Browse content similar to Episode 3. Check below for episodes and series from the same categories and more!
Line | From | To | |
---|---|---|---|
Hello, good evening and welcome to tonight's show. | 0:00:03 | 0:00:05 | |
Here's a big number for you. | 0:00:05 | 0:00:08 | |
We spend over £10 billion a year upgrading our computers, | 0:00:08 | 0:00:11 | |
smartphones, hard drives, TVs | 0:00:11 | 0:00:13 | |
and with all your old kit destined for scrap heaps like this, | 0:00:13 | 0:00:16 | |
how can you be sure things like your bank details, | 0:00:16 | 0:00:19 | |
or your photographs or other personal information remain safe? | 0:00:19 | 0:00:23 | |
You might go through your old computers and phones | 0:00:23 | 0:00:26 | |
and delete the files before you chuck everything out, but how certain | 0:00:26 | 0:00:30 | |
are you that your data still doesn't end up in the hands of cyber crooks? | 0:00:30 | 0:00:34 | |
On tonight's show we go behind the headlines to reveal | 0:00:34 | 0:00:37 | |
the science of cyber security. | 0:00:37 | 0:00:39 | |
Coming up: Jem and Dallas | 0:00:39 | 0:00:41 | |
find out how hard it is to destroy computer files as they go | 0:00:41 | 0:00:45 | |
head to head with the data recovery experts. | 0:00:45 | 0:00:48 | |
-That's the sort of thing. -Yeah, I usually find that does the trick with electronics! | 0:00:50 | 0:00:54 | |
Maggie Philbin joins us to test | 0:00:56 | 0:00:58 | |
whether phone hacking is any easier today than it was 30 years ago. | 0:00:58 | 0:01:02 | |
What we want to see is can we actually tap into the data | 0:01:02 | 0:01:07 | |
that goes in and out of their mobile phones? | 0:01:07 | 0:01:10 | |
'And I check out the cloud where it seems we're all | 0:01:11 | 0:01:15 | |
'storing our music, photos and personal information.' | 0:01:15 | 0:01:19 | |
Hard drives and memory sticks become obsolete, you need to keep changing them, | 0:01:19 | 0:01:22 | |
that's no longer a problem with the cloud. It just continues to grow. | 0:01:22 | 0:01:26 | |
But first, have a look at this. | 0:01:30 | 0:01:31 | |
This is a ton of discarded hard drives which are about to be crushed and shredded in that machine there. | 0:01:31 | 0:01:37 | |
I am looking at it wondering just how much personal information is sitting right here. | 0:01:37 | 0:01:42 | |
It makes you think. | 0:01:42 | 0:01:44 | |
It is terrifying just how much digital information | 0:01:49 | 0:01:52 | |
we collect about ourselves over the years. | 0:01:52 | 0:01:56 | |
Now this is an old BBC computer from the office which is going to | 0:01:56 | 0:01:59 | |
be thrown out today. | 0:01:59 | 0:02:01 | |
But I am opening it up and on it is some of my stuff, old scripts | 0:02:01 | 0:02:05 | |
articles I've written. Look at this for instance, | 0:02:05 | 0:02:09 | |
this is a call sheet which has a lot of personal information on it. | 0:02:09 | 0:02:13 | |
It has what everyone is doing. Liz Bonnin's phone number! | 0:02:13 | 0:02:16 | |
Let's do the responsible thing and let's pull that into the | 0:02:16 | 0:02:19 | |
recycle bin but as we know this can be emptied so let's delete that. | 0:02:19 | 0:02:25 | |
"Empty recycle Bin?" | 0:02:25 | 0:02:26 | |
"Are you sure, Dallas, you want to delete these items?" Yes, I am. | 0:02:26 | 0:02:29 | |
Job done... Or is it? | 0:02:31 | 0:02:35 | |
I'm off to meet a man who reckons he can access all those files | 0:02:35 | 0:02:39 | |
I just deleted. | 0:02:39 | 0:02:40 | |
You might think I am driving to MI5 or MI6 or somewhere like that, | 0:02:40 | 0:02:43 | |
I'm actually off to a little house in rural Suffolk. | 0:02:43 | 0:02:47 | |
Pete Warren is an investigative journalist on a mission to | 0:02:47 | 0:02:51 | |
warn us all about the dangers of throwing away computers. | 0:02:51 | 0:02:54 | |
It only takes him a moment to remove my hard drive | 0:02:54 | 0:02:58 | |
and plug it into his computer. | 0:02:58 | 0:03:00 | |
Even though I thought it was completely wiped, | 0:03:00 | 0:03:03 | |
in no time at all, he's browsing through my deleted documents. | 0:03:03 | 0:03:07 | |
As far as I was concerned, I had deleted it and it was gone but there it is. | 0:03:09 | 0:03:14 | |
So how easy is it to get all this data back? | 0:03:14 | 0:03:16 | |
I would say it is criminally easy. | 0:03:16 | 0:03:20 | |
Because, basically, all of that data still resides in the computer, | 0:03:20 | 0:03:25 | |
though there is now increasingly a criminal market developing in data. | 0:03:25 | 0:03:30 | |
If you go to Africa for example, | 0:03:30 | 0:03:33 | |
you will find that hard drives are 50% more expensive | 0:03:33 | 0:03:37 | |
if they have data on them. | 0:03:37 | 0:03:39 | |
One good example was somebody who sent his hard drive away, | 0:03:39 | 0:03:43 | |
thought it had been destroyed | 0:03:43 | 0:03:44 | |
and suddenly he received a phone call from some of the States | 0:03:44 | 0:03:48 | |
in the former Soviet Union, asking for, I think | 0:03:48 | 0:03:50 | |
it was around £300 for the recovery of some of his personal photographs. | 0:03:50 | 0:03:54 | |
'Which of course is blackmail. | 0:03:54 | 0:03:56 | |
'It just goes to show how important it is to properly delete your files. | 0:03:56 | 0:04:01 | |
'So why doesn't pressing the delete button work?' | 0:04:01 | 0:04:05 | |
I've come to the world leaders of data recovery to help me | 0:04:05 | 0:04:08 | |
understand a little bit more and to find out exactly what is going on inside my hard drive. | 0:04:08 | 0:04:13 | |
Now here is my question - why it doesn't delete mean delete? | 0:04:16 | 0:04:20 | |
If you think of this as your hard drive | 0:04:20 | 0:04:23 | |
and the pages are containing your files, | 0:04:23 | 0:04:25 | |
when you delete a file and remove it from your recycle bin, | 0:04:25 | 0:04:29 | |
what you are doing is just removing | 0:04:29 | 0:04:33 | |
the entry from the table of contents. | 0:04:33 | 0:04:36 | |
The link that you would normally have to the data is lost, | 0:04:36 | 0:04:40 | |
but the data is still there. | 0:04:40 | 0:04:41 | |
So that's the key, | 0:04:43 | 0:04:44 | |
saving a file leaves a physical trace on the desk which is not | 0:04:44 | 0:04:47 | |
affected by pressing delete. | 0:04:47 | 0:04:50 | |
So here you have a spinning platter just like a record, | 0:04:50 | 0:04:54 | |
and you have the armature here which would be the arm of the record player. | 0:04:54 | 0:04:59 | |
Then right at the end, very small, is the read/write head. | 0:04:59 | 0:05:05 | |
Instead of leaving grooves in the record, what happens is this | 0:05:05 | 0:05:10 | |
uses magnetic polarities to write the data to the disc. | 0:05:10 | 0:05:13 | |
OK, brilliant. Thank you. | 0:05:13 | 0:05:16 | |
for example, let us say I really, really want to get rid of the data | 0:05:16 | 0:05:20 | |
and perhaps I want to throw away a hard drive or computer and | 0:05:20 | 0:05:23 | |
I do not want it to get into the wrong hands, | 0:05:23 | 0:05:26 | |
is it just a case of getting physical with it? | 0:05:26 | 0:05:30 | |
Is that what I have to do, beat it up a bit? | 0:05:30 | 0:05:32 | |
That would be a way. | 0:05:32 | 0:05:34 | |
I would say that to really find out, why don't you go away | 0:05:34 | 0:05:40 | |
and find a few old computers and hard drives, | 0:05:40 | 0:05:42 | |
give them some physical abuse, bring them back here | 0:05:42 | 0:05:46 | |
and we will see how successful you have been. | 0:05:46 | 0:05:50 | |
That is a challenge. I will be interested to see how you guys get on. | 0:05:50 | 0:05:53 | |
'It's game on. | 0:05:53 | 0:05:55 | |
'So I've rounded up some gear destined for the scrap heap, five old computers, | 0:05:55 | 0:06:01 | |
'a memory stick and a portable hard drive. | 0:06:01 | 0:06:04 | |
'I'll load them all up with a selection of pictures that | 0:06:04 | 0:06:07 | |
'I'd rather no-one ever saw again. | 0:06:07 | 0:06:09 | |
'Now I am going to see how much it would take to completely wipe them.' | 0:06:09 | 0:06:14 | |
Oh! Bang Christmas party - that one might need to be destroyed. | 0:06:14 | 0:06:19 | |
'I think some extra muscle will help. | 0:06:19 | 0:06:22 | |
'So with my first electronic victim on a chopping block, | 0:06:22 | 0:06:25 | |
'I've also let Jem know it's loaded with dodgy pictures of him too.' | 0:06:25 | 0:06:29 | |
Yes, that is the sort of thing. | 0:06:37 | 0:06:39 | |
I usually find that does the trick with electronics. | 0:06:39 | 0:06:42 | |
That is a hard drive there. | 0:06:42 | 0:06:43 | |
This label lets us know what we're doing, | 0:06:43 | 0:06:47 | |
-we have hit that with a sledgehammer. -10lb sledge. | 0:06:47 | 0:06:52 | |
Right, next. | 0:06:52 | 0:06:53 | |
I would've said that is not too bothered about life on the farm. | 0:07:02 | 0:07:06 | |
I think that is just a flesh wound. | 0:07:06 | 0:07:09 | |
Now, watch this drive. | 0:07:09 | 0:07:11 | |
One portable hard disk done for. | 0:07:14 | 0:07:15 | |
OK, that is simple brute force | 0:07:18 | 0:07:20 | |
but what about other things such as, water damage - fairly obvious. | 0:07:20 | 0:07:25 | |
That's the memory stick drowned. How about a powerful magnet? | 0:07:25 | 0:07:30 | |
Or even a quick blast of heat? | 0:07:30 | 0:07:32 | |
Your classic hard drive breakfast. | 0:07:32 | 0:07:35 | |
And if the toaster wasn't enough, then this should surely do the trick? | 0:07:41 | 0:07:45 | |
What about we reduce them to a molten mass? | 0:07:45 | 0:07:48 | |
That's seven hard drives done. | 0:07:53 | 0:07:55 | |
There is only one place where those photos now survive... | 0:07:55 | 0:08:00 | |
that is our memories. | 0:08:00 | 0:08:02 | |
Exactly. | 0:08:02 | 0:08:03 | |
Surely that has wiped off everything on those drives. | 0:08:08 | 0:08:12 | |
-I have no idea. We gave those a proper battering. -You had far too much fun! | 0:08:12 | 0:08:16 | |
The guys in data security reckon, | 0:08:16 | 0:08:18 | |
I do not know how, they reckon they can get some of the information. | 0:08:18 | 0:08:22 | |
-Really! -Apparently. -We will find out later in the show if they do. | 0:08:22 | 0:08:25 | |
We are on Tottenham Court Road, London's biggest electronics | 0:08:25 | 0:08:29 | |
high street - the perfect place for you to buy a new hard drive. | 0:08:29 | 0:08:33 | |
-Yes, it is. -But what about security on these things? Mobile phones. | 0:08:33 | 0:08:38 | |
The issue is not just about when you throw them away, it is | 0:08:38 | 0:08:40 | |
about people snooping on them while you are actually using them. | 0:08:40 | 0:08:44 | |
It is a question we've been worrying about since the 1980s when the first cordless phones came on the market. | 0:08:44 | 0:08:50 | |
Back then TV science uber-legend Maggie Philbin was on the case. | 0:08:50 | 0:08:54 | |
..Despite this sophisticated system, it is possible to home in on one person's call. | 0:08:54 | 0:09:01 | |
With that sort of pedigree, who better | 0:09:01 | 0:09:03 | |
to look at smartphone security? | 0:09:03 | 0:09:04 | |
'Mobile phones have changed enormously over the last 25 years.' | 0:09:06 | 0:09:11 | |
It's really funny to think that this was a social trophy, | 0:09:12 | 0:09:16 | |
particularly because the early models only delivered | 0:09:16 | 0:09:19 | |
30 minutes talk time. And because they were analogue, | 0:09:19 | 0:09:21 | |
with the right equipment it was quite easy | 0:09:21 | 0:09:24 | |
to eavesdrop on people's conversations. | 0:09:24 | 0:09:26 | |
But we all know about the recent phone hacking scandals. | 0:09:26 | 0:09:29 | |
Are today's multi-tasking smartphones | 0:09:29 | 0:09:33 | |
any safer than those old bricks? | 0:09:33 | 0:09:34 | |
Tom and Oliver are cyber security experts. | 0:09:38 | 0:09:40 | |
They specialise in securing the phones of celebrities | 0:09:40 | 0:09:44 | |
and they know that a smartphone's weak spot isn't so much voicemail | 0:09:44 | 0:09:47 | |
as when it's surfing the net. | 0:09:47 | 0:09:49 | |
While I'm out and about and using my mobile or iPad or whatever, | 0:09:50 | 0:09:53 | |
how could I be putting myself at risk? | 0:09:53 | 0:09:56 | |
Your phone will transmit data in two ways. | 0:09:56 | 0:09:59 | |
One is over a 3G network and generally it's fairly secure. | 0:09:59 | 0:10:02 | |
Wi-Fi, on the other hand, is fairly susceptible to hackers. | 0:10:02 | 0:10:05 | |
There's two primary ways they do this. | 0:10:05 | 0:10:07 | |
One of them is setting up what we call a bait network. | 0:10:07 | 0:10:10 | |
We're sat in a cafe here, they may set up a fake wi-fi network | 0:10:10 | 0:10:13 | |
and call it the same as the cafe we're sat in. | 0:10:13 | 0:10:16 | |
The other way is to monitor what phones in the area are looking for. | 0:10:16 | 0:10:19 | |
Phones are constantly looking for networks | 0:10:19 | 0:10:22 | |
that they've previously connected to. | 0:10:22 | 0:10:24 | |
So if you've got a wi-fi network called Maggie's Home, a hacker could see that | 0:10:24 | 0:10:28 | |
and imitate that network to attract your phone to connect. | 0:10:28 | 0:10:32 | |
Using specialist equipment, | 0:10:32 | 0:10:34 | |
Tom can easily detect those Wi-Fi request signals. | 0:10:34 | 0:10:37 | |
In just seconds, he's collected a huge list | 0:10:37 | 0:10:40 | |
from every person's phone in this shopping centre. | 0:10:40 | 0:10:43 | |
For privacy, we've blurred their details. | 0:10:43 | 0:10:46 | |
So here you've got number 11. | 0:10:46 | 0:10:48 | |
Now that's obviously someone who lives at number 11. | 0:10:48 | 0:10:50 | |
If you were to set up a fake network called number 11, | 0:10:50 | 0:10:55 | |
then that means that phone would connect it. | 0:10:55 | 0:10:58 | |
Yeah. | 0:10:58 | 0:10:59 | |
Once you've got control of that connection, then any data going | 0:10:59 | 0:11:02 | |
from that phone through your network and out to the internet | 0:11:02 | 0:11:05 | |
is up for grabs. So you can see that data | 0:11:05 | 0:11:08 | |
and you can manipulate that data and perform attacks. | 0:11:08 | 0:11:11 | |
What we're seeing is people harvesting login details | 0:11:11 | 0:11:14 | |
for social media, for email accounts, and then using that information. | 0:11:14 | 0:11:17 | |
Often people use the same username and password for different accounts. | 0:11:17 | 0:11:21 | |
So once you've got one, for something on a social media site, | 0:11:21 | 0:11:24 | |
that could potentially result in some security risks. | 0:11:24 | 0:11:28 | |
'I wanted to see how this could work in practice, | 0:11:28 | 0:11:31 | |
'but it would be illegal to do it in public. | 0:11:31 | 0:11:34 | |
'So Oliver and Tom have helped me | 0:11:34 | 0:11:36 | |
'set up a sting on a group of friends, pretending we're doing | 0:11:36 | 0:11:39 | |
'a medical experiment on the effects of social networking.' | 0:11:39 | 0:11:42 | |
Right, well we've told them that we're going to run a test. | 0:11:42 | 0:11:46 | |
And so we're taking their blood pressure | 0:11:46 | 0:11:48 | |
before and after they've done a bit of social networking. | 0:11:48 | 0:11:51 | |
Of course, we're not in the least interested | 0:11:51 | 0:11:55 | |
in what their blood pressure is. What we want to see | 0:11:55 | 0:11:58 | |
is can we actually tap into the data | 0:11:58 | 0:12:01 | |
that goes in and out of their mobile phones? | 0:12:01 | 0:12:04 | |
We've given them access to a local Wi-Fi network. | 0:12:05 | 0:12:08 | |
What they don't know is that it's one Tom | 0:12:08 | 0:12:10 | |
and Oliver have set up with a bit of fishing in mind. | 0:12:10 | 0:12:13 | |
CHATTERING | 0:12:17 | 0:12:20 | |
Pretty soon, they've harvested cookies and login details | 0:12:21 | 0:12:25 | |
from every phone in the room and it's time to set to work. | 0:12:25 | 0:12:29 | |
But first, we're going to lock their phones away safely. | 0:12:29 | 0:12:32 | |
Not to deprive them as they think, | 0:12:32 | 0:12:33 | |
but so Tom and Oliver can get hacking. | 0:12:33 | 0:12:36 | |
A few tweaks on Facebook and we're done. | 0:12:37 | 0:12:39 | |
The first thing I'm going to do is to reunite you | 0:12:41 | 0:12:43 | |
with your mobile phones. | 0:12:43 | 0:12:46 | |
I've got something of a confession to make here, | 0:12:46 | 0:12:48 | |
because we have just spent the last couple of hours trying | 0:12:48 | 0:12:52 | |
to hack into your mobile phones. And we did very well. | 0:12:52 | 0:12:56 | |
Harry, we've seen all of your Instagram pictures. | 0:12:56 | 0:13:00 | |
Electra, we know what you've been up to. Just to show you, Charlie, | 0:13:00 | 0:13:03 | |
could you just look at your Facebook profile? | 0:13:03 | 0:13:05 | |
"Bang Goes The Theory is my new favourite show." | 0:13:05 | 0:13:08 | |
And I have a profile picture change. | 0:13:08 | 0:13:11 | |
-Crazy! -Is that your normal picture? -No. | 0:13:11 | 0:13:15 | |
-And that was relatively easy to do, wasn't it? -Yeah, it was. | 0:13:15 | 0:13:19 | |
A real hacker would take that information away, | 0:13:19 | 0:13:21 | |
spend a day analysing it | 0:13:21 | 0:13:23 | |
and, even after months, they can still log in as you using the packets of data | 0:13:23 | 0:13:27 | |
that they've captured during that time you were using | 0:13:27 | 0:13:29 | |
that infected Wi-Fi network. | 0:13:29 | 0:13:31 | |
How do they make sure that they do keep their personal data personal? | 0:13:31 | 0:13:34 | |
Ultimately, connecting to a free Wi-Fi network leaves you at risk, | 0:13:34 | 0:13:38 | |
because you don't really know who's on the other end of that network. | 0:13:38 | 0:13:43 | |
And our final tip - | 0:13:43 | 0:13:44 | |
make sure you use a different password for every website, | 0:13:44 | 0:13:48 | |
just in case you do accidentally log on to a hacker's network. | 0:13:48 | 0:13:52 | |
It might make you think twice next time you log on in a public place. | 0:13:52 | 0:13:55 | |
Absolutely. If you've got any worries or concerns, | 0:13:55 | 0:13:58 | |
loads more cyber security information on our website. | 0:13:58 | 0:14:02 | |
-Being careful obviously where and when you log on. -Obviously, yeah. | 0:14:02 | 0:14:06 | |
Speaking of our website, time to hop over | 0:14:06 | 0:14:08 | |
to Dr Yan in cyberspace for another brain teaser. | 0:14:08 | 0:14:11 | |
How is our data kept safe when we send it over the internet? | 0:14:11 | 0:14:15 | |
Well, that's what this week's brain teaser is all about. | 0:14:15 | 0:14:17 | |
Imagine Alice here is using this train to exchange | 0:14:17 | 0:14:21 | |
secret messages with Bob down the line. | 0:14:21 | 0:14:24 | |
But like the internet, the train is full of prying eyes. | 0:14:24 | 0:14:29 | |
Like Evil Ed here. | 0:14:29 | 0:14:31 | |
Alice and Bob have padlocks to protect their messages. | 0:14:31 | 0:14:35 | |
But there's a problem. | 0:14:35 | 0:14:37 | |
Neither can send their key on the train in case Ed intercepts it. | 0:14:37 | 0:14:40 | |
What can Alice and Bob do to make sure their messages stay safe? | 0:14:40 | 0:14:45 | |
As ever, head to /bang for Dr Yan's answer. | 0:14:45 | 0:14:48 | |
And while you're there, follow the links to watch the film Yan | 0:14:48 | 0:14:51 | |
picked to win the British Science Association Prove It competition. | 0:14:51 | 0:14:56 | |
And make sure you visit the Open University for loads more information | 0:14:56 | 0:14:59 | |
about surviving online attacks and shopping safely on the internet. | 0:14:59 | 0:15:04 | |
Right, so far we've been talking about stopping | 0:15:04 | 0:15:07 | |
your digital information from getting into the wrong hands. | 0:15:07 | 0:15:10 | |
But here's another thought. How can we be sure | 0:15:10 | 0:15:13 | |
that we'll always be able to get our own hands on our files and photos? | 0:15:13 | 0:15:16 | |
All of this is stuff I've collected over the years. | 0:15:21 | 0:15:24 | |
Stuff I want to keep and hopefully pass onto my family | 0:15:24 | 0:15:27 | |
because it says a lot about my life. | 0:15:27 | 0:15:29 | |
I mean, this vinyl album is of Depeche Mode, | 0:15:29 | 0:15:32 | |
the first gig I ever went to. | 0:15:32 | 0:15:35 | |
And this is a collection of photographs from my first sighting | 0:15:35 | 0:15:38 | |
of a wild tiger, an event that completely changed my life. | 0:15:38 | 0:15:41 | |
So I definitely don't want to lose this. | 0:15:41 | 0:15:44 | |
Now as much as it's really cool to keep these, | 0:15:44 | 0:15:46 | |
we all know that vinyl records scratched and they broke and... | 0:15:46 | 0:15:50 | |
Oh, my gosh. Do you remember these? I used to make so many mixtapes. | 0:15:50 | 0:15:53 | |
But they used to unravel, do you remember? | 0:15:53 | 0:15:55 | |
You had to spool them back in with a pencil for ages. | 0:15:55 | 0:15:59 | |
So really, all this physical stuff is susceptible to wear and tear | 0:15:59 | 0:16:02 | |
and, of course, you can lose it. | 0:16:02 | 0:16:04 | |
So with the advent of new technology like hard drives and USB sticks, | 0:16:04 | 0:16:08 | |
I thought I was sorted. | 0:16:08 | 0:16:10 | |
I put all my tiger photos on this, my entire music collection is now on | 0:16:10 | 0:16:14 | |
this hard drive, and my whole master's course | 0:16:14 | 0:16:17 | |
is now on this tiny stick. | 0:16:17 | 0:16:19 | |
But are digital collections like this | 0:16:19 | 0:16:22 | |
any safer than the vinyl records and paper photos of the past? | 0:16:22 | 0:16:26 | |
Whether you keep your files on discs and drives, | 0:16:28 | 0:16:31 | |
on memory sticks or you upload them to the cloud for storage, | 0:16:31 | 0:16:34 | |
will you still be able to read them years from now? | 0:16:34 | 0:16:36 | |
'To find the answer, we need to go back in time, starting with | 0:16:39 | 0:16:42 | |
'something almost all of us have stored precious photos and music on. | 0:16:42 | 0:16:47 | |
'Since they came on the scene in the 80s - the CD.' | 0:16:47 | 0:16:51 | |
The surface is covered by a layer of transparent plastic, | 0:16:51 | 0:16:55 | |
so you don't have to worry about | 0:16:55 | 0:16:58 | |
grubby fingers or even scratches. | 0:16:58 | 0:17:01 | |
Now whether there's a market for this remains to be seen. | 0:17:01 | 0:17:05 | |
'Of course, CDs and DVDs did take off. | 0:17:05 | 0:17:09 | |
'But how well are they standing the test of time?' | 0:17:09 | 0:17:13 | |
Now there's a lot of debate as to the lifespan of DVDs. | 0:17:13 | 0:17:16 | |
Manufacturers say they can last up to 200 years, | 0:17:16 | 0:17:19 | |
but the US National Archive says they'll last anything from two | 0:17:19 | 0:17:23 | |
to five years, which really makes you think twice about using them | 0:17:23 | 0:17:26 | |
if you've got very important data to store. | 0:17:26 | 0:17:29 | |
If, like me, you think you're covered | 0:17:29 | 0:17:31 | |
because you're now using one of these, an external hard drive, | 0:17:31 | 0:17:35 | |
practical experience says they'll last up to six years. | 0:17:35 | 0:17:38 | |
The advice is maybe you should use another external hard drive to | 0:17:38 | 0:17:41 | |
back that one up, and then maybe another one for safety. | 0:17:41 | 0:17:44 | |
And it's not just decay we have to worry about. What about being | 0:17:46 | 0:17:48 | |
able to retrieve your data from storage in the future? | 0:17:48 | 0:17:53 | |
To find that out, I'm at the National Museum of Computing, | 0:17:53 | 0:17:58 | |
and some of these machines date back to the 40s. | 0:17:58 | 0:18:01 | |
Of course at the time, all of these were state of the art, | 0:18:01 | 0:18:05 | |
but back then, no one considered the trouble | 0:18:05 | 0:18:07 | |
we might have trying to read their files in the future. | 0:18:07 | 0:18:11 | |
This is a disc drive. It's one section of a disc drive. | 0:18:11 | 0:18:15 | |
-Now that's incredibly heavy. -Is it? | 0:18:15 | 0:18:18 | |
-Oh, my lord! OK. -But in terms of technology... | 0:18:18 | 0:18:21 | |
Do you have a drive for that in your house? | 0:18:21 | 0:18:23 | |
In terms of technology, it's exactly the same as the little | 0:18:23 | 0:18:26 | |
three and a half inch drive inside there. | 0:18:26 | 0:18:28 | |
-Hoe much memory on this bad boy? -Oh, tiny. | 0:18:28 | 0:18:31 | |
-It's about one hundredth of one of these. -Oh, my gosh. | 0:18:31 | 0:18:34 | |
So at least, you know, as technology improved... | 0:18:34 | 0:18:37 | |
Oh, good lord! I can't even lift it. | 0:18:37 | 0:18:40 | |
The size of the storage device got smaller, | 0:18:40 | 0:18:43 | |
-But the memory increased. -Oh, yeah. | 0:18:43 | 0:18:46 | |
-And each generation has a smaller, more convenient format. -Yeah. | 0:18:46 | 0:18:50 | |
And the capacity's gone up each time as our requirements | 0:18:50 | 0:18:53 | |
and our uses of the medium has changed. | 0:18:53 | 0:18:55 | |
-That's the sort of sort I started using in the '80s. -Yeah. | 0:18:55 | 0:18:58 | |
When those floppy disc drives were produced, | 0:18:58 | 0:19:01 | |
nobody thought of storing digital pictures. | 0:19:01 | 0:19:03 | |
It was a few recipes and perhaps your address book. | 0:19:03 | 0:19:06 | |
Now, of course, we've got USB pens. | 0:19:06 | 0:19:08 | |
A USB pen like the one you're holding | 0:19:08 | 0:19:11 | |
is equivalent to something like | 0:19:11 | 0:19:13 | |
500,000 times the size of one of these discs. | 0:19:13 | 0:19:16 | |
'But of course, size isn't everything. | 0:19:16 | 0:19:19 | |
'Since it was introduced in 1996, | 0:19:19 | 0:19:22 | |
'the real benefit of the USB was to standardise hardware connections. | 0:19:22 | 0:19:26 | |
'But what's the chance of this system going out of date?' | 0:19:26 | 0:19:29 | |
Surely everything will always have a USB port. | 0:19:29 | 0:19:32 | |
Surely this is going to be a little bit more long-lasting | 0:19:32 | 0:19:35 | |
than a floppy disc? | 0:19:35 | 0:19:36 | |
No? | 0:19:36 | 0:19:37 | |
Our experience with machines here at the museum, | 0:19:37 | 0:19:39 | |
and even if we're just looking at... | 0:19:39 | 0:19:41 | |
home computing in the last 20, 30 years, | 0:19:41 | 0:19:44 | |
is that the technology changes radically at least every ten years. | 0:19:44 | 0:19:49 | |
I wouldn't guarantee that would work on your laptop in ten years' time. | 0:19:49 | 0:19:54 | |
It's a problem, because if you rely on just one of those | 0:19:54 | 0:19:57 | |
for all of your data, you could be in for a nasty surprise. | 0:19:57 | 0:20:01 | |
Good grief. | 0:20:01 | 0:20:02 | |
OK, so as an expert, Kevin, | 0:20:02 | 0:20:03 | |
what would you do to store your most precious data? | 0:20:03 | 0:20:06 | |
If you wanted to keep something for the next thousand years, | 0:20:06 | 0:20:10 | |
that would be the most reliable... | 0:20:10 | 0:20:12 | |
-You're kidding?! -..on printed paper tape, | 0:20:12 | 0:20:14 | |
punched paper tape like this. | 0:20:14 | 0:20:16 | |
-You're kidding?! -No! -Seriously? | 0:20:16 | 0:20:17 | |
No, this is acid-free paper, it's punched raw digital format. | 0:20:17 | 0:20:21 | |
-Look at how lovely that is. -It won't suddenly not boot one morning. | 0:20:21 | 0:20:26 | |
Where does this come from? | 0:20:26 | 0:20:27 | |
This one is about 70 years old, | 0:20:27 | 0:20:29 | |
and this tape was used to store German messages in World War II | 0:20:29 | 0:20:33 | |
to be replayed through the Colossus computer. | 0:20:33 | 0:20:35 | |
-This is Colossus. -This is the Colossus computer. | 0:20:35 | 0:20:38 | |
So, I need one of these at home and some of this and I'm sorted? | 0:20:38 | 0:20:42 | |
-Plenty of this. -Plenty of this! -Indeed. | 0:20:42 | 0:20:45 | |
Of course, these days there is another way to store your photos | 0:20:53 | 0:20:56 | |
and your files that does away with discs and hard drives | 0:20:56 | 0:21:00 | |
and the need to update your hardware every couple of years. | 0:21:00 | 0:21:03 | |
It's called cloud computing | 0:21:03 | 0:21:04 | |
and involves storing your data in remote servers. | 0:21:04 | 0:21:08 | |
But is the cloud the answer to all our problems, | 0:21:09 | 0:21:12 | |
and more to the point, where is it? | 0:21:12 | 0:21:15 | |
Turns out it's in an industrial estate in Slough. | 0:21:15 | 0:21:18 | |
Well, a small part of it is, anyway. | 0:21:18 | 0:21:20 | |
Security is tight here. | 0:21:22 | 0:21:24 | |
We're not even allowed to film the outside of the building | 0:21:24 | 0:21:27 | |
in case it can be identified. | 0:21:27 | 0:21:29 | |
It's highly likely that you're using the cloud already. | 0:21:29 | 0:21:32 | |
Lots of people actually upload pictures | 0:21:32 | 0:21:33 | |
to things like Flickr, YouTube, | 0:21:33 | 0:21:35 | |
where, you know, | 0:21:35 | 0:21:37 | |
there's about 48 hours of video that is uploaded every single minute. | 0:21:37 | 0:21:40 | |
Or your e-mail. | 0:21:40 | 0:21:42 | |
Your e-mail is a cloud service | 0:21:42 | 0:21:43 | |
where the information is stored in a data centre like this. | 0:21:43 | 0:21:46 | |
You're probably using the cloud a lot today already. | 0:21:46 | 0:21:48 | |
And can we even hazard a guess | 0:21:48 | 0:21:50 | |
as to how much memory the entire cloud is storing? | 0:21:50 | 0:21:53 | |
The cloud's a relatively new technology, | 0:21:53 | 0:21:55 | |
only really invented a few years ago, | 0:21:55 | 0:21:56 | |
and the amount of data which we're storing in our cloud | 0:21:56 | 0:21:59 | |
is doubling every six months. | 0:21:59 | 0:22:00 | |
-Oh! -So, very, very difficult to actually add it up. | 0:22:00 | 0:22:04 | |
I mean, if you look at the technology, | 0:22:04 | 0:22:05 | |
it's gone from gigabytes to terabytes to petabytes to exabytes. | 0:22:05 | 0:22:10 | |
In this data centre, we have three rooms like this. | 0:22:10 | 0:22:13 | |
Globally, we've got nine data centres bigger than this one. | 0:22:13 | 0:22:17 | |
We host about eight billion files - | 0:22:17 | 0:22:20 | |
pictures, videos, or documents - so a lot of info. | 0:22:20 | 0:22:24 | |
OK. But essentially, all these rows are made up of hard drives too, | 0:22:24 | 0:22:27 | |
so how can you ensure that these hard drives | 0:22:27 | 0:22:29 | |
don't break down in the same way as my home one might? | 0:22:29 | 0:22:32 | |
They CAN break, but the beauty of this technology | 0:22:32 | 0:22:35 | |
is that already this data's replicated in three different areas, | 0:22:35 | 0:22:37 | |
so none of your information will be lost. | 0:22:37 | 0:22:39 | |
You know, this is a very important facility, | 0:22:39 | 0:22:41 | |
cos we've got people like TfL, Transport for London, | 0:22:41 | 0:22:44 | |
and the Oyster card, | 0:22:44 | 0:22:45 | |
-where all that information gets stored here as well. -OK. | 0:22:45 | 0:22:48 | |
So, Fabio, is the cloud the future? | 0:22:48 | 0:22:50 | |
Can I put my data in here and continue to do so until the day I die | 0:22:50 | 0:22:53 | |
and not have to worry about keeping up with the technology | 0:22:53 | 0:22:56 | |
or the fact that it might break down? | 0:22:56 | 0:22:58 | |
Hard drives and memory sticks become obsolete. | 0:22:58 | 0:23:00 | |
You need to keep changing them. | 0:23:00 | 0:23:02 | |
That is no longer a problem with the cloud. | 0:23:02 | 0:23:04 | |
It just continues to grow. | 0:23:04 | 0:23:05 | |
But handing over your digital property | 0:23:07 | 0:23:09 | |
to someone else for safekeeping | 0:23:09 | 0:23:11 | |
raises important questions. | 0:23:11 | 0:23:12 | |
Who owns the files, for a start? | 0:23:12 | 0:23:15 | |
And will you be able to pass them on to members of your family? | 0:23:15 | 0:23:19 | |
These are issues the data storage world has only just begun to address. | 0:23:19 | 0:23:23 | |
So, the cloud's pretty safe? What do you think? | 0:23:25 | 0:23:27 | |
It's the safest thing, I guess, | 0:23:27 | 0:23:29 | |
but good idea to back up your data on another hard drive as well. | 0:23:29 | 0:23:33 | |
Not just A hard drive - several hard drives. | 0:23:33 | 0:23:35 | |
And print out your photos on good, old-fashioned paper. | 0:23:35 | 0:23:37 | |
-And leave one of the hard drives at your mum's house. -Really good idea. | 0:23:37 | 0:23:40 | |
-There are people who have lost data and people who will lose data. -Deep! | 0:23:40 | 0:23:44 | |
That's what they say. | 0:23:44 | 0:23:46 | |
OK, earlier on in the show, Jem and I were having a smashing time | 0:23:46 | 0:23:49 | |
trying to erase data from some hard drives. | 0:23:49 | 0:23:52 | |
We took them to the data recovery boys. Let's see how they got on. | 0:23:52 | 0:23:55 | |
Right. | 0:23:58 | 0:24:00 | |
That's nice. Wow! | 0:24:00 | 0:24:03 | |
The contents of this cardboard box... | 0:24:03 | 0:24:06 | |
-Dropped in tea. -..are all that's left | 0:24:06 | 0:24:09 | |
-after our enjoyably destructive afternoon. -Nice and toasted. | 0:24:09 | 0:24:12 | |
Doesn't look too bad. | 0:24:12 | 0:24:14 | |
Oh, that's nice. | 0:24:14 | 0:24:15 | |
Been playing golf with this one. | 0:24:15 | 0:24:18 | |
These guys are data recovery masters | 0:24:18 | 0:24:21 | |
and they can piece together damaged drives | 0:24:21 | 0:24:23 | |
and read what's on them using their own specialist software. | 0:24:23 | 0:24:28 | |
But I'm pretty confident | 0:24:28 | 0:24:30 | |
we're going to end up with more write-offs than rescues. | 0:24:30 | 0:24:35 | |
-We had an interesting and satisfying day in the workshop. -OK. | 0:24:35 | 0:24:40 | |
-I think it's fair to day we got fairly medieval. -On this lot! | 0:24:40 | 0:24:45 | |
I'm guessing to the untrained eye, you didn't get anything from that. | 0:24:45 | 0:24:49 | |
-No, no, no. -You told me you were the best! | 0:24:49 | 0:24:53 | |
That's destroyed. | 0:24:53 | 0:24:54 | |
There's nothing left of the media platters, | 0:24:54 | 0:24:57 | |
so we can't recover any data. | 0:24:57 | 0:25:00 | |
'I'll try not to look too smug! | 0:25:00 | 0:25:02 | |
'Anyway, 1-0 to Bang.' | 0:25:02 | 0:25:04 | |
So, this one, this is the one I had the most fun with. | 0:25:07 | 0:25:09 | |
This is the golf shot. | 0:25:09 | 0:25:11 | |
And I've got to say, it was a perfect, perfect strike. | 0:25:11 | 0:25:14 | |
So, any joy? | 0:25:16 | 0:25:18 | |
No. | 0:25:18 | 0:25:19 | |
In the case of this laptop drive, the platter is made of glass. | 0:25:19 | 0:25:24 | |
Oh, look at that! | 0:25:24 | 0:25:26 | |
What you managed to do is shatter the platters. | 0:25:26 | 0:25:28 | |
If a disc is shattered, you're not getting the data back. | 0:25:28 | 0:25:31 | |
2-0! It's looking good. | 0:25:33 | 0:25:35 | |
But I wonder how he got on | 0:25:35 | 0:25:37 | |
with the drive Jem zapped with his mega-magnet. | 0:25:37 | 0:25:40 | |
That magnet WAS powerful enough | 0:25:40 | 0:25:42 | |
to get through the case of the hard drive | 0:25:42 | 0:25:44 | |
and wipe it sufficiently for the hard drive to stop working. | 0:25:44 | 0:25:49 | |
OK, 3-0 to me and Jem. | 0:25:50 | 0:25:52 | |
-Yes! -3-0! | 0:25:52 | 0:25:54 | |
OK, so these two, which are similar ones that went in the toaster. | 0:25:54 | 0:25:59 | |
How did you get on? | 0:26:01 | 0:26:02 | |
Are these toast? | 0:26:02 | 0:26:03 | |
No. | 0:26:03 | 0:26:04 | |
-Ahh! -OK! | 0:26:04 | 0:26:06 | |
So, hang on. You got a... | 0:26:06 | 0:26:08 | |
-God! -Do you recognise these photos? | 0:26:08 | 0:26:10 | |
Sadly, I recognise those photos. | 0:26:10 | 0:26:12 | |
-OK, so there you go. You've clawed one back. -OK. | 0:26:14 | 0:26:17 | |
How about the old tractor? | 0:26:17 | 0:26:20 | |
Again, we managed to get all the data back from that. | 0:26:21 | 0:26:25 | |
Oh, 3-2, and I thought Jem and I had this in the bag. | 0:26:25 | 0:26:30 | |
I'm sad about that! | 0:26:30 | 0:26:32 | |
'More awkward pictures of me are revealed | 0:26:32 | 0:26:35 | |
'and Rob is clawing his way back.' | 0:26:35 | 0:26:38 | |
Now, this one I can tell you, was Jem's favourite. | 0:26:38 | 0:26:41 | |
You didn't get anything off the sledgehammer one, did you? | 0:26:41 | 0:26:44 | |
-Yes, all of it. -You're kidding?! | 0:26:44 | 0:26:46 | |
And the consequences of Jem's failure are there to see. | 0:26:51 | 0:26:54 | |
Actually, the one I'm really interested in is this one. | 0:26:56 | 0:26:59 | |
I mean, this is a solid-state drive | 0:26:59 | 0:27:01 | |
and anybody who's got a smartphone has one of these in their lives. | 0:27:01 | 0:27:04 | |
-This is actually from a USB-type memory stick. -Mm-hm. | 0:27:04 | 0:27:08 | |
How did we get on with this? | 0:27:08 | 0:27:10 | |
We got on OK. | 0:27:10 | 0:27:11 | |
We managed to dry it out and got all the pictures off it again. | 0:27:11 | 0:27:17 | |
So, there you go - Rob has won, | 0:27:17 | 0:27:20 | |
and the last of my embarrassing pics are displayed for all to see. | 0:27:20 | 0:27:24 | |
So, smashing up your computer isn't guaranteed to wipe your hard drive. | 0:27:26 | 0:27:30 | |
And what's more, it's a waste of resources. | 0:27:30 | 0:27:33 | |
If you want to recycle your computer, | 0:27:33 | 0:27:35 | |
the best option is to use scrambling software. | 0:27:35 | 0:27:38 | |
It's free on the internet, | 0:27:38 | 0:27:39 | |
but you have to watch out for fake versions | 0:27:39 | 0:27:42 | |
that can actually steal your data. | 0:27:42 | 0:27:44 | |
Check our website for recommended downloads. | 0:27:44 | 0:27:47 | |
-So, there's the socially responsible way of doing it. -Mm-hm. | 0:27:47 | 0:27:53 | |
Or there's the Bang way. | 0:27:53 | 0:27:55 | |
Which, I have to say, was very satisfying. | 0:27:55 | 0:27:58 | |
Yes, it would be! | 0:27:58 | 0:27:59 | |
-Happy Christmas, Liz! -Seriously! -This is for you. | 0:28:01 | 0:28:04 | |
-I hope you're proud of yourself! -It's kind of nice. | 0:28:04 | 0:28:06 | |
-It's like an art installation. -It's kind of pretty. -"Jem was here". | 0:28:06 | 0:28:09 | |
Probably a better idea to use the right kind of software | 0:28:09 | 0:28:11 | |
to get rid of the data on your computer, so then you can recycle it, | 0:28:11 | 0:28:14 | |
someone else can use the computer. | 0:28:14 | 0:28:16 | |
You're right. This is more fun. | 0:28:16 | 0:28:18 | |
Another thing - be careful when you chuck out your old mobile phone | 0:28:18 | 0:28:21 | |
because obviously there's loads of personal information, | 0:28:21 | 0:28:24 | |
personal data on them. | 0:28:24 | 0:28:25 | |
Exactly. So, make sure you give them to a reputable organisation. | 0:28:25 | 0:28:28 | |
-This is it for this show, but we will see you soon. -Look forward to it. | 0:28:28 | 0:28:31 | |
-Bye-bye. -Bye. | 0:28:31 | 0:28:32 | |
Next time, Johnny Ball will be using maths to work out | 0:28:32 | 0:28:36 | |
how many cabs are in London. | 0:28:36 | 0:28:38 | |
Whether we'll get this right, I can't be sure. | 0:28:38 | 0:28:40 | |
Subtitles by Red Bee Media Ltd | 0:28:58 | 0:29:00 |