David Birch A new way to stop identity theft

So I thought I’d talk about identity.

That’s sort of an interesting
enough topic to me.

And the reason was,
because when I was asked to do this,

I’d just read in one of the papers,
I can’t remember,

something from someone at Facebook saying,

“Well, we need to make everybody
use their real names,

and then that’s basically
all the problems solved.”

And that’s so wrong,

that’s such a fundamentally
reactionary view of identity,

and it’s going to get us
into all sorts of trouble.

And so what I thought I’d do is,

I’ll explain four sort of
problems about it,

and then I’ll suggest a solution,

which, hopefully,
you might find interesting.

So just to frame the problem:

What does “authenticity” mean?

That’s me,

that’s a camera phone picture
of me looking at a painting.

[What’s the Problem?]

That’s a painting that was painted
by a very famous forger,

and because I’m not very good
at presentations,

I already can’t remember the name
that I wrote on my card.

And he was incarcerated in,
I think, Wakefield Prison,

for forging masterpieces by,
I think, French Impressionists.

And he’s so good at it
that when he was in prison,

everybody in prison,
the governor and whatever,

wanted him to paint masterpieces
to put on the walls

because they were so good.

And so that’s a masterpiece,
which is a fake of a masterpiece,

and bonded into the canvas is a chip
which identifies that as a real fake,

if you see what I mean.

(Laughter)

So when we’re talking about authenticity,

it’s a little more fractal
than it appears,

and that’s a good example to show it.

I tried to pick four problems
that will frame the issue properly.

So the first problem, I thought,
chip and PIN, right?

[Banks and legacies
bringing down the system from within]

[Offline solutions do not work online]

Everyone’s got a chip and PIN card, right?

So why is that a good example?

That’s the example
of how legacy thinking about identity

subverts the security
of a well-constructed system.

That chip-and-PIN card
that’s in your pocket

has a little chip on it
that cost millions of pounds to develop,

is extremely secure,

you can put scanning
electron microscopes on it,

you can try and grind it down,
blah blah blah.

Those chips have never been broken,
whatever you read in the paper.

And for a joke,
we take that supersecure chip,

and we bond it to a trivially
counterfeitable magnetic stripe.

And for very lazy criminals,
we still emboss the card.

So if you’re a criminal in a hurry
and you need to copy someone’s card,

you can just stick a piece of paper on it
and rub a pencil over it

just to speed things up.

And even more amusingly,
and on my debit card, too,

we print the name and the sort code
and everything else on the front.

Why?

There is no earthly reason why your name
is printed on a chip-and-PIN card.

And if you think about it,

it’s even more insidious and perverse
than it seems at first.

Because the only people that benefit
from having the name on the card

are criminals.

You know what your name is, right?

(Laughter)

And when you go into a shop
and buy something,

it’s a PIN – he doesn’t care
what the name is.

The only place you ever have to write
your name on the back

is in America.

Whenever I go to America,

and I have to pay with a magstripe
on the back of the card,

I always sign it “Carlos Tethers” anyway,
just as a security mechanism,

because if a transaction
ever gets disputed,

and it comes back
and it says “Dave Birch,”

I know it must have been a criminal,

because I would never
sign it “Dave Birch.”

(Laughter)

So if you drop your card in the street,

it means a criminal
can pick it up and read it.

They know the name,
from the name, they can find the address,

and then they can go off
and buy stuff online.

Why do we put the name on the card?

Because we think identity
is something to do with names,

and because we’re rooted
in the idea of the identity card,

which obsesses us.

And I know it crashed and burned
a couple of years ago,

but if you’re someone in politics
or the Home Office or whatever,

and you think about identity,

you can only think of identity
in terms of cards with names on.

And that’s very subversive
in a modern world.

So the second example I thought I’d use

is chat rooms.

[Chatrooms and Children]

I’m very proud of that picture.

That’s my son playing
in his band with his friends

for the first-ever gig,
I believe you call it, where he got paid.

(Laughter)

And I love that picture.

I’ll like the picture of him
getting into medical school a lot better,

(Laughter)

I like that one for the moment.

Why do I use that picture?

Because that was very interesting,
watching that experience as an old person.

So him and his friends,

they get together, they booked a room,
like a church hall,

and they got all their friends
who had bands, got them together,

and they do it all on Facebook,

and then they sell tickets,
and the first band on the –

I was going to say “menu,” that’s
probably the wrong word for it, isn’t it?

The first band on the list of bands

that appears at some
public music performance of some kind

gets the sales from the first 20 tickets,

then the next band gets the next 20,

and so on.

They were at the bottom
of the menu, like, fifth,

I thought they had no chance.

He actually got 20 quid. Fantastic, right?

But my point is,
that all worked perfectly,

except on the web.

So they’re sitting on Facebook,

and they’re sending these messages
and arranging things,

and they don’t know who anybody is, right?

That’s the problem we’re trying to solve.

If only they were using real names,

then you wouldn’t be worried
about them on the internet.

So when he says to me,

“Oh, I want to go to a chat room
to talk about guitars” or something,

I’m like, “Oh, well,
I don’t want you to go into a chat room

to talk about guitars,

because they might
not all be your friends,

and some of the people
that are in the chat room

might be, you know, perverts
and teachers and vicars –”

(Laughter)

I mean, they generally are,
when you look in the paper, right?

“So I want to know who all the people
in the chat room are.

So, OK, you can go in the chat room,

but only if everybody in the chat room
is using their real names,

and they submit full copies
of their police report.”

(Laughter)

But of course, if anybody
in the chat room asked for his real name,

I’d say, “No. You can’t
give them your real name,

because what happens
if they turn out to be perverts

and teachers and whatever?”

So you have this odd sort of paradox

where I’m happy for him
to go into this space

if I know who everybody else is,

but I don’t want anybody else
to know who he is.

And so you get this sort of
logjam around identity,

where you want full disclosure
from everybody else,

but not from yourself.

And there’s no progress, we get stuck.

So the chat room thing
doesn’t work properly,

and it’s a very bad way
of thinking about identity.

Cheerleading … so, on my RSS feed,
I saw this thing about –

I just said something bad
about my RSS feed, didn’t I?

I should stop saying it like that.

For some random reason I can’t imagine,

something about cheerleaders
turned up in my in-box.

And I read this story about cheerleaders,
and it’s a fascinating story.

This happened a couple
of years ago in the US.

There were some cheerleaders
in a team at a high school in the US,

and they said mean things
about their cheerleading coach,

as I’m sure kids do about
all of their teachers all of the time,

and somehow, the cheerleading coach
found out about this.

She was very upset.

So she went to one of the girls and said,

“You have to give me
your Facebook password.”

I read this all the time,

where even at some universities
and places of education,

kids are forced to hand over
their Facebook passwords.

So you have to give them
your Facebook password.

So the kid – she was a kid! –
what she should have said is,

“My lawyer will be calling
you first thing in the morning.

It’s an outrageous imposition
on my Fourth Amendment right to privacy.

You’ll be sued
for all the money you’ve got!”

That’s what she should have said.

But she’s a kid,
so she hands over the password.

The teacher can’t log in,

because the school
has blocked access to Facebook.

So the teacher can’t log into Facebook
till she gets home.

So the girl tells her friends,

“Guess what happened?
The teacher logged in. She knows.”

So the girls all logged into Facebook
and deleted their profiles.

So when the teacher logged in,
there was nothing there.

My point is: those identities,
they don’t think about them the same way.

Identity is – especially when
you’re a teenager – a fluid thing.

You have lots of identities,
you experiment with them.

And if you have an identity you don’t
like because it’s subverted in some way

or it’s insecure or it’s inappropriate,

you just delete it and get another one.

The idea that you have an identity
that’s given to you by someone,

the government or whatever,

and you have to stick with that identity
and use it in all places

is absolutely wrong.

Why would you want to really know
who someone was on Facebook,

unless you wanted to abuse them
and harass them in some way?

It just doesn’t work properly.

And my fourth example is,

there are some cases
where you really want to be –

in case you’re wondering,
that’s me at the G20 protest.

I wasn’t actually at the G20 protest,

but I had a meeting at a bank
on the day of the G20 protest.

And I got an email from the bank, saying,

“Please don’t wear a suit,
because it’ll inflame the protesters.”

I look pretty good in a suit, frankly,

so you can see why it would drive them
into an anticapitalist frenzy.

(Laughter)

So I thought, “Well, if I don’t
want to inflame the protesters,

the obvious thing to do
is go dressed as a protester.”

So I went dressed completely in black,
you know, black balaclava …

I had black gloves on but took them off
to sign the visitors' book.

(Laughter)

I’m wearing black trousers and boots,
I’m dressed completely in black.

I go into the bank at 10am
and go, “Hi, I’m Dave Birch,

I’ve got a 3 o’clock with so-and-so.”

“Sure!” And they sign me in.
There’s my visitor’s badge.

(Laughter)

So this nonsense about “you’ve got to have
real names on Facebook” and whatever,

that gets you that kind of security.

That gets you “security theater,”

where there’s no actual security,

but people are sort of playing parts
in a play about security,

and as long as everybody
learns their lines,

everyone’s happy.

But it’s not real security, right?

Especially because I hate banks
more than the G20 protesters do,

because I work for them.

I know that things are actually worse
than these guys think.

(Laughter)

But suppose I worked
next to somebody in a bank

who was doing something –

you know, they were like people who take
the money from banks and don’t …

you know, they take the money …

Oh – “traders.”
That’s the word I was thinking of.

Suppose I was sitting
next to a rogue trader,

and I want to report it
to the boss of the bank.

So I log on to do a little whistleblowing.

I send a message,
“This guy’s a rogue trader.”

That message is meaningless

if you don’t know
that I’m a trader at the bank.

If that message just comes from anybody,

it has zero information value.

There’s no point in sending that message.

You have to know that I’m …

But if I have to prove who I am,

I’ll never send that message.

It’s just like the nurse in the hospital
reporting the drunk surgeon.

That message will only happen
if I’m anonymous.

So the system has to have ways
of providing anonymity in it,

otherwise, we don’t get
where we want to get to.

So, four issues.

So what are we going to do about it?

Well, what we tend to do about it

is we think about Orwell-space.

And we try to make electronic versions
of the identity card

that we got rid of in 1953.

So we think if we had a card –

call it a Facebook login –

which proves who you are,

and I make you carry it all the time,

that solves the problem.

And of course, for all those
reasons I’ve just outlined, it doesn’t,

and it might make some problems worse.

The more times you’re forced
to use your real identity,

certainly in transactional terms,

the more likely that identity
is to get stolen and subverted.

The goal is to stop people
from using identity

in transactions which don’t need identity,

which is actually almost all transactions.

Almost all of the transactions you do
are not “Who are you?”

They’re “Are you allowed
to drive the car?”

“Are you allowed in the building?”
“Are you over 18?”

etcetera, etcetera.

So my suggestion – I, like James,

think that there should be
a resurgence of interest in R and D.

I think this is a solvable problem.

It’s something we can do about.

Naturally, in these circumstances,
I turn to Doctor Who.

Because in this –

(Laughter)

as in so many other walks of life,

Doctor Who has already
shown us the answer.

So I should say,
for some of our foreign visitors:

Doctor Who is the greatest
living scientist in England –

(Laughter)

and a beacon of truth
and enlightenment to all of us.

And this is Doctor Who
with his “psychic paper.”

Come on, you guys must have seen
Doctor Who’s “psychic paper.”

You’re not nerds if you say yes.

Who’s seen Doctor Who’s psychic paper?

Oh right, you were in the library
the whole time studying, I guess.

Is that what you’re going to tell us?

Doctor Who’s psychic paper is:

when you hold up the psychic paper,

the person, in their brain,

sees the thing that they need to see.

So I want to show you a British passport,

I hold up the psychic paper,

you see a British passport.

I want to get into a party,

I hold up the psychic paper,

I show you a party invitation.

You see what you want to see.

So what I’m saying is, we need
to make an electronic version of that,

but with one tiny, tiny change,

which is that it’ll only show you
the British passport

if I’ve actually got one.

It’ll only show you the party invitation
if I actually have one.

It will only show you that I’m over 18
if I actually am over 18.

But nothing else.

So you’re the bouncer at the pub,
you need to know that I’m over 18.

Instead of showing you my driving license,

which shows you I know how to drive,

what my name is, my address,
all these kind of things,

I show you my psychic paper,

and all it tells you is,
am I over 18 or not.

Right.

Is that just a pipe dream?

Of course not, otherwise
I wouldn’t be here talking.

So, in order to build that
and make it work,

I’m only going to name these things,
I’ll not go into them:

we need a plan,

which is, we’re going to build
this as an infrastructure

for everybody to use
to solve all of these problems.

We’re going to make a utility.

The utility has to be universal,
you can use it everywhere.

I’m just giving you little flashes
of the technology as we go along.

That’s a Japanese ATM,

the fingerprint template
is stored inside the mobile phone.

So when you want to draw money out,

you put the phone on the ATM
and touch your finger,

your fingerprint
goes through to the phone,

the phone says, “Yes, that’s whoever,”

and the ATM then gives you some money.

It has to be a utility
that you can use everywhere.

It has to be absolutely convenient.

That’s me going into the pub.

All the device on the door
of the pub is allowed is:

Is this person over 18
and not barred from the pub?

And so the idea is,
you touch your ID card to the door,

and if I’m allowed in,
it shows my picture,

if I’m not, it shows a red cross.

It doesn’t disclose any other information.

It has to have no special gadgets.

That can only mean one thing,
following on from Ross’s statement,

which I agree with completely:
if it means no special gadgets,

it has to run on a mobile phone.

That’s the only choice we have,
to make it work on mobile phones.

There are 6.6 billion
mobile phone subscriptions.

My favorite statistic of all time:
only 4 billion toothbrushes in the world.

That means something. I don’t know what.

(Laughter)

I rely on our futurologists to tell me.

It has to be a utility
which is extensible.

So it has to be something
that anybody could build on.

Anybody should be able
to use this infrastructure;

you don’t need permissions,
licenses, whatever.

Anyone should be able
to write some code to do this.

Well, you know what symmetry is,
so you don’t need a picture of it.

This is how we’re going to do it.

We’re going to do it using phones
and mobile proximity.

I’m going to suggest to you

the technology to implement Doctor Who’s
psychic paper is already here,

and if any of you have got
one of the new Barclay’s debit cards

with the contactless interface on it,

you’ve already got that technology.

Have you ever been up to the big city
and used an Oyster card?

Does that ring a bell?

The technology already exists.

The first phones that have
the technology built in –

the Google Nexus, the S II,
the Samsung Wave 578 –

the first phones that have the technology
built into them are already in the shops.

So the idea that the gasman
can turn up at my mum’s door,

and he can show my mum his phone,

and she can tap it with her phone,

and it’ll come up with green
if he really is from British Gas

and allowed in,

and will come up with red
if he isn’t, end of story.

We have the technology to do that.

And what’s more,

although some of those things
sound a bit counterintuitive,

like proving I’m over 18
without proving who I am,

the cryptography to do that
not only exists,

it’s extremely well-known
and well-understood.

Digital signatures, the blinding
of public key certificates –

these technologies
have been around for a while,

we’ve just had no way
of packaging them up.

So the technology already exists.

We know it works.

There are a few examples
of the technology being used

in experimental places.

That’s London Fashion Week,

where we built a system with O2.

That’s for the Wireless
Festival in Hyde Park.

You can see the person’s
walking in with their VIP band,

it’s being checked by the Nokia phone
that’s reading the band.

I’m only putting those up to show you
these things are prosaic,

this stuff works in these environments.

They don’t need to be special.

So finally, I know that you can do this,

because if you saw
the Easter special of Doctor Who,

where he went to Mars in a bus –

I should say, again,
for our foreign students:

that doesn’t happen in every episode.

This was a very special case.

So in the episode where he goes
to Mars in a London bus –

I can’t show you the clip,

due to the outrageous restrictions
of Queen Anne-style copyright

by the BBC –

but in the episode where he goes
to Mars in a London bus,

Doctor Who is clearly shown
getting onto the bus

with the Oyster card reader

using his psychic paper.

Which proves that psychic paper
has an NFC interface.

Thank you very much.

(Applause)

所以我想我会谈谈身份。

这对我来说是一个
足够有趣的话题。

原因是,
因为当我被要求这样做时,

我刚刚读到其中一篇论文,
我不记得了

,Facebook 有人说,

“嗯,我们需要让每个人都
使用他们的真实姓名 ,

然后基本上
所有的问题都解决了。”

这是非常错误的,

这是一种从根本上
反动的身份观

,它会给我们
带来各种各样的麻烦。

所以我想我会做的是,

我会解释四种
关于它的问题,

然后我会提出一个解决

方案,希望
你会觉得有趣。

所以只是为了解决问题:

“真实性”是什么意思?

那是我,


是我看着一幅画的照相手机照片。

【有什么问题吗?】


是一个非常有名的伪造者画的画

,因为我不太
擅长演示,

我已经不记得
我写在卡片上的名字了。

我认为他被关押在
韦克菲尔德监狱,

因为他伪造了
法国印象派画家的杰作。

而且他非常擅长,
以至于当他在监狱里时,监狱里的

每个人
,州长和其他人,都

希望他画出杰作
来挂在墙上,

因为它们太棒了。

所以那
是一件杰作,它是一件杰作的赝品,如果你明白我的意思的话,

在画布上粘着一块芯片
,它可以识别出它是真正的赝品

(笑声)

所以当我们谈论真实性时,

它比看起来更分形

,这是一个很好的例子。

我试图挑选
四个问题来正确地描述问题。

所以第一个问题,我想,
芯片和密码,对吧?

[银行和遗产
从内部破坏系统]

[离线解决方案在线不起作用]

每个人都有芯片和密码卡,对吗?

那么为什么这是一个很好的例子呢?

这就是
关于身份的传统思维如何

颠覆
构建良好系统的安全性的示例。

你口袋里的芯片和密码卡

有一个小芯片
,开发成本数百万英镑,

非常安全,

你可以
在上面放扫描电子显微镜,

你可以试着把它磨碎,
等等等等。

无论你在报纸上读到什么,这些芯片从未被打破过。

开个玩笑,
我们拿那个超级安全的芯片,我们把

它绑定到一个普通的可
伪造磁条上。

对于非常懒惰的罪犯,
我们仍然会在卡片上进行压印。

因此,如果您是一个匆忙的罪犯
并且您需要复制某人的卡片,

您只需将一张纸贴在上面,
然后用铅笔在上面擦一下

,以加快速度。

更有趣的是
,在我的借记卡上,

我们也在前面打印了姓名和分类代码
以及其他所有内容。

为什么?

你的
名字印在芯片和密码卡上没有任何世俗的理由。

如果你仔细想想,

它比最初看起来更加阴险和反常

因为只有犯罪分子才能
从卡片上的名字中受益

你知道你叫什么名字,对吧?

(笑声

) 当你去
商店买东西时,

它是一个密码——他不在乎
名字是什么。

唯一需要
在背面写名字的地方

就是美国。

每当我去美国

,我必须用
卡背面的磁条付款时,

我总是在上面签上“Carlos Tethers”
,作为一种安全机制,

因为如果交易发生
争议

,它会
回来 上面写着“Dave Birch”,

我知道它一定是罪犯,

因为我永远不会在上面
签名“Dave Birch”。

(笑声)

所以如果你把你的卡丢在街上,

就意味着犯罪分子
可以捡起来读。

他们知道名字,
从名字中,他们可以找到地址,

然后他们可以
去网上买东西。

为什么我们要把名字写在卡片上?

因为我们认为
身份与姓名有关,

而且因为我们植根
于身份证的概念,

这让我们着迷。

我知道它在
几年前坠毁和烧毁,

但如果你是政界人士
或内政部或其他任何人,

并且你考虑身份,

你只能
根据带有名字的卡片来考虑身份。

这在现代世界中是非常具有颠覆性的

所以我想我会使用的第二个例子

是聊天室。

[聊天室和儿童]

我为那张照片感到非常自豪。

那是我儿子
和他的朋友们在他的乐队里演奏

的第一次演出,
我相信你这么称呼它,他在那里得到了报酬。

(笑声)

我喜欢那张照片。

我会更喜欢他
进入医学院的照片,

(笑声)

我现在喜欢那个。

为什么我用那张图?

因为那很有趣,
作为一个老人观看那段经历。

所以他和他的朋友

们聚在一起,他们订了一个房间,
就像一个教堂大厅

,他们把所有
有乐队的朋友召集在一起

,他们在 Facebook 上做这一切,

然后他们卖票,
然后 第一个乐队——

我要说“菜单”,这
可能是错误的词,不是吗? 出现在某种公共音乐表演中

的乐队列表中的第一个乐队

从前 20 张门票中获得销售额,

然后下一个乐队获得接下来的 20 张门票,

依此类推。

他们在
菜单的底部,就像第五,

我认为他们没有机会。

他实际上得到了20英镑。 太棒了,对吧?

但我的观点是
,除了在网络上,一切都运行良好

所以他们坐在Facebook上

,他们正在发送这些消息
并安排事情

,他们不知道任何人是谁,对吧?

这就是我们要解决的问题。

如果只是他们使用真实姓名,

那么您就不会
担心他们在互联网上。

所以当他对我说,

“哦,我想去聊天
室谈论吉他”之类的时候,

我会说,“哦,好吧,
我不想让你去聊天

室聊天 关于吉他,

因为他们可能
不都是你的朋友,

而且
聊天室里的一些人

可能是,你知道的,变态
,老师和牧师——”

(笑声)

我的意思是,
当你看的时候,他们通常是 在纸上,对吧?

“所以我想知道
聊天室里的所有人是谁。

所以,好吧,你可以进入聊天室,

但前提是聊天室里的每个人
都使用他们的真实姓名,

并且他们提交
了他们的警察的完整副本 报告。”

(笑声

) 当然,如果
聊天室里有人问他的真名,

我会说,“不,你
不能告诉他们你的真名,

因为
如果他们变成了色狼

和老师,会发生什么? 任何?”

所以你有一种奇怪的悖论

,如果我知道其他人是谁,我很高兴
他进入这个领域

但我不希望其他
人知道他是谁。

所以你会遇到这种
围绕身份的僵局

,你希望从其他人那里得到充分的披露

而不是从你自己那里。

而且没有进展,我们被卡住了。

所以聊天室的东西
不能正常工作

,这是一种非常糟糕
的身份思考方式。

啦啦队……所以,在我的 RSS 提要上,
我看到了这件事——

我刚刚说了一些
关于我的 RSS 提要的坏话,不是吗?

我应该停止这样说。

出于某种我无法想象的随机原因

,我的收件箱里出现了一些关于啦啦队的信息。

我读了这个关于啦啦队的故事
,这是一个引人入胜的故事。

这发生
在几年前的美国。

美国一所高中的一支球队中有一些啦啦队队员

,他们
说他们的啦啦队教练

很刻薄,因为我敢肯定孩子们
一直对他们所有的老师都这样做

,不知何故,啦啦队教练
发现了 对这个。

她非常沮丧。

于是她走到其中一个女孩面前说:

“你必须给我
你的 Facebook 密码。”

我一直在读这篇文章

,即使在一些大学
和教育场所,

孩子们也被迫交出
他们的 Facebook 密码。

所以你必须给他们
你的 Facebook 密码。

所以那个孩子——她还是个孩子!
——她应该说的是,

“我的律师会
在早上第一件事给你打电话。

这是
对我的第四修正案隐私权的无耻强加。

你会
因为你所有的钱而被起诉!”

这是她应该说的。

但她还是个孩子,
所以她交出了密码。

老师无法登录,

因为学校
已阻止访问 Facebook。

所以老师
在回家之前不能登录 Facebook。

于是女孩告诉她的朋友,

“猜猜发生了什么
?老师登录了。她知道。”

所以女孩们都登录了 Facebook
并删除了她们的个人资料。

所以当老师登录时,
那里什么都没有。

我的观点是:那些身份,
他们不会以同样的方式看待它们。

身份是——尤其是当
你还是青少年时——是一种流动的东西。

你有很多身份,
你用它们做实验。

如果你有一个你不喜欢的身份,
因为它以某种方式被颠覆,

或者它不安全或不合适,

你只需删除它并获得另一个身份。

认为你有一个
由某人

、政府或其他什么人给你的身份

,你必须坚持这个身份
并在所有地方使用它的想法

是绝对错误的。

为什么你真的想知道
Facebook 上的人是谁,

除非你想虐待他们
并以某种方式骚扰他们?

它只是无法正常工作。

我的第四个例子是,

在某些情况
下你真的想成为

——如果你想知道,
那就是我在 G20 抗议活动中。

我实际上并没有参加 G20 抗议活动,


在 G20 抗议活动当天我在一家银行开会。

我收到了银行的一封电子邮件,说:

“请不要穿西装,
因为它会激怒抗议者。”

坦率地说,我穿西装看起来很不错,

所以你可以明白为什么这会让他们
陷入反资本主义的狂热。

(笑声)

所以我想,“好吧,如果我
不想激怒抗议者

,显而易见的做法
就是打扮成抗议者。”

所以我穿着一身黑色,
你知道的,黑色巴拉克拉法帽……

我戴着黑色手套,但脱下它们
在访客簿上签名。

(笑声)

我穿着黑色的裤子和靴子,
我穿着一身黑。

我早上 10 点走进银行
,然后说:“嗨,我是 Dave Birch,

我有一个 3 点钟的某某。”

“当然!” 他们让我登录。
这是我的访客证。

(笑声)

所以这种关于“你必须
在 Facebook 上拥有真实姓名”之类的胡说八道

会让你获得那种安全感。

这让你成为“安全剧院”

,那里没有真正的安全,

但人们在某种程度上
扮演着关于安全的戏剧的角色

,只要每个人都
学会了他们的台词,

每个人都会很开心。

但这不是真正的安全,对吧?

尤其是因为我
比 G20 抗议者更讨厌银行,

因为我为他们工作。

我知道事情实际上
比这些人想象的要糟糕。

(笑声)

但是假设我
在一家银行的某个人旁边

工作——

你知道,他们就像
从银行拿钱而不是……

你知道,他们拿钱……

哦 ——《交易员》。
这就是我想到的词。

假设我坐在
一个流氓交易员旁边

,我想
向银行老板报告。

所以我登录做一点举报。

我发了一条信息,
“这家伙是个流氓交易员。”

如果你不
知道我是银行的交易员,那条信息就毫无意义。

如果该消息只是来自任何人,

则它的信息价值为零。

发送该消息毫无意义。

你必须知道我是……

但如果我必须证明我是谁,

我永远不会发送那个信息。

就像医院的护士
报告醉酒的外科医生一样。

只有在我匿名的情况下,该消息才会发生

所以系统必须有
提供匿名性的方法,

否则,我们无法
到达我们想要到达的地方。

所以,四个问题。

那么我们该怎么办呢?

好吧,我们倾向于做的

是我们考虑奥威尔空间。

我们尝试制作

我们在 1953 年废除的身份证的电子版本。

所以我们认为如果我们有一张卡片——

称之为 Facebook 登录——

它可以证明你是谁

,我让你随身携带 时间

,解决问题。

当然,
由于我刚刚概述的所有这些原因,它没有,

而且它可能会使一些问题变得更糟。


被迫使用真实身份的次数越多,

当然在交易方面,

该身份就越有可能
被盗和破坏。

目标是阻止人们

在不需要身份的交易中使用身份,

这实际上是几乎所有的交易。

你所做的几乎所有交易
都不是“你是谁?”

他们是“你
可以开车吗?”

“你可以进大楼吗?”
“你已经18岁了吗?”

等等等等。

所以我的建议——我和 James 一样,

认为
应该对 R 和 D 重新产生兴趣。

我认为这是一个可以解决的问题。

这是我们可以做的。

自然,在这种情况下,
我求助于神秘博士。

因为在这个——

(笑声)

和许多其他行业一样,

神秘博士已经
向我们展示了答案。

所以我应该
对我们的一些外国访客说:

神秘博士是英国最伟大的
在世科学家——

(笑声)

,是
我们所有人的真理和启蒙灯塔。

这就是神秘
博士的“通灵纸”。

拜托,你们一定看过
神秘博士的“通灵纸”。

如果你说是,你就不是书呆子。

谁看过神秘博士的通灵纸?

哦,对
了,我猜你一直在图书馆学习。

这就是你要告诉我们的吗?

神秘博士的通灵纸是:

当你举起通灵纸时,

这个人在他们的大脑中

看到了他们需要看到的东西。

所以我想给你看英国护照,

我举起通灵纸,

你看到的是英国护照。

我想参加一个派对,

我举起通灵纸

,给你看一份派对邀请函。

你看到你想看到的。

所以我要说的是,我们
需要制作一个电子版本,

但有一个微小的改变,

那就是它只会向你展示
英国护照,

如果我真的有的话。 如果我真的有

派对邀请,它只会显示给
你。 如果我实际上已

超过 18 岁,它只会向您显示我已超过 18 岁

但仅此而已。

所以你是酒吧的保镖
你需要知道我已经 18 岁

以上 事情,

我给你看我的通灵纸

,它告诉你的是,
我是否超过 18 岁。

对。

这只是一个白日梦吗?

当然不是,否则
我不会在这里说话。

所以,为了构建它
并让它发挥作用,

我只会命名这些东西,
我不会深入探讨它们:

我们需要一个计划

,也就是说,我们将把它
构建为每个人的基础设施

用来解决所有这些问题。

我们要做一个实用程序。

该实用程序必须是通用的,
您可以在任何地方使用它。

在我们进行的过程中,我只是给你一些
技术的闪光。

那是一台日本的ATM

,指纹模板
是存储在手机里面的。

所以当你想取钱的时候,

你把手机放在自动取款机上
,触摸你的手指,

你的指纹
会传到手机上

,手机会说,“是的,就是那个人”

,然后自动取款机给你一些钱。

它必须是一个
可以在任何地方使用的实用程序。

它必须绝对方便。

那是我去酒吧。 酒吧

门上的所有设备
都是允许的

:这个人是否年满 18 岁
且未被禁止进入酒吧?

所以这个想法是,
你把你的身份证贴在门上

,如果我被允许进来,
它会显示我的照片,

如果我不被允许,它会显示一个红十字。

它不透露任何其他信息。

它必须没有特殊的小工具。

这只能意味着一件事,
继罗斯的声明之后

,我完全同意:
如果这意味着没有特殊的小工具,

它必须在手机上运行。

这是我们唯一的选择
,让它在手机上运行。

有66亿
手机用户。

我最喜欢的统计数据:
全世界只有 40 亿支牙刷。

这意味着什么。 我不知道是什么。

(笑声)

我依靠我们的未来学家来告诉我。

它必须是可扩展的实用程序

所以它必须是
任何人都可以建立的东西。

任何人都应该
能够使用这个基础设施;

您不需要权限
、许可证等。

任何人都应该
能够编写一些代码来做到这一点。

好吧,你知道什么是对称,
所以你不需要它的图片。

这就是我们要做的事情。

我们将使用手机
和移动邻近度来做到这一点。

我将向你们推荐

实现神秘博士
通灵纸的技术

,如果你们中的任何人拥有
一张

带有非接触式界面的新巴克莱借记卡,

那么你已经掌握了这项技术。

你有没有去过大城市
并使用牡蛎卡?

这会敲响警钟吗?

该技术已经存在。

首批
内置该技术的手机

——Google Nexus、S II
、三星 Wave

578——首批内置该技术的手机
已经上市。

因此,加油员
可以出现在我妈妈的门口

,他可以给我妈妈看他的手机

,她可以用她的手机点击它,

如果他真的来自英国天然气公司

并且被允许进入,它就会出现绿色 ,

如果他不是,他会想出红色,故事结束。

我们有技术可以做到这一点。

更重要的是,

虽然其中一些事情
听起来有点违反直觉,

比如证明我已经超过 18 岁
而不证明我是谁,

但这样做的密码学
不仅存在,

而且非常知名
和广为人知。

数字签名,
公钥证书的盲化——

这些技术
已经存在了一段时间,

我们只是没有
办法将它们打包。

所以这项技术已经存在。

我们知道它有效。

有一些在实验场所
使用该技术的例子

那是伦敦时装周,

我们在那里用 O2 建立了一个系统。

那是
在海德公园举办的无线音乐节。

你可以看到这个人
带着他们的 VIP 乐队走进来,

它正在被正在读取乐队的诺基亚手机
检查。

我只是为了向你展示
这些东西是平淡无奇的,

这些东西在这些环境中有效。

他们不需要特别。

所以最后,我知道你可以做到这一点,

因为如果你看到
神秘博士的复活节特别节目

,他乘公共汽车去火星——

我应该再说一遍,
对于我们的外国学生:

这不会发生在每个 插曲。

这是一个非常特殊的案例。

所以在他
乘坐伦敦公共汽车去火星的那一集中——

我不能给你看这个剪辑,

因为 BBC
对安妮女王风格的版权

有令人发指的限制——

但是在他
去火星的那一集中 伦敦公共汽车,

清楚地显示神秘博士

带着牡蛎读卡器

使用他的通灵纸登上公共汽车。

这证明了通灵纸
有NFC接口。

非常感谢你。

(掌声)