Browse content similar to 08/03/2014. Check below for episodes and series from the same categories and more!
Line | From | To | |
---|---|---|---|
LAUGHS EVILLY | 0:00:01 | 0:00:04 | |
He's building his part up again. | 0:00:04 | 0:00:06 | |
This week on Click, we're seeing double. | 0:00:21 | 0:00:24 | |
But can your phone tell the difference between a good | 0:00:24 | 0:00:26 | |
and an evil Wi-Fi hotspot? | 0:00:26 | 0:00:29 | |
We'll ask if using public Wi-Fi is ever safe. | 0:00:29 | 0:00:33 | |
We'll also sample the gadgets that stimulate your senses. | 0:00:33 | 0:00:37 | |
But do they smell, or taste, as good as they sound? | 0:00:37 | 0:00:41 | |
And we'll get a flavour of the Texan interactive festival | 0:00:41 | 0:00:44 | |
that is South By Southwest. | 0:00:44 | 0:00:47 | |
All that, plus a round-up of the biggest tech news of the week | 0:00:47 | 0:00:49 | |
and a way to protect your property online, in Webscape. | 0:00:49 | 0:00:53 | |
Welcome to Click. I'm Spencer Kelly. | 0:00:58 | 0:01:00 | |
Over the past few months, we've been investigating an internet crime | 0:01:00 | 0:01:03 | |
which is almost invisible and which, we've been told, is on the rise. | 0:01:03 | 0:01:08 | |
Now, you don't have to be a spy to pull it off. | 0:01:08 | 0:01:11 | |
In fact, all you need is a mobile phone. | 0:01:11 | 0:01:14 | |
The hack relies on our desire to always be online. | 0:01:14 | 0:01:18 | |
And specifically, those times | 0:01:18 | 0:01:20 | |
when we want to hook up to a Wi-Fi hotspot. | 0:01:20 | 0:01:22 | |
Now, hotspots are really easy to join, of course. | 0:01:24 | 0:01:26 | |
You just select one on your phone by tapping the screen. | 0:01:26 | 0:01:29 | |
And conveniently, most phones will remember | 0:01:29 | 0:01:31 | |
the hotspots that you trust | 0:01:31 | 0:01:33 | |
and reconnect to them automatically the next time they're in range. | 0:01:33 | 0:01:36 | |
But, even the hotspots that you trust might not actually be safe. | 0:01:37 | 0:01:42 | |
And that's because your device can be tricked into connecting | 0:01:42 | 0:01:45 | |
to another network with an identical name. | 0:01:45 | 0:01:48 | |
But one that's been set up by a criminal. | 0:01:48 | 0:01:51 | |
It's called an Evil Twin attack. | 0:01:51 | 0:01:54 | |
It certainly is, Evil Twin. | 0:01:54 | 0:01:55 | |
And while he's actually been around for a little while now, | 0:01:55 | 0:01:58 | |
we've since discovered just how easy it is for him | 0:01:58 | 0:02:00 | |
to swipe my information using just a mobile. | 0:02:00 | 0:02:04 | |
Which means your attacker could be standing right next to you. | 0:02:04 | 0:02:08 | |
Dan Simmons reports. | 0:02:08 | 0:02:10 | |
The busy lives of the often-spotted city dweller. | 0:02:13 | 0:02:17 | |
These mammals are always on the go. | 0:02:17 | 0:02:20 | |
Their social habits include fiddling with these peculiar devices. | 0:02:20 | 0:02:24 | |
Thankfully, because they often use Wi-Fi, | 0:02:26 | 0:02:29 | |
we can now see almost everything they do. | 0:02:29 | 0:02:34 | |
In the park... | 0:02:34 | 0:02:35 | |
Yeah, it's quite shocking, quite terrifying to think, you know, | 0:02:35 | 0:02:38 | |
whatever I could have been looking at, | 0:02:38 | 0:02:39 | |
someone could have found that stuff. | 0:02:39 | 0:02:41 | |
Relaxing in the coffee shop... | 0:02:41 | 0:02:43 | |
I thought it would happen in some sort of hi tech van outside. | 0:02:43 | 0:02:47 | |
But just to see it on a normal laptop here is just a bit unnerving! | 0:02:47 | 0:02:52 | |
And in the office... | 0:02:52 | 0:02:55 | |
We could add cards, remove cards, buy items... | 0:02:55 | 0:02:59 | |
Any functionality within Amazon, we could do pretending to be Caroline. | 0:02:59 | 0:03:04 | |
City slicker Martin's hopping on to a Wi-Fi hotspot. | 0:03:06 | 0:03:09 | |
But it's one set up by Nosey Pete, our security expert, | 0:03:09 | 0:03:13 | |
who's curious to find out what these city folk do in their lunch hour. | 0:03:13 | 0:03:18 | |
Here he is searching and he finds the website for Billy Elliot. | 0:03:18 | 0:03:22 | |
There it is. | 0:03:22 | 0:03:24 | |
We looked in on several other people's sessions, | 0:03:24 | 0:03:26 | |
and it wasn't difficult to see what they were up to, | 0:03:26 | 0:03:29 | |
including their passwords and other personal data along the way. | 0:03:29 | 0:03:34 | |
By simply naming his hotspot the same as the one | 0:03:34 | 0:03:37 | |
that Martin's expecting to find, Pete can dupe him into believing | 0:03:37 | 0:03:41 | |
he's on the real one. | 0:03:41 | 0:03:44 | |
But that's with a public, open Wi-Fi network hotspot. | 0:03:44 | 0:03:48 | |
No username required, or password. | 0:03:48 | 0:03:51 | |
Throw those in, and you'd think you'd be a bit more safe. Wouldn't you? | 0:03:51 | 0:03:58 | |
An aptly-named coffee shop in trendy Shoreditch, | 0:04:00 | 0:04:03 | |
home to London's tech hub, and one where the owners set up a hotspot | 0:04:03 | 0:04:08 | |
with a password. A password that is written on the counter. | 0:04:08 | 0:04:13 | |
And of course, nosy Pete is up to his old tricks again | 0:04:13 | 0:04:15 | |
and can just as easily set up an identical Wi-Fi hotspot | 0:04:15 | 0:04:19 | |
asking for the same password. | 0:04:19 | 0:04:21 | |
This time, it's Lucy caught in the trap. | 0:04:21 | 0:04:25 | |
We can see what flights you are planning to take, | 0:04:25 | 0:04:28 | |
we'd know when you will be away from home, away from the office. | 0:04:28 | 0:04:32 | |
And if it were a business arrangement, | 0:04:32 | 0:04:35 | |
maybe we could predict what sort of meetings will take place, | 0:04:35 | 0:04:37 | |
that could be important to the business. | 0:04:37 | 0:04:40 | |
Yeah. Wow. | 0:04:40 | 0:04:42 | |
This snooping on what others are doing isn't just nosy, | 0:04:44 | 0:04:47 | |
it's illegal, which is why we did not set up an evil twin Wi-Fi here. | 0:04:47 | 0:04:53 | |
Instead, we asked users to log on to our bogus network | 0:04:53 | 0:04:57 | |
and explained to them what we could see. | 0:04:57 | 0:05:00 | |
That's not nice. That's not nice at all! That is not nice, no. | 0:05:00 | 0:05:04 | |
And it's not just websites. | 0:05:04 | 0:05:07 | |
Nowadays, the apps we use seem to love automatically | 0:05:07 | 0:05:10 | |
updating in the background, so it's now possible for our data to | 0:05:10 | 0:05:13 | |
be hacked without our phone leaving our pocket. | 0:05:13 | 0:05:16 | |
This photo-sharing app is typical. | 0:05:18 | 0:05:20 | |
It is sending out the user's e-mail address list, password | 0:05:20 | 0:05:24 | |
and phone contacts to make sure it's up-to-date. | 0:05:24 | 0:05:28 | |
Pete has got the lot. | 0:05:28 | 0:05:29 | |
But what he is not is very mobile himself. | 0:05:34 | 0:05:37 | |
The evil twin Wi-Fi scam has been around for a while | 0:05:37 | 0:05:40 | |
but all that kit has made Pete's job, well, a bit tricky. | 0:05:40 | 0:05:43 | |
But it turns out you can carry out the same attack | 0:05:43 | 0:05:46 | |
with an ordinary mobile smartphone. | 0:05:46 | 0:05:49 | |
This is mobile Mike | 0:05:49 | 0:05:51 | |
and he is using his to spoof the local pub's Wi-Fi hotspot. | 0:05:51 | 0:05:55 | |
With some software from the web, | 0:05:55 | 0:05:57 | |
he is recording everything Caroline is doing. | 0:05:57 | 0:06:00 | |
So how worried should we be? | 0:06:02 | 0:06:04 | |
The head of Europol's cyber crime unit told us | 0:06:04 | 0:06:07 | |
users simply should not use public Wi-Fi networks for anything | 0:06:07 | 0:06:11 | |
financial or sensitive but instead wait until they get home. | 0:06:11 | 0:06:15 | |
Charlie Mcmurdie headed up the UK's police effort against online crime | 0:06:17 | 0:06:21 | |
until last year. | 0:06:21 | 0:06:22 | |
She told me Wi-Fi providers should now carry out regular checks | 0:06:22 | 0:06:26 | |
as snooping becomes easier. | 0:06:26 | 0:06:28 | |
Whereas, previously, we have really focused on the sort of | 0:06:30 | 0:06:35 | |
stand-alone attacks and compromises of big databases, now, a lot of | 0:06:35 | 0:06:41 | |
mainstream criminals have identified there are easy opportunities | 0:06:41 | 0:06:46 | |
and vulnerabilities just walking down the street and exploiting | 0:06:46 | 0:06:50 | |
Wi-Fi networks that exist in every coffee shop, | 0:06:50 | 0:06:53 | |
every premises you go to. | 0:06:53 | 0:06:55 | |
Back at the cafe, Letty is checking her e-mail. | 0:06:57 | 0:07:00 | |
But, this time, our snoopers are not so lucky. | 0:07:00 | 0:07:02 | |
Thankfully, most e-mail and retail sites are encrypted. | 0:07:03 | 0:07:07 | |
It's slower but much safer. | 0:07:07 | 0:07:09 | |
Encrypted sites show up with the letters HTTPS in the address bar. | 0:07:09 | 0:07:14 | |
Your browser might also add a padlock to reassure you. | 0:07:14 | 0:07:17 | |
If your session is encrypted this way, | 0:07:18 | 0:07:20 | |
no-one else should be able to snoop. | 0:07:20 | 0:07:23 | |
But our security experts have found a way to bypass even that, | 0:07:24 | 0:07:28 | |
using an app that can be simply downloaded to a mobile phone. | 0:07:28 | 0:07:32 | |
Caroline is shopping. | 0:07:33 | 0:07:35 | |
In this attack, Mike doesn't need to spoof a hotspot, | 0:07:35 | 0:07:38 | |
he just needs to be on the same genuine Wi-Fi network. | 0:07:38 | 0:07:42 | |
But the app he has got manages to tell his victim's handset to | 0:07:42 | 0:07:46 | |
send all of its web requests to his own mobile. | 0:07:46 | 0:07:49 | |
He will act as a man in the middle, again seeing everything | 0:07:49 | 0:07:53 | |
because he is now able to strip out the encryption that Caroline | 0:07:53 | 0:07:57 | |
is relying on. | 0:07:57 | 0:07:59 | |
Many other encrypted websites would be just as vulnerable. | 0:07:59 | 0:08:02 | |
It means if you are using Wi-Fi with just a mobile, | 0:08:02 | 0:08:06 | |
your attacker could be sitting right next to you. | 0:08:06 | 0:08:09 | |
You can see them all sitting on benches, and they wouldn't be | 0:08:09 | 0:08:12 | |
given a second thought to the potential that those communications | 0:08:12 | 0:08:17 | |
are being picked up and read by the person sat on the bench next to them. | 0:08:17 | 0:08:20 | |
Dan Simmons reporting. | 0:08:24 | 0:08:25 | |
And just to reiterate, there was nothing intrinsically unsafe, | 0:08:25 | 0:08:29 | |
insecure or unusual about the websites featured in that report. | 0:08:29 | 0:08:34 | |
The hack happens because of the way that our phones recognise | 0:08:34 | 0:08:37 | |
and connect over Wi-Fi networks. | 0:08:37 | 0:08:39 | |
Joining me is Mick Paddington, | 0:08:40 | 0:08:42 | |
from one of the security firms who worked with us on that report. | 0:08:42 | 0:08:45 | |
-Hi. -Hi. -What can we do? We can't give up using public Wi-Fi, can we? | 0:08:45 | 0:08:50 | |
No, and there's some simple steps you can take. | 0:08:50 | 0:08:52 | |
You would not read out your credit card on the train | 0:08:52 | 0:08:55 | |
aloud over the phone with an audience. | 0:08:55 | 0:08:58 | |
so you've got to be aware that | 0:08:58 | 0:08:59 | |
when you are doing these kind of transactions or working on the web | 0:08:59 | 0:09:03 | |
you should be limiting the sort of behaviour you're doing online. | 0:09:03 | 0:09:06 | |
Just to clarify - the mere fact that you have to enter a password | 0:09:06 | 0:09:11 | |
to join a Wi-Fi network does not make it secure. | 0:09:11 | 0:09:14 | |
No. Definitely not. | 0:09:14 | 0:09:15 | |
In fact, a lot of these passwords are in the public domain because these | 0:09:15 | 0:09:18 | |
companies that own these hotspots | 0:09:18 | 0:09:20 | |
don't actually change these passwords. | 0:09:20 | 0:09:22 | |
The sort of passwords you should be looking for | 0:09:22 | 0:09:25 | |
which are more secure are dynamic, one-use passwords. | 0:09:25 | 0:09:27 | |
If you are in a hotel room, it will ask you for your name | 0:09:27 | 0:09:30 | |
and room number and then issue you with a password. | 0:09:30 | 0:09:32 | |
Rather than you going into a well-known coffee shop, for instance, | 0:09:32 | 0:09:35 | |
and the Wi-Fi address and the password is up on the wall. | 0:09:35 | 0:09:38 | |
So those one-time passwords can't be obtained by some hacker | 0:09:38 | 0:09:42 | |
who is setting up a spoof Wi-Fi network? | 0:09:42 | 0:09:45 | |
They would have no idea what that password is and if they were | 0:09:45 | 0:09:47 | |
issued with it, you would be issued with a different one. | 0:09:47 | 0:09:50 | |
Right. That is the theory, OK. Obviously, nothing is 100% secure. | 0:09:50 | 0:09:54 | |
What we are putting in practice is behaviour | 0:09:54 | 0:09:57 | |
that reduces your risk online. | 0:09:57 | 0:09:59 | |
Nothing is 100% secure and, if it was, | 0:09:59 | 0:10:01 | |
it would probably be totally unusable. | 0:10:01 | 0:10:03 | |
What about the idea of not using Wi-Fi | 0:10:03 | 0:10:05 | |
but using the cellular network, the mobile network, to connect to your bank, for example? | 0:10:05 | 0:10:09 | |
Is that safer? | 0:10:09 | 0:10:10 | |
Yes, but the trouble is that most people connect to Wi-Fi | 0:10:10 | 0:10:13 | |
or automatically connect. | 0:10:13 | 0:10:15 | |
You have got to be aware of what your device is connecting to | 0:10:15 | 0:10:18 | |
and if you have it set up to connect automatically. | 0:10:18 | 0:10:21 | |
In terms of using the cellular network, yes, it is inherently more secure. | 0:10:21 | 0:10:25 | |
The connection from your device to the mast is encrypted. | 0:10:25 | 0:10:28 | |
The trouble is Wi-Fi is more convenient, it tends to be a lot more faster. | 0:10:28 | 0:10:32 | |
4G isn't everywhere yet | 0:10:32 | 0:10:33 | |
so people will default to a Wi-Fi network. | 0:10:33 | 0:10:36 | |
Thank you very much. Wise words. Good advice there. | 0:10:36 | 0:10:39 | |
If you have advice or experiences of your own that you | 0:10:39 | 0:10:42 | |
would like to share, e-mail us. | 0:10:42 | 0:10:43 | |
Next up, a look at this week's tech news. | 0:10:46 | 0:10:48 | |
A Japanese-American man has been named by Newsweek magazine | 0:10:50 | 0:10:54 | |
as the creator of Bitcoin. | 0:10:54 | 0:10:56 | |
Dorian Satoshi Nakamoto, who shares part of his name | 0:10:56 | 0:11:00 | |
with the mysterious figure behind the digital currency, | 0:11:00 | 0:11:03 | |
was chased by reporters through Los Angeles after the news broke | 0:11:03 | 0:11:07 | |
only to tell the Associated Press he had nothing to do with Bitcoin. | 0:11:07 | 0:11:11 | |
He said he hadn't even heard of the currency | 0:11:11 | 0:11:14 | |
until three weeks ago when his son was contacted by a reporter. | 0:11:14 | 0:11:17 | |
Ever wanted the physical strength of a superhero? | 0:11:18 | 0:11:21 | |
Well, engineers in Italy have created a powered exoskeleton | 0:11:21 | 0:11:25 | |
that can do just that. | 0:11:25 | 0:11:26 | |
The body extender tracks the movement of the person | 0:11:26 | 0:11:29 | |
wearing it and can lift 50 kilos in each of its metal hands. | 0:11:29 | 0:11:34 | |
Its modular design means it could be rapidly reconfigured to perform | 0:11:34 | 0:11:37 | |
a large number of different tasks | 0:11:37 | 0:11:40 | |
such as work in factories or emergency rescue scenarios. | 0:11:40 | 0:11:43 | |
Finally, thinking of getting new business cards? | 0:11:44 | 0:11:47 | |
American programmer Kevin Bates | 0:11:47 | 0:11:49 | |
has certainly made an impression with his. | 0:11:49 | 0:11:52 | |
It sports an in-built Tetris game. | 0:11:52 | 0:11:55 | |
Made up of a tiny Arduino computer, an OLED screen | 0:11:55 | 0:11:58 | |
and capacitive sensor controls, a user or business associate | 0:11:58 | 0:12:03 | |
can play for up to nine hours before changing batteries. | 0:12:03 | 0:12:07 | |
Programmable to play other games, | 0:12:07 | 0:12:09 | |
Bates is already working on a Pokemon variant. | 0:12:09 | 0:12:12 | |
In recent years, it has made us sit up | 0:12:16 | 0:12:18 | |
and take notice of everything from Twitter to lifelogging. | 0:12:18 | 0:12:22 | |
So the big question is | 0:12:22 | 0:12:23 | |
what does Austin's South By Southwest Interactive Festival | 0:12:23 | 0:12:27 | |
hold for us this year? | 0:12:27 | 0:12:28 | |
LJ Rich is our reporter on the ground, | 0:12:28 | 0:12:30 | |
she's just landed and this is what she has found so far. | 0:12:30 | 0:12:34 | |
One trend that shows no sign of abating | 0:12:35 | 0:12:38 | |
if this festival's obsession with eating. | 0:12:38 | 0:12:41 | |
Look at all these restaurants along sixth street. | 0:12:41 | 0:12:44 | |
Down the road, something new is being cooked up. | 0:12:44 | 0:12:47 | |
It can't hurt to be more creative in the kitchen | 0:12:50 | 0:12:53 | |
and that's exactly what researchers at IBM's Watson Group decided. | 0:12:53 | 0:12:57 | |
They're using cognitive computing, | 0:12:57 | 0:12:59 | |
which is like a machine learning as opposed to programmed, | 0:12:59 | 0:13:03 | |
to help put unexpected ingredients together. | 0:13:03 | 0:13:06 | |
How does it work? | 0:13:06 | 0:13:07 | |
You choose an ingredient you like, like asparagus, | 0:13:07 | 0:13:10 | |
and then Watson does millions of calculations, comparing asparagus | 0:13:10 | 0:13:14 | |
for thousands of other ingredients, then decides which ingredient would | 0:13:14 | 0:13:19 | |
fit perfectly with asparagus that humans would not normally think of by themselves. | 0:13:19 | 0:13:23 | |
Now, this may just be a nice way of trying different foods but actually | 0:13:23 | 0:13:27 | |
the science behind this can be widened out | 0:13:27 | 0:13:30 | |
to things like travel itineraries or even making perfume. | 0:13:30 | 0:13:34 | |
The whole idea behind cognitive computing is, of course, to do things a little bit differently. | 0:13:34 | 0:13:39 | |
So, what does a real chef make of ingredients being put together by a machine? | 0:13:39 | 0:13:45 | |
Creativity is based on previous experience. | 0:13:45 | 0:13:48 | |
For chefs, it is something we tasted, it's a smell from our childhood, | 0:13:48 | 0:13:51 | |
something we remember that spurs us to create a new dish. | 0:13:51 | 0:13:54 | |
Now, working with this system, that's erased. | 0:13:54 | 0:13:57 | |
It's all based on new information. | 0:13:57 | 0:13:59 | |
We are starting with a blank slate looking at a set of ingredients | 0:13:59 | 0:14:02 | |
that seemingly have no relationship, no memory, nothing to spur us on, | 0:14:02 | 0:14:07 | |
just the ingredients themselves are the inspiration. | 0:14:07 | 0:14:11 | |
-There it is. Russian beet salad. -Thank you very much. | 0:14:11 | 0:14:15 | |
Mmmm. Mmmm! | 0:14:15 | 0:14:17 | |
Beets, prunes, pickles, cucumbers - who would have thought? | 0:14:17 | 0:14:22 | |
I liked it more when you didn't tell me what was in it. | 0:14:25 | 0:14:28 | |
LJ Rich - and LJ will have more from South By Southwest next week. | 0:14:28 | 0:14:34 | |
Now, a feast for your senses. | 0:14:34 | 0:14:36 | |
Computers have traditionally played to only two of our five senses, | 0:14:39 | 0:14:43 | |
sight and sound. | 0:14:43 | 0:14:44 | |
And while these have become increasingly immersive over the years, | 0:14:44 | 0:14:48 | |
the other senses are much harder to cater for. | 0:14:48 | 0:14:50 | |
But, after recently finding something that simulates touch, | 0:14:51 | 0:14:55 | |
it is time to turn my attention and my tongue to something rather tasty. | 0:14:55 | 0:15:00 | |
This is what is being billed as the world's first electric lollipop. | 0:15:02 | 0:15:08 | |
It doesn't look like it but bear with me. | 0:15:08 | 0:15:10 | |
You stick your tongue between these two electrodes | 0:15:10 | 0:15:13 | |
and they pass an electric current through it. | 0:15:13 | 0:15:16 | |
What the researchers here at City University London have found | 0:15:16 | 0:15:19 | |
is that by varying the amplitude and frequency of that current | 0:15:19 | 0:15:23 | |
they can stimulate the different taste receptors. | 0:15:23 | 0:15:26 | |
That means they can simulate the four basic tastes - sweet, | 0:15:26 | 0:15:31 | |
sour, salt and bitter. | 0:15:31 | 0:15:33 | |
The question is does it work? Time to find out. | 0:15:34 | 0:15:39 | |
By far the easiest taste to create is a sour, lemony taste. | 0:15:41 | 0:15:45 | |
It's the same sensation you get when you taste some metals. Ughhh! | 0:15:45 | 0:15:49 | |
HE GIGGLES | 0:15:49 | 0:15:51 | |
That's so weird. That's lemon. Lemon? | 0:15:51 | 0:15:55 | |
The theory is that animals have developed a strong response | 0:15:55 | 0:15:58 | |
to sour taste in order to detect food that's gone bad. | 0:15:58 | 0:16:01 | |
The other tastes are certainly harder to judge. | 0:16:01 | 0:16:05 | |
I can't really taste anything. | 0:16:07 | 0:16:08 | |
One thing is for sure - it is a weird experience. | 0:16:08 | 0:16:12 | |
While this thing can only ever simulate basic tastes, | 0:16:14 | 0:16:18 | |
it could be used in combination with a mouth-worn device | 0:16:18 | 0:16:22 | |
that stimulates your nose, | 0:16:22 | 0:16:24 | |
at which point you should be able to detect many, many more flavours. | 0:16:24 | 0:16:28 | |
In fact, that is where we are off to next. | 0:16:28 | 0:16:30 | |
We have ticked off sight, sound, touch and taste. | 0:16:30 | 0:16:34 | |
It is now time for Lara Lewington to hit the fifth sense, | 0:16:34 | 0:16:37 | |
as she heads to Madrid to see what's cooking. | 0:16:37 | 0:16:40 | |
This may be a feast for the eyes | 0:16:42 | 0:16:44 | |
but the rest is left to the imagination. | 0:16:44 | 0:16:47 | |
Spanish chef Andoni Luis Aduriz hopes that could change. | 0:16:48 | 0:16:53 | |
With two Michelin stars, | 0:16:53 | 0:16:55 | |
his restaurant, Mugaritz, ranks in the world's top five year on year. | 0:16:55 | 0:16:59 | |
And he wants to bring the scent of this molecular gastronomy to your phone. | 0:17:01 | 0:17:07 | |
HE SPEAKS SPANISH | 0:17:07 | 0:17:10 | |
Here, I am learning to make one of his signature dishes, | 0:17:10 | 0:17:13 | |
a broth that is all about the full sensory experience. | 0:17:13 | 0:17:18 | |
The smell is a lot stronger since I have been doing this. | 0:17:23 | 0:17:27 | |
I can smell saffron and peppercorns, mixed with some seeds. | 0:17:27 | 0:17:31 | |
The saffron is the most overwhelming smell. | 0:17:31 | 0:17:34 | |
Watching this on TV, you could see what the soup looked like, | 0:17:37 | 0:17:40 | |
you could hear me making it, | 0:17:40 | 0:17:42 | |
but of course you have no idea how it taste or smells | 0:17:42 | 0:17:46 | |
which, let's face it, when it comes to food, is pretty important. | 0:17:46 | 0:17:50 | |
Here is some technology that could change things. | 0:17:50 | 0:17:53 | |
This app allows you to virtually create what | 0:17:53 | 0:17:56 | |
I made in the kitchen, so let's get going. | 0:17:56 | 0:17:59 | |
You move the phone around, which effectively mixes up | 0:18:00 | 0:18:03 | |
the ingredients, the peppercorns and the seeds are being crushed. | 0:18:03 | 0:18:08 | |
It looks pretty similar and the sound is the same. | 0:18:08 | 0:18:11 | |
But the most exciting bit is, once you are finished, | 0:18:12 | 0:18:15 | |
you press OK, and the smell comes out. | 0:18:15 | 0:18:21 | |
And I can tell you, that also smells of saffron | 0:18:21 | 0:18:24 | |
and is pretty similar to the real thing. | 0:18:24 | 0:18:26 | |
We get to enrich all our information with taste and smell. | 0:18:28 | 0:18:34 | |
We will enhance and improve, particularly not our membranes | 0:18:34 | 0:18:42 | |
but our feelings in the very moment when we are watching | 0:18:42 | 0:18:47 | |
something together with the smell and taste of it. | 0:18:47 | 0:18:51 | |
The app's software sends signals to a moving motor in the device, | 0:18:51 | 0:18:55 | |
which attaches via the earphone jack to puff out the smell. | 0:18:55 | 0:18:59 | |
This version only omits one scent. | 0:18:59 | 0:19:02 | |
But, as the device's creator explains, it's merely the start. | 0:19:02 | 0:19:06 | |
What we are working on for the long-term | 0:19:06 | 0:19:09 | |
is a device that you put inside your mouth. | 0:19:09 | 0:19:12 | |
It will have magnetic coils | 0:19:12 | 0:19:13 | |
which will directly stimulate your olfactory bulb, | 0:19:13 | 0:19:17 | |
producing electrical currents to produce the artificial smell | 0:19:17 | 0:19:20 | |
sensation in your brain. | 0:19:20 | 0:19:22 | |
Once we can do that, the range of smells we can generate will be infinite | 0:19:22 | 0:19:25 | |
because they are not going to be limited chemicals. | 0:19:25 | 0:19:28 | |
And then, well, you may be left hungry | 0:19:28 | 0:19:31 | |
but the full sensory experience could be yours anywhere, any time. | 0:19:31 | 0:19:35 | |
Lara Lewington with her portable pongs. | 0:19:36 | 0:19:40 | |
From smells back to pictures now. Publishing photographs online | 0:19:40 | 0:19:45 | |
that don't belong to you can be a costly business. | 0:19:45 | 0:19:48 | |
Certainly if you're BuzzFeed, Getty Images or Perez Hilton, | 0:19:48 | 0:19:52 | |
all of whom have had copyright infringement lawsuits filed against them in the last year. | 0:19:52 | 0:19:58 | |
Coming up with some tips to help you protect your online images | 0:19:58 | 0:20:01 | |
and stay on the right side of the law, here comes Kate Russell with Webscape. | 0:20:01 | 0:20:05 | |
Copyright protection for digital content is a complex issue | 0:20:08 | 0:20:12 | |
with no straightforward solution. | 0:20:12 | 0:20:14 | |
Stipple can help you by creating a unique fingerprint that stays | 0:20:14 | 0:20:18 | |
connected to it wherever it travels within the website's network. | 0:20:18 | 0:20:22 | |
There is the extra bonus that you can add interactive content to tell | 0:20:22 | 0:20:27 | |
the story behind the image | 0:20:27 | 0:20:29 | |
and get detailed analytics about views and shares. | 0:20:29 | 0:20:33 | |
If anyone wants to repost your images, | 0:20:33 | 0:20:35 | |
this site makes the process super-easy, with a ready-made embed code | 0:20:35 | 0:20:39 | |
equipped with full attribution details as set by you. | 0:20:39 | 0:20:43 | |
There is even a free iPhone app to protect your mobile uploads, | 0:20:43 | 0:20:47 | |
which is a notoriously thorny part of intellectual property rights online. | 0:20:47 | 0:20:51 | |
If you want to stay on the right side of copyright law | 0:20:54 | 0:20:57 | |
when reposting a non-attributed image you find, | 0:20:57 | 0:21:00 | |
you can use the site's reverse image search. | 0:21:00 | 0:21:03 | |
Even though this website makes it super-easy to use and attribute images legally, | 0:21:03 | 0:21:08 | |
it is not a fail-safe method for protecting your photos online. | 0:21:08 | 0:21:12 | |
In truth, the only way to keep them safe is not to post them at all. | 0:21:12 | 0:21:17 | |
But that's not a satisfactory option for most | 0:21:17 | 0:21:20 | |
so I have some other suggestions. | 0:21:20 | 0:21:22 | |
You could try adding a subtle watermark detailing your ownership. | 0:21:25 | 0:21:30 | |
Most editing packages will let you do this by adding a translucent layer | 0:21:30 | 0:21:35 | |
and you will find lots of tutorials online. | 0:21:35 | 0:21:37 | |
If you want a quick and simple tool, try uMark Online | 0:21:37 | 0:21:41 | |
but bear in mind that positioning the attribution | 0:21:41 | 0:21:44 | |
on the edge of your picture so it doesn't spoil the view | 0:21:44 | 0:21:47 | |
will make it pretty easy to crop out before reposting | 0:21:47 | 0:21:50 | |
if someone is determined to rip you off. | 0:21:50 | 0:21:53 | |
Make sure you are clear about your terms for anything that you post | 0:21:54 | 0:21:59 | |
by linking it to a licence. | 0:21:59 | 0:22:01 | |
From all rights reserved, | 0:22:01 | 0:22:03 | |
meaning no-one has permission to repost, | 0:22:03 | 0:22:05 | |
to public domain, where you are happy for it to be shared without attribution. | 0:22:05 | 0:22:10 | |
And everything in between. | 0:22:10 | 0:22:12 | |
A Creative Commons licence is an easy and standardised way | 0:22:12 | 0:22:16 | |
of detailing permissions so that no-one can claim ignorance. | 0:22:16 | 0:22:20 | |
If you think your images are at risk of copyright theft, | 0:22:23 | 0:22:27 | |
it is not a bad idea to run them through a reverse image search, | 0:22:27 | 0:22:31 | |
like TinEye, every now and then. | 0:22:31 | 0:22:33 | |
It will trawl the web detailing where the image has been found online. | 0:22:33 | 0:22:38 | |
A quick way to check a whole website is to run the address through | 0:22:39 | 0:22:43 | |
Copyscape, which will tell you | 0:22:43 | 0:22:45 | |
if any other web pages are using the content posted on it. | 0:22:45 | 0:22:49 | |
If you do find a violation, there are steps you should take to tackle it, | 0:22:51 | 0:22:55 | |
rising in escalation depending on how the violator responds. | 0:22:55 | 0:22:59 | |
Firstly, contact them directly and keep it simple | 0:22:59 | 0:23:02 | |
and non-confrontational. | 0:23:02 | 0:23:05 | |
It could be that they are not aware they have done anything wrong | 0:23:05 | 0:23:08 | |
and the matter can be resolved swiftly. | 0:23:08 | 0:23:11 | |
How about we finish with a real-world hack | 0:23:18 | 0:23:21 | |
for this week's video of the week? | 0:23:21 | 0:23:23 | |
Illusion specialists Brusspup have a brilliant 3D T-rex video | 0:23:23 | 0:23:27 | |
on their YouTube channel, | 0:23:27 | 0:23:29 | |
complete with a link to download and print your own. | 0:23:29 | 0:23:33 | |
Thank you, Kate. Loving those dinosaurs. | 0:23:44 | 0:23:46 | |
They are so simple yet so very, very effective. | 0:23:46 | 0:23:49 | |
If you missed any of Kate's links, | 0:23:49 | 0:23:50 | |
you will find them all on our website as usual. | 0:23:50 | 0:23:52 | |
If you would like to get in touch about anything you have seen today, | 0:23:53 | 0:23:57 | |
please do e-mail or tweet us. | 0:23:57 | 0:23:59 | |
That's it for now though. | 0:24:01 | 0:24:02 | |
Thank you very much for watching and we'll see you next time. | 0:24:02 | 0:24:05 |