A new way to stop identity theft
-
0:02 - 0:04So I thought I'd talk about identity.
-
0:04 - 0:06That's sort of an
interesting enough topic to me. -
0:06 - 0:09And the reason was,
because when I was asked to do this, -
0:09 - 0:13I'd just read, in one of the papers,
I can't remember, -
0:13 - 0:16something from someone at Facebook
saying, well, -
0:16 - 0:18"we need to make everybody
use their real names." -
0:18 - 0:20and then that's basically
all the problems solved. -
0:20 - 0:22And that's so wrong,
-
0:22 - 0:26that's such a fundamentally,
reactionary view of identity, -
0:26 - 0:28and it's going to get us
into all sorts of trouble. -
0:28 - 0:30And so what I thought I'd do
-
0:30 - 0:34is I'll explain four
sort of problems about it, -
0:34 - 0:36and then I'll suggest a solution,
-
0:36 - 0:38which hopefully you
might find interesting. -
0:38 - 0:40So just to frame the problem,
-
0:40 - 0:42what does authenticity mean?
-
0:42 - 0:47That's me, that's
a camera phone picture of me -
0:47 - 0:48looking at a painting.
-
0:48 - 0:48[What's the Problem?]
-
0:48 - 0:49That's a painting that was painted
-
0:50 - 0:52by a very famous forger,
-
0:52 - 0:54and because I'm not very good
at presentations, -
0:54 - 0:57I already can't remember the name
that I wrote on my card. -
0:57 - 1:00And he was incarcerated
in, I think, Wakefield Prison -
1:00 - 1:04for forging masterpieces by,
I think, French Impressionists. -
1:04 - 1:07And he's so good at it,
that when he was in prison, -
1:07 - 1:09everybody in prison,
the governor and whatever, -
1:09 - 1:11wanted him to paint masterpieces
to put on the walls, -
1:11 - 1:13because they were so good.
-
1:13 - 1:14And so that's a masterpiece,
-
1:14 - 1:16which is a fake of a masterpiece,
-
1:16 - 1:23and bonded into the canvas is a chip
which identifies that as a real fake, -
1:23 - 1:24if you see what I mean.
-
1:24 - 1:25(Laughter)
-
1:25 - 1:28So when we're talking about authenticity,
-
1:28 - 1:33it's a little more fractal than it appears
and that's a good example to show it. -
1:33 - 1:37I tried to pick four problems
that will frame the issue properly. -
1:37 - 1:39So the first problem, I thought,
-
1:39 - 1:40Chip and PIN, right?
-
1:40 - 1:42[Banks and legacies
bringing down the system from within] -
1:42 - 1:43[Offline solutions do not work online]
-
1:43 - 1:45I'm guessing everyone's got
a chip and PIN card, right? -
1:45 - 1:47So why is that a good example?
-
1:47 - 1:50That's the example of how
legacy thinking about identity -
1:50 - 1:53subverts the security
of a well-constructed system. -
1:53 - 1:56That chip and PIN card
that's in your pocket -
1:56 - 1:59has a little chip on it
that cost millions of pounds to develop, -
1:59 - 2:01is extremely secure,
-
2:01 - 2:03you can put scanning
electron microscopes on it, -
2:03 - 2:05you can try and grind it down,
blah blah blah. -
2:05 - 2:09Those chips have never been broken,
whatever you read in the paper. -
2:09 - 2:12And for a joke,
we take that super-secure chip -
2:12 - 2:16and we bond it to a trivially
counterfeitable magnetic stripe -
2:16 - 2:19and for very lazy criminals,
we still emboss the card. -
2:19 - 2:23So if you're a criminal in a hurry
and you need to copy someone's card, -
2:23 - 2:25you can just stick a piece of paper on it
and rub a pencil over it -
2:25 - 2:27just to sort of speed things up.
-
2:27 - 2:30And even more amusingly,
and on my debit card too, -
2:30 - 2:32we print the name and the SALT code
and everything else on the front too. -
2:32 - 2:36Why?
-
2:36 - 2:40There is no earthly reason why your name
is printed on a chip and PIN card. -
2:40 - 2:41And if you think about it,
-
2:41 - 2:45it's even more insidious and perverse
than it seems at first. -
2:45 - 2:46Because the only people that benefit
-
2:46 - 2:49from having the name
on the card are criminals. -
2:49 - 2:51You know what your name is, right?
-
2:51 - 2:51(Laughter)
-
2:52 - 2:54And when you go into
a shop and buy something, -
2:54 - 2:57it's a PIN, he doesn't care
what the name is. -
2:57 - 2:59The only place where you ever have
to write your name on the back -
2:59 - 3:01is in America at the moment.
-
3:01 - 3:02And whenever I go to America,
-
3:02 - 3:04and I have to pay with a mag stripe
on the back of the card, -
3:04 - 3:05I always sign it Carlos Tethers anyway,
-
3:05 - 3:07just as a security mechanism,
-
3:07 - 3:09because if a transaction
ever gets disputed, -
3:09 - 3:11and it comes back and it says Dave Birch,
-
3:11 - 3:13I know it must have been a criminal,
-
3:13 - 3:16because I would never sign it Dave Birch.
-
3:16 - 3:18(Laughter)
-
3:18 - 3:20So if you drop your card in the street,
-
3:20 - 3:21it means a criminal
can pick it up and read it. -
3:21 - 3:22They know the name,
-
3:22 - 3:24from the name they can find the address,
-
3:24 - 3:26and then they can go off
and buy stuff online. -
3:26 - 3:29Why do we put the name on the card?
-
3:29 - 3:32Because we think identity
is something to do with names, -
3:32 - 3:36and because we're rooted
in the idea of the identity card, -
3:36 - 3:37which obsesses us.
-
3:37 - 3:40And I know it crashed and burned
a couple of years ago, -
3:40 - 3:44but if you're someone in politics
or the home office or whatever, -
3:44 - 3:46and you think about identity,
-
3:46 - 3:49you can only think of identity
in terms of cards with names on them. -
3:49 - 3:52And that's very subversive
in a modern world. -
3:52 - 3:54So the second example I thought I'd use
-
3:54 - 3:56is chatrooms.
-
3:56 - 3:57[Chatrooms and Children]
-
3:57 - 3:59I'm very proud of that picture,
that's my son -
3:59 - 4:03playing in his band with his friends
for the first-ever gig, -
4:03 - 4:05I believe you call it, where he got paid.
-
4:05 - 4:06(Laughter)
-
4:06 - 4:08And I love that picture.
-
4:08 - 4:11I like the picture of him
getting into medical school a lot better, -
4:11 - 4:11(Laughter)
-
4:12 - 4:14I like that picture for the moment.
-
4:14 - 4:15Why do I use that picture?
-
4:15 - 4:20Because that was very interesting,
watching that experience as an old person. -
4:20 - 4:21So him and his friends,
-
4:21 - 4:24they get together, they booked a room,
like a church hall, -
4:24 - 4:26and they got all their friends
who had bands, -
4:26 - 4:27and they got them together,
-
4:27 - 4:29and they do it all on Facebook,
-
4:29 - 4:32and then they sell tickets,
and the first band on the - -
4:32 - 4:33I was going to say "menu,"
-
4:33 - 4:36that's probably
the wrong word for it, isn't it? -
4:36 - 4:38The first band on the list of bands
-
4:38 - 4:42that appears at some
public music performance of some kind -
4:42 - 4:44gets the sales from the first 20 tickets,
-
4:44 - 4:46then the next band gets the next 20,
-
4:46 - 4:47and so on.
-
4:47 - 4:48They were at the bottom of the menu,
-
4:48 - 4:51they were like fifth,
I thought they had no chance. -
4:51 - 4:53He actually got 20 quid. Fantastic, right?
-
4:53 - 4:55But my point is,
that all worked perfectly, -
4:55 - 4:58except on the web.
-
4:58 - 5:00So they're sitting on Facebook,
-
5:00 - 5:03and they're sending these messages
and arranging things -
5:03 - 5:05and they don't know who anybody is, right?
-
5:05 - 5:07That's the big problem
we're trying to solve. -
5:07 - 5:09If only they were using the real names,
-
5:09 - 5:11Then you wouldn't be worried
about them on the Internet. -
5:11 - 5:13And so when he says to me,
-
5:13 - 5:17"Oh, I want to go to a chatroom
to talk about guitars" or something, -
5:17 - 5:20I'm like, "oh, well,
I don't want you to go into a chatroom -
5:20 - 5:24to talk about guitars, because
they might not all be your friends, -
5:24 - 5:26and some of the people
that are in the chatroom -
5:26 - 5:29might be perverts and teachers
and vicars." -
5:29 - 5:31(Laughter)
-
5:31 - 5:34I mean, they generally are,
when you look in the paper, right? -
5:34 - 5:37So I want to know who
all the people in the chatroom are. -
5:37 - 5:39So okay, you can go in the chatroom,
-
5:39 - 5:42but only if everybody in the chatroom
is using their real names, -
5:42 - 5:46and they submit full copies
of their police report. -
5:46 - 5:49But of course, if anybody
in the chatroom asked for his real name, -
5:49 - 5:52I'd say no.
You can't give them your real name. -
5:52 - 5:54Because what happens
if they turn out to be perverts, -
5:54 - 5:57and teachers and whatever.
-
5:57 - 5:59So you have this odd sort of paradox
-
5:59 - 6:01where I'm happy for him
to go into this space -
6:01 - 6:03if I know who everybody else is,
-
6:03 - 6:05but I don't want anybody else
to know who he is. -
6:05 - 6:08And so you get
this sort of logjam around identity -
6:08 - 6:09where you want full disclosure
from everybody else, -
6:09 - 6:11but not from yourself.
-
6:11 - 6:13And there's no progress, we get stuck.
-
6:13 - 6:15And so the chatroom thing
doesn't work properly, -
6:15 - 6:19and it's a very bad way
of thinking about identity. -
6:19 - 6:22So on my RSS feed,
I saw this thing about - -
6:22 - 6:25I just said something bad
about my RSS feed, didn't I? -
6:25 - 6:27I should stop saying it like that.
-
6:27 - 6:28For some random reason, I can't imagine,
-
6:28 - 6:30something about cheerleaders
turned up in my inbox. -
6:30 - 6:32And I read this story about cheerleaders,
-
6:32 - 6:34and it's a fascinating story.
-
6:34 - 6:36This happened a couple of years ago
in the U.S. -
6:36 - 6:39There were some cheerleaders
in a team at a high school -
6:39 - 6:41in the U.S., and they said mean things
-
6:41 - 6:43about their cheerleading coach,
-
6:43 - 6:45as I'm sure kids do
about all of their teachers -
6:45 - 6:46all of the time,
-
6:46 - 6:48and somehow the cheerleading coach
found out about this. -
6:48 - 6:50She was very upset.
-
6:50 - 6:52And so she went to one of the girls,
and said, -
6:52 - 6:54"you have to give me
your Facebook password." -
6:54 - 6:58I read this all the time,
where even at some universities -
6:58 - 6:59and places of education,
-
6:59 - 7:00kids are forced to hand over
their Facebook passwords. -
7:00 - 7:03So you've got to give them
your Facebook password. -
7:03 - 7:04She was a kid!
-
7:04 - 7:05What she should have said
-
7:05 - 7:06is, "my lawyer will be calling you
-
7:06 - 7:07first thing in the morning.
-
7:07 - 7:09It's an outrageous imposition
-
7:09 - 7:11on my 4th Amendment right to privacy,
-
7:11 - 7:12and you're going to be sued
-
7:12 - 7:13for all the money you've got."
-
7:13 - 7:14That's what she should have said.
-
7:14 - 7:15But she's a kid,
-
7:15 - 7:16so she hands over the password.
-
7:16 - 7:18The teacher can't log into Facebook,
-
7:18 - 7:22because the school
has blocked access to Facebook. -
7:22 - 7:24So the teacher can't log into Facebook
until she gets home. -
7:24 - 7:25So the girl tells her friends,
-
7:25 - 7:26guess what happened?
-
7:26 - 7:27The teacher logged in, she knows.
-
7:27 - 7:29So the girls just all logged into Facebook
on their phones, -
7:29 - 7:31and deleted their profiles.
-
7:31 - 7:34And so when the teacher logged in,
there was nothing there. -
7:34 - 7:40My point is, those identities,
they don't think about them the same way. -
7:40 - 7:43Identity is, especially when
you're a teenager, a fluid thing. -
7:43 - 7:45You have lots of identities.
-
7:45 - 7:47And you can have an identity,
you don't like it, -
7:47 - 7:51because it's subverted in some way,
or it's insecure, or it's inappropriate, -
7:51 - 7:53you just delete it and get another one.
-
7:53 - 7:56The idea that you have an identity
that's given to you by someone, -
7:56 - 7:57the government or whatever,
-
7:57 - 7:59and you have to stick with that identity
and use it in all places, -
7:59 - 8:01that's absolutely wrong.
-
8:01 - 8:04Why would you want to really know
who someone was on Facebook, -
8:04 - 8:07unless you wanted to abuse them
and harass them in some way? -
8:07 - 8:09And it just doesn't work properly.
-
8:09 - 8:12And my fourth example is
there are some cases -
8:12 - 8:14where you really want to be -
-
8:14 - 8:18In case you're wondering,
that's me at the G20 protest. -
8:18 - 8:21I wasn't actually at the G20 protest,
but I had a meeting at a bank -
8:21 - 8:25on the day of the G20 protest,
and I got an email from the bank -
8:25 - 8:29saying please don't wear a suit,
because it'll inflame the protesters. -
8:29 - 8:31I look pretty good in a suit, frankly,
-
8:31 - 8:33so you can see why it would drive them
-
8:33 - 8:34into an anti-capitalist frenzy.
-
8:34 - 8:35(Laughter)
-
8:35 - 8:36So I thought, well, look.
-
8:36 - 8:39If I don't want to inflame the protesters,
-
8:39 - 8:40the obvious thing to do
-
8:40 - 8:41is go dressed as a protester.
-
8:41 - 8:43So I went dressed completely in black,
-
8:43 - 8:45you know, with a black balaclava,
-
8:45 - 8:46I had black gloves on,
-
8:46 - 8:48but I've taken them off
to sign the visitor's book. -
8:48 - 8:48(Laughter)
-
8:48 - 8:50I'm wearing black trousers, black boots,
-
8:50 - 8:52I'm dressed completely in black.
-
8:52 - 8:53I go into the bank at 10 o'clock,
-
8:53 - 8:54go, "Hi, I'm Dave Birch,
-
8:54 - 8:55I've got a 3 o'clock
with so and so there." -
8:55 - 8:57Sure. They sign me in.
-
8:57 - 8:59There's my visitor's badge.
-
8:59 - 9:00(Laughter)
-
9:00 - 9:02So this nonsense
-
9:02 - 9:04about you've got to have real names
on Facebook and whatever, -
9:04 - 9:06that gets you that kind of security.
-
9:06 - 9:10That gets you security theater,
where there's no actual security, -
9:10 - 9:14but people are sort of playing parts
in a play about security. -
9:14 - 9:15And as long as
everybody learns their lines, -
9:15 - 9:16everyone's happy.
-
9:16 - 9:19But it's not real security.
-
9:19 - 9:22Especially because I hate banks
more than the G20 protesters do, -
9:22 - 9:24because I work for them.
-
9:24 - 9:26I know that things are actually worse
than these guys think. -
9:27 - 9:28(Laughter)
-
9:30 - 9:35But suppose I worked
next to somebody in a bank -
9:35 - 9:38who was doing something.
-
9:45 - 9:47Suppose I was sitting
next to a rogue trader, -
9:47 - 9:49and I want to report it
to the boss of the bank. -
9:49 - 9:51So I log on to do
a little bit of whistleblowing. -
9:51 - 9:53I send a message,
this guy's a rogue trader. -
9:53 - 9:55That message is meaningless
-
9:55 - 9:58if you don't know
that I'm a trader at the bank. -
9:58 - 10:00If that message just comes from anybody,
-
10:00 - 10:02it has zero information value.
-
10:02 - 10:05There's no point in sending that message.
-
10:06 - 10:09But if I have to prove who I am,
-
10:09 - 10:11I'll never send that message.
-
10:11 - 10:14It's just like the nurse in the hospital
reporting the drunk surgeon. -
10:14 - 10:17That message will only happen
if I'm anonymous. -
10:17 - 10:22So the system has to have ways
of providing anonymity there, -
10:22 - 10:24otherwise we don't get
where we want to get to. -
10:24 - 10:27So four issues.
So what are we going to do about it? -
10:27 - 10:32Well, what we tend to do about it
-
10:32 - 10:34is we think about Orwell space.
-
10:34 - 10:37And we try to make electronic versions
-
10:37 - 10:40of the identity card
that we got rid of in 1953. -
10:40 - 10:42So we think if we had a card,
-
10:42 - 10:44call it a Facebook login,
-
10:44 - 10:45which proves who you are,
-
10:45 - 10:47and I make you carry it all the time,
-
10:47 - 10:48that solves the problem.
-
10:48 - 10:50And of course, for all those reasons
I've just outlined, -
10:50 - 10:51it doesn't, and it might, actually,
-
10:51 - 10:52make some problems worse.
-
10:52 - 10:55The more times you're forced
to use your real identity, -
10:55 - 10:57certainly in transactional terms,
-
10:57 - 11:00the more likely that identity
is to get stolen and subverted. -
11:00 - 11:02The goal is to stop people
from using identity -
11:02 - 11:04in transactions which don't need identity,
-
11:04 - 11:07which is actually almost all transactions.
-
11:07 - 11:09Almost all of the transactions you do
-
11:09 - 11:11are not, who are you?
-
11:11 - 11:13They're, are you allowed to drive the car,
-
11:13 - 11:15are you allowed in the building,
-
11:15 - 11:15are you over 18,
-
11:15 - 11:17etcetera, etcetera.
-
11:18 - 11:19So my suggestion-I, like James,
-
11:19 - 11:22think that there should be
a resurgence of interest in R & D. -
11:23 - 11:23I think this is a solvable problem.
-
11:23 - 11:25It's something we can do about.
-
11:25 - 11:27Naturally, in these circumstances,
-
11:27 - 11:28I turn to Doctor Who.
-
11:28 - 11:31Because in this,
-
11:31 - 11:32as in so many other walks of life,
-
11:32 - 11:35Doctor Who has already shown
us the answer. -
11:35 - 11:36So I should say,
-
11:36 - 11:38for some of our foreign visitors,
-
11:38 - 11:42Doctor Who is the greatest
living scientist in England, -
11:42 - 11:44(Laughter)
-
11:44 - 11:47and a beacon of truth and enlightenment
to all of us. -
11:47 - 11:51And this is Doctor Who
with his psychic paper. -
11:51 - 11:53Come on, you guys must have seen
Doctor Who's psychic paper. -
11:53 - 11:55You're not nerds if you say yes.
-
11:55 - 11:57Who's seen Doctor Who's psychic paper?
-
11:57 - 11:59Oh right, you were in the library
the whole time studying I guess. -
11:59 - 12:01Is that what you're going to tell us?
-
12:01 - 12:03Doctor Who's psychic paper
-
12:03 - 12:05is when you hold up the psychic paper,
-
12:05 - 12:06the person, in their brain,
-
12:06 - 12:09sees the thing that they need to see.
-
12:09 - 12:11So I want to show you a British passport,
-
12:11 - 12:12I hold up the psychic paper,
-
12:12 - 12:14you see a British passport.
-
12:14 - 12:15I want to get into a party,
-
12:15 - 12:17I hold up the psychic paper,
-
12:17 - 12:18I show you a party invitation.
-
12:18 - 12:20You see what you want to see.
-
12:20 - 12:24So what I'm saying is we need
to make an electronic version of that, -
12:24 - 12:26but with one tiny, tiny change,
-
12:26 - 12:28which is that it'll only show you
the British passport -
12:28 - 12:30if I've actually got one.
-
12:30 - 12:31It'll only show you the party invitation
-
12:31 - 12:32if I actually have one.
-
12:32 - 12:35It will only show you that I'm over 18
if I actually am over 18. -
12:35 - 12:38But nothing else.
-
12:38 - 12:42So you're the bouncer at the pub,
you need to know that I'm over 18, -
12:42 - 12:44instead of showing you my driving license,
-
12:44 - 12:46which shows you I know how to drive,
-
12:46 - 12:49what my name is, my address,
all these kind of things, -
12:49 - 12:50I show you my psychic paper,
-
12:50 - 12:54and all it tells you is
am I over 18 or not. -
12:54 - 12:55Right.
-
12:55 - 12:56Is that just a pipe dream?
-
12:56 - 12:58Of course not, otherwise
I wouldn't be here talking to you. -
12:58 - 13:01So in order to build that
and make it work, -
13:01 - 13:04I'm only going to name these things,
I'll not go into them, -
13:04 - 13:05we need a plan,
-
13:05 - 13:06which is we're going to build this
-
13:06 - 13:08as an infrastructure for everybody to use,
-
13:08 - 13:10to solve all of these problems.
-
13:10 - 13:12We're going to make a utility,
-
13:12 - 13:14the utility has to be universal,
-
13:14 - 13:15you can use it everywhere,
-
13:15 - 13:18I'm just giving you little flashes
of the technology as we go along. -
13:18 - 13:19That's a Japanese ATM,
-
13:19 - 13:22the fingerprint template
is stored inside the mobile phone. -
13:22 - 13:23So when you want to draw money out,
-
13:23 - 13:25you put the mobile phone on the ATM,
-
13:25 - 13:26and touch your finger,
-
13:26 - 13:28your fingerprint goes through
to the phone, -
13:28 - 13:30the phone says yes, that's whoever,
-
13:30 - 13:32and the ATM then gives you some money.
-
13:32 - 13:35It has to be a utility
that you can use everywhere. -
13:35 - 13:37It has to be absolutely convenient,
-
13:37 - 13:40that's me going into the pub.
-
13:40 - 13:43All the device on the door
of the pub is allowed is, -
13:43 - 13:47is this person over 18
and not barred from the pub? -
13:47 - 13:50And so the idea is,
you touch your ID card to the door, -
13:50 - 13:52and if I am allowed in,
it shows my picture, -
13:52 - 13:53if I'm not allowed in,
it shows a red cross. -
13:53 - 13:55It doesn't disclose any other information.
-
13:55 - 13:57It has to have no special gadgets.
-
13:57 - 13:59That can only mean one thing,
-
13:59 - 14:00following on from Ross's statement,
-
14:00 - 14:02which I agree with completely.
-
14:02 - 14:03If it means no special gadgets,
-
14:03 - 14:04it has to run on a mobile phone.
-
14:04 - 14:05That's the only choice we have,
-
14:05 - 14:07we have to make it work on mobile phones.
-
14:07 - 14:08There are 6.6 billion
-
14:08 - 14:09mobile phone subscriptions.
-
14:09 - 14:11My favorite statistic of all time,
-
14:11 - 14:13only 4 billion toothbrushes in the world.
-
14:13 - 14:14That means something,
-
14:14 - 14:15I don't know what.
-
14:15 - 14:16(Laughter)
-
14:16 - 14:19I rely on our futurologists to tell me.
-
14:19 - 14:21It has to be a utility
which is extensible. -
14:21 - 14:22So it has to be something
-
14:22 - 14:24that anybody could build on.
-
14:24 - 14:26Anybody should be able
to use this infrastructure, -
14:26 - 14:28you don't need permissions,
licenses, whatever, -
14:28 - 14:31anyone should be able
to write some code to do this. -
14:33 - 14:34You know what symmetry is,
-
14:34 - 14:37so you don't need a picture of it.
-
14:37 - 14:38This is how we're going to do it.
-
14:38 - 14:39We're going to do it using phones,
-
14:39 - 14:40and we're going to do it
-
14:40 - 14:41using mobile proximity.
-
14:41 - 14:42I'm going to suggest to you
-
14:42 - 14:43the technology to implement
-
14:43 - 14:45Doctor Who's psychic paper
-
14:45 - 14:46is already here, and if any of you
-
14:46 - 14:49have got one of the new
Barclay's debit cards -
14:49 - 14:50with the contactless interface on it,
-
14:50 - 14:52you've already got that technology.
-
14:52 - 14:53If you've ever been up to the big city,
-
14:53 - 14:55and used an Oyster card at all,
-
14:55 - 14:57does that ring any bells to anybody?
-
14:57 - 14:58The technology already exists.
-
14:58 - 14:59The first phones
-
14:59 - 15:00that have the technology built in,
-
15:00 - 15:02the Google Nexus, the S2,
-
15:02 - 15:03the Samsung Wifi 7.9,
-
15:03 - 15:04the first phones that have
-
15:04 - 15:05the technology built into them
-
15:05 - 15:06are already in the shops.
-
15:06 - 15:08So the idea that the gas man
-
15:08 - 15:10can turn up at my mom's door
-
15:10 - 15:12and he can show my mom his phone,
-
15:12 - 15:14and she can tap it with her phone,
-
15:14 - 15:16and it will come up with green
if he really is from British Gas -
15:16 - 15:17and allowed in,
-
15:17 - 15:19and it'll come up with red if he isn't,
-
15:19 - 15:19end of story.
-
15:20 - 15:21We have the technology to do that.
-
15:21 - 15:23And what's more,
-
15:23 - 15:25although some of those things
sounded a bit counter-intuitive, -
15:25 - 15:28like proving I'm over 18
without proving who I am, -
15:28 - 15:30the cryptography to do that
not only exists, -
15:30 - 15:32it's extremely well-known
and well-understood. -
15:32 - 15:35Digital signatures, the blinding
of public key certificates, -
15:35 - 15:36these technologies have been around
for a while, -
15:36 - 15:38we've just had no way
of packaging them up. -
15:38 - 15:41So the technology already exists.
-
15:41 - 15:45We know it works,
-
15:45 - 15:47There are a few examples
of the technology being used -
15:47 - 15:48in experimental places.
-
15:48 - 15:50That's London Fashion Week,
-
15:50 - 15:51where we built a system with O2,
-
15:51 - 15:54that's for the Wireless Festival
in Hyde Park, -
15:54 - 15:55you can see the persons
-
15:55 - 15:57walking in with their VIP band,
-
15:57 - 15:58it's just being checked
-
15:58 - 15:59by the Nokia phone
that's reading the band. -
15:59 - 16:00I'm only putting those up to show you
-
16:00 - 16:02these things are prosaic,
-
16:02 - 16:04this stuff works in these environments.
-
16:04 - 16:05They don't need to be special.
-
16:05 - 16:11So finally, I know that you can do this,
-
16:12 - 16:15because if you saw
the episode of Doctor Who, -
16:15 - 16:17the Easter special of Doctor Who,
-
16:17 - 16:20where he went to Mars in a bus,
-
16:20 - 16:22I should say again
for our foreign students, -
16:22 - 16:23that doesn't happen every episode.
-
16:23 - 16:25This was a very special case.
-
16:25 - 16:28So in the episode where
he goes to Mars in a London bus, -
16:28 - 16:30I can't show you the clip,
-
16:30 - 16:33due to the outrageous restrictions
of Queen Anne-style copyright -
16:33 - 16:34by the BBC,
-
16:35 - 16:37but in the episode
where he goes to Mars in a London bus, -
16:37 - 16:41Doctor Who is clearly shown
getting on to the bus -
16:41 - 16:43with the Oyster card reader
-
16:43 - 16:44using his psychic paper.
-
16:44 - 16:46Which proves that psychic paper
-
16:46 - 16:48has an MSE interface.
-
16:48 - 16:50Thank you very much.
- Title:
- A new way to stop identity theft
- Speaker:
- David Birch
- Description:
-
Bartenders need to know your age, retailers need your PIN, but almost no one actually needs your name -- except for identity thieves. ID expert David Birch proposes a safer approach to personal identification -- a "fractured" approach -- that would almost never require your real name.
- Video Language:
- English
- Team:
- closed TED
- Project:
- TEDTalks
- Duration:
- 17:01
Camille Martínez commented on English subtitles for A new way to stop identity theft | ||
Camille Martínez edited English subtitles for A new way to stop identity theft | ||
Camille Martínez edited English subtitles for A new way to stop identity theft | ||
Camille Martínez edited English subtitles for A new way to stop identity theft | ||
Camille Martínez edited English subtitles for A new way to stop identity theft | ||
Camille Martínez edited English subtitles for A new way to stop identity theft | ||
Krystian Aparta edited English subtitles for A new way to stop identity theft | ||
Krystian Aparta edited English subtitles for A new way to stop identity theft |
Camille Martínez
Hello,
The English transcript was updated on 6/10/20. Please make a note of the following edits:
02:30 salt code ---> sort code
04:30 home office ---> Home Office
15:02 the Samsung Wifi 7.9 ---> the Samsung Wave 578
16:44 MSE ---> NSF
Thank you!