Skip to main content

Ed Sheeran takes on ticket touts and cancels 10,000 gig tickets sold by unofficial resale sites

xxx

Fans who purchased tickets when they went on sale will have to arrive at their gig venue with the booking confirmation, a valid form of ID and the credit card used for the purchase (or a photocopy).

From Ed Sheeran takes on ticket touts and cancels 10,000 gig tickets sold by unofficial resale sites

How are the bouncers on the door at an Ed Sheeran concert supposed to tell a real Portuguese fishing licence from a fake one? And what happens if I use my credit card to buy a ticket as a present for someone?

There is a solution, of course: put the tickets on a shared ledger and then sell them on eBay so that the market clears. If Ed wants fans to have tickets for £10 instead of £100, then he can buy the £100 tickets in the auction and re-sell them himself using whatever identification and authentication system he wants. Ticket “scalping” is a natural response to a broken market.

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...