data, corporations effectively become extensions of the state apparatus. China’s real-name registration system did not begin as a tool of coercion; it began as a “responsibility and safety” measure. Over time, it became the backbone of the Great Firewall and the Social Credit System, enabling the state to track speech, movement, and reputation across nearly every dimension of life. Russia adopted similar “child protection” and identity-verification laws which, once implemented, were repurposed to suppress LGBTQ+ content, monitor dissidents, and control online political organizing. The pattern is not cultural. It is structural. Once identity verification becomes a universal prerequisite for digital access, the system only moves in one direction: toward expansion of control.
Texas’s law does not need to be authoritarian in intent to be authoritarian in effect. By forcing Apple and Google to create a universal identity-linked verification system, the state lays the groundwork for a future in which internet access is conditioned on transparency to authority. A system built to verify age today can be used to verify political loyalty tomorrow. A database built to restrict minors from accessing apps can be used to restrict dissidents, journalists, organizers, and artists from communicating without surveillance. The danger is not what the law does on the day it is passed. The danger is what the infrastructure allows when political power shifts.
Authoritarian control does not require constant enforcement. It requires only that people believe they can be seen. When identity must be disclosed to read, speak, organize, or dissent, individuals begin to censor themselves. The threat becomes ambient. The pressure becomes internal. Conformity becomes voluntary. In Moscow, independent journalists cannot publish anonymously because every digital platform is tied to passport verification. In Tehran, students cannot join dissident chats because the state knows every verified user. The same outcome in the United States would require no new mechanisms—only access to the identity-linked systems that laws like SB2420 compel corporations to build.
The machinery of enforcement also does not need to be overt to be effective. When platforms are legally responsible for verifying identity and restricting access, they default to caution. Content that raises the possibility of scrutiny is filtered or removed. Users who hesitate to provide identification are locked out. The result is not explicit censorship but a silent shrinking of the public sphere, as entire categories of speech and participation are functionally disabled.
Privacy is not a luxury good or a personal preference; it is a structural requirement for free thought. It is the space in which dissent forms, in which conscience develops, and in which individuals test ideas without fear of punishment. When privacy erodes, autonomy erodes with it. The result is not increased safety. It is increased compliance. Authoritarianism is not constructed in a single act of state violence. It is built quietly, through ordinary laws with reasonable justifications, until the underlying power structures are irreversible.
The true stakes of Texas’s law are not about children or apps. They are about identity, access, and power. To control identity is to control participation. To control participation is to control speech. And to control speech is to control the boundaries of reality itself. The infrastructure being built today determines who will control truth tomorrow. Once the valves exist, they do not remain unturned.