Identity in the 21st Century | David Birch | TEDxSussexUniversity
-
0:09 - 0:11So I thought I'd talk about identity.
-
0:11 - 0:14That's sort of
an interesting enough topic to me. -
0:14 - 0:17And the reason was,
because when I was asked to do this, -
0:17 - 0:21I'd just read, in one of the papers,
I can't remember, -
0:21 - 0:24something from someone
at Facebook saying, well, -
0:24 - 0:26"we need to make everybody
use their real names" -
0:26 - 0:28and then that's basically
all the problems solved. -
0:28 - 0:30And that's so wrong,
-
0:30 - 0:34that's such a fundamentally,
reactionary view of identity, -
0:34 - 0:36and it's going to get us
into all sorts of trouble. -
0:36 - 0:37And so what I thought I'd do
-
0:37 - 0:42is I'll explain four
sort of problems about it, -
0:42 - 0:44and then I'll suggest a solution,
-
0:44 - 0:46which hopefully
you might find interesting. -
0:46 - 0:48So just to frame the problem,
-
0:48 - 0:49what does authenticity mean?
-
0:49 - 0:54That's me,
that's a camera phone picture of me -
0:54 - 0:55looking at a painting.
-
0:55 - 0:56[What's the Problem?]
-
0:56 - 0:58That's a painting that was painted
-
0:58 - 0:59by a very famous forger,
-
0:59 - 1:02and because I'm not very good
at presentations, -
1:02 - 1:04I already can't remember the name
that I wrote on my card. -
1:04 - 1:08And he was incarcerated in,
I think, Wakefield Prison -
1:08 - 1:12for forging masterpieces by,
I think, French Impressionists. -
1:12 - 1:15And he's so good at it,
that when he was in prison, -
1:15 - 1:17everybody in prison,
the governor and whatever, -
1:17 - 1:19wanted him to paint masterpieces
to put on the walls, -
1:19 - 1:21because they were so good.
-
1:21 - 1:22And so that's a masterpiece,
-
1:22 - 1:24which is a fake of a masterpiece,
-
1:24 - 1:30and bonded into the canvas is a chip
which identifies that as a real fake, -
1:30 - 1:32if you see what I mean.
-
1:32 - 1:33(Laughter)
-
1:33 - 1:35So when we're talking about authenticity,
-
1:35 - 1:41it's a little more fractal than it appears
and that's a good example to show it. -
1:41 - 1:45I tried to pick four problems
that will frame the issue properly. -
1:45 - 1:46So the first problem, I thought,
-
1:46 - 1:49chip and PIN, right?
-
1:50 - 1:53I'm guessing everyone's got
a chip and PIN card, right? -
1:53 - 1:55So why is that a good example?
-
1:55 - 1:58That's the example of how
legacy thinking about identity -
1:58 - 2:01subverts the security
of a well-constructed system. -
2:01 - 2:04That chip and PIN card
that's in your pocket -
2:04 - 2:07has a little chip on it
that cost millions of pounds to develop, -
2:07 - 2:09is extremely secure,
-
2:09 - 2:11you can put scanning
electron microscopes on it, -
2:11 - 2:13you can try and grind it down,
blah blah blah. -
2:13 - 2:17Those chips have never been broken,
whatever you read in the paper. -
2:17 - 2:20And for a joke,
we take that super-secure chip -
2:20 - 2:23and we bond it to a trivially
counterfeitable magnetic stripe -
2:23 - 2:27and for very lazy criminals,
we still emboss the card. -
2:27 - 2:31So if you're a criminal in a hurry
and you need to copy someone's card, -
2:31 - 2:34you can just stick a piece of paper on it
and rub a pencil over it -
2:34 - 2:35just to sort of speed things up.
-
2:35 - 2:38And even more amusingly,
and on my debit card too, -
2:38 - 2:41we print the name and the SALT code
and everything else on the front too. -
2:41 - 2:43Why?
-
2:43 - 2:48There is no earthly reason why your name
is printed on a chip and PIN card. -
2:48 - 2:49And if you think about it,
-
2:49 - 2:52it's even more insidious and perverse
than it seems at first. -
2:52 - 2:54Because the only people that benefit
-
2:54 - 2:57from having the name
on the card are criminals. -
2:57 - 2:58You know what your name is, right?
-
2:58 - 2:59(Laughter)
-
2:59 - 3:01And when you go into
a shop and buy something, -
3:01 - 3:04it's a PIN, he doesn't care
what the name is. -
3:04 - 3:07The only place where you ever have
to write your name on the back -
3:07 - 3:08is in America at the moment.
-
3:08 - 3:10And whenever I go to America,
-
3:10 - 3:13and I have to pay with a mag stripe
on the back of the card, -
3:13 - 3:16I always sign it Carlos Tethers anyway,
just as a security mechanism, -
3:16 - 3:18because if a transaction
ever gets disputed, -
3:18 - 3:21and it comes back and it says Dave Birch,
I know it must have been a criminal, -
3:21 - 3:24because I would never sign it Dave Birch.
-
3:24 - 3:25(Laughter)
-
3:25 - 3:27So if you drop your card in the street,
-
3:27 - 3:30it means a criminal
can pick it up and read it. -
3:30 - 3:32They know the name,
from it they can find the address, -
3:32 - 3:34and then they can
go off and buy stuff online. -
3:34 - 3:36Why do we put the name on the card?
-
3:36 - 3:40Because we think identity
is something to do with names, -
3:40 - 3:44and because we're rooted
in the idea of the identity card, -
3:44 - 3:45which obsesses us.
-
3:45 - 3:47And I know it crashed and burned
a couple of years ago, -
3:47 - 3:52but if you're someone in politics
or the home office or whatever, -
3:52 - 3:53and you think about identity,
-
3:53 - 3:56you can only think of identity in terms
of cards with names on them. -
3:56 - 4:00And that's very subversive
in a modern world. -
4:00 - 4:02So the second example I thought I'd use
-
4:02 - 4:04is chatrooms.
-
4:04 - 4:05[Chatrooms and Children]
-
4:05 - 4:07I'm very proud of that picture,
that's my son -
4:07 - 4:11playing in his band with his friends
for the first-ever gig, -
4:11 - 4:13I believe you call it, where he got paid.
-
4:13 - 4:14(Laughter)
-
4:14 - 4:16And I love that picture.
-
4:16 - 4:18I like the picture of him
getting into medical school a lot better, -
4:18 - 4:19(Laughter)
-
4:19 - 4:21I like that picture for the moment.
-
4:21 - 4:23Why do I use that picture?
-
4:23 - 4:27Because that was very interesting,
watching that experience as an old person. -
4:27 - 4:29So him and his friends,
-
4:29 - 4:32they get together, they booked a room,
like a church hall, -
4:32 - 4:34and they got all their friends
who had bands, -
4:34 - 4:37and they got them together,
and they do it all on Facebook, -
4:37 - 4:40and then they sell tickets,
and the first band on the - -
4:40 - 4:41I was going to say "menu,"
-
4:41 - 4:44that's probably the wrong word for it,
isn't it? -
4:44 - 4:46The first band on the list of bands
-
4:46 - 4:50that appears at some
public music performance of some kind -
4:50 - 4:52gets the sales from the first 20 tickets,
-
4:52 - 4:54then the next band gets the next 20,
-
4:54 - 4:55and so on.
-
4:55 - 4:57They were at the bottom of the menu,
-
4:57 - 4:59they were like fifth,
I thought they had no chance. -
4:59 - 5:01He actually got 20 quid.
Fantastic, right? -
5:01 - 5:03But my point is,
that all worked perfectly, -
5:03 - 5:05except on the web.
-
5:05 - 5:08So they're sitting on Facebook,
-
5:08 - 5:10and they're sending these messages
and arranging things -
5:10 - 5:13and they don't know who anybody is, right?
-
5:13 - 5:15That's the big problem
we're trying to solve. -
5:15 - 5:17If only they were using the real names.
-
5:17 - 5:20Then you wouldn't be worried
about them on the internet. -
5:20 - 5:21And so when he says to me,
-
5:21 - 5:25"oh, I want to go to a chatroom
to talk about guitars" or something, -
5:25 - 5:28I'm like, "oh, well,
I don't want you to go into a chatroom -
5:28 - 5:31to talk about guitars, because
they might not all be your friends, -
5:31 - 5:34and some of the people
that are in the chatroom -
5:34 - 5:37might be perverts and teachers
and vicars." -
5:37 - 5:39(Laughter)
-
5:39 - 5:42I mean, they generally are,
when you look in the paper, right? -
5:42 - 5:45So I want to know who
all the people in the chatroom are. -
5:45 - 5:47So okay, you can go in the chatroom,
-
5:47 - 5:50but only if everybody in the chatroom
is using their real names, -
5:50 - 5:54and they submit full copies
of their police report. -
5:54 - 5:58But of course, if anybody in the chatroom
asked for his real name, I'd say no. -
5:58 - 6:00You can't give them your real name.
-
6:00 - 6:02Because what happens
if they turn out to be perverts, -
6:02 - 6:04and teachers and whatever.
-
6:04 - 6:07So you have this odd sort of paradox
-
6:07 - 6:09where I'm happy for him
to go into this space -
6:09 - 6:11if I know who everybody else is,
-
6:11 - 6:13but I don't want anybody else
to know who he is. -
6:13 - 6:16And so you get this sort of logjam
around identity -
6:16 - 6:18where you want full disclosure
from everybody else, -
6:18 - 6:19but not from yourself.
-
6:19 - 6:21And there's no progress, we get stuck.
-
6:21 - 6:24And so the chatroom thing
doesn't work properly, -
6:24 - 6:27and it's a very bad way
of thinking about identity. -
6:27 - 6:30So on my RSS feed,
I saw this thing about - -
6:30 - 6:32I just said something bad
about my RSS feed, didn't I? -
6:32 - 6:34I should stop saying it like that.
-
6:34 - 6:36For some random reason,
I can't imagine, -
6:36 - 6:39something about cheerleaders
turned up in my inbox. -
6:39 - 6:42I read this story about cheerleaders,
and it's a fascinating story. -
6:42 - 6:44This happened a couple of years ago
in the U.S. -
6:44 - 6:47There were some cheerleaders
in a team at a high school -
6:47 - 6:49in the U.S., and they said mean things
-
6:49 - 6:51about their cheerleading coach,
-
6:51 - 6:53as I'm sure kids do
about all of their teachers -
6:53 - 6:54all of the time,
-
6:54 - 6:57and somehow the cheerleading coach
found out about this. -
6:57 - 6:58She was very upset.
-
6:58 - 7:00And so she went to one of the girls,
and said, -
7:00 - 7:02"you have to give me
your Facebook password." -
7:02 - 7:05I read this all the time,
where even at some universities -
7:05 - 7:06and places of education,
-
7:06 - 7:09kids are forced to hand over
their Facebook passwords. -
7:09 - 7:11You've got to give them
your Facebook password. -
7:11 - 7:12She was a kid!
-
7:12 - 7:15What she should have said is,
"my lawyer will be calling you -
7:15 - 7:16first thing in the morning.
-
7:16 - 7:19It's an outrageous imposition
on my 4th Amendment right to privacy, -
7:19 - 7:22and you're going to be sued
for all the money you've got." -
7:22 - 7:23She should have said that.
-
7:23 - 7:25But she's a kid,
so she hands over the password. -
7:25 - 7:27The teacher can't log into Facebook,
-
7:27 - 7:30because the school
has blocked access to Facebook. -
7:30 - 7:32So the teacher can't log into Facebook
until she gets home. -
7:32 - 7:35So the girl tells her friends,
guess what happened? -
7:35 - 7:36The teacher logged in, she knows.
-
7:36 - 7:39So the girls just all logged into Facebook
on their phones, -
7:39 - 7:40and deleted their profiles.
-
7:40 - 7:43So when the teacher logged in,
there was nothing there. -
7:43 - 7:47My point is, those identities,
they don't think about them the same way. -
7:47 - 7:51Identity is, especially
when you're a teenager, a fluid thing. -
7:51 - 7:53You have lots of identities.
-
7:53 - 7:55And you can have an identity,
you don't like it, -
7:55 - 7:59because it's subverted in some way,
or it's insecure, or it's inappropriate, -
7:59 - 8:01you just delete it and get another one.
-
8:01 - 8:04The idea that you have an identity
that's given to you by someone, -
8:04 - 8:05the government or whatever,
-
8:05 - 8:08and you have to stick with that identity
and use it in all places, -
8:08 - 8:10that's absolutely wrong.
-
8:10 - 8:13Why would you want to really know
who someone was on Facebook, -
8:13 - 8:16unless you wanted to abuse them
and harass them in some way? -
8:16 - 8:17And it just doesn't work properly.
-
8:17 - 8:20And my fourth example
is there are some cases -
8:20 - 8:22where you really want to be -
-
8:22 - 8:25In case you're wondering,
that's me at the G20 protest. -
8:25 - 8:29I wasn't actually at the G20 protest,
but I had a meeting at a bank -
8:29 - 8:32on the day of the G20 protest,
and I got an email from the bank -
8:32 - 8:37saying please don't wear a suit,
because it'll inflame the protestors. -
8:37 - 8:39I look pretty good in a suit, frankly,
-
8:39 - 8:43so you can see why it would drive them
into an anti-capitalist frenzy. (Laughter) -
8:43 - 8:44So I thought, well, look.
-
8:44 - 8:47If I don't want to inflame the protestors,
-
8:47 - 8:49the obvious thing to do
is go dressed as a protestor. -
8:49 - 8:51So I went dressed completely in black,
-
8:51 - 8:54you know, with a black balaclava,
I had black gloves on, -
8:54 - 8:56but I've taken them off
to sign the visitor's book. -
8:56 - 8:58I'm wearing black trousers, black boots,
-
8:58 - 9:00I'm dressed completely in black.
-
9:00 - 9:03I go into the bank at 10 o'clock,
go, "Hi, I'm Dave Birch, -
9:03 - 9:05I've got a 3 o'clock
with so and so there." -
9:05 - 9:07Sure. They sign me in.
There's my visitor's badge. -
9:07 - 9:08(Laughter)
-
9:08 - 9:09So this nonsense
-
9:09 - 9:12about you've got to have real names
on Facebook and whatever, -
9:12 - 9:14that gets you that kind of security.
-
9:14 - 9:18That gets you security theater,
where there's no actual security, -
9:18 - 9:21but people are sort of playing parts
in a play about security. -
9:21 - 9:24And as long as everybody learns
their lines, -
9:24 - 9:24everyone's happy.
-
9:24 - 9:27But it's not real security.
-
9:27 - 9:30Especially because I hate banks
more than the G20 protestors do, -
9:30 - 9:31because I work for them.
-
9:31 - 9:34I know that things are actually worse
than these guys think. -
9:34 - 9:36(Laughter)
-
9:38 - 9:43But suppose I worked
next to somebody in a bank -
9:43 - 9:46who was doing something.
-
9:46 - 9:49Those people
who take the money from banks... -
9:50 - 9:52traders - that's who I was thinking of.
-
9:52 - 9:55Suppose I was sitting
next to a rogue trader, -
9:55 - 9:57and I want to report it
to the boss of the bank. -
9:57 - 9:59So I log on
to do a little bit of whistleblowing. -
9:59 - 10:01I send a message,
this guy's a rogue trader. -
10:01 - 10:03That message is meaningless
-
10:03 - 10:06if you don't know
that I'm a trader at the bank. -
10:06 - 10:08If that message just comes from anybody,
-
10:08 - 10:10it has zero information value.
-
10:10 - 10:13There's no point in sending that message.
-
10:14 - 10:17But if I have to prove who I am,
-
10:17 - 10:18I'll never send that message.
-
10:18 - 10:22It's just like the nurse in the hospital
reporting the drunk surgeon. -
10:22 - 10:25That message will only happen
if I'm anonymous. -
10:25 - 10:30So the system has to have ways
of providing anonymity there, -
10:30 - 10:32otherwise we don't get
where we want to get to. -
10:32 - 10:35So four issues.
So what are we going to do about it? -
10:35 - 10:39Well, what we tend to do about it
-
10:40 - 10:42is we think about Orwell space.
-
10:42 - 10:45And we try to make electronic versions
-
10:45 - 10:47of the identity card
that we got rid of in 1953. -
10:47 - 10:50So we think if we had a card,
-
10:50 - 10:51call it a Facebook login,
-
10:51 - 10:53which proves who you are,
-
10:53 - 10:56and I make you carry it all the time,
that solves the problem. -
10:56 - 10:58And of course, for all those reasons
I've just outlined, -
10:58 - 11:01it doesn't, and it might, actually,
make some problems worse. -
11:01 - 11:04The more times you're forced
to use your real identity, -
11:04 - 11:06certainly in transactional terms,
-
11:06 - 11:09the more likely that identity
is to get stolen and subverted. -
11:09 - 11:11The goal is to stop people
from using identity -
11:11 - 11:13in transactions which don't need identity,
-
11:13 - 11:15which is actually almost all transactions.
-
11:15 - 11:17Almost all of the transactions you do
-
11:17 - 11:19are not, who are you?
-
11:19 - 11:21They're, are you allowed to drive the car,
-
11:21 - 11:24are you allowed in the building,
are you over 18, etcetera, etcetera. -
11:25 - 11:27So my suggestion - I, like James,
-
11:27 - 11:30think that there should be
a resurgence of interest in R & D. -
11:30 - 11:32I think this is a solvable problem.
-
11:32 - 11:33It's something we can do about.
-
11:33 - 11:36Naturally, in these circumstances,
I turn to Doctor Who. -
11:36 - 11:38Because in this,
-
11:38 - 11:40as in so many other walks of life,
-
11:40 - 11:43Doctor Who has already shown us
the answer. -
11:43 - 11:44So I should say,
-
11:44 - 11:46for some of our foreign visitors,
-
11:46 - 11:50Doctor Who is the greatest
living scientist in England, -
11:50 - 11:51(Laughter)
-
11:51 - 11:54and a beacon of truth and enlightenment
to all of us. -
11:54 - 11:58And this is Doctor Who
with his psychic paper. -
11:58 - 12:01Come on, you guys must have seen
Doctor Who's psychic paper. -
12:01 - 12:02You're not nerds if you say yes.
-
12:02 - 12:05Who's seen Doctor Who's psychic paper?
-
12:05 - 12:08Oh right, you were in the library
the whole time studying I guess. -
12:08 - 12:10Is that what you're going to tell us?
-
12:10 - 12:11Doctor Who's psychic paper
-
12:11 - 12:13is when you hold up the psychic paper,
-
12:13 - 12:14the person, in their brain,
-
12:14 - 12:16sees the thing that they need to see.
-
12:16 - 12:19So I want to show you a British passport,
-
12:19 - 12:21I hold up the psychic paper,
you see a British passport. -
12:21 - 12:23I want to get into a party,
-
12:23 - 12:25I hold up the psychic paper,
-
12:25 - 12:26I show you a party invitation.
-
12:26 - 12:28You see what you want to see.
-
12:28 - 12:31So what I'm saying is we need
to make an electronic version of that, -
12:31 - 12:34but with one tiny, tiny change,
-
12:34 - 12:36which is that it'll only show you
the British passport -
12:36 - 12:37if I've actually got one.
-
12:37 - 12:41It'll only show you the party invitation
if I actually have one. -
12:41 - 12:44It will only show you that I'm over 18
if I actually am. -
12:44 - 12:45But nothing else.
-
12:45 - 12:50So you're the bouncer at the pub,
you need to know that I'm over 18, -
12:50 - 12:52instead of showing you my driving license,
-
12:52 - 12:54which shows you I know how to drive,
-
12:54 - 12:57what my name is, my address,
all these kind of things, -
12:57 - 12:58I show you my psychic paper,
-
12:58 - 13:01and all it tells you
is am I over 18 or not. -
13:01 - 13:03Right.
-
13:03 - 13:04Is that just a pipe dream?
-
13:04 - 13:07Of course not, otherwise
I wouldn't be here talking to you. -
13:07 - 13:09So in order to build that
and make it work, -
13:09 - 13:12I'm only going to name these things,
I'll not go into them, -
13:12 - 13:13we need a plan,
-
13:13 - 13:15which is we're going to build this
-
13:15 - 13:17as an infrastructure for everybody to use,
-
13:17 - 13:18to solve all of these problems.
-
13:18 - 13:20We're going to make a utility,
-
13:20 - 13:22the utility has to be universal,
-
13:22 - 13:23you can use it everywhere,
-
13:23 - 13:26I'm just giving you little flashes
of the technology as we go along. -
13:26 - 13:27That's a Japanese ATM,
-
13:27 - 13:30the fingerprint template
is stored inside the mobile phone. -
13:30 - 13:32So when you want to draw money out,
-
13:32 - 13:35you put the mobile phone on the ATM,
and touch your finger, -
13:35 - 13:37your fingerprint goes through
to the phone, -
13:37 - 13:39the phone says yes, that's whoever,
-
13:39 - 13:41and the ATM then gives you some money.
-
13:41 - 13:43It has to be a utility
that you can use everywhere. -
13:43 - 13:45It has to be absolutely convenient,
-
13:45 - 13:48that's me going into the pub.
-
13:48 - 13:51All the device on the door of the pub
is allowed is, -
13:51 - 13:54is this person over 18
and not barred from the pub? -
13:54 - 13:58And so the idea is,
you touch your ID card to the door, -
13:58 - 14:00and if I am allowed in,
it shows my picture, -
14:00 - 14:02if I'm not allowed in,
it shows a red cross. -
14:02 - 14:04It doesn't disclose any other information.
-
14:04 - 14:07It has to have no special gadgets.
That can only mean one thing, -
14:07 - 14:10following on from Ross's statement,
which I agree with completely. -
14:10 - 14:13If it means no special gadgets,
it has to run on a mobile phone. -
14:13 - 14:16That's the only choice we have,
we have to make it work on mobile phones. -
14:16 - 14:19There are 6.6 billion
mobile phone subscriptions. -
14:19 - 14:22My favorite statistic of all time,
only 4 billion toothbrushes in the world. -
14:22 - 14:24That means something,
-
14:24 - 14:25I don't know what.
(Laughter) -
14:25 - 14:27I rely on our futurologists to tell me.
-
14:27 - 14:29It has to be a utility
which is extensible. -
14:29 - 14:32So it has to be something
that anybody could build on. -
14:32 - 14:34Anybody should be able
to use this infrastructure, -
14:34 - 14:36you don't need permissions,
licenses, whatever, -
14:36 - 14:39anyone should be able
to write some code to do this. -
14:41 - 14:42You know what symmetry is,
-
14:42 - 14:44so you don't need a picture of it.
-
14:44 - 14:46This is how we're going to do it.
-
14:46 - 14:49We're going to do it using phones,
using mobile proximity. -
14:49 - 14:52I'm going to suggest to you
the technology to implement -
14:52 - 14:54Doctor Who's psychic paper
is already here, -
14:54 - 14:57and if any of you have got one of the new
Barclay's debit cards -
14:57 - 14:58with the contactless interface on it,
-
14:58 - 15:00you've already got that technology.
-
15:00 - 15:02If you've ever been up to the big city,
-
15:02 - 15:04and used an Oyster card at all,
-
15:04 - 15:05does that ring any bells to anybody?
-
15:05 - 15:06The technology already exists.
-
15:06 - 15:09The first phones
that have the technology built in, -
15:09 - 15:11the Google Nexus, the S2,
the Samsung Wifi 7.9, -
15:11 - 15:14the first phones that have
the technology built into them -
15:14 - 15:15are already in the shops.
-
15:15 - 15:16So the idea that the gas man
-
15:16 - 15:18can turn up at my mom's door
-
15:18 - 15:20and he can show my mom his phone,
-
15:20 - 15:22and she can tap it with her phone,
-
15:22 - 15:25and it will come up with green
if he really is from British Gas -
15:25 - 15:26and allowed in,
-
15:26 - 15:28and it'll come up with red if he isn't.
-
15:28 - 15:30We have the technology to do that.
-
15:30 - 15:31And what's more,
-
15:31 - 15:34although some of those things
sounded a bit counter-intuitive, -
15:34 - 15:36like proving I'm over 18
without proving who I am, -
15:36 - 15:38the cryptography to do that
not only exists, -
15:38 - 15:41it's extremely well-known
and well-understood. -
15:41 - 15:44Digital signatures, the blinding
of public key certificates, -
15:44 - 15:46these technologies have been around
for a while, -
15:46 - 15:48we've just had no way
of packaging them up. -
15:48 - 15:50So the technology already exists.
-
15:50 - 15:52We know it works.
-
15:52 - 15:55There are a few examples
of the technology being used -
15:55 - 15:56in experimental places.
-
15:56 - 15:57That's London Fashion Week,
-
15:57 - 15:59where we built a system with O2,
-
15:59 - 16:02that's for the Wireless Festival
in Hyde Park, -
16:02 - 16:03you can see the persons
-
16:03 - 16:06walking in with their VIP band,
it's just being checked -
16:06 - 16:08by the Nokia phone
that's reading the band. -
16:08 - 16:11I'm only putting those up to show you
these things are prosaic, -
16:11 - 16:13this stuff works in these environments.
-
16:13 - 16:14They don't need to be special.
-
16:14 - 16:18So finally, I know that you can do this,
-
16:19 - 16:22because if you saw
the episode of Doctor Who, -
16:22 - 16:24the Easter special of Doctor Who,
-
16:24 - 16:28where he went to Mars in a bus,
-
16:28 - 16:30I should say again
for our foreign students, -
16:30 - 16:32that doesn't happen every episode.
-
16:32 - 16:33This was a very special case.
-
16:33 - 16:36So in the episode where he goes
to Mars in a London bus, -
16:36 - 16:37I can't show you the clip,
-
16:37 - 16:40due to the outrageous restrictions
of Queen Anne-style copyright -
16:40 - 16:42by the BBC,
-
16:42 - 16:45but in the episode where he goes
to Mars in a London bus, -
16:45 - 16:49Doctor Who is clearly shown
getting on to the bus -
16:49 - 16:50with the Oyster card reader
-
16:50 - 16:52using his psychic paper.
-
16:52 - 16:54Which proves that psychic paper
-
16:54 - 16:56has an MSE interface.
-
16:56 - 16:58Thank you very much.
(Applause)
- Title:
- Identity in the 21st Century | David Birch | TEDxSussexUniversity
- Description:
-
Bartenders needs to know your age, retailers need your PIN, but almost no one actually needs your name -- except for identity thieves. ID expert David Birch proposes a safer approach to personal identification -- a "fractured" approach -- that would almost never require your real name.
- Video Language:
- English
- Team:
- closed TED
- Project:
- TEDxTalks
- Duration:
- 17:06
Ivana Korom edited English subtitles for Identity in the 21st Century | David Birch | TEDxSussexUniversity | ||
Ivana Korom edited English subtitles for Identity in the 21st Century | David Birch | TEDxSussexUniversity | ||
Ivana Korom edited English subtitles for Identity in the 21st Century | David Birch | TEDxSussexUniversity | ||
TED Translators admin approved English subtitles for Identity in the 21st Century | David Birch | TEDxSussexUniversity | ||
Ivana Korom accepted English subtitles for Identity in the 21st Century | David Birch | TEDxSussexUniversity | ||
TED Translators admin edited English subtitles for Identity in the 21st Century | David Birch | TEDxSussexUniversity | ||
TED Translators admin edited English subtitles for Identity in the 21st Century | David Birch | TEDxSussexUniversity | ||
TED Translators admin edited English subtitles for Identity in the 21st Century | David Birch | TEDxSussexUniversity |