Return to Video

A new way to stop identity theft

  • 0:02 - 0:04
    So I thought I'd talk about identity.
  • 0:04 - 0:06
    That's sort of an
    interesting enough topic to me.
  • 0:06 - 0:09
    And the reason was,
    because when I was asked to do this,
  • 0:09 - 0:13
    I'd just read, in one of the papers,
    I can't remember,
  • 0:13 - 0:16
    something from someone at Facebook
    saying, well,
  • 0:16 - 0:18
    "we need to make everybody
    use their real names."
  • 0:18 - 0:20
    and then that's basically
    all the problems solved.
  • 0:20 - 0:22
    And that's so wrong,
  • 0:22 - 0:26
    that's such a fundamentally,
    reactionary view of identity,
  • 0:26 - 0:28
    and it's going to get us
    into all sorts of trouble.
  • 0:28 - 0:30
    And so what I thought I'd do
  • 0:30 - 0:34
    is I'll explain four
    sort of problems about it,
  • 0:34 - 0:36
    and then I'll suggest a solution,
  • 0:36 - 0:38
    which hopefully you
    might find interesting.
  • 0:38 - 0:40
    So just to frame the problem,
  • 0:40 - 0:42
    what does authenticity mean?
  • 0:42 - 0:47
    That's me, that's
    a camera phone picture of me
  • 0:47 - 0:48
    looking at a painting.
  • 0:48 - 0:48
    [What's the Problem?]
  • 0:48 - 0:49
    That's a painting that was painted
  • 0:50 - 0:52
    by a very famous forger,
  • 0:52 - 0:54
    and because I'm not very good
    at presentations,
  • 0:54 - 0:57
    I already can't remember the name
    that I wrote on my card.
  • 0:57 - 1:00
    And he was incarcerated
    in, I think, Wakefield Prison
  • 1:00 - 1:04
    for forging masterpieces by,
    I think, French Impressionists.
  • 1:04 - 1:07
    And he's so good at it,
    that when he was in prison,
  • 1:07 - 1:09
    everybody in prison,
    the governor and whatever,
  • 1:09 - 1:11
    wanted him to paint masterpieces
    to put on the walls,
  • 1:11 - 1:13
    because they were so good.
  • 1:13 - 1:14
    And so that's a masterpiece,
  • 1:14 - 1:16
    which is a fake of a masterpiece,
  • 1:16 - 1:23
    and bonded into the canvas is a chip
    which identifies that as a real fake,
  • 1:23 - 1:24
    if you see what I mean.
  • 1:24 - 1:25
    (Laughter)
  • 1:25 - 1:28
    So when we're talking about authenticity,
  • 1:28 - 1:33
    it's a little more fractal than it appears
    and that's a good example to show it.
  • 1:33 - 1:37
    I tried to pick four problems
    that will frame the issue properly.
  • 1:37 - 1:39
    So the first problem, I thought,
  • 1:39 - 1:40
    Chip and PIN, right?
  • 1:40 - 1:42
    [Banks and legacies
    bringing down the system from within]
  • 1:42 - 1:43
    [Offline solutions do not work online]
  • 1:43 - 1:45
    I'm guessing everyone's got
    a chip and PIN card, right?
  • 1:45 - 1:47
    So why is that a good example?
  • 1:47 - 1:50
    That's the example of how
    legacy thinking about identity
  • 1:50 - 1:53
    subverts the security
    of a well-constructed system.
  • 1:53 - 1:56
    That chip and PIN card
    that's in your pocket
  • 1:56 - 1:59
    has a little chip on it
    that cost millions of pounds to develop,
  • 1:59 - 2:01
    is extremely secure,
  • 2:01 - 2:03
    you can put scanning
    electron microscopes on it,
  • 2:03 - 2:05
    you can try and grind it down,
    blah blah blah.
  • 2:05 - 2:09
    Those chips have never been broken,
    whatever you read in the paper.
  • 2:09 - 2:12
    And for a joke,
    we take that super-secure chip
  • 2:12 - 2:16
    and we bond it to a trivially
    counterfeitable magnetic stripe
  • 2:16 - 2:19
    and for very lazy criminals,
    we still emboss the card.
  • 2:19 - 2:23
    So if you're a criminal in a hurry
    and you need to copy someone's card,
  • 2:23 - 2:25
    you can just stick a piece of paper on it
    and rub a pencil over it
  • 2:25 - 2:27
    just to sort of speed things up.
  • 2:27 - 2:30
    And even more amusingly,
    and on my debit card too,
  • 2:30 - 2:32
    we print the name and the SALT code
    and everything else on the front too.
  • 2:32 - 2:36
    Why?
  • 2:36 - 2:40
    There is no earthly reason why your name
    is printed on a chip and PIN card.
  • 2:40 - 2:41
    And if you think about it,
  • 2:41 - 2:45
    it's even more insidious and perverse
    than it seems at first.
  • 2:45 - 2:46
    Because the only people that benefit
  • 2:46 - 2:49
    from having the name
    on the card are criminals.
  • 2:49 - 2:51
    You know what your name is, right?
  • 2:51 - 2:51
    (Laughter)
  • 2:52 - 2:54
    And when you go into
    a shop and buy something,
  • 2:54 - 2:57
    it's a PIN, he doesn't care
    what the name is.
  • 2:57 - 2:59
    The only place where you ever have
    to write your name on the back
  • 2:59 - 3:01
    is in America at the moment.
  • 3:01 - 3:02
    And whenever I go to America,
  • 3:02 - 3:04
    and I have to pay with a mag stripe
    on the back of the card,
  • 3:04 - 3:05
    I always sign it Carlos Tethers anyway,
  • 3:05 - 3:07
    just as a security mechanism,
  • 3:07 - 3:09
    because if a transaction
    ever gets disputed,
  • 3:09 - 3:11
    and it comes back and it says Dave Birch,
  • 3:11 - 3:13
    I know it must have been a criminal,
  • 3:13 - 3:16
    because I would never sign it Dave Birch.
  • 3:16 - 3:18
    (Laughter)
  • 3:18 - 3:20
    So if you drop your card in the street,
  • 3:20 - 3:21
    it means a criminal
    can pick it up and read it.
  • 3:21 - 3:22
    They know the name,
  • 3:22 - 3:24
    from the name they can find the address,
  • 3:24 - 3:26
    and then they can go off
    and buy stuff online.
  • 3:26 - 3:29
    Why do we put the name on the card?
  • 3:29 - 3:32
    Because we think identity
    is something to do with names,
  • 3:32 - 3:36
    and because we're rooted
    in the idea of the identity card,
  • 3:36 - 3:37
    which obsesses us.
  • 3:37 - 3:40
    And I know it crashed and burned
    a couple of years ago,
  • 3:40 - 3:44
    but if you're someone in politics
    or the home office or whatever,
  • 3:44 - 3:46
    and you think about identity,
  • 3:46 - 3:49
    you can only think of identity
    in terms of cards with names on them.
  • 3:49 - 3:52
    And that's very subversive
    in a modern world.
  • 3:52 - 3:54
    So the second example I thought I'd use
  • 3:54 - 3:56
    is chatrooms.
  • 3:56 - 3:57
    [Chatrooms and Children]
  • 3:57 - 3:59
    I'm very proud of that picture,
    that's my son
  • 3:59 - 4:03
    playing in his band with his friends
    for the first-ever gig,
  • 4:03 - 4:05
    I believe you call it, where he got paid.
  • 4:05 - 4:06
    (Laughter)
  • 4:06 - 4:08
    And I love that picture.
  • 4:08 - 4:11
    I like the picture of him
    getting into medical school a lot better,
  • 4:11 - 4:11
    (Laughter)
  • 4:12 - 4:14
    I like that picture for the moment.
  • 4:14 - 4:15
    Why do I use that picture?
  • 4:15 - 4:20
    Because that was very interesting,
    watching that experience as an old person.
  • 4:20 - 4:21
    So him and his friends,
  • 4:21 - 4:24
    they get together, they booked a room,
    like a church hall,
  • 4:24 - 4:26
    and they got all their friends
    who had bands,
  • 4:26 - 4:27
    and they got them together,
  • 4:27 - 4:29
    and they do it all on Facebook,
  • 4:29 - 4:32
    and then they sell tickets,
    and the first band on the -
  • 4:32 - 4:33
    I was going to say "menu,"
  • 4:33 - 4:36
    that's probably
    the wrong word for it, isn't it?
  • 4:36 - 4:38
    The first band on the list of bands
  • 4:38 - 4:42
    that appears at some
    public music performance of some kind
  • 4:42 - 4:44
    gets the sales from the first 20 tickets,
  • 4:44 - 4:46
    then the next band gets the next 20,
  • 4:46 - 4:47
    and so on.
  • 4:47 - 4:48
    They were at the bottom of the menu,
  • 4:48 - 4:51
    they were like fifth,
    I thought they had no chance.
  • 4:51 - 4:53
    He actually got 20 quid. Fantastic, right?
  • 4:53 - 4:55
    But my point is,
    that all worked perfectly,
  • 4:55 - 4:58
    except on the web.
  • 4:58 - 5:00
    So they're sitting on Facebook,
  • 5:00 - 5:03
    and they're sending these messages
    and arranging things
  • 5:03 - 5:05
    and they don't know who anybody is, right?
  • 5:05 - 5:07
    That's the big problem
    we're trying to solve.
  • 5:07 - 5:09
    If only they were using the real names,
  • 5:09 - 5:11
    Then you wouldn't be worried
    about them on the Internet.
  • 5:11 - 5:13
    And so when he says to me,
  • 5:13 - 5:17
    "Oh, I want to go to a chatroom
    to talk about guitars" or something,
  • 5:17 - 5:20
    I'm like, "oh, well,
    I don't want you to go into a chatroom
  • 5:20 - 5:24
    to talk about guitars, because
    they might not all be your friends,
  • 5:24 - 5:26
    and some of the people
    that are in the chatroom
  • 5:26 - 5:29
    might be perverts and teachers
    and vicars."
  • 5:29 - 5:31
    (Laughter)
  • 5:31 - 5:34
    I mean, they generally are,
    when you look in the paper, right?
  • 5:34 - 5:37
    So I want to know who
    all the people in the chatroom are.
  • 5:37 - 5:39
    So okay, you can go in the chatroom,
  • 5:39 - 5:42
    but only if everybody in the chatroom
    is using their real names,
  • 5:42 - 5:46
    and they submit full copies
    of their police report.
  • 5:46 - 5:49
    But of course, if anybody
    in the chatroom asked for his real name,
  • 5:49 - 5:52
    I'd say no.
    You can't give them your real name.
  • 5:52 - 5:54
    Because what happens
    if they turn out to be perverts,
  • 5:54 - 5:57
    and teachers and whatever.
  • 5:57 - 5:59
    So you have this odd sort of paradox
  • 5:59 - 6:01
    where I'm happy for him
    to go into this space
  • 6:01 - 6:03
    if I know who everybody else is,
  • 6:03 - 6:05
    but I don't want anybody else
    to know who he is.
  • 6:05 - 6:08
    And so you get
    this sort of logjam around identity
  • 6:08 - 6:09
    where you want full disclosure
    from everybody else,
  • 6:09 - 6:11
    but not from yourself.
  • 6:11 - 6:13
    And there's no progress, we get stuck.
  • 6:13 - 6:15
    And so the chatroom thing
    doesn't work properly,
  • 6:15 - 6:19
    and it's a very bad way
    of thinking about identity.
  • 6:19 - 6:22
    So on my RSS feed,
    I saw this thing about -
  • 6:22 - 6:25
    I just said something bad
    about my RSS feed, didn't I?
  • 6:25 - 6:27
    I should stop saying it like that.
  • 6:27 - 6:28
    For some random reason, I can't imagine,
  • 6:28 - 6:30
    something about cheerleaders
    turned up in my inbox.
  • 6:30 - 6:32
    And I read this story about cheerleaders,
  • 6:32 - 6:34
    and it's a fascinating story.
  • 6:34 - 6:36
    This happened a couple of years ago
    in the U.S.
  • 6:36 - 6:39
    There were some cheerleaders
    in a team at a high school
  • 6:39 - 6:41
    in the U.S., and they said mean things
  • 6:41 - 6:43
    about their cheerleading coach,
  • 6:43 - 6:45
    as I'm sure kids do
    about all of their teachers
  • 6:45 - 6:46
    all of the time,
  • 6:46 - 6:48
    and somehow the cheerleading coach
    found out about this.
  • 6:48 - 6:50
    She was very upset.
  • 6:50 - 6:52
    And so she went to one of the girls,
    and said,
  • 6:52 - 6:54
    "you have to give me
    your Facebook password."
  • 6:54 - 6:58
    I read this all the time,
    where even at some universities
  • 6:58 - 6:59
    and places of education,
  • 6:59 - 7:00
    kids are forced to hand over
    their Facebook passwords.
  • 7:00 - 7:03
    So you've got to give them
    your Facebook password.
  • 7:03 - 7:04
    She was a kid!
  • 7:04 - 7:05
    What she should have said
  • 7:05 - 7:06
    is, "my lawyer will be calling you
  • 7:06 - 7:07
    first thing in the morning.
  • 7:07 - 7:09
    It's an outrageous imposition
  • 7:09 - 7:11
    on my 4th Amendment right to privacy,
  • 7:11 - 7:12
    and you're going to be sued
  • 7:12 - 7:13
    for all the money you've got."
  • 7:13 - 7:14
    That's what she should have said.
  • 7:14 - 7:15
    But she's a kid,
  • 7:15 - 7:16
    so she hands over the password.
  • 7:16 - 7:18
    The teacher can't log into Facebook,
  • 7:18 - 7:22
    because the school
    has blocked access to Facebook.
  • 7:22 - 7:24
    So the teacher can't log into Facebook
    until she gets home.
  • 7:24 - 7:25
    So the girl tells her friends,
  • 7:25 - 7:26
    guess what happened?
  • 7:26 - 7:27
    The teacher logged in, she knows.
  • 7:27 - 7:29
    So the girls just all logged into Facebook
    on their phones,
  • 7:29 - 7:31
    and deleted their profiles.
  • 7:31 - 7:34
    And so when the teacher logged in,
    there was nothing there.
  • 7:34 - 7:40
    My point is, those identities,
    they don't think about them the same way.
  • 7:40 - 7:43
    Identity is, especially when
    you're a teenager, a fluid thing.
  • 7:43 - 7:45
    You have lots of identities.
  • 7:45 - 7:47
    And you can have an identity,
    you don't like it,
  • 7:47 - 7:51
    because it's subverted in some way,
    or it's insecure, or it's inappropriate,
  • 7:51 - 7:53
    you just delete it and get another one.
  • 7:53 - 7:56
    The idea that you have an identity
    that's given to you by someone,
  • 7:56 - 7:57
    the government or whatever,
  • 7:57 - 7:59
    and you have to stick with that identity
    and use it in all places,
  • 7:59 - 8:01
    that's absolutely wrong.
  • 8:01 - 8:04
    Why would you want to really know
    who someone was on Facebook,
  • 8:04 - 8:07
    unless you wanted to abuse them
    and harass them in some way?
  • 8:07 - 8:09
    And it just doesn't work properly.
  • 8:09 - 8:12
    And my fourth example is
    there are some cases
  • 8:12 - 8:14
    where you really want to be -
  • 8:14 - 8:18
    In case you're wondering,
    that's me at the G20 protest.
  • 8:18 - 8:21
    I wasn't actually at the G20 protest,
    but I had a meeting at a bank
  • 8:21 - 8:25
    on the day of the G20 protest,
    and I got an email from the bank
  • 8:25 - 8:29
    saying please don't wear a suit,
    because it'll inflame the protesters.
  • 8:29 - 8:31
    I look pretty good in a suit, frankly,
  • 8:31 - 8:33
    so you can see why it would drive them
  • 8:33 - 8:34
    into an anti-capitalist frenzy.
  • 8:34 - 8:35
    (Laughter)
  • 8:35 - 8:36
    So I thought, well, look.
  • 8:36 - 8:39
    If I don't want to inflame the protesters,
  • 8:39 - 8:40
    the obvious thing to do
  • 8:40 - 8:41
    is go dressed as a protester.
  • 8:41 - 8:43
    So I went dressed completely in black,
  • 8:43 - 8:45
    you know, with a black balaclava,
  • 8:45 - 8:46
    I had black gloves on,
  • 8:46 - 8:48
    but I've taken them off
    to sign the visitor's book.
  • 8:48 - 8:48
    (Laughter)
  • 8:48 - 8:50
    I'm wearing black trousers, black boots,
  • 8:50 - 8:52
    I'm dressed completely in black.
  • 8:52 - 8:53
    I go into the bank at 10 o'clock,
  • 8:53 - 8:54
    go, "Hi, I'm Dave Birch,
  • 8:54 - 8:55
    I've got a 3 o'clock
    with so and so there."
  • 8:55 - 8:57
    Sure. They sign me in.
  • 8:57 - 8:59
    There's my visitor's badge.
  • 8:59 - 9:00
    (Laughter)
  • 9:00 - 9:02
    So this nonsense
  • 9:02 - 9:04
    about you've got to have real names
    on Facebook and whatever,
  • 9:04 - 9:06
    that gets you that kind of security.
  • 9:06 - 9:10
    That gets you security theater,
    where there's no actual security,
  • 9:10 - 9:14
    but people are sort of playing parts
    in a play about security.
  • 9:14 - 9:15
    And as long as
    everybody learns their lines,
  • 9:15 - 9:16
    everyone's happy.
  • 9:16 - 9:19
    But it's not real security.
  • 9:19 - 9:22
    Especially because I hate banks
    more than the G20 protesters do,
  • 9:22 - 9:24
    because I work for them.
  • 9:24 - 9:26
    I know that things are actually worse
    than these guys think.
  • 9:27 - 9:28
    (Laughter)
  • 9:30 - 9:35
    But suppose I worked
    next to somebody in a bank
  • 9:35 - 9:38
    who was doing something.
  • 9:45 - 9:47
    Suppose I was sitting
    next to a rogue trader,
  • 9:47 - 9:49
    and I want to report it
    to the boss of the bank.
  • 9:49 - 9:51
    So I log on to do
    a little bit of whistleblowing.
  • 9:51 - 9:53
    I send a message,
    this guy's a rogue trader.
  • 9:53 - 9:55
    That message is meaningless
  • 9:55 - 9:58
    if you don't know
    that I'm a trader at the bank.
  • 9:58 - 10:00
    If that message just comes from anybody,
  • 10:00 - 10:02
    it has zero information value.
  • 10:02 - 10:05
    There's no point in sending that message.
  • 10:06 - 10:09
    But if I have to prove who I am,
  • 10:09 - 10:11
    I'll never send that message.
  • 10:11 - 10:14
    It's just like the nurse in the hospital
    reporting the drunk surgeon.
  • 10:14 - 10:17
    That message will only happen
    if I'm anonymous.
  • 10:17 - 10:22
    So the system has to have ways
    of providing anonymity there,
  • 10:22 - 10:24
    otherwise we don't get
    where we want to get to.
  • 10:24 - 10:27
    So four issues.
    So what are we going to do about it?
  • 10:27 - 10:32
    Well, what we tend to do about it
  • 10:32 - 10:34
    is we think about Orwell space.
  • 10:34 - 10:37
    And we try to make electronic versions
  • 10:37 - 10:40
    of the identity card
    that we got rid of in 1953.
  • 10:40 - 10:42
    So we think if we had a card,
  • 10:42 - 10:44
    call it a Facebook login,
  • 10:44 - 10:45
    which proves who you are,
  • 10:45 - 10:47
    and I make you carry it all the time,
  • 10:47 - 10:48
    that solves the problem.
  • 10:48 - 10:50
    And of course, for all those reasons
    I've just outlined,
  • 10:50 - 10:51
    it doesn't, and it might, actually,
  • 10:51 - 10:52
    make some problems worse.
  • 10:52 - 10:55
    The more times you're forced
    to use your real identity,
  • 10:55 - 10:57
    certainly in transactional terms,
  • 10:57 - 11:00
    the more likely that identity
    is to get stolen and subverted.
  • 11:00 - 11:02
    The goal is to stop people
    from using identity
  • 11:02 - 11:04
    in transactions which don't need identity,
  • 11:04 - 11:07
    which is actually almost all transactions.
  • 11:07 - 11:09
    Almost all of the transactions you do
  • 11:09 - 11:11
    are not, who are you?
  • 11:11 - 11:13
    They're, are you allowed to drive the car,
  • 11:13 - 11:15
    are you allowed in the building,
  • 11:15 - 11:15
    are you over 18,
  • 11:15 - 11:17
    etcetera, etcetera.
  • 11:18 - 11:19
    So my suggestion-I, like James,
  • 11:19 - 11:22
    think that there should be
    a resurgence of interest in R & D.
  • 11:23 - 11:23
    I think this is a solvable problem.
  • 11:23 - 11:25
    It's something we can do about.
  • 11:25 - 11:27
    Naturally, in these circumstances,
  • 11:27 - 11:28
    I turn to Doctor Who.
  • 11:28 - 11:31
    Because in this,
  • 11:31 - 11:32
    as in so many other walks of life,
  • 11:32 - 11:35
    Doctor Who has already shown
    us the answer.
  • 11:35 - 11:36
    So I should say,
  • 11:36 - 11:38
    for some of our foreign visitors,
  • 11:38 - 11:42
    Doctor Who is the greatest
    living scientist in England,
  • 11:42 - 11:44
    (Laughter)
  • 11:44 - 11:47
    and a beacon of truth and enlightenment
    to all of us.
  • 11:47 - 11:51
    And this is Doctor Who
    with his psychic paper.
  • 11:51 - 11:53
    Come on, you guys must have seen
    Doctor Who's psychic paper.
  • 11:53 - 11:55
    You're not nerds if you say yes.
  • 11:55 - 11:57
    Who's seen Doctor Who's psychic paper?
  • 11:57 - 11:59
    Oh right, you were in the library
    the whole time studying I guess.
  • 11:59 - 12:01
    Is that what you're going to tell us?
  • 12:01 - 12:03
    Doctor Who's psychic paper
  • 12:03 - 12:05
    is when you hold up the psychic paper,
  • 12:05 - 12:06
    the person, in their brain,
  • 12:06 - 12:09
    sees the thing that they need to see.
  • 12:09 - 12:11
    So I want to show you a British passport,
  • 12:11 - 12:12
    I hold up the psychic paper,
  • 12:12 - 12:14
    you see a British passport.
  • 12:14 - 12:15
    I want to get into a party,
  • 12:15 - 12:17
    I hold up the psychic paper,
  • 12:17 - 12:18
    I show you a party invitation.
  • 12:18 - 12:20
    You see what you want to see.
  • 12:20 - 12:24
    So what I'm saying is we need
    to make an electronic version of that,
  • 12:24 - 12:26
    but with one tiny, tiny change,
  • 12:26 - 12:28
    which is that it'll only show you
    the British passport
  • 12:28 - 12:30
    if I've actually got one.
  • 12:30 - 12:31
    It'll only show you the party invitation
  • 12:31 - 12:32
    if I actually have one.
  • 12:32 - 12:35
    It will only show you that I'm over 18
    if I actually am over 18.
  • 12:35 - 12:38
    But nothing else.
  • 12:38 - 12:42
    So you're the bouncer at the pub,
    you need to know that I'm over 18,
  • 12:42 - 12:44
    instead of showing you my driving license,
  • 12:44 - 12:46
    which shows you I know how to drive,
  • 12:46 - 12:49
    what my name is, my address,
    all these kind of things,
  • 12:49 - 12:50
    I show you my psychic paper,
  • 12:50 - 12:54
    and all it tells you is
    am I over 18 or not.
  • 12:54 - 12:55
    Right.
  • 12:55 - 12:56
    Is that just a pipe dream?
  • 12:56 - 12:58
    Of course not, otherwise
    I wouldn't be here talking to you.
  • 12:58 - 13:01
    So in order to build that
    and make it work,
  • 13:01 - 13:04
    I'm only going to name these things,
    I'll not go into them,
  • 13:04 - 13:05
    we need a plan,
  • 13:05 - 13:06
    which is we're going to build this
  • 13:06 - 13:08
    as an infrastructure for everybody to use,
  • 13:08 - 13:10
    to solve all of these problems.
  • 13:10 - 13:12
    We're going to make a utility,
  • 13:12 - 13:14
    the utility has to be universal,
  • 13:14 - 13:15
    you can use it everywhere,
  • 13:15 - 13:18
    I'm just giving you little flashes
    of the technology as we go along.
  • 13:18 - 13:19
    That's a Japanese ATM,
  • 13:19 - 13:22
    the fingerprint template
    is stored inside the mobile phone.
  • 13:22 - 13:23
    So when you want to draw money out,
  • 13:23 - 13:25
    you put the mobile phone on the ATM,
  • 13:25 - 13:26
    and touch your finger,
  • 13:26 - 13:28
    your fingerprint goes through
    to the phone,
  • 13:28 - 13:30
    the phone says yes, that's whoever,
  • 13:30 - 13:32
    and the ATM then gives you some money.
  • 13:32 - 13:35
    It has to be a utility
    that you can use everywhere.
  • 13:35 - 13:37
    It has to be absolutely convenient,
  • 13:37 - 13:40
    that's me going into the pub.
  • 13:40 - 13:43
    All the device on the door
    of the pub is allowed is,
  • 13:43 - 13:47
    is this person over 18
    and not barred from the pub?
  • 13:47 - 13:50
    And so the idea is,
    you touch your ID card to the door,
  • 13:50 - 13:52
    and if I am allowed in,
    it shows my picture,
  • 13:52 - 13:53
    if I'm not allowed in,
    it shows a red cross.
  • 13:53 - 13:55
    It doesn't disclose any other information.
  • 13:55 - 13:57
    It has to have no special gadgets.
  • 13:57 - 13:59
    That can only mean one thing,
  • 13:59 - 14:00
    following on from Ross's statement,
  • 14:00 - 14:02
    which I agree with completely.
  • 14:02 - 14:03
    If it means no special gadgets,
  • 14:03 - 14:04
    it has to run on a mobile phone.
  • 14:04 - 14:05
    That's the only choice we have,
  • 14:05 - 14:07
    we have to make it work on mobile phones.
  • 14:07 - 14:08
    There are 6.6 billion
  • 14:08 - 14:09
    mobile phone subscriptions.
  • 14:09 - 14:11
    My favorite statistic of all time,
  • 14:11 - 14:13
    only 4 billion toothbrushes in the world.
  • 14:13 - 14:14
    That means something,
  • 14:14 - 14:15
    I don't know what.
  • 14:15 - 14:16
    (Laughter)
  • 14:16 - 14:19
    I rely on our futurologists to tell me.
  • 14:19 - 14:21
    It has to be a utility
    which is extensible.
  • 14:21 - 14:22
    So it has to be something
  • 14:22 - 14:24
    that anybody could build on.
  • 14:24 - 14:26
    Anybody should be able
    to use this infrastructure,
  • 14:26 - 14:28
    you don't need permissions,
    licenses, whatever,
  • 14:28 - 14:31
    anyone should be able
    to write some code to do this.
  • 14:33 - 14:34
    You know what symmetry is,
  • 14:34 - 14:37
    so you don't need a picture of it.
  • 14:37 - 14:38
    This is how we're going to do it.
  • 14:38 - 14:39
    We're going to do it using phones,
  • 14:39 - 14:40
    and we're going to do it
  • 14:40 - 14:41
    using mobile proximity.
  • 14:41 - 14:42
    I'm going to suggest to you
  • 14:42 - 14:43
    the technology to implement
  • 14:43 - 14:45
    Doctor Who's psychic paper
  • 14:45 - 14:46
    is already here, and if any of you
  • 14:46 - 14:49
    have got one of the new
    Barclay's debit cards
  • 14:49 - 14:50
    with the contactless interface on it,
  • 14:50 - 14:52
    you've already got that technology.
  • 14:52 - 14:53
    If you've ever been up to the big city,
  • 14:53 - 14:55
    and used an Oyster card at all,
  • 14:55 - 14:57
    does that ring any bells to anybody?
  • 14:57 - 14:58
    The technology already exists.
  • 14:58 - 14:59
    The first phones
  • 14:59 - 15:00
    that have the technology built in,
  • 15:00 - 15:02
    the Google Nexus, the S2,
  • 15:02 - 15:03
    the Samsung Wifi 7.9,
  • 15:03 - 15:04
    the first phones that have
  • 15:04 - 15:05
    the technology built into them
  • 15:05 - 15:06
    are already in the shops.
  • 15:06 - 15:08
    So the idea that the gas man
  • 15:08 - 15:10
    can turn up at my mom's door
  • 15:10 - 15:12
    and he can show my mom his phone,
  • 15:12 - 15:14
    and she can tap it with her phone,
  • 15:14 - 15:16
    and it will come up with green
    if he really is from British Gas
  • 15:16 - 15:17
    and allowed in,
  • 15:17 - 15:19
    and it'll come up with red if he isn't,
  • 15:19 - 15:19
    end of story.
  • 15:20 - 15:21
    We have the technology to do that.
  • 15:21 - 15:23
    And what's more,
  • 15:23 - 15:25
    although some of those things
    sounded a bit counter-intuitive,
  • 15:25 - 15:28
    like proving I'm over 18
    without proving who I am,
  • 15:28 - 15:30
    the cryptography to do that
    not only exists,
  • 15:30 - 15:32
    it's extremely well-known
    and well-understood.
  • 15:32 - 15:35
    Digital signatures, the blinding
    of public key certificates,
  • 15:35 - 15:36
    these technologies have been around
    for a while,
  • 15:36 - 15:38
    we've just had no way
    of packaging them up.
  • 15:38 - 15:41
    So the technology already exists.
  • 15:41 - 15:45
    We know it works,
  • 15:45 - 15:47
    There are a few examples
    of the technology being used
  • 15:47 - 15:48
    in experimental places.
  • 15:48 - 15:50
    That's London Fashion Week,
  • 15:50 - 15:51
    where we built a system with O2,
  • 15:51 - 15:54
    that's for the Wireless Festival
    in Hyde Park,
  • 15:54 - 15:55
    you can see the persons
  • 15:55 - 15:57
    walking in with their VIP band,
  • 15:57 - 15:58
    it's just being checked
  • 15:58 - 15:59
    by the Nokia phone
    that's reading the band.
  • 15:59 - 16:00
    I'm only putting those up to show you
  • 16:00 - 16:02
    these things are prosaic,
  • 16:02 - 16:04
    this stuff works in these environments.
  • 16:04 - 16:05
    They don't need to be special.
  • 16:05 - 16:11
    So finally, I know that you can do this,
  • 16:12 - 16:15
    because if you saw
    the episode of Doctor Who,
  • 16:15 - 16:17
    the Easter special of Doctor Who,
  • 16:17 - 16:20
    where he went to Mars in a bus,
  • 16:20 - 16:22
    I should say again
    for our foreign students,
  • 16:22 - 16:23
    that doesn't happen every episode.
  • 16:23 - 16:25
    This was a very special case.
  • 16:25 - 16:28
    So in the episode where
    he goes to Mars in a London bus,
  • 16:28 - 16:30
    I can't show you the clip,
  • 16:30 - 16:33
    due to the outrageous restrictions
    of Queen Anne-style copyright
  • 16:33 - 16:34
    by the BBC,
  • 16:35 - 16:37
    but in the episode
    where he goes to Mars in a London bus,
  • 16:37 - 16:41
    Doctor Who is clearly shown
    getting on to the bus
  • 16:41 - 16:43
    with the Oyster card reader
  • 16:43 - 16:44
    using his psychic paper.
  • 16:44 - 16:46
    Which proves that psychic paper
  • 16:46 - 16:48
    has an MSE interface.
  • 16:48 - 16:50
    Thank you very much.
Title:
A new way to stop identity theft
Speaker:
David Birch
Description:

Bartenders need to know your age, retailers need your PIN, but almost no one actually needs your name -- except for identity thieves. ID expert David Birch proposes a safer approach to personal identification -- a "fractured" approach -- that would almost never require your real name.

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
17:01
  • Hello,

    The English transcript was updated on 6/10/20. Please make a note of the following edits:

    02:30 salt code ---> sort code
    04:30 home office ---> Home Office
    15:02 the Samsung Wifi 7.9 ---> the Samsung Wave 578
    16:44 MSE ---> NSF

    Thank you!

English subtitles

Revisions Compare revisions