0:00:01 > 0:00:04LAUGHS EVILLY
0:00:04 > 0:00:06He's building his part up again.
0:00:21 > 0:00:24This week on Click, we're seeing double.
0:00:24 > 0:00:26But can your phone tell the difference between a good
0:00:26 > 0:00:29and an evil Wi-Fi hotspot?
0:00:29 > 0:00:33We'll ask if using public Wi-Fi is ever safe.
0:00:33 > 0:00:37We'll also sample the gadgets that stimulate your senses.
0:00:37 > 0:00:41But do they smell, or taste, as good as they sound?
0:00:41 > 0:00:44And we'll get a flavour of the Texan interactive festival
0:00:44 > 0:00:47that is South By Southwest.
0:00:47 > 0:00:49All that, plus a round-up of the biggest tech news of the week
0:00:49 > 0:00:53and a way to protect your property online, in Webscape.
0:00:58 > 0:01:00Welcome to Click. I'm Spencer Kelly.
0:01:00 > 0:01:03Over the past few months, we've been investigating an internet crime
0:01:03 > 0:01:08which is almost invisible and which, we've been told, is on the rise.
0:01:08 > 0:01:11Now, you don't have to be a spy to pull it off.
0:01:11 > 0:01:14In fact, all you need is a mobile phone.
0:01:14 > 0:01:18The hack relies on our desire to always be online.
0:01:18 > 0:01:20And specifically, those times
0:01:20 > 0:01:22when we want to hook up to a Wi-Fi hotspot.
0:01:24 > 0:01:26Now, hotspots are really easy to join, of course.
0:01:26 > 0:01:29You just select one on your phone by tapping the screen.
0:01:29 > 0:01:31And conveniently, most phones will remember
0:01:31 > 0:01:33the hotspots that you trust
0:01:33 > 0:01:36and reconnect to them automatically the next time they're in range.
0:01:37 > 0:01:42But, even the hotspots that you trust might not actually be safe.
0:01:42 > 0:01:45And that's because your device can be tricked into connecting
0:01:45 > 0:01:48to another network with an identical name.
0:01:48 > 0:01:51But one that's been set up by a criminal.
0:01:51 > 0:01:54It's called an Evil Twin attack.
0:01:54 > 0:01:55It certainly is, Evil Twin.
0:01:55 > 0:01:58And while he's actually been around for a little while now,
0:01:58 > 0:02:00we've since discovered just how easy it is for him
0:02:00 > 0:02:04to swipe my information using just a mobile.
0:02:04 > 0:02:08Which means your attacker could be standing right next to you.
0:02:08 > 0:02:10Dan Simmons reports.
0:02:13 > 0:02:17The busy lives of the often-spotted city dweller.
0:02:17 > 0:02:20These mammals are always on the go.
0:02:20 > 0:02:24Their social habits include fiddling with these peculiar devices.
0:02:26 > 0:02:29Thankfully, because they often use Wi-Fi,
0:02:29 > 0:02:34we can now see almost everything they do.
0:02:34 > 0:02:35In the park...
0:02:35 > 0:02:38Yeah, it's quite shocking, quite terrifying to think, you know,
0:02:38 > 0:02:39whatever I could have been looking at,
0:02:39 > 0:02:41someone could have found that stuff.
0:02:41 > 0:02:43Relaxing in the coffee shop...
0:02:43 > 0:02:47I thought it would happen in some sort of hi tech van outside.
0:02:47 > 0:02:52But just to see it on a normal laptop here is just a bit unnerving!
0:02:52 > 0:02:55And in the office...
0:02:55 > 0:02:59We could add cards, remove cards, buy items...
0:02:59 > 0:03:04Any functionality within Amazon, we could do pretending to be Caroline.
0:03:06 > 0:03:09City slicker Martin's hopping on to a Wi-Fi hotspot.
0:03:09 > 0:03:13But it's one set up by Nosey Pete, our security expert,
0:03:13 > 0:03:18who's curious to find out what these city folk do in their lunch hour.
0:03:18 > 0:03:22Here he is searching and he finds the website for Billy Elliot.
0:03:22 > 0:03:24There it is.
0:03:24 > 0:03:26We looked in on several other people's sessions,
0:03:26 > 0:03:29and it wasn't difficult to see what they were up to,
0:03:29 > 0:03:34including their passwords and other personal data along the way.
0:03:34 > 0:03:37By simply naming his hotspot the same as the one
0:03:37 > 0:03:41that Martin's expecting to find, Pete can dupe him into believing
0:03:41 > 0:03:44he's on the real one.
0:03:44 > 0:03:48But that's with a public, open Wi-Fi network hotspot.
0:03:48 > 0:03:51No username required, or password.
0:03:51 > 0:03:58Throw those in, and you'd think you'd be a bit more safe. Wouldn't you?
0:04:00 > 0:04:03An aptly-named coffee shop in trendy Shoreditch,
0:04:03 > 0:04:08home to London's tech hub, and one where the owners set up a hotspot
0:04:08 > 0:04:13with a password. A password that is written on the counter.
0:04:13 > 0:04:15And of course, nosy Pete is up to his old tricks again
0:04:15 > 0:04:19and can just as easily set up an identical Wi-Fi hotspot
0:04:19 > 0:04:21asking for the same password.
0:04:21 > 0:04:25This time, it's Lucy caught in the trap.
0:04:25 > 0:04:28We can see what flights you are planning to take,
0:04:28 > 0:04:32we'd know when you will be away from home, away from the office.
0:04:32 > 0:04:35And if it were a business arrangement,
0:04:35 > 0:04:37maybe we could predict what sort of meetings will take place,
0:04:37 > 0:04:40that could be important to the business.
0:04:40 > 0:04:42Yeah. Wow.
0:04:44 > 0:04:47This snooping on what others are doing isn't just nosy,
0:04:47 > 0:04:53it's illegal, which is why we did not set up an evil twin Wi-Fi here.
0:04:53 > 0:04:57Instead, we asked users to log on to our bogus network
0:04:57 > 0:05:00and explained to them what we could see.
0:05:00 > 0:05:04That's not nice. That's not nice at all! That is not nice, no.
0:05:04 > 0:05:07And it's not just websites.
0:05:07 > 0:05:10Nowadays, the apps we use seem to love automatically
0:05:10 > 0:05:13updating in the background, so it's now possible for our data to
0:05:13 > 0:05:16be hacked without our phone leaving our pocket.
0:05:18 > 0:05:20This photo-sharing app is typical.
0:05:20 > 0:05:24It is sending out the user's e-mail address list, password
0:05:24 > 0:05:28and phone contacts to make sure it's up-to-date.
0:05:28 > 0:05:29Pete has got the lot.
0:05:34 > 0:05:37But what he is not is very mobile himself.
0:05:37 > 0:05:40The evil twin Wi-Fi scam has been around for a while
0:05:40 > 0:05:43but all that kit has made Pete's job, well, a bit tricky.
0:05:43 > 0:05:46But it turns out you can carry out the same attack
0:05:46 > 0:05:49with an ordinary mobile smartphone.
0:05:49 > 0:05:51This is mobile Mike
0:05:51 > 0:05:55and he is using his to spoof the local pub's Wi-Fi hotspot.
0:05:55 > 0:05:57With some software from the web,
0:05:57 > 0:06:00he is recording everything Caroline is doing.
0:06:02 > 0:06:04So how worried should we be?
0:06:04 > 0:06:07The head of Europol's cyber crime unit told us
0:06:07 > 0:06:11users simply should not use public Wi-Fi networks for anything
0:06:11 > 0:06:15financial or sensitive but instead wait until they get home.
0:06:17 > 0:06:21Charlie Mcmurdie headed up the UK's police effort against online crime
0:06:21 > 0:06:22until last year.
0:06:22 > 0:06:26She told me Wi-Fi providers should now carry out regular checks
0:06:26 > 0:06:28as snooping becomes easier.
0:06:30 > 0:06:35Whereas, previously, we have really focused on the sort of
0:06:35 > 0:06:41stand-alone attacks and compromises of big databases, now, a lot of
0:06:41 > 0:06:46mainstream criminals have identified there are easy opportunities
0:06:46 > 0:06:50and vulnerabilities just walking down the street and exploiting
0:06:50 > 0:06:53Wi-Fi networks that exist in every coffee shop,
0:06:53 > 0:06:55every premises you go to.
0:06:57 > 0:07:00Back at the cafe, Letty is checking her e-mail.
0:07:00 > 0:07:02But, this time, our snoopers are not so lucky.
0:07:03 > 0:07:07Thankfully, most e-mail and retail sites are encrypted.
0:07:07 > 0:07:09It's slower but much safer.
0:07:09 > 0:07:14Encrypted sites show up with the letters HTTPS in the address bar.
0:07:14 > 0:07:17Your browser might also add a padlock to reassure you.
0:07:18 > 0:07:20If your session is encrypted this way,
0:07:20 > 0:07:23no-one else should be able to snoop.
0:07:24 > 0:07:28But our security experts have found a way to bypass even that,
0:07:28 > 0:07:32using an app that can be simply downloaded to a mobile phone.
0:07:33 > 0:07:35Caroline is shopping.
0:07:35 > 0:07:38In this attack, Mike doesn't need to spoof a hotspot,
0:07:38 > 0:07:42he just needs to be on the same genuine Wi-Fi network.
0:07:42 > 0:07:46But the app he has got manages to tell his victim's handset to
0:07:46 > 0:07:49send all of its web requests to his own mobile.
0:07:49 > 0:07:53He will act as a man in the middle, again seeing everything
0:07:53 > 0:07:57because he is now able to strip out the encryption that Caroline
0:07:57 > 0:07:59is relying on.
0:07:59 > 0:08:02Many other encrypted websites would be just as vulnerable.
0:08:02 > 0:08:06It means if you are using Wi-Fi with just a mobile,
0:08:06 > 0:08:09your attacker could be sitting right next to you.
0:08:09 > 0:08:12You can see them all sitting on benches, and they wouldn't be
0:08:12 > 0:08:17given a second thought to the potential that those communications
0:08:17 > 0:08:20are being picked up and read by the person sat on the bench next to them.
0:08:24 > 0:08:25Dan Simmons reporting.
0:08:25 > 0:08:29And just to reiterate, there was nothing intrinsically unsafe,
0:08:29 > 0:08:34insecure or unusual about the websites featured in that report.
0:08:34 > 0:08:37The hack happens because of the way that our phones recognise
0:08:37 > 0:08:39and connect over Wi-Fi networks.
0:08:40 > 0:08:42Joining me is Mick Paddington,
0:08:42 > 0:08:45from one of the security firms who worked with us on that report.
0:08:45 > 0:08:50- Hi.- Hi.- What can we do? We can't give up using public Wi-Fi, can we?
0:08:50 > 0:08:52No, and there's some simple steps you can take.
0:08:52 > 0:08:55You would not read out your credit card on the train
0:08:55 > 0:08:58aloud over the phone with an audience.
0:08:58 > 0:08:59so you've got to be aware that
0:08:59 > 0:09:03when you are doing these kind of transactions or working on the web
0:09:03 > 0:09:06you should be limiting the sort of behaviour you're doing online.
0:09:06 > 0:09:11Just to clarify - the mere fact that you have to enter a password
0:09:11 > 0:09:14to join a Wi-Fi network does not make it secure.
0:09:14 > 0:09:15No. Definitely not.
0:09:15 > 0:09:18In fact, a lot of these passwords are in the public domain because these
0:09:18 > 0:09:20companies that own these hotspots
0:09:20 > 0:09:22don't actually change these passwords.
0:09:22 > 0:09:25The sort of passwords you should be looking for
0:09:25 > 0:09:27which are more secure are dynamic, one-use passwords.
0:09:27 > 0:09:30If you are in a hotel room, it will ask you for your name
0:09:30 > 0:09:32and room number and then issue you with a password.
0:09:32 > 0:09:35Rather than you going into a well-known coffee shop, for instance,
0:09:35 > 0:09:38and the Wi-Fi address and the password is up on the wall.
0:09:38 > 0:09:42So those one-time passwords can't be obtained by some hacker
0:09:42 > 0:09:45who is setting up a spoof Wi-Fi network?
0:09:45 > 0:09:47They would have no idea what that password is and if they were
0:09:47 > 0:09:50issued with it, you would be issued with a different one.
0:09:50 > 0:09:54Right. That is the theory, OK. Obviously, nothing is 100% secure.
0:09:54 > 0:09:57What we are putting in practice is behaviour
0:09:57 > 0:09:59that reduces your risk online.
0:09:59 > 0:10:01Nothing is 100% secure and, if it was,
0:10:01 > 0:10:03it would probably be totally unusable.
0:10:03 > 0:10:05What about the idea of not using Wi-Fi
0:10:05 > 0:10:09but using the cellular network, the mobile network, to connect to your bank, for example?
0:10:09 > 0:10:10Is that safer?
0:10:10 > 0:10:13Yes, but the trouble is that most people connect to Wi-Fi
0:10:13 > 0:10:15or automatically connect.
0:10:15 > 0:10:18You have got to be aware of what your device is connecting to
0:10:18 > 0:10:21and if you have it set up to connect automatically.
0:10:21 > 0:10:25In terms of using the cellular network, yes, it is inherently more secure.
0:10:25 > 0:10:28The connection from your device to the mast is encrypted.
0:10:28 > 0:10:32The trouble is Wi-Fi is more convenient, it tends to be a lot more faster.
0:10:32 > 0:10:334G isn't everywhere yet
0:10:33 > 0:10:36so people will default to a Wi-Fi network.
0:10:36 > 0:10:39Thank you very much. Wise words. Good advice there.
0:10:39 > 0:10:42If you have advice or experiences of your own that you
0:10:42 > 0:10:43would like to share, e-mail us.
0:10:46 > 0:10:48Next up, a look at this week's tech news.
0:10:50 > 0:10:54A Japanese-American man has been named by Newsweek magazine
0:10:54 > 0:10:56as the creator of Bitcoin.
0:10:56 > 0:11:00Dorian Satoshi Nakamoto, who shares part of his name
0:11:00 > 0:11:03with the mysterious figure behind the digital currency,
0:11:03 > 0:11:07was chased by reporters through Los Angeles after the news broke
0:11:07 > 0:11:11only to tell the Associated Press he had nothing to do with Bitcoin.
0:11:11 > 0:11:14He said he hadn't even heard of the currency
0:11:14 > 0:11:17until three weeks ago when his son was contacted by a reporter.
0:11:18 > 0:11:21Ever wanted the physical strength of a superhero?
0:11:21 > 0:11:25Well, engineers in Italy have created a powered exoskeleton
0:11:25 > 0:11:26that can do just that.
0:11:26 > 0:11:29The body extender tracks the movement of the person
0:11:29 > 0:11:34wearing it and can lift 50 kilos in each of its metal hands.
0:11:34 > 0:11:37Its modular design means it could be rapidly reconfigured to perform
0:11:37 > 0:11:40a large number of different tasks
0:11:40 > 0:11:43such as work in factories or emergency rescue scenarios.
0:11:44 > 0:11:47Finally, thinking of getting new business cards?
0:11:47 > 0:11:49American programmer Kevin Bates
0:11:49 > 0:11:52has certainly made an impression with his.
0:11:52 > 0:11:55It sports an in-built Tetris game.
0:11:55 > 0:11:58Made up of a tiny Arduino computer, an OLED screen
0:11:58 > 0:12:03and capacitive sensor controls, a user or business associate
0:12:03 > 0:12:07can play for up to nine hours before changing batteries.
0:12:07 > 0:12:09Programmable to play other games,
0:12:09 > 0:12:12Bates is already working on a Pokemon variant.
0:12:16 > 0:12:18In recent years, it has made us sit up
0:12:18 > 0:12:22and take notice of everything from Twitter to lifelogging.
0:12:22 > 0:12:23So the big question is
0:12:23 > 0:12:27what does Austin's South By Southwest Interactive Festival
0:12:27 > 0:12:28hold for us this year?
0:12:28 > 0:12:30LJ Rich is our reporter on the ground,
0:12:30 > 0:12:34she's just landed and this is what she has found so far.
0:12:35 > 0:12:38One trend that shows no sign of abating
0:12:38 > 0:12:41if this festival's obsession with eating.
0:12:41 > 0:12:44Look at all these restaurants along sixth street.
0:12:44 > 0:12:47Down the road, something new is being cooked up.
0:12:50 > 0:12:53It can't hurt to be more creative in the kitchen
0:12:53 > 0:12:57and that's exactly what researchers at IBM's Watson Group decided.
0:12:57 > 0:12:59They're using cognitive computing,
0:12:59 > 0:13:03which is like a machine learning as opposed to programmed,
0:13:03 > 0:13:06to help put unexpected ingredients together.
0:13:06 > 0:13:07How does it work?
0:13:07 > 0:13:10You choose an ingredient you like, like asparagus,
0:13:10 > 0:13:14and then Watson does millions of calculations, comparing asparagus
0:13:14 > 0:13:19for thousands of other ingredients, then decides which ingredient would
0:13:19 > 0:13:23fit perfectly with asparagus that humans would not normally think of by themselves.
0:13:23 > 0:13:27Now, this may just be a nice way of trying different foods but actually
0:13:27 > 0:13:30the science behind this can be widened out
0:13:30 > 0:13:34to things like travel itineraries or even making perfume.
0:13:34 > 0:13:39The whole idea behind cognitive computing is, of course, to do things a little bit differently.
0:13:39 > 0:13:45So, what does a real chef make of ingredients being put together by a machine?
0:13:45 > 0:13:48Creativity is based on previous experience.
0:13:48 > 0:13:51For chefs, it is something we tasted, it's a smell from our childhood,
0:13:51 > 0:13:54something we remember that spurs us to create a new dish.
0:13:54 > 0:13:57Now, working with this system, that's erased.
0:13:57 > 0:13:59It's all based on new information.
0:13:59 > 0:14:02We are starting with a blank slate looking at a set of ingredients
0:14:02 > 0:14:07that seemingly have no relationship, no memory, nothing to spur us on,
0:14:07 > 0:14:11just the ingredients themselves are the inspiration.
0:14:11 > 0:14:15- There it is. Russian beet salad. - Thank you very much.
0:14:15 > 0:14:17Mmmm. Mmmm!
0:14:17 > 0:14:22Beets, prunes, pickles, cucumbers - who would have thought?
0:14:25 > 0:14:28I liked it more when you didn't tell me what was in it.
0:14:28 > 0:14:34LJ Rich - and LJ will have more from South By Southwest next week.
0:14:34 > 0:14:36Now, a feast for your senses.
0:14:39 > 0:14:43Computers have traditionally played to only two of our five senses,
0:14:43 > 0:14:44sight and sound.
0:14:44 > 0:14:48And while these have become increasingly immersive over the years,
0:14:48 > 0:14:50the other senses are much harder to cater for.
0:14:51 > 0:14:55But, after recently finding something that simulates touch,
0:14:55 > 0:15:00it is time to turn my attention and my tongue to something rather tasty.
0:15:02 > 0:15:08This is what is being billed as the world's first electric lollipop.
0:15:08 > 0:15:10It doesn't look like it but bear with me.
0:15:10 > 0:15:13You stick your tongue between these two electrodes
0:15:13 > 0:15:16and they pass an electric current through it.
0:15:16 > 0:15:19What the researchers here at City University London have found
0:15:19 > 0:15:23is that by varying the amplitude and frequency of that current
0:15:23 > 0:15:26they can stimulate the different taste receptors.
0:15:26 > 0:15:31That means they can simulate the four basic tastes - sweet,
0:15:31 > 0:15:33sour, salt and bitter.
0:15:34 > 0:15:39The question is does it work? Time to find out.
0:15:41 > 0:15:45By far the easiest taste to create is a sour, lemony taste.
0:15:45 > 0:15:49It's the same sensation you get when you taste some metals. Ughhh!
0:15:49 > 0:15:51HE GIGGLES
0:15:51 > 0:15:55That's so weird. That's lemon. Lemon?
0:15:55 > 0:15:58The theory is that animals have developed a strong response
0:15:58 > 0:16:01to sour taste in order to detect food that's gone bad.
0:16:01 > 0:16:05The other tastes are certainly harder to judge.
0:16:07 > 0:16:08I can't really taste anything.
0:16:08 > 0:16:12One thing is for sure - it is a weird experience.
0:16:14 > 0:16:18While this thing can only ever simulate basic tastes,
0:16:18 > 0:16:22it could be used in combination with a mouth-worn device
0:16:22 > 0:16:24that stimulates your nose,
0:16:24 > 0:16:28at which point you should be able to detect many, many more flavours.
0:16:28 > 0:16:30In fact, that is where we are off to next.
0:16:30 > 0:16:34We have ticked off sight, sound, touch and taste.
0:16:34 > 0:16:37It is now time for Lara Lewington to hit the fifth sense,
0:16:37 > 0:16:40as she heads to Madrid to see what's cooking.
0:16:42 > 0:16:44This may be a feast for the eyes
0:16:44 > 0:16:47but the rest is left to the imagination.
0:16:48 > 0:16:53Spanish chef Andoni Luis Aduriz hopes that could change.
0:16:53 > 0:16:55With two Michelin stars,
0:16:55 > 0:16:59his restaurant, Mugaritz, ranks in the world's top five year on year.
0:17:01 > 0:17:07And he wants to bring the scent of this molecular gastronomy to your phone.
0:17:07 > 0:17:10HE SPEAKS SPANISH
0:17:10 > 0:17:13Here, I am learning to make one of his signature dishes,
0:17:13 > 0:17:18a broth that is all about the full sensory experience.
0:17:23 > 0:17:27The smell is a lot stronger since I have been doing this.
0:17:27 > 0:17:31I can smell saffron and peppercorns, mixed with some seeds.
0:17:31 > 0:17:34The saffron is the most overwhelming smell.
0:17:37 > 0:17:40Watching this on TV, you could see what the soup looked like,
0:17:40 > 0:17:42you could hear me making it,
0:17:42 > 0:17:46but of course you have no idea how it taste or smells
0:17:46 > 0:17:50which, let's face it, when it comes to food, is pretty important.
0:17:50 > 0:17:53Here is some technology that could change things.
0:17:53 > 0:17:56This app allows you to virtually create what
0:17:56 > 0:17:59I made in the kitchen, so let's get going.
0:18:00 > 0:18:03You move the phone around, which effectively mixes up
0:18:03 > 0:18:08the ingredients, the peppercorns and the seeds are being crushed.
0:18:08 > 0:18:11It looks pretty similar and the sound is the same.
0:18:12 > 0:18:15But the most exciting bit is, once you are finished,
0:18:15 > 0:18:21you press OK, and the smell comes out.
0:18:21 > 0:18:24And I can tell you, that also smells of saffron
0:18:24 > 0:18:26and is pretty similar to the real thing.
0:18:28 > 0:18:34We get to enrich all our information with taste and smell.
0:18:34 > 0:18:42We will enhance and improve, particularly not our membranes
0:18:42 > 0:18:47but our feelings in the very moment when we are watching
0:18:47 > 0:18:51something together with the smell and taste of it.
0:18:51 > 0:18:55The app's software sends signals to a moving motor in the device,
0:18:55 > 0:18:59which attaches via the earphone jack to puff out the smell.
0:18:59 > 0:19:02This version only omits one scent.
0:19:02 > 0:19:06But, as the device's creator explains, it's merely the start.
0:19:06 > 0:19:09What we are working on for the long-term
0:19:09 > 0:19:12is a device that you put inside your mouth.
0:19:12 > 0:19:13It will have magnetic coils
0:19:13 > 0:19:17which will directly stimulate your olfactory bulb,
0:19:17 > 0:19:20producing electrical currents to produce the artificial smell
0:19:20 > 0:19:22sensation in your brain.
0:19:22 > 0:19:25Once we can do that, the range of smells we can generate will be infinite
0:19:25 > 0:19:28because they are not going to be limited chemicals.
0:19:28 > 0:19:31And then, well, you may be left hungry
0:19:31 > 0:19:35but the full sensory experience could be yours anywhere, any time.
0:19:36 > 0:19:40Lara Lewington with her portable pongs.
0:19:40 > 0:19:45From smells back to pictures now. Publishing photographs online
0:19:45 > 0:19:48that don't belong to you can be a costly business.
0:19:48 > 0:19:52Certainly if you're BuzzFeed, Getty Images or Perez Hilton,
0:19:52 > 0:19:58all of whom have had copyright infringement lawsuits filed against them in the last year.
0:19:58 > 0:20:01Coming up with some tips to help you protect your online images
0:20:01 > 0:20:05and stay on the right side of the law, here comes Kate Russell with Webscape.
0:20:08 > 0:20:12Copyright protection for digital content is a complex issue
0:20:12 > 0:20:14with no straightforward solution.
0:20:14 > 0:20:18Stipple can help you by creating a unique fingerprint that stays
0:20:18 > 0:20:22connected to it wherever it travels within the website's network.
0:20:22 > 0:20:27There is the extra bonus that you can add interactive content to tell
0:20:27 > 0:20:29the story behind the image
0:20:29 > 0:20:33and get detailed analytics about views and shares.
0:20:33 > 0:20:35If anyone wants to repost your images,
0:20:35 > 0:20:39this site makes the process super-easy, with a ready-made embed code
0:20:39 > 0:20:43equipped with full attribution details as set by you.
0:20:43 > 0:20:47There is even a free iPhone app to protect your mobile uploads,
0:20:47 > 0:20:51which is a notoriously thorny part of intellectual property rights online.
0:20:54 > 0:20:57If you want to stay on the right side of copyright law
0:20:57 > 0:21:00when reposting a non-attributed image you find,
0:21:00 > 0:21:03you can use the site's reverse image search.
0:21:03 > 0:21:08Even though this website makes it super-easy to use and attribute images legally,
0:21:08 > 0:21:12it is not a fail-safe method for protecting your photos online.
0:21:12 > 0:21:17In truth, the only way to keep them safe is not to post them at all.
0:21:17 > 0:21:20But that's not a satisfactory option for most
0:21:20 > 0:21:22so I have some other suggestions.
0:21:25 > 0:21:30You could try adding a subtle watermark detailing your ownership.
0:21:30 > 0:21:35Most editing packages will let you do this by adding a translucent layer
0:21:35 > 0:21:37and you will find lots of tutorials online.
0:21:37 > 0:21:41If you want a quick and simple tool, try uMark Online
0:21:41 > 0:21:44but bear in mind that positioning the attribution
0:21:44 > 0:21:47on the edge of your picture so it doesn't spoil the view
0:21:47 > 0:21:50will make it pretty easy to crop out before reposting
0:21:50 > 0:21:53if someone is determined to rip you off.
0:21:54 > 0:21:59Make sure you are clear about your terms for anything that you post
0:21:59 > 0:22:01by linking it to a licence.
0:22:01 > 0:22:03From all rights reserved,
0:22:03 > 0:22:05meaning no-one has permission to repost,
0:22:05 > 0:22:10to public domain, where you are happy for it to be shared without attribution.
0:22:10 > 0:22:12And everything in between.
0:22:12 > 0:22:16A Creative Commons licence is an easy and standardised way
0:22:16 > 0:22:20of detailing permissions so that no-one can claim ignorance.
0:22:23 > 0:22:27If you think your images are at risk of copyright theft,
0:22:27 > 0:22:31it is not a bad idea to run them through a reverse image search,
0:22:31 > 0:22:33like TinEye, every now and then.
0:22:33 > 0:22:38It will trawl the web detailing where the image has been found online.
0:22:39 > 0:22:43A quick way to check a whole website is to run the address through
0:22:43 > 0:22:45Copyscape, which will tell you
0:22:45 > 0:22:49if any other web pages are using the content posted on it.
0:22:51 > 0:22:55If you do find a violation, there are steps you should take to tackle it,
0:22:55 > 0:22:59rising in escalation depending on how the violator responds.
0:22:59 > 0:23:02Firstly, contact them directly and keep it simple
0:23:02 > 0:23:05and non-confrontational.
0:23:05 > 0:23:08It could be that they are not aware they have done anything wrong
0:23:08 > 0:23:11and the matter can be resolved swiftly.
0:23:18 > 0:23:21How about we finish with a real-world hack
0:23:21 > 0:23:23for this week's video of the week?
0:23:23 > 0:23:27Illusion specialists Brusspup have a brilliant 3D T-rex video
0:23:27 > 0:23:29on their YouTube channel,
0:23:29 > 0:23:33complete with a link to download and print your own.
0:23:44 > 0:23:46Thank you, Kate. Loving those dinosaurs.
0:23:46 > 0:23:49They are so simple yet so very, very effective.
0:23:49 > 0:23:50If you missed any of Kate's links,
0:23:50 > 0:23:52you will find them all on our website as usual.
0:23:53 > 0:23:57If you would like to get in touch about anything you have seen today,
0:23:57 > 0:23:59please do e-mail or tweet us.
0:24:01 > 0:24:02That's it for now though.
0:24:02 > 0:24:05Thank you very much for watching and we'll see you next time.