Return to Video

A new way to stop identity theft

  • 0:00 - 0:01
    So I thought I'd talk about identity.
  • 0:01 - 0:04
    That's sort of an
    interesting enough topic to me.
  • 0:04 - 0:07
    And the reason was,
    because when I was asked to do this,
  • 0:07 - 0:11
    I'd just read, in one of the papers,
    I can't remember,
  • 0:11 - 0:14
    something from someone at Facebook
    saying, well,
  • 0:14 - 0:16
    "we need to make everybody
    use their real names."
  • 0:16 - 0:18
    and then that's basically
    all the problems solved.
  • 0:18 - 0:20
    And that's so wrong,
  • 0:20 - 0:24
    that's such a fundamentally,
    reactionary view of identity,
  • 0:24 - 0:26
    and it's going to get us
    into all sorts of trouble.
  • 0:26 - 0:28
    And so what I thought I'd do
  • 0:28 - 0:32
    is I'll explain four
    sort of problems about it,
  • 0:32 - 0:34
    and then I'll suggest a solution,
  • 0:34 - 0:36
    which hopefully you
    might find interesting.
  • 0:36 - 0:38
    So just to frame the problem,
  • 0:38 - 0:40
    what does authenticity mean?
  • 0:40 - 0:45
    That's me, that's
    a camera phone picture of me
  • 0:45 - 0:46
    looking at a painting.
  • 0:46 - 0:47
    [What's the Problem?]
  • 0:47 - 0:48
    That's a painting that was painted
  • 0:48 - 0:50
    by a very famous forger,
  • 0:50 - 0:52
    and because I'm not very good
    at presentations,
  • 0:52 - 0:54
    I already can't remember the name
    that I wrote on my card.
  • 0:54 - 0:59
    And he was incarcerated
    in, I think, Wakefield Prison
  • 0:59 - 1:02
    for forging masterpieces by,
    I think, French Impressionists.
  • 1:02 - 1:05
    And he's so good at it,
    that when he was in prison,
  • 1:05 - 1:07
    everybody in prison,
    the governor and whatever,
  • 1:07 - 1:10
    wanted him to paint masterpieces
    to put on the walls,
  • 1:10 - 1:11
    because they were so good.
  • 1:11 - 1:12
    And so that's a masterpiece,
  • 1:12 - 1:14
    which is a fake of a masterpiece,
  • 1:14 - 1:21
    and bonded into the canvas is a chip
    which identifies that as a real fake,
  • 1:21 - 1:22
    if you see what I mean.
  • 1:22 - 1:24
    (Laughter)
  • 1:24 - 1:26
    So when we're talking about authenticity,
  • 1:26 - 1:31
    it's a little more fractal than it appears
    and that's a good example to show it.
  • 1:31 - 1:35
    I tried to pick four problems
    that will frame the issue properly.
  • 1:35 - 1:37
    So the first problem, I thought,
  • 1:37 - 1:38
    Chip and PIN, right?
  • 1:38 - 1:40
    [Banking legacies
    bringing down the system from within]
  • 1:40 - 1:41
    [Offline solutions
    do not work online]
  • 1:41 - 1:43
    I'm guessing everyone's got
    a chip and PIN card, right?
  • 1:43 - 1:45
    So why is that a good example?
  • 1:45 - 1:49
    That's the example of how
    legacy thinking about identity
  • 1:49 - 1:52
    subverts the security
    of a well-constructed system.
  • 1:52 - 1:54
    That chip and PIN card
    that's in your pocket
  • 1:54 - 1:58
    has a little chip on it
    that cost millions of pounds to develop,
  • 1:58 - 1:59
    is extremely secure,
  • 1:59 - 2:01
    you can put scanning
    electron microscopes on it,
  • 2:01 - 2:04
    you can try and grind it down,
    blah blah blah.
  • 2:04 - 2:07
    Those chips have never been broken,
    whatever you read in the paper.
  • 2:07 - 2:10
    And for a joke,
    we take that super-secure chip
  • 2:10 - 2:14
    and we bond it to a trivially
    counterfeitable magnetic stripe
  • 2:14 - 2:18
    and for very lazy criminals,
    we still emboss the card.
  • 2:18 - 2:21
    So if you're a criminal in a hurry
    and you need to copy someone's card,
  • 2:21 - 2:23
    you can just stick a piece of paper on it
    and rub a pencil over it
  • 2:23 - 2:25
    just to sort of speed things up.
  • 2:25 - 2:28
    And even more amusingly,
    and on my debit card too,
  • 2:28 - 2:31
    we print the name and the SALT code
    and everything else on the front too.
  • 2:31 - 2:34
    Why?
  • 2:34 - 2:38
    There is no earthly reason why your name
    is printed on a chip and PIN card.
  • 2:38 - 2:40
    And if you think about it,
  • 2:40 - 2:43
    it's even more insidious and perverse
    than it seems at first.
  • 2:43 - 2:45
    Because the only people that benefit
  • 2:45 - 2:47
    from having the name
    on the card are criminals.
  • 2:47 - 2:49
    You know what your name is, right?
  • 2:49 - 2:50
    (Laughter)
  • 2:50 - 2:52
    And when you go into
    a shop and buy something,
  • 2:52 - 2:55
    it's a PIN, he doesn't care
    what the name is.
  • 2:55 - 2:58
    The only place where you ever have
    to write your name on the back
  • 2:58 - 2:59
    is in America at the moment.
  • 2:59 - 3:00
    And whenever I go to America,
  • 3:00 - 3:02
    and I have to pay with a mag stripe
    on the back of the card,
  • 3:02 - 3:04
    I always sign it Carlos Tethers anyway,
  • 3:04 - 3:05
    just as a security mechanism,
  • 3:05 - 3:08
    because if a transaction
    ever gets disputed,
  • 3:08 - 3:10
    and it comes back and it says Dave Birch,
  • 3:10 - 3:11
    I know it must have been a criminal,
  • 3:11 - 3:14
    because I would never sign it Dave Birch.
  • 3:14 - 3:16
    (Laughter)
  • 3:16 - 3:18
    So if you drop your card in the street,
  • 3:18 - 3:20
    it means a criminal
    can pick it up and read it.
  • 3:20 - 3:20
    They know the name,
  • 3:20 - 3:22
    from the name they can find the address,
  • 3:22 - 3:24
    and then they can go off
    and buy stuff online.
  • 3:24 - 3:27
    Why do we put the name on the card?
  • 3:27 - 3:30
    Because we think identity
    is something to do with names,
  • 3:30 - 3:34
    and because we're rooted
    in the idea of the identity card,
  • 3:34 - 3:35
    which obsesses us.
  • 3:35 - 3:38
    And I know it crashed and burned
    a couple of years ago,
  • 3:38 - 3:42
    but if you're someone in politics
    or the home office or whatever,
  • 3:42 - 3:44
    and you think about identity,
  • 3:44 - 3:47
    you can only think of identity
    in terms of cards with names on them.
  • 3:47 - 3:50
    And that's very subversive
    in a modern world.
  • 3:50 - 3:52
    So the second example I thought I'd use
  • 3:52 - 3:55
    is chatrooms.
  • 3:55 - 3:55
    [Chatrooms and Children]
  • 3:55 - 3:58
    I'm very proud of that picture,
    that's my son
  • 3:58 - 4:02
    playing in his band with his friends
    for the first-ever gig,
  • 4:02 - 4:04
    I believe you call it, where he got paid.
  • 4:04 - 4:04
    (Laughter)
  • 4:04 - 4:06
    And I love that picture.
  • 4:06 - 4:09
    I like the picture of him
    getting into medical school a lot better,
  • 4:09 - 4:10
    (Laughter)
  • 4:10 - 4:12
    I like that picture for the moment.
  • 4:12 - 4:13
    Why do I use that picture?
  • 4:13 - 4:18
    Because that was very interesting,
    watching that experience as an old person.
  • 4:18 - 4:19
    So him and his friends,
  • 4:19 - 4:22
    they get together, they booked a room,
    like a church hall,
  • 4:22 - 4:24
    and they got all their friends
    who had bands,
  • 4:24 - 4:25
    and they got them together,
  • 4:25 - 4:27
    and they do it all on Facebook,
  • 4:27 - 4:31
    and then they sell tickets,
    and the first band on the -
  • 4:31 - 4:32
    I was going to say "menu,"
  • 4:32 - 4:33
    that's probably
    the wrong word for it, isn't it?
  • 4:33 - 4:36
    The first band on the list of bands
  • 4:36 - 4:40
    that appears at some
    public music performance of some kind
  • 4:40 - 4:43
    gets the sales from the first 20 tickets,
  • 4:43 - 4:44
    then the next band gets the next 20,
  • 4:44 - 4:45
    and so on.
  • 4:45 - 4:47
    They were at the bottom of the menu,
  • 4:47 - 4:49
    they were like fifth,
    I thought they had no chance.
  • 4:49 - 4:51
    He actually got 20 quid.
    Fantastic, right?
  • 4:51 - 4:53
    But my point is, that all worked perfectly,
  • 4:53 - 4:56
    except on the web.
  • 4:56 - 4:58
    So they're sitting on Facebook,
  • 4:58 - 5:01
    and they're sending these messages
    and arranging things
  • 5:01 - 5:03
    and they don't know who anybody is, right?
  • 5:03 - 5:05
    That's the big problem
    we're trying to solve.
  • 5:05 - 5:07
    If only they were using the real names,
  • 5:07 - 5:09
    Then you wouldn't be worried
    about them on the internet.
  • 5:09 - 5:10
    And so when he says to me,
  • 5:10 - 5:15
    "oh, I want to go to a chatroom
    to talk about guitars" or something,
  • 5:15 - 5:18
    I'm like, "oh, well,
    I don't want you to go into a chatroom
  • 5:18 - 5:22
    to talk about guitars, because
    they might not all be your friends,
  • 5:22 - 5:24
    and some of the people
    that are in the chatroom
  • 5:24 - 5:28
    might be perverts and teachers
    and vicars."
  • 5:28 - 5:29
    (Laughter)
  • 5:29 - 5:32
    I mean, they generally are,
    when you look in the paper, right?
  • 5:32 - 5:35
    So I want to know who
    all the people in the chatroom are.
  • 5:35 - 5:37
    So okay, you can go in the chatroom,
  • 5:37 - 5:39
    but only if everybody in the chatroom
    is using their real names,
  • 5:39 - 5:45
    and they submit full copies
    of their police report.
  • 5:45 - 5:47
    But of course, if anybody
    in the chatroom asked for his real name,
  • 5:47 - 5:50
    I'd say no.
    You can't give them your real name.
  • 5:50 - 5:53
    Because what happens
    if they turn out to be perverts,
  • 5:53 - 5:55
    and teachers and whatever.
  • 5:55 - 5:57
    So you have this odd sort of paradox
  • 5:57 - 5:59
    where I'm happy for him
    to go into this space
  • 5:59 - 6:01
    if I know who everybody else is,
  • 6:01 - 6:04
    but I don't want anybody else
    to know who he is.
  • 6:04 - 6:06
    And so you get
    this sort of logjam around identity
  • 6:06 - 6:07
    where you want full disclosure
    from everybody else,
  • 6:07 - 6:09
    but not from yourself.
  • 6:09 - 6:11
    And there's no progress, we get stuck.
  • 6:11 - 6:13
    And so the chatroom thing
    doesn't work properly,
  • 6:13 - 6:17
    and it's a very bad way
    of thinking about identity.
  • 6:17 - 6:20
    So on my RSS feed,
    I saw this thing about -
  • 6:20 - 6:23
    I just said something bad
    about my RSS feed, didn't I?
  • 6:23 - 6:25
    I should stop saying it like that.
  • 6:25 - 6:26
    For some random reason,
    I can't imagine,
  • 6:26 - 6:28
    something about cheerleaders
    turned up in my inbox.
  • 6:28 - 6:30
    And I read this story about cheerleaders,
  • 6:30 - 6:32
    and it's a fascinating story.
  • 6:32 - 6:34
    This happened a couple of years ago
    in the U.S.
  • 6:34 - 6:37
    There were some cheerleaders
    in a team at a high school
  • 6:37 - 6:40
    in the U.S., and they said mean things
  • 6:40 - 6:41
    about their cheerleading coach,
  • 6:41 - 6:43
    as I'm sure kids do
    about all of their teachers
  • 6:43 - 6:44
    all of the time,
  • 6:44 - 6:46
    and somehow the cheerleading coach
    found out about this.
  • 6:46 - 6:48
    She was very upset.
  • 6:48 - 6:50
    And so she went to one of the girls,
    and said,
  • 6:50 - 6:52
    "you have to give me
    your Facebook password."
  • 6:52 - 6:56
    I read this all the time,
    where even at some universities
  • 6:56 - 6:57
    and places of education,
  • 6:57 - 6:59
    kids are forced to hand over
    their Facebook passwords.
  • 6:59 - 7:01
    So you've got to give them
    your Facebook password.
  • 7:01 - 7:02
    She was a kid!
  • 7:02 - 7:03
    What she should have said
  • 7:03 - 7:05
    is, "my lawyer will be calling you
  • 7:05 - 7:05
    first thing in the morning.
  • 7:05 - 7:08
    It's an outrageous imposition
  • 7:08 - 7:09
    on my 4th Amendment right
    to privacy,
  • 7:09 - 7:10
    and you're going to be sued
  • 7:10 - 7:11
    for all the money you've got."
  • 7:11 - 7:12
    That's what she should have said.
  • 7:12 - 7:13
    But she's a kid,
  • 7:13 - 7:15
    so she hands over the password.
  • 7:15 - 7:17
    The teacher can't log into Facebook,
  • 7:17 - 7:20
    because the school
    has blocked access to Facebook.
  • 7:20 - 7:22
    So the teacher can't log into Facebook
    until she gets home.
  • 7:22 - 7:23
    So the girl tells her friends,
  • 7:23 - 7:24
    guess what happened?
  • 7:24 - 7:25
    The teacher logged in, she knows.
  • 7:25 - 7:27
    So the girls just all logged into Facebook
    on their phones,
  • 7:27 - 7:29
    and deleted their profiles.
  • 7:29 - 7:32
    And so when the teacher logged in,
    there was nothing there.
  • 7:32 - 7:38
    My point is, those identities,
    they don't think about them the same way.
  • 7:38 - 7:42
    Identity is, especially when
    you're a teenager, a fluid thing.
  • 7:42 - 7:43
    You have lots of identities.
  • 7:43 - 7:45
    And you can have an identity,
    you don't like it,
  • 7:45 - 7:48
    because it's subverted in some way,
    or it's insecure, or it's inappropriate,
  • 7:48 - 7:51
    you just delete it and get another one.
  • 7:51 - 7:54
    The idea that you have an identity
    that's given to you by someone,
  • 7:54 - 7:55
    the government or whatever,
  • 7:55 - 7:57
    and you have to stick with that identity
    and use it in all places,
  • 7:57 - 7:59
    that's absolutely wrong.
  • 7:59 - 8:02
    Why would you want to really know
    who someone was on Facebook,
  • 8:02 - 8:05
    unless you wanted to abuse them
    and harass them in some way?
  • 8:05 - 8:08
    And it just doesn't work properly.
  • 8:08 - 8:10
    And my fourth example is
    there are some cases
  • 8:10 - 8:12
    where you really want to be -
  • 8:12 - 8:16
    In case you're wondering,
    that's me at the G20 protest.
  • 8:16 - 8:20
    I wasn't actually at the G20 protest,
    but I had a meeting at a bank
  • 8:20 - 8:23
    on the day of the G20 protest,
    and I got an email from the bank
  • 8:23 - 8:28
    saying please don't wear a suit,
    because it'll inflame the protestors.
  • 8:28 - 8:29
    I look pretty good in a suit, frankly,
  • 8:29 - 8:31
    so you can see why
    it would drive them
  • 8:31 - 8:32
    into an anti-capitalist frenzy.
  • 8:32 - 8:33
    (Laughter)
  • 8:33 - 8:34
    So I thought, well, look.
  • 8:34 - 8:37
    If I don't want to inflame the protestors,
  • 8:37 - 8:38
    the obvious thing to do
  • 8:38 - 8:39
    is go dressed as a protestor.
  • 8:39 - 8:41
    So I went dressed completely in black,
  • 8:41 - 8:43
    you know, with a black balaclava,
  • 8:43 - 8:44
    I had black gloves on,
  • 8:44 - 8:46
    but I've taken them off
    to sign the visitor's book.
  • 8:46 - 8:46
    (Laughter)
  • 8:46 - 8:49
    I'm wearing black trousers,
    black boots,
  • 8:49 - 8:50
    I'm dressed completely in black.
  • 8:50 - 8:51
    I go into the bank at 10 o'clock,
  • 8:51 - 8:52
    go, "Hi, I'm Dave Birch,
  • 8:52 - 8:53
    I've got a 3 o'clock
    with so and so there."
  • 8:53 - 8:55
    Sure. They sign me in.
  • 8:55 - 8:58
    There's my visitor's badge.
  • 8:58 - 8:58
    (Laughter)
  • 8:58 - 9:00
    So this nonsense
  • 9:00 - 9:02
    about you've got to have real names
    on Facebook and whatever,
  • 9:02 - 9:04
    that gets you that kind of security.
  • 9:04 - 9:09
    That gets you security theater,
    where there's no actual security,
  • 9:09 - 9:12
    but people are sort of playing parts
    in a play about security.
  • 9:12 - 9:13
    And as long as
    everybody learns their lines,
  • 9:13 - 9:15
    everyone's happy.
  • 9:15 - 9:17
    But it's not real security.
  • 9:17 - 9:21
    Especially because I hate banks
    more than the G20 protestors do,
  • 9:21 - 9:22
    because I work for them.
  • 9:22 - 9:25
    I know that things are actually worse
    than these guys think.
  • 9:25 - 9:26
    (Laughter)
  • 9:28 - 9:33
    But suppose I worked
    next to somebody in a bank
  • 9:33 - 9:36
    who was doing something.
  • 9:43 - 9:45
    Suppose I was sitting
    next to a rogue trader,
  • 9:45 - 9:47
    and I want to report it
    to the boss of the bank.
  • 9:47 - 9:49
    So I log on to do
    a little bit of whistleblowing.
  • 9:49 - 9:51
    I send a message,
    this guy's a rogue trader.
  • 9:51 - 9:53
    That message is meaningless
  • 9:53 - 9:56
    if you don't know
    that I'm a trader at the bank.
  • 9:56 - 9:58
    If that message just comes from anybody,
  • 9:58 - 10:01
    it has zero information value.
  • 10:01 - 10:03
    There's no point in sending that message.
  • 10:05 - 10:07
    But if I have to prove who I am,
  • 10:07 - 10:09
    I'll never send that message.
  • 10:09 - 10:13
    It's just like the nurse in the hospital
    reporting the drunk surgeon.
  • 10:13 - 10:16
    That message will only happen
    if I'm anonymous.
  • 10:16 - 10:20
    So the system has to have ways
    of providing anonymity there,
  • 10:20 - 10:22
    otherwise we don't get
    where we want to get to.
  • 10:22 - 10:25
    So four issues.
    So what are we going to do about it?
  • 10:25 - 10:30
    Well, what we tend to do about it
  • 10:30 - 10:32
    is we think about Orwell space.
  • 10:32 - 10:36
    And we try to make electronic versions
  • 10:36 - 10:38
    of the identity card
    that we got rid of in 1953.
  • 10:38 - 10:41
    So we think if we had a card,
  • 10:41 - 10:42
    call it a Facebook login,
  • 10:42 - 10:43
    which proves who you are,
  • 10:43 - 10:45
    and I make you carry it all the time,
  • 10:45 - 10:46
    that solves the problem.
  • 10:46 - 10:48
    And of course, for all those reasons
    I've just outlined,
  • 10:48 - 10:49
    it doesn't, and it might, actually,
  • 10:49 - 10:50
    make some problems worse.
  • 10:50 - 10:53
    The more times you're forced
    to use your real identity,
  • 10:53 - 10:55
    certainly in transactional terms,
  • 10:55 - 10:58
    the more likely that identity
    is to get stolen and subverted.
  • 10:58 - 11:00
    The goal is to stop people
    from using identity
  • 11:00 - 11:03
    in transactions which don't need identity,
  • 11:03 - 11:05
    which is actually almost all transactions.
  • 11:05 - 11:07
    Almost all of the transactions you do
  • 11:07 - 11:09
    are not, who are you?
  • 11:09 - 11:11
    They're, are you allowed
    to drive the car,
  • 11:11 - 11:12
    are you allowed in the building,
  • 11:12 - 11:13
    are you over 18,
  • 11:13 - 11:16
    etcetera, etcetera.
  • 11:16 - 11:18
    So my suggestion- I, like James,
  • 11:18 - 11:21
    think that there should be
    a resurgence of interest in R & D.
  • 11:21 - 11:22
    I think this is a solvable problem.
  • 11:22 - 11:23
    It's something we can do about.
  • 11:23 - 11:25
    Naturally, in these circumstances,
  • 11:25 - 11:27
    I turn to Doctor Who.
  • 11:27 - 11:29
    Because in this,
  • 11:29 - 11:30
    as in so many other walks of life,
  • 11:30 - 11:33
    Doctor Who has already shown
    us the answer.
  • 11:33 - 11:34
    So I should say,
  • 11:34 - 11:37
    for some of our foreign visitors,
  • 11:37 - 11:40
    Doctor Who is the greatest
    living scientist in England,
  • 11:40 - 11:42
    (Laughter)
  • 11:42 - 11:45
    and a beacon of truth and enlightenment
    to all of us.
  • 11:45 - 11:49
    And this is Doctor Who
    with his psychic paper.
  • 11:49 - 11:51
    Come on, you guys must have seen
    Doctor Who's psychic paper.
  • 11:51 - 11:53
    You're not nerds if you say yes.
  • 11:53 - 11:55
    Who's seen Doctor Who's psychic paper?
  • 11:55 - 11:58
    Oh right, you were in the library
    the whole time studying I guess.
  • 11:58 - 12:00
    Is that what you're going to tell us?
  • 12:00 - 12:01
    Doctor Who's psychic paper
  • 12:01 - 12:03
    is when you hold up the psychic paper,
  • 12:03 - 12:05
    the person, in their brain,
  • 12:05 - 12:07
    sees the thing that they need to see.
  • 12:07 - 12:09
    So I want to show you a British passport,
  • 12:09 - 12:10
    I hold up the psychic paper,
  • 12:10 - 12:12
    you see a British passport.
  • 12:12 - 12:14
    I want to get into a party,
  • 12:14 - 12:15
    I hold up the psychic paper,
  • 12:15 - 12:17
    I show you a party invitation.
  • 12:17 - 12:19
    You see what you want to see.
  • 12:19 - 12:22
    So what I'm saying is we need
    to make an electronic version of that,
  • 12:22 - 12:24
    but with one tiny, tiny change,
  • 12:24 - 12:26
    which is that it'll only show you
    the British passport
  • 12:26 - 12:28
    if I've actually got one.
  • 12:28 - 12:29
    It'll only show you the party invitation
  • 12:29 - 12:31
    if I actually have one.
  • 12:31 - 12:33
    It will only show you that I'm over 18
    if I actually am over 18.
  • 12:33 - 12:36
    But nothing else.
  • 12:36 - 12:41
    So you're the bouncer at the pub,
    you need to know that I'm over 18,
  • 12:41 - 12:42
    instead of showing you my driving license,
  • 12:42 - 12:45
    which shows you I know how to drive,
  • 12:45 - 12:47
    what my name is, my address,
    all these kind of things,
  • 12:47 - 12:49
    I show you my psychic paper,
  • 12:49 - 12:52
    and all it tells you is
    am I over 18 or not.
  • 12:52 - 12:53
    Right.
  • 12:53 - 12:55
    Is that just a pipe dream?
  • 12:55 - 12:56
    Of course not, otherwise
    I wouldn't be here talking to you.
  • 12:56 - 12:59
    So in order to build that
    and make it work,
  • 12:59 - 13:02
    I'm only going to name these things,
    I'll not go into them,
  • 13:02 - 13:03
    we need a plan,
  • 13:03 - 13:05
    which is we're going to build this
  • 13:05 - 13:07
    as an infrastructure
    for everybody to use,
  • 13:07 - 13:08
    to solve all of these problems.
  • 13:08 - 13:11
    We're going to make a utility,
  • 13:11 - 13:12
    the utility has to be universal,
  • 13:12 - 13:13
    you can use it everywhere,
  • 13:13 - 13:16
    I'm just giving you little flashes
    of the technology as we go along.
  • 13:16 - 13:18
    That's a Japanese ATM,
  • 13:18 - 13:21
    the fingerprint template
    is stored inside the mobile phone.
  • 13:21 - 13:22
    So when you want to draw money out,
  • 13:22 - 13:23
    you put the mobile phone on the ATM,
  • 13:23 - 13:24
    and touch your finger,
  • 13:24 - 13:26
    your fingerprint goes through
    to the phone,
  • 13:26 - 13:28
    the phone says yes, that's whoever,
  • 13:28 - 13:30
    and the ATM then gives you some money.
  • 13:30 - 13:33
    It has to be a utility
    that you can use everywhere.
  • 13:33 - 13:35
    It has to be absolutely convenient,
  • 13:35 - 13:38
    that's me going into the pub.
  • 13:38 - 13:41
    All the device on the door
    of the pub is allowed is,
  • 13:41 - 13:45
    is this person over 18
    and not barred from the pub?
  • 13:45 - 13:48
    And so the idea is,
    you touch your ID card to the door,
  • 13:48 - 13:50
    and if I am allowed in,
    it shows my picture,
  • 13:50 - 13:52
    if I'm not allowed in,
    it shows a red cross.
  • 13:52 - 13:53
    It doesn't disclose any other information.
  • 13:53 - 13:55
    It has to have no special gadgets.
  • 13:55 - 13:57
    That can only mean one thing,
  • 13:57 - 13:58
    following on from Ross's statement,
  • 13:58 - 14:00
    which I agree with completely.
  • 14:00 - 14:01
    If it means no special gadgets,
  • 14:01 - 14:02
    it has to run on a mobile phone.
  • 14:02 - 14:04
    That's the only choice we have,
  • 14:04 - 14:05
    we have to make it work on mobile phones.
  • 14:05 - 14:06
    There are 6.6 billion
  • 14:06 - 14:07
    mobile phone subscriptions.
  • 14:07 - 14:09
    My favorite statistic of all time,
  • 14:09 - 14:11
    only 4 billion toothbrushes in the world.
  • 14:11 - 14:12
    That means something,
  • 14:12 - 14:14
    I don't know what.
  • 14:14 - 14:14
    (Laughter)
  • 14:14 - 14:17
    I rely on our futurologists to tell me.
  • 14:17 - 14:19
    It has to be a utility
    which is extensible.
  • 14:19 - 14:20
    So it has to be something
  • 14:20 - 14:22
    that anybody could build on.
  • 14:22 - 14:24
    Anybody should be able
    to use this infrastructure,
  • 14:24 - 14:26
    you don't need permissions,
    licenses, whatever,
  • 14:26 - 14:30
    anyone should be able
    to write some code to do this.
  • 14:31 - 14:33
    You know what symmetry is,
  • 14:33 - 14:35
    so you don't need a picture of it.
  • 14:35 - 14:36
    This is how we're going to do it.
  • 14:36 - 14:37
    We're going to do it using phones,
  • 14:37 - 14:38
    and we're going to do it
  • 14:38 - 14:39
    using mobile proximity.
  • 14:39 - 14:40
    I'm going to suggest to you
  • 14:40 - 14:41
    the technology to implement
  • 14:41 - 14:43
    Doctor Who's psychic paper
  • 14:43 - 14:44
    is already here, and if any of you
  • 14:44 - 14:47
    have got one of the new
    Barclay's debit cards
  • 14:47 - 14:48
    with the contactless interface on it,
  • 14:48 - 14:49
    you've already got that technology.
  • 14:49 - 14:52
    If you've ever been up to the big city,
  • 14:52 - 14:53
    and used an Oyster card at all,
  • 14:53 - 14:55
    does that ring any bells to anybody?
  • 14:55 - 14:56
    The technology already exists.
  • 14:56 - 14:57
    The first phones
  • 14:57 - 14:58
    that have the technology built in,
  • 14:58 - 15:00
    the Google Nexus, the S2,
  • 15:00 - 15:01
    the Samsung Wifi 7.9,
  • 15:01 - 15:03
    the first phones that have
  • 15:03 - 15:04
    the technology built into them
  • 15:04 - 15:04
    are already in the shops.
  • 15:04 - 15:06
    So the idea that the gas man
  • 15:06 - 15:08
    can turn up at my mom's door
  • 15:08 - 15:11
    and he can show my mom his phone,
  • 15:11 - 15:12
    and she can tap it with her phone,
  • 15:12 - 15:14
    and it will come up with green
    if he really is from British Gas
  • 15:14 - 15:15
    and allowed in,
  • 15:15 - 15:17
    and it'll come up with red if he isn't,
  • 15:17 - 15:18
    end of story.
  • 15:18 - 15:20
    We have the technology to do that.
  • 15:20 - 15:21
    And what's more,
  • 15:21 - 15:23
    although some of those things
    sounded a bit counter-intuitive,
  • 15:23 - 15:26
    like proving I'm over 18
    without proving who I am,
  • 15:26 - 15:28
    the cryptography to do that
    not only exists,
  • 15:28 - 15:30
    it's extremely well-known
    and well-understood.
  • 15:30 - 15:33
    Digital signatures, the blinding
    of public key certificates,
  • 15:33 - 15:35
    these technologies have been around
    for a while,
  • 15:35 - 15:36
    we've just had no way
    of packaging them up.
  • 15:36 - 15:39
    So the technology already exists.
  • 15:39 - 15:43
    We know it works,
  • 15:43 - 15:45
    There are a few examples
    of the technology being used
  • 15:45 - 15:46
    in experimental places.
  • 15:46 - 15:48
    That's London Fashion Week,
  • 15:48 - 15:50
    where we built a system with O2,
  • 15:50 - 15:52
    that's for the Wireless Festival
    in Hyde Park,
  • 15:52 - 15:54
    you can see the persons
  • 15:54 - 15:55
    walking in with their VIP band,
  • 15:55 - 15:56
    it's just being checked
  • 15:56 - 15:57
    by the Nokia phone
    that's reading the band.
  • 15:57 - 15:59
    I'm only putting those up to show you
  • 15:59 - 16:00
    these things are prosaic,
  • 16:00 - 16:02
    this stuff works in these environments.
  • 16:02 - 16:03
    They don't need to be special.
  • 16:03 - 16:09
    So finally, I know that you can do this,
  • 16:10 - 16:13
    because if you saw
    the episode of Doctor Who,
  • 16:13 - 16:15
    the Easter special of Doctor Who,
  • 16:15 - 16:18
    where he went to Mars in a bus,
  • 16:18 - 16:20
    I should say again
    for our foreign students,
  • 16:20 - 16:21
    that doesn't happen every episode.
  • 16:21 - 16:23
    This was a very special case.
  • 16:23 - 16:26
    So in the episode where
    he goes to Mars in a London bus,
  • 16:26 - 16:28
    I can't show you the clip,
  • 16:28 - 16:31
    due to the outrageous restrictions
    of Queen Anne-style copyright
  • 16:31 - 16:33
    by the BBC,
  • 16:33 - 16:35
    but in the episode
    where he goes to Mars in a London bus,
  • 16:35 - 16:40
    Doctor Who is clearly shown
    getting on to the bus
  • 16:40 - 16:41
    with the Oyster card reader
  • 16:41 - 16:42
    using his psychic paper.
  • 16:42 - 16:45
    Which proves that psychic paper
  • 16:45 - 16:46
    has an MSE interface.
  • 16:46 - 16:48
    Thank you very much.
Title:
A new way to stop identity theft
Speaker:
David Birch
Description:

Bartenders needs to know your age, retailers need your PIN, but almost no one actually needs your name -- except for identity thieves. ID expert David Birch proposes a safer approach to personal identification -- a "fractured" approach -- that would almost never require your real name.

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDTalks
Duration:
17:01
  • Hello,

    The English transcript was updated on 6/10/20. Please make a note of the following edits:

    02:30 salt code ---> sort code
    04:30 home office ---> Home Office
    15:02 the Samsung Wifi 7.9 ---> the Samsung Wave 578
    16:44 MSE ---> NSF

    Thank you!

English subtitles

Revisions Compare revisions