Return to Video

Identity in the 21st Century | David Birch | TEDxSussexUniversity

  • 0:09 - 0:11
    So I thought I'd talk about identity.
  • 0:11 - 0:14
    That's sort of
    an interesting enough topic to me.
  • 0:14 - 0:17
    And the reason was,
    because when I was asked to do this,
  • 0:17 - 0:21
    I'd just read, in one of the papers,
    I can't remember,
  • 0:21 - 0:24
    something from someone
    at Facebook saying, well,
  • 0:24 - 0:26
    "we need to make everybody
    use their real names"
  • 0:26 - 0:28
    and then that's basically
    all the problems solved.
  • 0:28 - 0:30
    And that's so wrong,
  • 0:30 - 0:34
    that's such a fundamentally,
    reactionary view of identity,
  • 0:34 - 0:36
    and it's going to get us
    into all sorts of trouble.
  • 0:36 - 0:37
    And so what I thought I'd do
  • 0:37 - 0:42
    is I'll explain four
    sort of problems about it,
  • 0:42 - 0:44
    and then I'll suggest a solution,
  • 0:44 - 0:46
    which hopefully
    you might find interesting.
  • 0:46 - 0:48
    So just to frame the problem,
  • 0:48 - 0:49
    what does authenticity mean?
  • 0:49 - 0:54
    That's me,
    that's a camera phone picture of me
  • 0:54 - 0:55
    looking at a painting.
  • 0:55 - 0:56
    [What's the Problem?]
  • 0:56 - 0:58
    That's a painting that was painted
  • 0:58 - 0:59
    by a very famous forger,
  • 0:59 - 1:02
    and because I'm not very good
    at presentations,
  • 1:02 - 1:04
    I already can't remember the name
    that I wrote on my card.
  • 1:04 - 1:08
    And he was incarcerated in,
    I think, Wakefield Prison
  • 1:08 - 1:12
    for forging masterpieces by,
    I think, French Impressionists.
  • 1:12 - 1:15
    And he's so good at it,
    that when he was in prison,
  • 1:15 - 1:17
    everybody in prison,
    the governor and whatever,
  • 1:17 - 1:19
    wanted him to paint masterpieces
    to put on the walls,
  • 1:19 - 1:21
    because they were so good.
  • 1:21 - 1:22
    And so that's a masterpiece,
  • 1:22 - 1:24
    which is a fake of a masterpiece,
  • 1:24 - 1:30
    and bonded into the canvas is a chip
    which identifies that as a real fake,
  • 1:30 - 1:32
    if you see what I mean.
  • 1:32 - 1:33
    (Laughter)
  • 1:33 - 1:35
    So when we're talking about authenticity,
  • 1:35 - 1:41
    it's a little more fractal than it appears
    and that's a good example to show it.
  • 1:41 - 1:45
    I tried to pick four problems
    that will frame the issue properly.
  • 1:45 - 1:46
    So the first problem, I thought,
  • 1:46 - 1:49
    chip and PIN, right?
  • 1:50 - 1:53
    I'm guessing everyone's got
    a chip and PIN card, right?
  • 1:53 - 1:55
    So why is that a good example?
  • 1:55 - 1:58
    That's the example of how
    legacy thinking about identity
  • 1:58 - 2:01
    subverts the security
    of a well-constructed system.
  • 2:01 - 2:04
    That chip and PIN card
    that's in your pocket
  • 2:04 - 2:07
    has a little chip on it
    that cost millions of pounds to develop,
  • 2:07 - 2:09
    is extremely secure,
  • 2:09 - 2:11
    you can put scanning
    electron microscopes on it,
  • 2:11 - 2:13
    you can try and grind it down,
    blah blah blah.
  • 2:13 - 2:17
    Those chips have never been broken,
    whatever you read in the paper.
  • 2:17 - 2:20
    And for a joke,
    we take that super-secure chip
  • 2:20 - 2:23
    and we bond it to a trivially
    counterfeitable magnetic stripe
  • 2:23 - 2:27
    and for very lazy criminals,
    we still emboss the card.
  • 2:27 - 2:31
    So if you're a criminal in a hurry
    and you need to copy someone's card,
  • 2:31 - 2:34
    you can just stick a piece of paper on it
    and rub a pencil over it
  • 2:34 - 2:35
    just to sort of speed things up.
  • 2:35 - 2:38
    And even more amusingly,
    and on my debit card too,
  • 2:38 - 2:41
    we print the name and the SALT code
    and everything else on the front too.
  • 2:41 - 2:43
    Why?
  • 2:43 - 2:48
    There is no earthly reason why your name
    is printed on a chip and PIN card.
  • 2:48 - 2:49
    And if you think about it,
  • 2:49 - 2:52
    it's even more insidious and perverse
    than it seems at first.
  • 2:52 - 2:54
    Because the only people that benefit
  • 2:54 - 2:57
    from having the name
    on the card are criminals.
  • 2:57 - 2:58
    You know what your name is, right?
  • 2:58 - 2:59
    (Laughter)
  • 2:59 - 3:01
    And when you go into
    a shop and buy something,
  • 3:01 - 3:04
    it's a PIN, he doesn't care
    what the name is.
  • 3:04 - 3:07
    The only place where you ever have
    to write your name on the back
  • 3:07 - 3:08
    is in America at the moment.
  • 3:08 - 3:10
    And whenever I go to America,
  • 3:10 - 3:13
    and I have to pay with a mag stripe
    on the back of the card,
  • 3:13 - 3:16
    I always sign it Carlos Tethers anyway,
    just as a security mechanism,
  • 3:16 - 3:18
    because if a transaction
    ever gets disputed,
  • 3:18 - 3:21
    and it comes back and it says Dave Birch,
    I know it must have been a criminal,
  • 3:21 - 3:24
    because I would never sign it Dave Birch.
  • 3:24 - 3:25
    (Laughter)
  • 3:25 - 3:27
    So if you drop your card in the street,
  • 3:27 - 3:30
    it means a criminal
    can pick it up and read it.
  • 3:30 - 3:32
    They know the name,
    from it they can find the address,
  • 3:32 - 3:34
    and then they can
    go off and buy stuff online.
  • 3:34 - 3:36
    Why do we put the name on the card?
  • 3:36 - 3:40
    Because we think identity
    is something to do with names,
  • 3:40 - 3:44
    and because we're rooted
    in the idea of the identity card,
  • 3:44 - 3:45
    which obsesses us.
  • 3:45 - 3:47
    And I know it crashed and burned
    a couple of years ago,
  • 3:47 - 3:52
    but if you're someone in politics
    or the home office or whatever,
  • 3:52 - 3:53
    and you think about identity,
  • 3:53 - 3:56
    you can only think of identity in terms
    of cards with names on them.
  • 3:56 - 4:00
    And that's very subversive
    in a modern world.
  • 4:00 - 4:02
    So the second example I thought I'd use
  • 4:02 - 4:04
    is chatrooms.
  • 4:04 - 4:05
    [Chatrooms and Children]
  • 4:05 - 4:07
    I'm very proud of that picture,
    that's my son
  • 4:07 - 4:11
    playing in his band with his friends
    for the first-ever gig,
  • 4:11 - 4:13
    I believe you call it, where he got paid.
  • 4:13 - 4:14
    (Laughter)
  • 4:14 - 4:16
    And I love that picture.
  • 4:16 - 4:18
    I like the picture of him
    getting into medical school a lot better,
  • 4:18 - 4:19
    (Laughter)
  • 4:19 - 4:21
    I like that picture for the moment.
  • 4:21 - 4:23
    Why do I use that picture?
  • 4:23 - 4:27
    Because that was very interesting,
    watching that experience as an old person.
  • 4:27 - 4:29
    So him and his friends,
  • 4:29 - 4:32
    they get together, they booked a room,
    like a church hall,
  • 4:32 - 4:34
    and they got all their friends
    who had bands,
  • 4:34 - 4:37
    and they got them together,
    and they do it all on Facebook,
  • 4:37 - 4:40
    and then they sell tickets,
    and the first band on the -
  • 4:40 - 4:41
    I was going to say "menu,"
  • 4:41 - 4:44
    that's probably the wrong word for it,
    isn't it?
  • 4:44 - 4:46
    The first band on the list of bands
  • 4:46 - 4:50
    that appears at some
    public music performance of some kind
  • 4:50 - 4:52
    gets the sales from the first 20 tickets,
  • 4:52 - 4:54
    then the next band gets the next 20,
  • 4:54 - 4:55
    and so on.
  • 4:55 - 4:57
    They were at the bottom of the menu,
  • 4:57 - 4:59
    they were like fifth,
    I thought they had no chance.
  • 4:59 - 5:01
    He actually got 20 quid.
    Fantastic, right?
  • 5:01 - 5:03
    But my point is,
    that all worked perfectly,
  • 5:03 - 5:05
    except on the web.
  • 5:05 - 5:08
    So they're sitting on Facebook,
  • 5:08 - 5:10
    and they're sending these messages
    and arranging things
  • 5:10 - 5:13
    and they don't know who anybody is, right?
  • 5:13 - 5:15
    That's the big problem
    we're trying to solve.
  • 5:15 - 5:17
    If only they were using the real names.
  • 5:17 - 5:20
    Then you wouldn't be worried
    about them on the internet.
  • 5:20 - 5:21
    And so when he says to me,
  • 5:21 - 5:25
    "oh, I want to go to a chatroom
    to talk about guitars" or something,
  • 5:25 - 5:28
    I'm like, "oh, well,
    I don't want you to go into a chatroom
  • 5:28 - 5:31
    to talk about guitars, because
    they might not all be your friends,
  • 5:31 - 5:34
    and some of the people
    that are in the chatroom
  • 5:34 - 5:37
    might be perverts and teachers
    and vicars."
  • 5:37 - 5:39
    (Laughter)
  • 5:39 - 5:42
    I mean, they generally are,
    when you look in the paper, right?
  • 5:42 - 5:45
    So I want to know who
    all the people in the chatroom are.
  • 5:45 - 5:47
    So okay, you can go in the chatroom,
  • 5:47 - 5:50
    but only if everybody in the chatroom
    is using their real names,
  • 5:50 - 5:54
    and they submit full copies
    of their police report.
  • 5:54 - 5:58
    But of course, if anybody in the chatroom
    asked for his real name, I'd say no.
  • 5:58 - 6:00
    You can't give them your real name.
  • 6:00 - 6:02
    Because what happens
    if they turn out to be perverts,
  • 6:02 - 6:04
    and teachers and whatever.
  • 6:04 - 6:07
    So you have this odd sort of paradox
  • 6:07 - 6:09
    where I'm happy for him
    to go into this space
  • 6:09 - 6:11
    if I know who everybody else is,
  • 6:11 - 6:13
    but I don't want anybody else
    to know who he is.
  • 6:13 - 6:16
    And so you get this sort of logjam
    around identity
  • 6:16 - 6:18
    where you want full disclosure
    from everybody else,
  • 6:18 - 6:19
    but not from yourself.
  • 6:19 - 6:21
    And there's no progress, we get stuck.
  • 6:21 - 6:24
    And so the chatroom thing
    doesn't work properly,
  • 6:24 - 6:27
    and it's a very bad way
    of thinking about identity.
  • 6:27 - 6:30
    So on my RSS feed,
    I saw this thing about -
  • 6:30 - 6:32
    I just said something bad
    about my RSS feed, didn't I?
  • 6:32 - 6:34
    I should stop saying it like that.
  • 6:34 - 6:36
    For some random reason,
    I can't imagine,
  • 6:36 - 6:39
    something about cheerleaders
    turned up in my inbox.
  • 6:39 - 6:42
    I read this story about cheerleaders,
    and it's a fascinating story.
  • 6:42 - 6:44
    This happened a couple of years ago
    in the U.S.
  • 6:44 - 6:47
    There were some cheerleaders
    in a team at a high school
  • 6:47 - 6:49
    in the U.S., and they said mean things
  • 6:49 - 6:51
    about their cheerleading coach,
  • 6:51 - 6:53
    as I'm sure kids do
    about all of their teachers
  • 6:53 - 6:54
    all of the time,
  • 6:54 - 6:57
    and somehow the cheerleading coach
    found out about this.
  • 6:57 - 6:58
    She was very upset.
  • 6:58 - 7:00
    And so she went to one of the girls,
    and said,
  • 7:00 - 7:02
    "you have to give me
    your Facebook password."
  • 7:02 - 7:05
    I read this all the time,
    where even at some universities
  • 7:05 - 7:06
    and places of education,
  • 7:06 - 7:09
    kids are forced to hand over
    their Facebook passwords.
  • 7:09 - 7:11
    You've got to give them
    your Facebook password.
  • 7:11 - 7:12
    She was a kid!
  • 7:12 - 7:15
    What she should have said is,
    "my lawyer will be calling you
  • 7:15 - 7:16
    first thing in the morning.
  • 7:16 - 7:19
    It's an outrageous imposition
    on my 4th Amendment right to privacy,
  • 7:19 - 7:22
    and you're going to be sued
    for all the money you've got."
  • 7:22 - 7:23
    She should have said that.
  • 7:23 - 7:25
    But she's a kid,
    so she hands over the password.
  • 7:25 - 7:27
    The teacher can't log into Facebook,
  • 7:27 - 7:30
    because the school
    has blocked access to Facebook.
  • 7:30 - 7:32
    So the teacher can't log into Facebook
    until she gets home.
  • 7:32 - 7:35
    So the girl tells her friends,
    guess what happened?
  • 7:35 - 7:36
    The teacher logged in, she knows.
  • 7:36 - 7:39
    So the girls just all logged into Facebook
    on their phones,
  • 7:39 - 7:40
    and deleted their profiles.
  • 7:40 - 7:43
    So when the teacher logged in,
    there was nothing there.
  • 7:43 - 7:47
    My point is, those identities,
    they don't think about them the same way.
  • 7:47 - 7:51
    Identity is, especially
    when you're a teenager, a fluid thing.
  • 7:51 - 7:53
    You have lots of identities.
  • 7:53 - 7:55
    And you can have an identity,
    you don't like it,
  • 7:55 - 7:59
    because it's subverted in some way,
    or it's insecure, or it's inappropriate,
  • 7:59 - 8:01
    you just delete it and get another one.
  • 8:01 - 8:04
    The idea that you have an identity
    that's given to you by someone,
  • 8:04 - 8:05
    the government or whatever,
  • 8:05 - 8:08
    and you have to stick with that identity
    and use it in all places,
  • 8:08 - 8:10
    that's absolutely wrong.
  • 8:10 - 8:13
    Why would you want to really know
    who someone was on Facebook,
  • 8:13 - 8:16
    unless you wanted to abuse them
    and harass them in some way?
  • 8:16 - 8:17
    And it just doesn't work properly.
  • 8:17 - 8:20
    And my fourth example
    is there are some cases
  • 8:20 - 8:22
    where you really want to be -
  • 8:22 - 8:25
    In case you're wondering,
    that's me at the G20 protest.
  • 8:25 - 8:29
    I wasn't actually at the G20 protest,
    but I had a meeting at a bank
  • 8:29 - 8:32
    on the day of the G20 protest,
    and I got an email from the bank
  • 8:32 - 8:37
    saying please don't wear a suit,
    because it'll inflame the protestors.
  • 8:37 - 8:39
    I look pretty good in a suit, frankly,
  • 8:39 - 8:43
    so you can see why it would drive them
    into an anti-capitalist frenzy. (Laughter)
  • 8:43 - 8:44
    So I thought, well, look.
  • 8:44 - 8:47
    If I don't want to inflame the protestors,
  • 8:47 - 8:49
    the obvious thing to do
    is go dressed as a protestor.
  • 8:49 - 8:51
    So I went dressed completely in black,
  • 8:51 - 8:54
    you know, with a black balaclava,
    I had black gloves on,
  • 8:54 - 8:56
    but I've taken them off
    to sign the visitor's book.
  • 8:56 - 8:58
    I'm wearing black trousers, black boots,
  • 8:58 - 9:00
    I'm dressed completely in black.
  • 9:00 - 9:03
    I go into the bank at 10 o'clock,
    go, "Hi, I'm Dave Birch,
  • 9:03 - 9:05
    I've got a 3 o'clock
    with so and so there."
  • 9:05 - 9:07
    Sure. They sign me in.
    There's my visitor's badge.
  • 9:07 - 9:08
    (Laughter)
  • 9:08 - 9:09
    So this nonsense
  • 9:09 - 9:12
    about you've got to have real names
    on Facebook and whatever,
  • 9:12 - 9:14
    that gets you that kind of security.
  • 9:14 - 9:18
    That gets you security theater,
    where there's no actual security,
  • 9:18 - 9:21
    but people are sort of playing parts
    in a play about security.
  • 9:21 - 9:24
    And as long as everybody learns
    their lines,
  • 9:24 - 9:24
    everyone's happy.
  • 9:24 - 9:27
    But it's not real security.
  • 9:27 - 9:30
    Especially because I hate banks
    more than the G20 protestors do,
  • 9:30 - 9:31
    because I work for them.
  • 9:31 - 9:34
    I know that things are actually worse
    than these guys think.
  • 9:34 - 9:36
    (Laughter)
  • 9:38 - 9:43
    But suppose I worked
    next to somebody in a bank
  • 9:43 - 9:46
    who was doing something.
  • 9:46 - 9:49
    Those people
    who take the money from banks...
  • 9:50 - 9:52
    traders - that's who I was thinking of.
  • 9:52 - 9:55
    Suppose I was sitting
    next to a rogue trader,
  • 9:55 - 9:57
    and I want to report it
    to the boss of the bank.
  • 9:57 - 9:59
    So I log on
    to do a little bit of whistleblowing.
  • 9:59 - 10:01
    I send a message,
    this guy's a rogue trader.
  • 10:01 - 10:03
    That message is meaningless
  • 10:03 - 10:06
    if you don't know
    that I'm a trader at the bank.
  • 10:06 - 10:08
    If that message just comes from anybody,
  • 10:08 - 10:10
    it has zero information value.
  • 10:10 - 10:13
    There's no point in sending that message.
  • 10:14 - 10:17
    But if I have to prove who I am,
  • 10:17 - 10:18
    I'll never send that message.
  • 10:18 - 10:22
    It's just like the nurse in the hospital
    reporting the drunk surgeon.
  • 10:22 - 10:25
    That message will only happen
    if I'm anonymous.
  • 10:25 - 10:30
    So the system has to have ways
    of providing anonymity there,
  • 10:30 - 10:32
    otherwise we don't get
    where we want to get to.
  • 10:32 - 10:35
    So four issues.
    So what are we going to do about it?
  • 10:35 - 10:39
    Well, what we tend to do about it
  • 10:40 - 10:42
    is we think about Orwell space.
  • 10:42 - 10:45
    And we try to make electronic versions
  • 10:45 - 10:47
    of the identity card
    that we got rid of in 1953.
  • 10:47 - 10:50
    So we think if we had a card,
  • 10:50 - 10:51
    call it a Facebook login,
  • 10:51 - 10:53
    which proves who you are,
  • 10:53 - 10:56
    and I make you carry it all the time,
    that solves the problem.
  • 10:56 - 10:58
    And of course, for all those reasons
    I've just outlined,
  • 10:58 - 11:01
    it doesn't, and it might, actually,
    make some problems worse.
  • 11:01 - 11:04
    The more times you're forced
    to use your real identity,
  • 11:04 - 11:06
    certainly in transactional terms,
  • 11:06 - 11:09
    the more likely that identity
    is to get stolen and subverted.
  • 11:09 - 11:11
    The goal is to stop people
    from using identity
  • 11:11 - 11:13
    in transactions which don't need identity,
  • 11:13 - 11:15
    which is actually almost all transactions.
  • 11:15 - 11:17
    Almost all of the transactions you do
  • 11:17 - 11:19
    are not, who are you?
  • 11:19 - 11:21
    They're, are you allowed to drive the car,
  • 11:21 - 11:24
    are you allowed in the building,
    are you over 18, etcetera, etcetera.
  • 11:25 - 11:27
    So my suggestion - I, like James,
  • 11:27 - 11:30
    think that there should be
    a resurgence of interest in R & D.
  • 11:30 - 11:32
    I think this is a solvable problem.
  • 11:32 - 11:33
    It's something we can do about.
  • 11:33 - 11:36
    Naturally, in these circumstances,
    I turn to Doctor Who.
  • 11:36 - 11:38
    Because in this,
  • 11:38 - 11:40
    as in so many other walks of life,
  • 11:40 - 11:43
    Doctor Who has already shown us
    the answer.
  • 11:43 - 11:44
    So I should say,
  • 11:44 - 11:46
    for some of our foreign visitors,
  • 11:46 - 11:50
    Doctor Who is the greatest
    living scientist in England,
  • 11:50 - 11:51
    (Laughter)
  • 11:51 - 11:54
    and a beacon of truth and enlightenment
    to all of us.
  • 11:54 - 11:58
    And this is Doctor Who
    with his psychic paper.
  • 11:58 - 12:01
    Come on, you guys must have seen
    Doctor Who's psychic paper.
  • 12:01 - 12:02
    You're not nerds if you say yes.
  • 12:02 - 12:05
    Who's seen Doctor Who's psychic paper?
  • 12:05 - 12:08
    Oh right, you were in the library
    the whole time studying I guess.
  • 12:08 - 12:10
    Is that what you're going to tell us?
  • 12:10 - 12:11
    Doctor Who's psychic paper
  • 12:11 - 12:13
    is when you hold up the psychic paper,
  • 12:13 - 12:14
    the person, in their brain,
  • 12:14 - 12:16
    sees the thing that they need to see.
  • 12:16 - 12:19
    So I want to show you a British passport,
  • 12:19 - 12:21
    I hold up the psychic paper,
    you see a British passport.
  • 12:21 - 12:23
    I want to get into a party,
  • 12:23 - 12:25
    I hold up the psychic paper,
  • 12:25 - 12:26
    I show you a party invitation.
  • 12:26 - 12:28
    You see what you want to see.
  • 12:28 - 12:31
    So what I'm saying is we need
    to make an electronic version of that,
  • 12:31 - 12:34
    but with one tiny, tiny change,
  • 12:34 - 12:36
    which is that it'll only show you
    the British passport
  • 12:36 - 12:37
    if I've actually got one.
  • 12:37 - 12:41
    It'll only show you the party invitation
    if I actually have one.
  • 12:41 - 12:44
    It will only show you that I'm over 18
    if I actually am.
  • 12:44 - 12:45
    But nothing else.
  • 12:45 - 12:50
    So you're the bouncer at the pub,
    you need to know that I'm over 18,
  • 12:50 - 12:52
    instead of showing you my driving license,
  • 12:52 - 12:54
    which shows you I know how to drive,
  • 12:54 - 12:57
    what my name is, my address,
    all these kind of things,
  • 12:57 - 12:58
    I show you my psychic paper,
  • 12:58 - 13:01
    and all it tells you
    is am I over 18 or not.
  • 13:01 - 13:03
    Right.
  • 13:03 - 13:04
    Is that just a pipe dream?
  • 13:04 - 13:07
    Of course not, otherwise
    I wouldn't be here talking to you.
  • 13:07 - 13:09
    So in order to build that
    and make it work,
  • 13:09 - 13:12
    I'm only going to name these things,
    I'll not go into them,
  • 13:12 - 13:13
    we need a plan,
  • 13:13 - 13:15
    which is we're going to build this
  • 13:15 - 13:17
    as an infrastructure for everybody to use,
  • 13:17 - 13:18
    to solve all of these problems.
  • 13:18 - 13:20
    We're going to make a utility,
  • 13:20 - 13:22
    the utility has to be universal,
  • 13:22 - 13:23
    you can use it everywhere,
  • 13:23 - 13:26
    I'm just giving you little flashes
    of the technology as we go along.
  • 13:26 - 13:27
    That's a Japanese ATM,
  • 13:27 - 13:30
    the fingerprint template
    is stored inside the mobile phone.
  • 13:30 - 13:32
    So when you want to draw money out,
  • 13:32 - 13:35
    you put the mobile phone on the ATM,
    and touch your finger,
  • 13:35 - 13:37
    your fingerprint goes through
    to the phone,
  • 13:37 - 13:39
    the phone says yes, that's whoever,
  • 13:39 - 13:41
    and the ATM then gives you some money.
  • 13:41 - 13:43
    It has to be a utility
    that you can use everywhere.
  • 13:43 - 13:45
    It has to be absolutely convenient,
  • 13:45 - 13:48
    that's me going into the pub.
  • 13:48 - 13:51
    All the device on the door of the pub
    is allowed is,
  • 13:51 - 13:54
    is this person over 18
    and not barred from the pub?
  • 13:54 - 13:58
    And so the idea is,
    you touch your ID card to the door,
  • 13:58 - 14:00
    and if I am allowed in,
    it shows my picture,
  • 14:00 - 14:02
    if I'm not allowed in,
    it shows a red cross.
  • 14:02 - 14:04
    It doesn't disclose any other information.
  • 14:04 - 14:07
    It has to have no special gadgets.
    That can only mean one thing,
  • 14:07 - 14:10
    following on from Ross's statement,
    which I agree with completely.
  • 14:10 - 14:13
    If it means no special gadgets,
    it has to run on a mobile phone.
  • 14:13 - 14:16
    That's the only choice we have,
    we have to make it work on mobile phones.
  • 14:16 - 14:19
    There are 6.6 billion
    mobile phone subscriptions.
  • 14:19 - 14:22
    My favorite statistic of all time,
    only 4 billion toothbrushes in the world.
  • 14:22 - 14:24
    That means something,
  • 14:24 - 14:25
    I don't know what.
    (Laughter)
  • 14:25 - 14:27
    I rely on our futurologists to tell me.
  • 14:27 - 14:29
    It has to be a utility
    which is extensible.
  • 14:29 - 14:32
    So it has to be something
    that anybody could build on.
  • 14:32 - 14:34
    Anybody should be able
    to use this infrastructure,
  • 14:34 - 14:36
    you don't need permissions,
    licenses, whatever,
  • 14:36 - 14:39
    anyone should be able
    to write some code to do this.
  • 14:41 - 14:42
    You know what symmetry is,
  • 14:42 - 14:44
    so you don't need a picture of it.
  • 14:44 - 14:46
    This is how we're going to do it.
  • 14:46 - 14:49
    We're going to do it using phones,
    using mobile proximity.
  • 14:49 - 14:52
    I'm going to suggest to you
    the technology to implement
  • 14:52 - 14:54
    Doctor Who's psychic paper
    is already here,
  • 14:54 - 14:57
    and if any of you have got one of the new
    Barclay's debit cards
  • 14:57 - 14:58
    with the contactless interface on it,
  • 14:58 - 15:00
    you've already got that technology.
  • 15:00 - 15:02
    If you've ever been up to the big city,
  • 15:02 - 15:04
    and used an Oyster card at all,
  • 15:04 - 15:05
    does that ring any bells to anybody?
  • 15:05 - 15:06
    The technology already exists.
  • 15:06 - 15:09
    The first phones
    that have the technology built in,
  • 15:09 - 15:11
    the Google Nexus, the S2,
    the Samsung Wifi 7.9,
  • 15:11 - 15:14
    the first phones that have
    the technology built into them
  • 15:14 - 15:15
    are already in the shops.
  • 15:15 - 15:16
    So the idea that the gas man
  • 15:16 - 15:18
    can turn up at my mom's door
  • 15:18 - 15:20
    and he can show my mom his phone,
  • 15:20 - 15:22
    and she can tap it with her phone,
  • 15:22 - 15:25
    and it will come up with green
    if he really is from British Gas
  • 15:25 - 15:26
    and allowed in,
  • 15:26 - 15:28
    and it'll come up with red if he isn't.
  • 15:28 - 15:30
    We have the technology to do that.
  • 15:30 - 15:31
    And what's more,
  • 15:31 - 15:34
    although some of those things
    sounded a bit counter-intuitive,
  • 15:34 - 15:36
    like proving I'm over 18
    without proving who I am,
  • 15:36 - 15:38
    the cryptography to do that
    not only exists,
  • 15:38 - 15:41
    it's extremely well-known
    and well-understood.
  • 15:41 - 15:44
    Digital signatures, the blinding
    of public key certificates,
  • 15:44 - 15:46
    these technologies have been around
    for a while,
  • 15:46 - 15:48
    we've just had no way
    of packaging them up.
  • 15:48 - 15:50
    So the technology already exists.
  • 15:50 - 15:52
    We know it works.
  • 15:52 - 15:55
    There are a few examples
    of the technology being used
  • 15:55 - 15:56
    in experimental places.
  • 15:56 - 15:57
    That's London Fashion Week,
  • 15:57 - 15:59
    where we built a system with O2,
  • 15:59 - 16:02
    that's for the Wireless Festival
    in Hyde Park,
  • 16:02 - 16:03
    you can see the persons
  • 16:03 - 16:06
    walking in with their VIP band,
    it's just being checked
  • 16:06 - 16:08
    by the Nokia phone
    that's reading the band.
  • 16:08 - 16:11
    I'm only putting those up to show you
    these things are prosaic,
  • 16:11 - 16:13
    this stuff works in these environments.
  • 16:13 - 16:14
    They don't need to be special.
  • 16:14 - 16:18
    So finally, I know that you can do this,
  • 16:19 - 16:22
    because if you saw
    the episode of Doctor Who,
  • 16:22 - 16:24
    the Easter special of Doctor Who,
  • 16:24 - 16:28
    where he went to Mars in a bus,
  • 16:28 - 16:30
    I should say again
    for our foreign students,
  • 16:30 - 16:32
    that doesn't happen every episode.
  • 16:32 - 16:33
    This was a very special case.
  • 16:33 - 16:36
    So in the episode where he goes
    to Mars in a London bus,
  • 16:36 - 16:37
    I can't show you the clip,
  • 16:37 - 16:40
    due to the outrageous restrictions
    of Queen Anne-style copyright
  • 16:40 - 16:42
    by the BBC,
  • 16:42 - 16:45
    but in the episode where he goes
    to Mars in a London bus,
  • 16:45 - 16:49
    Doctor Who is clearly shown
    getting on to the bus
  • 16:49 - 16:50
    with the Oyster card reader
  • 16:50 - 16:52
    using his psychic paper.
  • 16:52 - 16:54
    Which proves that psychic paper
  • 16:54 - 16:56
    has an MSE interface.
  • 16:56 - 16:58
    Thank you very much.
    (Applause)
Title:
Identity in the 21st Century | David Birch | TEDxSussexUniversity
Description:

Bartenders needs to know your age, retailers need your PIN, but almost no one actually needs your name -- except for identity thieves. ID expert David Birch proposes a safer approach to personal identification -- a "fractured" approach -- that would almost never require your real name.

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDxTalks
Duration:
17:06

English subtitles

Revisions