A new way to stop identity theft
-
0:00 - 0:01So I thought I'd talk about identity.
-
0:01 - 0:04That's sort of an
interesting enough topic to me. -
0:04 - 0:07And the reason was,
because when I was asked to do this, -
0:07 - 0:11I'd just read, in one of the papers,
I can't remember, -
0:11 - 0:14something from someone at Facebook
saying, well, -
0:14 - 0:16"we need to make everybody
use their real names." -
0:16 - 0:18and then that's basically
all the problems solved. -
0:18 - 0:20And that's so wrong,
-
0:20 - 0:24that's such a fundamentally,
reactionary view of identity, -
0:24 - 0:26and it's going to get us
into all sorts of trouble. -
0:26 - 0:28And so what I thought I'd do
-
0:28 - 0:32is I'll explain four
sort of problems about it, -
0:32 - 0:34and then I'll suggest a solution,
-
0:34 - 0:36which hopefully you
might find interesting. -
0:36 - 0:38So just to frame the problem,
-
0:38 - 0:40what does authenticity mean?
-
0:40 - 0:45That's me, that's
a camera phone picture of me -
0:45 - 0:46looking at a painting.
-
0:46 - 0:47[What's the Problem?]
-
0:47 - 0:48That's a painting that was painted
-
0:48 - 0:50by a very famous forger,
-
0:50 - 0:52and because I'm not very good
at presentations, -
0:52 - 0:54I already can't remember the name
that I wrote on my card. -
0:54 - 0:59And he was incarcerated
in, I think, Wakefield Prison -
0:59 - 1:02for forging masterpieces by,
I think, French Impressionists. -
1:02 - 1:05And he's so good at it,
that when he was in prison, -
1:05 - 1:07everybody in prison,
the governor and whatever, -
1:07 - 1:10wanted him to paint masterpieces
to put on the walls, -
1:10 - 1:11because they were so good.
-
1:11 - 1:12And so that's a masterpiece,
-
1:12 - 1:14which is a fake of a masterpiece,
-
1:14 - 1:21and bonded into the canvas is a chip
which identifies that as a real fake, -
1:21 - 1:22if you see what I mean.
-
1:22 - 1:24(Laughter)
-
1:24 - 1:26So when we're talking about authenticity,
-
1:26 - 1:31it's a little more fractal than it appears
and that's a good example to show it. -
1:31 - 1:35I tried to pick four problems
that will frame the issue properly. -
1:35 - 1:37So the first problem, I thought,
-
1:37 - 1:38Chip and PIN, right?
-
1:38 - 1:40[Banking legacies
bringing down the system from within] -
1:40 - 1:41[Offline solutions
do not work online] -
1:41 - 1:43I'm guessing everyone's got
a chip and PIN card, right? -
1:43 - 1:45So why is that a good example?
-
1:45 - 1:49That's the example of how
legacy thinking about identity -
1:49 - 1:52subverts the security
of a well-constructed system. -
1:52 - 1:54That chip and PIN card
that's in your pocket -
1:54 - 1:58has a little chip on it
that cost millions of pounds to develop, -
1:58 - 1:59is extremely secure,
-
1:59 - 2:01you can put scanning
electron microscopes on it, -
2:01 - 2:04you can try and grind it down,
blah blah blah. -
2:04 - 2:07Those chips have never been broken,
whatever you read in the paper. -
2:07 - 2:10And for a joke,
we take that super-secure chip -
2:10 - 2:14and we bond it to a trivially
counterfeitable magnetic stripe -
2:14 - 2:18and for very lazy criminals,
we still emboss the card. -
2:18 - 2:21So if you're a criminal in a hurry
and you need to copy someone's card, -
2:21 - 2:23you can just stick a piece of paper on it
and rub a pencil over it -
2:23 - 2:25just to sort of speed things up.
-
2:25 - 2:28And even more amusingly,
and on my debit card too, -
2:28 - 2:31we print the name and the SALT code
and everything else on the front too. -
2:31 - 2:34Why?
-
2:34 - 2:38There is no earthly reason why your name
is printed on a chip and PIN card. -
2:38 - 2:40And if you think about it,
-
2:40 - 2:43it's even more insidious and perverse
than it seems at first. -
2:43 - 2:45Because the only people that benefit
-
2:45 - 2:47from having the name
on the card are criminals. -
2:47 - 2:49You know what your name is, right?
-
2:49 - 2:50(Laughter)
-
2:50 - 2:52And when you go into
a shop and buy something, -
2:52 - 2:55it's a PIN, he doesn't care
what the name is. -
2:55 - 2:58The only place where you ever have
to write your name on the back -
2:58 - 2:59is in America at the moment.
-
2:59 - 3:00And whenever I go to America,
-
3:00 - 3:02and I have to pay with a mag stripe
on the back of the card, -
3:02 - 3:04I always sign it Carlos Tethers anyway,
-
3:04 - 3:05just as a security mechanism,
-
3:05 - 3:08because if a transaction
ever gets disputed, -
3:08 - 3:10and it comes back and it says Dave Birch,
-
3:10 - 3:11I know it must have been a criminal,
-
3:11 - 3:14because I would never sign it Dave Birch.
-
3:14 - 3:16(Laughter)
-
3:16 - 3:18So if you drop your card in the street,
-
3:18 - 3:20it means a criminal
can pick it up and read it. -
3:20 - 3:20They know the name,
-
3:20 - 3:22from the name they can find the address,
-
3:22 - 3:24and then they can go off
and buy stuff online. -
3:24 - 3:27Why do we put the name on the card?
-
3:27 - 3:30Because we think identity
is something to do with names, -
3:30 - 3:34and because we're rooted
in the idea of the identity card, -
3:34 - 3:35which obsesses us.
-
3:35 - 3:38And I know it crashed and burned
a couple of years ago, -
3:38 - 3:42but if you're someone in politics
or the home office or whatever, -
3:42 - 3:44and you think about identity,
-
3:44 - 3:47you can only think of identity
in terms of cards with names on them. -
3:47 - 3:50And that's very subversive
in a modern world. -
3:50 - 3:52So the second example I thought I'd use
-
3:52 - 3:55is chatrooms.
-
3:55 - 3:55[Chatrooms and Children]
-
3:55 - 3:58I'm very proud of that picture,
that's my son -
3:58 - 4:02playing in his band with his friends
for the first-ever gig, -
4:02 - 4:04I believe you call it, where he got paid.
-
4:04 - 4:04(Laughter)
-
4:04 - 4:06And I love that picture.
-
4:06 - 4:09I like the picture of him
getting into medical school a lot better, -
4:09 - 4:10(Laughter)
-
4:10 - 4:12I like that picture for the moment.
-
4:12 - 4:13Why do I use that picture?
-
4:13 - 4:18Because that was very interesting,
watching that experience as an old person. -
4:18 - 4:19So him and his friends,
-
4:19 - 4:22they get together, they booked a room,
like a church hall, -
4:22 - 4:24and they got all their friends
who had bands, -
4:24 - 4:25and they got them together,
-
4:25 - 4:27and they do it all on Facebook,
-
4:27 - 4:31and then they sell tickets,
and the first band on the - -
4:31 - 4:32I was going to say "menu,"
-
4:32 - 4:33that's probably
the wrong word for it, isn't it? -
4:33 - 4:36The first band on the list of bands
-
4:36 - 4:40that appears at some
public music performance of some kind -
4:40 - 4:43gets the sales from the first 20 tickets,
-
4:43 - 4:44then the next band gets the next 20,
-
4:44 - 4:45and so on.
-
4:45 - 4:47They were at the bottom of the menu,
-
4:47 - 4:49they were like fifth,
I thought they had no chance. -
4:49 - 4:51He actually got 20 quid.
Fantastic, right? -
4:51 - 4:53But my point is, that all worked perfectly,
-
4:53 - 4:56except on the web.
-
4:56 - 4:58So they're sitting on Facebook,
-
4:58 - 5:01and they're sending these messages
and arranging things -
5:01 - 5:03and they don't know who anybody is, right?
-
5:03 - 5:05That's the big problem
we're trying to solve. -
5:05 - 5:07If only they were using the real names,
-
5:07 - 5:09Then you wouldn't be worried
about them on the internet. -
5:09 - 5:10And so when he says to me,
-
5:10 - 5:15"oh, I want to go to a chatroom
to talk about guitars" or something, -
5:15 - 5:18I'm like, "oh, well,
I don't want you to go into a chatroom -
5:18 - 5:22to talk about guitars, because
they might not all be your friends, -
5:22 - 5:24and some of the people
that are in the chatroom -
5:24 - 5:28might be perverts and teachers
and vicars." -
5:28 - 5:29(Laughter)
-
5:29 - 5:32I mean, they generally are,
when you look in the paper, right? -
5:32 - 5:35So I want to know who
all the people in the chatroom are. -
5:35 - 5:37So okay, you can go in the chatroom,
-
5:37 - 5:39but only if everybody in the chatroom
is using their real names, -
5:39 - 5:45and they submit full copies
of their police report. -
5:45 - 5:47But of course, if anybody
in the chatroom asked for his real name, -
5:47 - 5:50I'd say no.
You can't give them your real name. -
5:50 - 5:53Because what happens
if they turn out to be perverts, -
5:53 - 5:55and teachers and whatever.
-
5:55 - 5:57So you have this odd sort of paradox
-
5:57 - 5:59where I'm happy for him
to go into this space -
5:59 - 6:01if I know who everybody else is,
-
6:01 - 6:04but I don't want anybody else
to know who he is. -
6:04 - 6:06And so you get
this sort of logjam around identity -
6:06 - 6:07where you want full disclosure
from everybody else, -
6:07 - 6:09but not from yourself.
-
6:09 - 6:11And there's no progress, we get stuck.
-
6:11 - 6:13And so the chatroom thing
doesn't work properly, -
6:13 - 6:17and it's a very bad way
of thinking about identity. -
6:17 - 6:20So on my RSS feed,
I saw this thing about - -
6:20 - 6:23I just said something bad
about my RSS feed, didn't I? -
6:23 - 6:25I should stop saying it like that.
-
6:25 - 6:26For some random reason,
I can't imagine, -
6:26 - 6:28something about cheerleaders
turned up in my inbox. -
6:28 - 6:30And I read this story about cheerleaders,
-
6:30 - 6:32and it's a fascinating story.
-
6:32 - 6:34This happened a couple of years ago
in the U.S. -
6:34 - 6:37There were some cheerleaders
in a team at a high school -
6:37 - 6:40in the U.S., and they said mean things
-
6:40 - 6:41about their cheerleading coach,
-
6:41 - 6:43as I'm sure kids do
about all of their teachers -
6:43 - 6:44all of the time,
-
6:44 - 6:46and somehow the cheerleading coach
found out about this. -
6:46 - 6:48She was very upset.
-
6:48 - 6:50And so she went to one of the girls,
and said, -
6:50 - 6:52"you have to give me
your Facebook password." -
6:52 - 6:56I read this all the time,
where even at some universities -
6:56 - 6:57and places of education,
-
6:57 - 6:59kids are forced to hand over
their Facebook passwords. -
6:59 - 7:01So you've got to give them
your Facebook password. -
7:01 - 7:02She was a kid!
-
7:02 - 7:03What she should have said
-
7:03 - 7:05is, "my lawyer will be calling you
-
7:05 - 7:05first thing in the morning.
-
7:05 - 7:08It's an outrageous imposition
-
7:08 - 7:09on my 4th Amendment right
to privacy, -
7:09 - 7:10and you're going to be sued
-
7:10 - 7:11for all the money you've got."
-
7:11 - 7:12That's what she should have said.
-
7:12 - 7:13But she's a kid,
-
7:13 - 7:15so she hands over the password.
-
7:15 - 7:17The teacher can't log into Facebook,
-
7:17 - 7:20because the school
has blocked access to Facebook. -
7:20 - 7:22So the teacher can't log into Facebook
until she gets home. -
7:22 - 7:23So the girl tells her friends,
-
7:23 - 7:24guess what happened?
-
7:24 - 7:25The teacher logged in, she knows.
-
7:25 - 7:27So the girls just all logged into Facebook
on their phones, -
7:27 - 7:29and deleted their profiles.
-
7:29 - 7:32And so when the teacher logged in,
there was nothing there. -
7:32 - 7:38My point is, those identities,
they don't think about them the same way. -
7:38 - 7:42Identity is, especially when
you're a teenager, a fluid thing. -
7:42 - 7:43You have lots of identities.
-
7:43 - 7:45And you can have an identity,
you don't like it, -
7:45 - 7:48because it's subverted in some way,
or it's insecure, or it's inappropriate, -
7:48 - 7:51you just delete it and get another one.
-
7:51 - 7:54The idea that you have an identity
that's given to you by someone, -
7:54 - 7:55the government or whatever,
-
7:55 - 7:57and you have to stick with that identity
and use it in all places, -
7:57 - 7:59that's absolutely wrong.
-
7:59 - 8:02Why would you want to really know
who someone was on Facebook, -
8:02 - 8:05unless you wanted to abuse them
and harass them in some way? -
8:05 - 8:08And it just doesn't work properly.
-
8:08 - 8:10And my fourth example is
there are some cases -
8:10 - 8:12where you really want to be -
-
8:12 - 8:16In case you're wondering,
that's me at the G20 protest. -
8:16 - 8:20I wasn't actually at the G20 protest,
but I had a meeting at a bank -
8:20 - 8:23on the day of the G20 protest,
and I got an email from the bank -
8:23 - 8:28saying please don't wear a suit,
because it'll inflame the protestors. -
8:28 - 8:29I look pretty good in a suit, frankly,
-
8:29 - 8:31so you can see why
it would drive them -
8:31 - 8:32into an anti-capitalist frenzy.
-
8:32 - 8:33(Laughter)
-
8:33 - 8:34So I thought, well, look.
-
8:34 - 8:37If I don't want to inflame the protestors,
-
8:37 - 8:38the obvious thing to do
-
8:38 - 8:39is go dressed as a protestor.
-
8:39 - 8:41So I went dressed completely in black,
-
8:41 - 8:43you know, with a black balaclava,
-
8:43 - 8:44I had black gloves on,
-
8:44 - 8:46but I've taken them off
to sign the visitor's book. -
8:46 - 8:46(Laughter)
-
8:46 - 8:49I'm wearing black trousers,
black boots, -
8:49 - 8:50I'm dressed completely in black.
-
8:50 - 8:51I go into the bank at 10 o'clock,
-
8:51 - 8:52go, "Hi, I'm Dave Birch,
-
8:52 - 8:53I've got a 3 o'clock
with so and so there." -
8:53 - 8:55Sure. They sign me in.
-
8:55 - 8:58There's my visitor's badge.
-
8:58 - 8:58(Laughter)
-
8:58 - 9:00So this nonsense
-
9:00 - 9:02about you've got to have real names
on Facebook and whatever, -
9:02 - 9:04that gets you that kind of security.
-
9:04 - 9:09That gets you security theater,
where there's no actual security, -
9:09 - 9:12but people are sort of playing parts
in a play about security. -
9:12 - 9:13And as long as
everybody learns their lines, -
9:13 - 9:15everyone's happy.
-
9:15 - 9:17But it's not real security.
-
9:17 - 9:21Especially because I hate banks
more than the G20 protestors do, -
9:21 - 9:22because I work for them.
-
9:22 - 9:25I know that things are actually worse
than these guys think. -
9:25 - 9:26(Laughter)
-
9:28 - 9:33But suppose I worked
next to somebody in a bank -
9:33 - 9:36who was doing something.
-
9:43 - 9:45Suppose I was sitting
next to a rogue trader, -
9:45 - 9:47and I want to report it
to the boss of the bank. -
9:47 - 9:49So I log on to do
a little bit of whistleblowing. -
9:49 - 9:51I send a message,
this guy's a rogue trader. -
9:51 - 9:53That message is meaningless
-
9:53 - 9:56if you don't know
that I'm a trader at the bank. -
9:56 - 9:58If that message just comes from anybody,
-
9:58 - 10:01it has zero information value.
-
10:01 - 10:03There's no point in sending that message.
-
10:05 - 10:07But if I have to prove who I am,
-
10:07 - 10:09I'll never send that message.
-
10:09 - 10:13It's just like the nurse in the hospital
reporting the drunk surgeon. -
10:13 - 10:16That message will only happen
if I'm anonymous. -
10:16 - 10:20So the system has to have ways
of providing anonymity there, -
10:20 - 10:22otherwise we don't get
where we want to get to. -
10:22 - 10:25So four issues.
So what are we going to do about it? -
10:25 - 10:30Well, what we tend to do about it
-
10:30 - 10:32is we think about Orwell space.
-
10:32 - 10:36And we try to make electronic versions
-
10:36 - 10:38of the identity card
that we got rid of in 1953. -
10:38 - 10:41So we think if we had a card,
-
10:41 - 10:42call it a Facebook login,
-
10:42 - 10:43which proves who you are,
-
10:43 - 10:45and I make you carry it all the time,
-
10:45 - 10:46that solves the problem.
-
10:46 - 10:48And of course, for all those reasons
I've just outlined, -
10:48 - 10:49it doesn't, and it might, actually,
-
10:49 - 10:50make some problems worse.
-
10:50 - 10:53The more times you're forced
to use your real identity, -
10:53 - 10:55certainly in transactional terms,
-
10:55 - 10:58the more likely that identity
is to get stolen and subverted. -
10:58 - 11:00The goal is to stop people
from using identity -
11:00 - 11:03in transactions which don't need identity,
-
11:03 - 11:05which is actually almost all transactions.
-
11:05 - 11:07Almost all of the transactions you do
-
11:07 - 11:09are not, who are you?
-
11:09 - 11:11They're, are you allowed
to drive the car, -
11:11 - 11:12are you allowed in the building,
-
11:12 - 11:13are you over 18,
-
11:13 - 11:16etcetera, etcetera.
-
11:16 - 11:18So my suggestion- I, like James,
-
11:18 - 11:21think that there should be
a resurgence of interest in R & D. -
11:21 - 11:22I think this is a solvable problem.
-
11:22 - 11:23It's something we can do about.
-
11:23 - 11:25Naturally, in these circumstances,
-
11:25 - 11:27I turn to Doctor Who.
-
11:27 - 11:29Because in this,
-
11:29 - 11:30as in so many other walks of life,
-
11:30 - 11:33Doctor Who has already shown
us the answer. -
11:33 - 11:34So I should say,
-
11:34 - 11:37for some of our foreign visitors,
-
11:37 - 11:40Doctor Who is the greatest
living scientist in England, -
11:40 - 11:42(Laughter)
-
11:42 - 11:45and a beacon of truth and enlightenment
to all of us. -
11:45 - 11:49And this is Doctor Who
with his psychic paper. -
11:49 - 11:51Come on, you guys must have seen
Doctor Who's psychic paper. -
11:51 - 11:53You're not nerds if you say yes.
-
11:53 - 11:55Who's seen Doctor Who's psychic paper?
-
11:55 - 11:58Oh right, you were in the library
the whole time studying I guess. -
11:58 - 12:00Is that what you're going to tell us?
-
12:00 - 12:01Doctor Who's psychic paper
-
12:01 - 12:03is when you hold up the psychic paper,
-
12:03 - 12:05the person, in their brain,
-
12:05 - 12:07sees the thing that they need to see.
-
12:07 - 12:09So I want to show you a British passport,
-
12:09 - 12:10I hold up the psychic paper,
-
12:10 - 12:12you see a British passport.
-
12:12 - 12:14I want to get into a party,
-
12:14 - 12:15I hold up the psychic paper,
-
12:15 - 12:17I show you a party invitation.
-
12:17 - 12:19You see what you want to see.
-
12:19 - 12:22So what I'm saying is we need
to make an electronic version of that, -
12:22 - 12:24but with one tiny, tiny change,
-
12:24 - 12:26which is that it'll only show you
the British passport -
12:26 - 12:28if I've actually got one.
-
12:28 - 12:29It'll only show you the party invitation
-
12:29 - 12:31if I actually have one.
-
12:31 - 12:33It will only show you that I'm over 18
if I actually am over 18. -
12:33 - 12:36But nothing else.
-
12:36 - 12:41So you're the bouncer at the pub,
you need to know that I'm over 18, -
12:41 - 12:42instead of showing you my driving license,
-
12:42 - 12:45which shows you I know how to drive,
-
12:45 - 12:47what my name is, my address,
all these kind of things, -
12:47 - 12:49I show you my psychic paper,
-
12:49 - 12:52and all it tells you is
am I over 18 or not. -
12:52 - 12:53Right.
-
12:53 - 12:55Is that just a pipe dream?
-
12:55 - 12:56Of course not, otherwise
I wouldn't be here talking to you. -
12:56 - 12:59So in order to build that
and make it work, -
12:59 - 13:02I'm only going to name these things,
I'll not go into them, -
13:02 - 13:03we need a plan,
-
13:03 - 13:05which is we're going to build this
-
13:05 - 13:07as an infrastructure
for everybody to use, -
13:07 - 13:08to solve all of these problems.
-
13:08 - 13:11We're going to make a utility,
-
13:11 - 13:12the utility has to be universal,
-
13:12 - 13:13you can use it everywhere,
-
13:13 - 13:16I'm just giving you little flashes
of the technology as we go along. -
13:16 - 13:18That's a Japanese ATM,
-
13:18 - 13:21the fingerprint template
is stored inside the mobile phone. -
13:21 - 13:22So when you want to draw money out,
-
13:22 - 13:23you put the mobile phone on the ATM,
-
13:23 - 13:24and touch your finger,
-
13:24 - 13:26your fingerprint goes through
to the phone, -
13:26 - 13:28the phone says yes, that's whoever,
-
13:28 - 13:30and the ATM then gives you some money.
-
13:30 - 13:33It has to be a utility
that you can use everywhere. -
13:33 - 13:35It has to be absolutely convenient,
-
13:35 - 13:38that's me going into the pub.
-
13:38 - 13:41All the device on the door
of the pub is allowed is, -
13:41 - 13:45is this person over 18
and not barred from the pub? -
13:45 - 13:48And so the idea is,
you touch your ID card to the door, -
13:48 - 13:50and if I am allowed in,
it shows my picture, -
13:50 - 13:52if I'm not allowed in,
it shows a red cross. -
13:52 - 13:53It doesn't disclose any other information.
-
13:53 - 13:55It has to have no special gadgets.
-
13:55 - 13:57That can only mean one thing,
-
13:57 - 13:58following on from Ross's statement,
-
13:58 - 14:00which I agree with completely.
-
14:00 - 14:01If it means no special gadgets,
-
14:01 - 14:02it has to run on a mobile phone.
-
14:02 - 14:04That's the only choice we have,
-
14:04 - 14:05we have to make it work on mobile phones.
-
14:05 - 14:06There are 6.6 billion
-
14:06 - 14:07mobile phone subscriptions.
-
14:07 - 14:09My favorite statistic of all time,
-
14:09 - 14:11only 4 billion toothbrushes in the world.
-
14:11 - 14:12That means something,
-
14:12 - 14:14I don't know what.
-
14:14 - 14:14(Laughter)
-
14:14 - 14:17I rely on our futurologists to tell me.
-
14:17 - 14:19It has to be a utility
which is extensible. -
14:19 - 14:20So it has to be something
-
14:20 - 14:22that anybody could build on.
-
14:22 - 14:24Anybody should be able
to use this infrastructure, -
14:24 - 14:26you don't need permissions,
licenses, whatever, -
14:26 - 14:30anyone should be able
to write some code to do this. -
14:31 - 14:33You know what symmetry is,
-
14:33 - 14:35so you don't need a picture of it.
-
14:35 - 14:36This is how we're going to do it.
-
14:36 - 14:37We're going to do it using phones,
-
14:37 - 14:38and we're going to do it
-
14:38 - 14:39using mobile proximity.
-
14:39 - 14:40I'm going to suggest to you
-
14:40 - 14:41the technology to implement
-
14:41 - 14:43Doctor Who's psychic paper
-
14:43 - 14:44is already here, and if any of you
-
14:44 - 14:47have got one of the new
Barclay's debit cards -
14:47 - 14:48with the contactless interface on it,
-
14:48 - 14:49you've already got that technology.
-
14:49 - 14:52If you've ever been up to the big city,
-
14:52 - 14:53and used an Oyster card at all,
-
14:53 - 14:55does that ring any bells to anybody?
-
14:55 - 14:56The technology already exists.
-
14:56 - 14:57The first phones
-
14:57 - 14:58that have the technology built in,
-
14:58 - 15:00the Google Nexus, the S2,
-
15:00 - 15:01the Samsung Wifi 7.9,
-
15:01 - 15:03the first phones that have
-
15:03 - 15:04the technology built into them
-
15:04 - 15:04are already in the shops.
-
15:04 - 15:06So the idea that the gas man
-
15:06 - 15:08can turn up at my mom's door
-
15:08 - 15:11and he can show my mom his phone,
-
15:11 - 15:12and she can tap it with her phone,
-
15:12 - 15:14and it will come up with green
if he really is from British Gas -
15:14 - 15:15and allowed in,
-
15:15 - 15:17and it'll come up with red if he isn't,
-
15:17 - 15:18end of story.
-
15:18 - 15:20We have the technology to do that.
-
15:20 - 15:21And what's more,
-
15:21 - 15:23although some of those things
sounded a bit counter-intuitive, -
15:23 - 15:26like proving I'm over 18
without proving who I am, -
15:26 - 15:28the cryptography to do that
not only exists, -
15:28 - 15:30it's extremely well-known
and well-understood. -
15:30 - 15:33Digital signatures, the blinding
of public key certificates, -
15:33 - 15:35these technologies have been around
for a while, -
15:35 - 15:36we've just had no way
of packaging them up. -
15:36 - 15:39So the technology already exists.
-
15:39 - 15:43We know it works,
-
15:43 - 15:45There are a few examples
of the technology being used -
15:45 - 15:46in experimental places.
-
15:46 - 15:48That's London Fashion Week,
-
15:48 - 15:50where we built a system with O2,
-
15:50 - 15:52that's for the Wireless Festival
in Hyde Park, -
15:52 - 15:54you can see the persons
-
15:54 - 15:55walking in with their VIP band,
-
15:55 - 15:56it's just being checked
-
15:56 - 15:57by the Nokia phone
that's reading the band. -
15:57 - 15:59I'm only putting those up to show you
-
15:59 - 16:00these things are prosaic,
-
16:00 - 16:02this stuff works in these environments.
-
16:02 - 16:03They don't need to be special.
-
16:03 - 16:09So finally, I know that you can do this,
-
16:10 - 16:13because if you saw
the episode of Doctor Who, -
16:13 - 16:15the Easter special of Doctor Who,
-
16:15 - 16:18where he went to Mars in a bus,
-
16:18 - 16:20I should say again
for our foreign students, -
16:20 - 16:21that doesn't happen every episode.
-
16:21 - 16:23This was a very special case.
-
16:23 - 16:26So in the episode where
he goes to Mars in a London bus, -
16:26 - 16:28I can't show you the clip,
-
16:28 - 16:31due to the outrageous restrictions
of Queen Anne-style copyright -
16:31 - 16:33by the BBC,
-
16:33 - 16:35but in the episode
where he goes to Mars in a London bus, -
16:35 - 16:40Doctor Who is clearly shown
getting on to the bus -
16:40 - 16:41with the Oyster card reader
-
16:41 - 16:42using his psychic paper.
-
16:42 - 16:45Which proves that psychic paper
-
16:45 - 16:46has an MSE interface.
-
16:46 - 16:48Thank you very much.
- Title:
- A new way to stop identity theft
- Speaker:
- David Birch
- Description:
-
Bartenders needs to know your age, retailers need your PIN, but almost no one actually needs your name -- except for identity thieves. ID expert David Birch proposes a safer approach to personal identification -- a "fractured" approach -- that would almost never require your real name.
- Video Language:
- English
- Team:
- closed TED
- Project:
- TEDTalks
- Duration:
- 17:01
Camille Martínez commented on English subtitles for A new way to stop identity theft | ||
Camille Martínez edited English subtitles for A new way to stop identity theft | ||
Camille Martínez edited English subtitles for A new way to stop identity theft | ||
Camille Martínez edited English subtitles for A new way to stop identity theft | ||
Camille Martínez edited English subtitles for A new way to stop identity theft | ||
Camille Martínez edited English subtitles for A new way to stop identity theft | ||
Krystian Aparta edited English subtitles for A new way to stop identity theft | ||
Krystian Aparta edited English subtitles for A new way to stop identity theft |
Camille Martínez
Hello,
The English transcript was updated on 6/10/20. Please make a note of the following edits:
02:30 salt code ---> sort code
04:30 home office ---> Home Office
15:02 the Samsung Wifi 7.9 ---> the Samsung Wave 578
16:44 MSE ---> NSF
Thank you!