08/03/2014

Download Subtitles

Transcript

0:00:01 > 0:00:04LAUGHS EVILLY

0:00:04 > 0:00:06He's building his part up again.

0:00:21 > 0:00:24This week on Click, we're seeing double.

0:00:24 > 0:00:26But can your phone tell the difference between a good

0:00:26 > 0:00:29and an evil Wi-Fi hotspot?

0:00:29 > 0:00:33We'll ask if using public Wi-Fi is ever safe.

0:00:33 > 0:00:37We'll also sample the gadgets that stimulate your senses.

0:00:37 > 0:00:41But do they smell, or taste, as good as they sound?

0:00:41 > 0:00:44And we'll get a flavour of the Texan interactive festival

0:00:44 > 0:00:47that is South By Southwest.

0:00:47 > 0:00:49All that, plus a round-up of the biggest tech news of the week

0:00:49 > 0:00:53and a way to protect your property online, in Webscape.

0:00:58 > 0:01:00Welcome to Click. I'm Spencer Kelly.

0:01:00 > 0:01:03Over the past few months, we've been investigating an internet crime

0:01:03 > 0:01:08which is almost invisible and which, we've been told, is on the rise.

0:01:08 > 0:01:11Now, you don't have to be a spy to pull it off.

0:01:11 > 0:01:14In fact, all you need is a mobile phone.

0:01:14 > 0:01:18The hack relies on our desire to always be online.

0:01:18 > 0:01:20And specifically, those times

0:01:20 > 0:01:22when we want to hook up to a Wi-Fi hotspot.

0:01:24 > 0:01:26Now, hotspots are really easy to join, of course.

0:01:26 > 0:01:29You just select one on your phone by tapping the screen.

0:01:29 > 0:01:31And conveniently, most phones will remember

0:01:31 > 0:01:33the hotspots that you trust

0:01:33 > 0:01:36and reconnect to them automatically the next time they're in range.

0:01:37 > 0:01:42But, even the hotspots that you trust might not actually be safe.

0:01:42 > 0:01:45And that's because your device can be tricked into connecting

0:01:45 > 0:01:48to another network with an identical name.

0:01:48 > 0:01:51But one that's been set up by a criminal.

0:01:51 > 0:01:54It's called an Evil Twin attack.

0:01:54 > 0:01:55It certainly is, Evil Twin.

0:01:55 > 0:01:58And while he's actually been around for a little while now,

0:01:58 > 0:02:00we've since discovered just how easy it is for him

0:02:00 > 0:02:04to swipe my information using just a mobile.

0:02:04 > 0:02:08Which means your attacker could be standing right next to you.

0:02:08 > 0:02:10Dan Simmons reports.

0:02:13 > 0:02:17The busy lives of the often-spotted city dweller.

0:02:17 > 0:02:20These mammals are always on the go.

0:02:20 > 0:02:24Their social habits include fiddling with these peculiar devices.

0:02:26 > 0:02:29Thankfully, because they often use Wi-Fi,

0:02:29 > 0:02:34we can now see almost everything they do.

0:02:34 > 0:02:35In the park...

0:02:35 > 0:02:38Yeah, it's quite shocking, quite terrifying to think, you know,

0:02:38 > 0:02:39whatever I could have been looking at,

0:02:39 > 0:02:41someone could have found that stuff.

0:02:41 > 0:02:43Relaxing in the coffee shop...

0:02:43 > 0:02:47I thought it would happen in some sort of hi tech van outside.

0:02:47 > 0:02:52But just to see it on a normal laptop here is just a bit unnerving!

0:02:52 > 0:02:55And in the office...

0:02:55 > 0:02:59We could add cards, remove cards, buy items...

0:02:59 > 0:03:04Any functionality within Amazon, we could do pretending to be Caroline.

0:03:06 > 0:03:09City slicker Martin's hopping on to a Wi-Fi hotspot.

0:03:09 > 0:03:13But it's one set up by Nosey Pete, our security expert,

0:03:13 > 0:03:18who's curious to find out what these city folk do in their lunch hour.

0:03:18 > 0:03:22Here he is searching and he finds the website for Billy Elliot.

0:03:22 > 0:03:24There it is.

0:03:24 > 0:03:26We looked in on several other people's sessions,

0:03:26 > 0:03:29and it wasn't difficult to see what they were up to,

0:03:29 > 0:03:34including their passwords and other personal data along the way.

0:03:34 > 0:03:37By simply naming his hotspot the same as the one

0:03:37 > 0:03:41that Martin's expecting to find, Pete can dupe him into believing

0:03:41 > 0:03:44he's on the real one.

0:03:44 > 0:03:48But that's with a public, open Wi-Fi network hotspot.

0:03:48 > 0:03:51No username required, or password.

0:03:51 > 0:03:58Throw those in, and you'd think you'd be a bit more safe. Wouldn't you?

0:04:00 > 0:04:03An aptly-named coffee shop in trendy Shoreditch,

0:04:03 > 0:04:08home to London's tech hub, and one where the owners set up a hotspot

0:04:08 > 0:04:13with a password. A password that is written on the counter.

0:04:13 > 0:04:15And of course, nosy Pete is up to his old tricks again

0:04:15 > 0:04:19and can just as easily set up an identical Wi-Fi hotspot

0:04:19 > 0:04:21asking for the same password.

0:04:21 > 0:04:25This time, it's Lucy caught in the trap.

0:04:25 > 0:04:28We can see what flights you are planning to take,

0:04:28 > 0:04:32we'd know when you will be away from home, away from the office.

0:04:32 > 0:04:35And if it were a business arrangement,

0:04:35 > 0:04:37maybe we could predict what sort of meetings will take place,

0:04:37 > 0:04:40that could be important to the business.

0:04:40 > 0:04:42Yeah. Wow.

0:04:44 > 0:04:47This snooping on what others are doing isn't just nosy,

0:04:47 > 0:04:53it's illegal, which is why we did not set up an evil twin Wi-Fi here.

0:04:53 > 0:04:57Instead, we asked users to log on to our bogus network

0:04:57 > 0:05:00and explained to them what we could see.

0:05:00 > 0:05:04That's not nice. That's not nice at all! That is not nice, no.

0:05:04 > 0:05:07And it's not just websites.

0:05:07 > 0:05:10Nowadays, the apps we use seem to love automatically

0:05:10 > 0:05:13updating in the background, so it's now possible for our data to

0:05:13 > 0:05:16be hacked without our phone leaving our pocket.

0:05:18 > 0:05:20This photo-sharing app is typical.

0:05:20 > 0:05:24It is sending out the user's e-mail address list, password

0:05:24 > 0:05:28and phone contacts to make sure it's up-to-date.

0:05:28 > 0:05:29Pete has got the lot.

0:05:34 > 0:05:37But what he is not is very mobile himself.

0:05:37 > 0:05:40The evil twin Wi-Fi scam has been around for a while

0:05:40 > 0:05:43but all that kit has made Pete's job, well, a bit tricky.

0:05:43 > 0:05:46But it turns out you can carry out the same attack

0:05:46 > 0:05:49with an ordinary mobile smartphone.

0:05:49 > 0:05:51This is mobile Mike

0:05:51 > 0:05:55and he is using his to spoof the local pub's Wi-Fi hotspot.

0:05:55 > 0:05:57With some software from the web,

0:05:57 > 0:06:00he is recording everything Caroline is doing.

0:06:02 > 0:06:04So how worried should we be?

0:06:04 > 0:06:07The head of Europol's cyber crime unit told us

0:06:07 > 0:06:11users simply should not use public Wi-Fi networks for anything

0:06:11 > 0:06:15financial or sensitive but instead wait until they get home.

0:06:17 > 0:06:21Charlie Mcmurdie headed up the UK's police effort against online crime

0:06:21 > 0:06:22until last year.

0:06:22 > 0:06:26She told me Wi-Fi providers should now carry out regular checks

0:06:26 > 0:06:28as snooping becomes easier.

0:06:30 > 0:06:35Whereas, previously, we have really focused on the sort of

0:06:35 > 0:06:41stand-alone attacks and compromises of big databases, now, a lot of

0:06:41 > 0:06:46mainstream criminals have identified there are easy opportunities

0:06:46 > 0:06:50and vulnerabilities just walking down the street and exploiting

0:06:50 > 0:06:53Wi-Fi networks that exist in every coffee shop,

0:06:53 > 0:06:55every premises you go to.

0:06:57 > 0:07:00Back at the cafe, Letty is checking her e-mail.

0:07:00 > 0:07:02But, this time, our snoopers are not so lucky.

0:07:03 > 0:07:07Thankfully, most e-mail and retail sites are encrypted.

0:07:07 > 0:07:09It's slower but much safer.

0:07:09 > 0:07:14Encrypted sites show up with the letters HTTPS in the address bar.

0:07:14 > 0:07:17Your browser might also add a padlock to reassure you.

0:07:18 > 0:07:20If your session is encrypted this way,

0:07:20 > 0:07:23no-one else should be able to snoop.

0:07:24 > 0:07:28But our security experts have found a way to bypass even that,

0:07:28 > 0:07:32using an app that can be simply downloaded to a mobile phone.

0:07:33 > 0:07:35Caroline is shopping.

0:07:35 > 0:07:38In this attack, Mike doesn't need to spoof a hotspot,

0:07:38 > 0:07:42he just needs to be on the same genuine Wi-Fi network.

0:07:42 > 0:07:46But the app he has got manages to tell his victim's handset to

0:07:46 > 0:07:49send all of its web requests to his own mobile.

0:07:49 > 0:07:53He will act as a man in the middle, again seeing everything

0:07:53 > 0:07:57because he is now able to strip out the encryption that Caroline

0:07:57 > 0:07:59is relying on.

0:07:59 > 0:08:02Many other encrypted websites would be just as vulnerable.

0:08:02 > 0:08:06It means if you are using Wi-Fi with just a mobile,

0:08:06 > 0:08:09your attacker could be sitting right next to you.

0:08:09 > 0:08:12You can see them all sitting on benches, and they wouldn't be

0:08:12 > 0:08:17given a second thought to the potential that those communications

0:08:17 > 0:08:20are being picked up and read by the person sat on the bench next to them.

0:08:24 > 0:08:25Dan Simmons reporting.

0:08:25 > 0:08:29And just to reiterate, there was nothing intrinsically unsafe,

0:08:29 > 0:08:34insecure or unusual about the websites featured in that report.

0:08:34 > 0:08:37The hack happens because of the way that our phones recognise

0:08:37 > 0:08:39and connect over Wi-Fi networks.

0:08:40 > 0:08:42Joining me is Mick Paddington,

0:08:42 > 0:08:45from one of the security firms who worked with us on that report.

0:08:45 > 0:08:50- Hi.- Hi.- What can we do? We can't give up using public Wi-Fi, can we?

0:08:50 > 0:08:52No, and there's some simple steps you can take.

0:08:52 > 0:08:55You would not read out your credit card on the train

0:08:55 > 0:08:58aloud over the phone with an audience.

0:08:58 > 0:08:59so you've got to be aware that

0:08:59 > 0:09:03when you are doing these kind of transactions or working on the web

0:09:03 > 0:09:06you should be limiting the sort of behaviour you're doing online.

0:09:06 > 0:09:11Just to clarify - the mere fact that you have to enter a password

0:09:11 > 0:09:14to join a Wi-Fi network does not make it secure.

0:09:14 > 0:09:15No. Definitely not.

0:09:15 > 0:09:18In fact, a lot of these passwords are in the public domain because these

0:09:18 > 0:09:20companies that own these hotspots

0:09:20 > 0:09:22don't actually change these passwords.

0:09:22 > 0:09:25The sort of passwords you should be looking for

0:09:25 > 0:09:27which are more secure are dynamic, one-use passwords.

0:09:27 > 0:09:30If you are in a hotel room, it will ask you for your name

0:09:30 > 0:09:32and room number and then issue you with a password.

0:09:32 > 0:09:35Rather than you going into a well-known coffee shop, for instance,

0:09:35 > 0:09:38and the Wi-Fi address and the password is up on the wall.

0:09:38 > 0:09:42So those one-time passwords can't be obtained by some hacker

0:09:42 > 0:09:45who is setting up a spoof Wi-Fi network?

0:09:45 > 0:09:47They would have no idea what that password is and if they were

0:09:47 > 0:09:50issued with it, you would be issued with a different one.

0:09:50 > 0:09:54Right. That is the theory, OK. Obviously, nothing is 100% secure.

0:09:54 > 0:09:57What we are putting in practice is behaviour

0:09:57 > 0:09:59that reduces your risk online.

0:09:59 > 0:10:01Nothing is 100% secure and, if it was,

0:10:01 > 0:10:03it would probably be totally unusable.

0:10:03 > 0:10:05What about the idea of not using Wi-Fi

0:10:05 > 0:10:09but using the cellular network, the mobile network, to connect to your bank, for example?

0:10:09 > 0:10:10Is that safer?

0:10:10 > 0:10:13Yes, but the trouble is that most people connect to Wi-Fi

0:10:13 > 0:10:15or automatically connect.

0:10:15 > 0:10:18You have got to be aware of what your device is connecting to

0:10:18 > 0:10:21and if you have it set up to connect automatically.

0:10:21 > 0:10:25In terms of using the cellular network, yes, it is inherently more secure.

0:10:25 > 0:10:28The connection from your device to the mast is encrypted.

0:10:28 > 0:10:32The trouble is Wi-Fi is more convenient, it tends to be a lot more faster.

0:10:32 > 0:10:334G isn't everywhere yet

0:10:33 > 0:10:36so people will default to a Wi-Fi network.

0:10:36 > 0:10:39Thank you very much. Wise words. Good advice there.

0:10:39 > 0:10:42If you have advice or experiences of your own that you

0:10:42 > 0:10:43would like to share, e-mail us.

0:10:46 > 0:10:48Next up, a look at this week's tech news.

0:10:50 > 0:10:54A Japanese-American man has been named by Newsweek magazine

0:10:54 > 0:10:56as the creator of Bitcoin.

0:10:56 > 0:11:00Dorian Satoshi Nakamoto, who shares part of his name

0:11:00 > 0:11:03with the mysterious figure behind the digital currency,

0:11:03 > 0:11:07was chased by reporters through Los Angeles after the news broke

0:11:07 > 0:11:11only to tell the Associated Press he had nothing to do with Bitcoin.

0:11:11 > 0:11:14He said he hadn't even heard of the currency

0:11:14 > 0:11:17until three weeks ago when his son was contacted by a reporter.

0:11:18 > 0:11:21Ever wanted the physical strength of a superhero?

0:11:21 > 0:11:25Well, engineers in Italy have created a powered exoskeleton

0:11:25 > 0:11:26that can do just that.

0:11:26 > 0:11:29The body extender tracks the movement of the person

0:11:29 > 0:11:34wearing it and can lift 50 kilos in each of its metal hands.

0:11:34 > 0:11:37Its modular design means it could be rapidly reconfigured to perform

0:11:37 > 0:11:40a large number of different tasks

0:11:40 > 0:11:43such as work in factories or emergency rescue scenarios.

0:11:44 > 0:11:47Finally, thinking of getting new business cards?

0:11:47 > 0:11:49American programmer Kevin Bates

0:11:49 > 0:11:52has certainly made an impression with his.

0:11:52 > 0:11:55It sports an in-built Tetris game.

0:11:55 > 0:11:58Made up of a tiny Arduino computer, an OLED screen

0:11:58 > 0:12:03and capacitive sensor controls, a user or business associate

0:12:03 > 0:12:07can play for up to nine hours before changing batteries.

0:12:07 > 0:12:09Programmable to play other games,

0:12:09 > 0:12:12Bates is already working on a Pokemon variant.

0:12:16 > 0:12:18In recent years, it has made us sit up

0:12:18 > 0:12:22and take notice of everything from Twitter to lifelogging.

0:12:22 > 0:12:23So the big question is

0:12:23 > 0:12:27what does Austin's South By Southwest Interactive Festival

0:12:27 > 0:12:28hold for us this year?

0:12:28 > 0:12:30LJ Rich is our reporter on the ground,

0:12:30 > 0:12:34she's just landed and this is what she has found so far.

0:12:35 > 0:12:38One trend that shows no sign of abating

0:12:38 > 0:12:41if this festival's obsession with eating.

0:12:41 > 0:12:44Look at all these restaurants along sixth street.

0:12:44 > 0:12:47Down the road, something new is being cooked up.

0:12:50 > 0:12:53It can't hurt to be more creative in the kitchen

0:12:53 > 0:12:57and that's exactly what researchers at IBM's Watson Group decided.

0:12:57 > 0:12:59They're using cognitive computing,

0:12:59 > 0:13:03which is like a machine learning as opposed to programmed,

0:13:03 > 0:13:06to help put unexpected ingredients together.

0:13:06 > 0:13:07How does it work?

0:13:07 > 0:13:10You choose an ingredient you like, like asparagus,

0:13:10 > 0:13:14and then Watson does millions of calculations, comparing asparagus

0:13:14 > 0:13:19for thousands of other ingredients, then decides which ingredient would

0:13:19 > 0:13:23fit perfectly with asparagus that humans would not normally think of by themselves.

0:13:23 > 0:13:27Now, this may just be a nice way of trying different foods but actually

0:13:27 > 0:13:30the science behind this can be widened out

0:13:30 > 0:13:34to things like travel itineraries or even making perfume.

0:13:34 > 0:13:39The whole idea behind cognitive computing is, of course, to do things a little bit differently.

0:13:39 > 0:13:45So, what does a real chef make of ingredients being put together by a machine?

0:13:45 > 0:13:48Creativity is based on previous experience.

0:13:48 > 0:13:51For chefs, it is something we tasted, it's a smell from our childhood,

0:13:51 > 0:13:54something we remember that spurs us to create a new dish.

0:13:54 > 0:13:57Now, working with this system, that's erased.

0:13:57 > 0:13:59It's all based on new information.

0:13:59 > 0:14:02We are starting with a blank slate looking at a set of ingredients

0:14:02 > 0:14:07that seemingly have no relationship, no memory, nothing to spur us on,

0:14:07 > 0:14:11just the ingredients themselves are the inspiration.

0:14:11 > 0:14:15- There it is. Russian beet salad. - Thank you very much.

0:14:15 > 0:14:17Mmmm. Mmmm!

0:14:17 > 0:14:22Beets, prunes, pickles, cucumbers - who would have thought?

0:14:25 > 0:14:28I liked it more when you didn't tell me what was in it.

0:14:28 > 0:14:34LJ Rich - and LJ will have more from South By Southwest next week.

0:14:34 > 0:14:36Now, a feast for your senses.

0:14:39 > 0:14:43Computers have traditionally played to only two of our five senses,

0:14:43 > 0:14:44sight and sound.

0:14:44 > 0:14:48And while these have become increasingly immersive over the years,

0:14:48 > 0:14:50the other senses are much harder to cater for.

0:14:51 > 0:14:55But, after recently finding something that simulates touch,

0:14:55 > 0:15:00it is time to turn my attention and my tongue to something rather tasty.

0:15:02 > 0:15:08This is what is being billed as the world's first electric lollipop.

0:15:08 > 0:15:10It doesn't look like it but bear with me.

0:15:10 > 0:15:13You stick your tongue between these two electrodes

0:15:13 > 0:15:16and they pass an electric current through it.

0:15:16 > 0:15:19What the researchers here at City University London have found

0:15:19 > 0:15:23is that by varying the amplitude and frequency of that current

0:15:23 > 0:15:26they can stimulate the different taste receptors.

0:15:26 > 0:15:31That means they can simulate the four basic tastes - sweet,

0:15:31 > 0:15:33sour, salt and bitter.

0:15:34 > 0:15:39The question is does it work? Time to find out.

0:15:41 > 0:15:45By far the easiest taste to create is a sour, lemony taste.

0:15:45 > 0:15:49It's the same sensation you get when you taste some metals. Ughhh!

0:15:49 > 0:15:51HE GIGGLES

0:15:51 > 0:15:55That's so weird. That's lemon. Lemon?

0:15:55 > 0:15:58The theory is that animals have developed a strong response

0:15:58 > 0:16:01to sour taste in order to detect food that's gone bad.

0:16:01 > 0:16:05The other tastes are certainly harder to judge.

0:16:07 > 0:16:08I can't really taste anything.

0:16:08 > 0:16:12One thing is for sure - it is a weird experience.

0:16:14 > 0:16:18While this thing can only ever simulate basic tastes,

0:16:18 > 0:16:22it could be used in combination with a mouth-worn device

0:16:22 > 0:16:24that stimulates your nose,

0:16:24 > 0:16:28at which point you should be able to detect many, many more flavours.

0:16:28 > 0:16:30In fact, that is where we are off to next.

0:16:30 > 0:16:34We have ticked off sight, sound, touch and taste.

0:16:34 > 0:16:37It is now time for Lara Lewington to hit the fifth sense,

0:16:37 > 0:16:40as she heads to Madrid to see what's cooking.

0:16:42 > 0:16:44This may be a feast for the eyes

0:16:44 > 0:16:47but the rest is left to the imagination.

0:16:48 > 0:16:53Spanish chef Andoni Luis Aduriz hopes that could change.

0:16:53 > 0:16:55With two Michelin stars,

0:16:55 > 0:16:59his restaurant, Mugaritz, ranks in the world's top five year on year.

0:17:01 > 0:17:07And he wants to bring the scent of this molecular gastronomy to your phone.

0:17:07 > 0:17:10HE SPEAKS SPANISH

0:17:10 > 0:17:13Here, I am learning to make one of his signature dishes,

0:17:13 > 0:17:18a broth that is all about the full sensory experience.

0:17:23 > 0:17:27The smell is a lot stronger since I have been doing this.

0:17:27 > 0:17:31I can smell saffron and peppercorns, mixed with some seeds.

0:17:31 > 0:17:34The saffron is the most overwhelming smell.

0:17:37 > 0:17:40Watching this on TV, you could see what the soup looked like,

0:17:40 > 0:17:42you could hear me making it,

0:17:42 > 0:17:46but of course you have no idea how it taste or smells

0:17:46 > 0:17:50which, let's face it, when it comes to food, is pretty important.

0:17:50 > 0:17:53Here is some technology that could change things.

0:17:53 > 0:17:56This app allows you to virtually create what

0:17:56 > 0:17:59I made in the kitchen, so let's get going.

0:18:00 > 0:18:03You move the phone around, which effectively mixes up

0:18:03 > 0:18:08the ingredients, the peppercorns and the seeds are being crushed.

0:18:08 > 0:18:11It looks pretty similar and the sound is the same.

0:18:12 > 0:18:15But the most exciting bit is, once you are finished,

0:18:15 > 0:18:21you press OK, and the smell comes out.

0:18:21 > 0:18:24And I can tell you, that also smells of saffron

0:18:24 > 0:18:26and is pretty similar to the real thing.

0:18:28 > 0:18:34We get to enrich all our information with taste and smell.

0:18:34 > 0:18:42We will enhance and improve, particularly not our membranes

0:18:42 > 0:18:47but our feelings in the very moment when we are watching

0:18:47 > 0:18:51something together with the smell and taste of it.

0:18:51 > 0:18:55The app's software sends signals to a moving motor in the device,

0:18:55 > 0:18:59which attaches via the earphone jack to puff out the smell.

0:18:59 > 0:19:02This version only omits one scent.

0:19:02 > 0:19:06But, as the device's creator explains, it's merely the start.

0:19:06 > 0:19:09What we are working on for the long-term

0:19:09 > 0:19:12is a device that you put inside your mouth.

0:19:12 > 0:19:13It will have magnetic coils

0:19:13 > 0:19:17which will directly stimulate your olfactory bulb,

0:19:17 > 0:19:20producing electrical currents to produce the artificial smell

0:19:20 > 0:19:22sensation in your brain.

0:19:22 > 0:19:25Once we can do that, the range of smells we can generate will be infinite

0:19:25 > 0:19:28because they are not going to be limited chemicals.

0:19:28 > 0:19:31And then, well, you may be left hungry

0:19:31 > 0:19:35but the full sensory experience could be yours anywhere, any time.

0:19:36 > 0:19:40Lara Lewington with her portable pongs.

0:19:40 > 0:19:45From smells back to pictures now. Publishing photographs online

0:19:45 > 0:19:48that don't belong to you can be a costly business.

0:19:48 > 0:19:52Certainly if you're BuzzFeed, Getty Images or Perez Hilton,

0:19:52 > 0:19:58all of whom have had copyright infringement lawsuits filed against them in the last year.

0:19:58 > 0:20:01Coming up with some tips to help you protect your online images

0:20:01 > 0:20:05and stay on the right side of the law, here comes Kate Russell with Webscape.

0:20:08 > 0:20:12Copyright protection for digital content is a complex issue

0:20:12 > 0:20:14with no straightforward solution.

0:20:14 > 0:20:18Stipple can help you by creating a unique fingerprint that stays

0:20:18 > 0:20:22connected to it wherever it travels within the website's network.

0:20:22 > 0:20:27There is the extra bonus that you can add interactive content to tell

0:20:27 > 0:20:29the story behind the image

0:20:29 > 0:20:33and get detailed analytics about views and shares.

0:20:33 > 0:20:35If anyone wants to repost your images,

0:20:35 > 0:20:39this site makes the process super-easy, with a ready-made embed code

0:20:39 > 0:20:43equipped with full attribution details as set by you.

0:20:43 > 0:20:47There is even a free iPhone app to protect your mobile uploads,

0:20:47 > 0:20:51which is a notoriously thorny part of intellectual property rights online.

0:20:54 > 0:20:57If you want to stay on the right side of copyright law

0:20:57 > 0:21:00when reposting a non-attributed image you find,

0:21:00 > 0:21:03you can use the site's reverse image search.

0:21:03 > 0:21:08Even though this website makes it super-easy to use and attribute images legally,

0:21:08 > 0:21:12it is not a fail-safe method for protecting your photos online.

0:21:12 > 0:21:17In truth, the only way to keep them safe is not to post them at all.

0:21:17 > 0:21:20But that's not a satisfactory option for most

0:21:20 > 0:21:22so I have some other suggestions.

0:21:25 > 0:21:30You could try adding a subtle watermark detailing your ownership.

0:21:30 > 0:21:35Most editing packages will let you do this by adding a translucent layer

0:21:35 > 0:21:37and you will find lots of tutorials online.

0:21:37 > 0:21:41If you want a quick and simple tool, try uMark Online

0:21:41 > 0:21:44but bear in mind that positioning the attribution

0:21:44 > 0:21:47on the edge of your picture so it doesn't spoil the view

0:21:47 > 0:21:50will make it pretty easy to crop out before reposting

0:21:50 > 0:21:53if someone is determined to rip you off.

0:21:54 > 0:21:59Make sure you are clear about your terms for anything that you post

0:21:59 > 0:22:01by linking it to a licence.

0:22:01 > 0:22:03From all rights reserved,

0:22:03 > 0:22:05meaning no-one has permission to repost,

0:22:05 > 0:22:10to public domain, where you are happy for it to be shared without attribution.

0:22:10 > 0:22:12And everything in between.

0:22:12 > 0:22:16A Creative Commons licence is an easy and standardised way

0:22:16 > 0:22:20of detailing permissions so that no-one can claim ignorance.

0:22:23 > 0:22:27If you think your images are at risk of copyright theft,

0:22:27 > 0:22:31it is not a bad idea to run them through a reverse image search,

0:22:31 > 0:22:33like TinEye, every now and then.

0:22:33 > 0:22:38It will trawl the web detailing where the image has been found online.

0:22:39 > 0:22:43A quick way to check a whole website is to run the address through

0:22:43 > 0:22:45Copyscape, which will tell you

0:22:45 > 0:22:49if any other web pages are using the content posted on it.

0:22:51 > 0:22:55If you do find a violation, there are steps you should take to tackle it,

0:22:55 > 0:22:59rising in escalation depending on how the violator responds.

0:22:59 > 0:23:02Firstly, contact them directly and keep it simple

0:23:02 > 0:23:05and non-confrontational.

0:23:05 > 0:23:08It could be that they are not aware they have done anything wrong

0:23:08 > 0:23:11and the matter can be resolved swiftly.

0:23:18 > 0:23:21How about we finish with a real-world hack

0:23:21 > 0:23:23for this week's video of the week?

0:23:23 > 0:23:27Illusion specialists Brusspup have a brilliant 3D T-rex video

0:23:27 > 0:23:29on their YouTube channel,

0:23:29 > 0:23:33complete with a link to download and print your own.

0:23:44 > 0:23:46Thank you, Kate. Loving those dinosaurs.

0:23:46 > 0:23:49They are so simple yet so very, very effective.

0:23:49 > 0:23:50If you missed any of Kate's links,

0:23:50 > 0:23:52you will find them all on our website as usual.

0:23:53 > 0:23:57If you would like to get in touch about anything you have seen today,

0:23:57 > 0:23:59please do e-mail or tweet us.

0:24:01 > 0:24:02That's it for now though.

0:24:02 > 0:24:05Thank you very much for watching and we'll see you next time.