70 Matching Annotations
  1. Feb 2018
    1. Unfortunately, in their eagerness to quash Aadhaar, they seem even willing to embrace questionable storylines deliberately designed to bait and malign the Unique Identification Authority of India (UIDAI) prior to the Supreme Court hearings. For example, when the UIDAI filed a FIR in a case of alleged misuse of its grievance redress system to illegally obtain some people’s Aadhaar demographic data, it was quickly accused of muzzling the free press, when it was merely fulfilling its legal obligation to act on any reported misuse of data.

      Blaming the journalist?

    2. (Have you ever tried to delete highly personal and sometimes libellous information that show up when you Google your own name?)

      Actually before deleting from Google one needs to delete from the web they exist. Biggest culprit has been government institutions. They tried to sue researchers after disclosure.

    3. hypocritical when they now suggest that everything was working just fine until Aadhaar came on the scene.

      Again. Where? Who said? When?

      No references.

    4. the movement against Aadhaar is led by a small group of Left-leaning activists, who are well known for advocating more and more government in people’s lives

      Trying to brand citizen with out any proof.

  2. Jan 2018
    1. So, this is the real news: not even a single biometric data, repeat not even a single biometric data, has been leaked in the last seven years since the first Aadhaar was issued. If that is not adequate security, what is?

      Misleading.

      The referred article Rs 500, 10 minutes, and you have access to billion Aadhaar details doesn't say biometric data were leaked. So this whole paragraph is pointless .

      Let me give you an example:

      Let's say you (son) lost Rs.100 note.

      Father: Did you lose Rs.100 note? Son: I didn't lose any Rs.500 note. Everything is safe.

    2. Aadhaar is like a detergent which is going to clean whatever it is applied on. When Aadhaar was being used by the poor for getting their entitlements, it was deemed okay. Now that it is cleaning other systems to check things like benami properties and tax evasions, it is becoming too dangerous for many people.

      Quoting your own tweet

      My piece on alleged Aadhaar data breach. Comments, only factual and not emotional, are welcome.

      This point is just emotional and not factual.

    3. next episode of this drama

      Again just emotional and not factual

    4. First, the Aadhaar number is not a secret number.

      Aadhaar act puts Aadhaar Number and core biometric data at the same level.

      Section 29(4) says: “No Aadhaar number or core biometric information collected or created under this Act in respect of an Aadhaar number holder shall be published, displayed or posted publicly, except for the purposes as may be specified by regulations.”

    5. The entire list of electors in India is available online with all these details.

      Misleading -

      Electoral list doesn't have Unique ID, DoB, Email or Phone numbers.

    6. So, if one person shares his credentials with another for a consideration, can this be called a data breach that exposes the weakness of the system? This is not a breach of system, but a breach of trust.

      Again. Its not an issue of sharing credentials. Its about the ability of admin creating other admin account without any kind of verification. This is the biggest threat. Read (Aadhaar’s Dirty Secret Is Out, Anyone Can Be Added as a Data Admin)[https://www.thequint.com/news/india/exclusive-aadhaar-dirty-secret-out-add-anyone-as-data-admin]

    7. one of the persons who had access to the search facility sold his credentials to somebody.

      He did not sell his credentials. He created a new user called "Anamika_6677". Its access level was "Enrolment Agency Administrator"

      The new ID also has the ability to create accounts.

      Refer the original article which reported this issue -<br> Rs 500, 10 minutes, and you have access to billion Aadhaar details

    8. If all these breach claims were true, no part of Aadhaar data would have been left secure. The fact is that there has been no data breach till date.

      Misleading.

      The article title is "Rs 500, 10 minutes, and you have access to billion Aadhaar details". It clearly says the "newly" admin account has access to billion records. It doesn't say it was downloaded and shared.

      It talks about the ability to access which is true.

    9. I had written in this publication that there had been no data leak

      I had written a blog post then as a reply. You can read it here.

    10. Guessing is also difficult as every 12-digit number is not an Aadhaar number.

      If one is performing a targeted phishing attack on one of the previously leaked Aadhaar number then one doesn't need to guess. One already has.

    11. Yes, he can now enter an Aadhaar number and download the Aadhaar letter relating to the concerned person.
      • He can also create a new Admin account and sell it.
      • This download is more than enough for any targeted phishing attack and put a citizen into danger of losing money and identity.
  3. Jun 2017
    1. Aadhaar

      Not even a single quote from critic.

    2. India Stack

      Also what exactly is India Stack? Brand? marketing term? Government project?

    3. “I could place those who have opposed Aadhaar in three buckets,” says Jain. “1) Those who don't understand, they have constant fear that the government projects are not well thought through. They change their minds once we explain. 2) Those who oppose on the grounds of privacy, they are afraid that it could get too powerful. You have to respect that view, and make the system more secure. 3) Those who have their own agenda. There's nothing you can do about it. You can't reason with them. You just have to live with them.”

      I think very narrow pov in my opinion. The same 3 buckets can be applied to supporters too.

    4. what’s possibly a First World problem.

      !

    5. The big question is whether we should pull the plug on the entire system because one can never be 100% sure that it wouldn’t happen; or should we think of ways to fix these issues while using it because it promises to make the lives of a large number of people significantly better.

      What is the solution?

    6. Samsung launched a tablet with Iris scanner, which is more accurate,
    7. It’s value neutral.

      !

    8. A tag on the vehicle, sensors at toll plazas, a charging system (prepaid/postpaid) built on the principles of interoperability and other enabling infrastructure should solve the issue.

      Is this related to Aadhaar?

      This is standard RFID?

    9. When it comes to giving away cash—as in the national rural employment guarantee scheme (NREGS)—the problem is even more complicated because cash is more fungible and has more uses than rice or sugar. The Aadhaar Payment Bridge solves this problem. It’s now possible to credit the payments directly to a beneficiary’s bank.

      Will the work get done? How will it reduce corruption?

    10. In Krishna district in Andhra Pradesh, which has seen reforms based on Aadhaar, people have more choice. The ration subsidies are tied to their Aadhaar number, and they can get their rice, sugar and other rationed items from any PDS outlet they want. If they see one outlet giving them a poor deal, they vote with their feet, putting pressure on the entire system to get better.

      Will that really work?

      • How far is the next nearest PDS system?
      • What about the political pressure to buy locally?
    11. There was a missing piece—public digital infrastructure. This is where the volunteers, who are keen on building software products in India, are making a difference.

      Again need definition for volunteer

    12. But they are owned and controlled by Google and Apple. India Stack, on the other hand, is open. They are public goods.
      • Again open definition required.
    13. In the broader market such competition typically leads to lower prices and better quality, and so it was with UIDAI. Prices came down.

      Where is the competition? There is only one iD provider UIDAI.

    14. the customer can be held to ransom because there is only one vendor.

      Isn't still only one vendor called UIDAI? Government but still only one vendor. Imagine if he had only one carrier AirIndia?

    15. open-API

      Again needs definition of Open API.

    16. Even if we believe that it can solve problems, can something credible and free be built by a bunch of volunteers?

      Also need to define volunteers[1]?

      [1] - Does it mean no salary? Or no way profited by it (Directly or Indirectly)?

    17. y providing an open, public

      Need definition for Open and Public here.

    18. physical authentication
      • Isn't fingerprint/retina scan physical auth?
    19. The use cases extend to more prosperous Indians too—for example, easing road toll collection to decongest traffic and reduce waiting time at the toll booth.  

      How?

      How does Aadhaar decongest traffic?

    20. Most of them have been created by Google, Facebook or Microsoft. The closest any of these come to Aadhaar is Android which reached a billion in five years, eight months.

      Bad comparison

      • None of them are Govt
      • None of them are compulsory to get gas or subsidy or pay tax.
  4. Apr 2017
    1. including their biometrics, to American tech companies and foreign governments anyway,

      Not sure which american pvt company demands bio-metrics. You give it US only if you need visa otherwise dont have to.

      Also US Goverment cant cancel your Aadhaar or stop grains

    2. cash and grain

      Cash can go to account directly. Will the grains go to tummy directly?

    3. tried to defame the programme

      No one is trying to defame. Everyone is asking questions.

    4. Recently, there was a spate of claims that the Aadhaar database was leaking information. That was not true though. A banking official had released the information, which was a criminal act. The fact remains that data can be stolen.

      Says not leaked and stolen in the same sentence.

      Aadhaar Database doesn't mean just the database, its the whole ecosystem. Just like how the credit of ecosystem goes yo Aadhaar, the failures of it too.

    5. others do not

      Not even a single quote or interview from the other side?

    6. , especially when they appear to accomplish things in years that activism has not for decades

      Just a statement. No facts.

    7. Reacting to such concerns, the Supreme Court has stated that Aadhaar should not be made mandatory to receive benefits. Meanwhile, over the years, the processes of the Aadhaar system have been improving.

      But is it being followed?

    8. Aadhaar system to make tax evasion difficult. “There are 250 million PANs (permanent account numbers),” Nilekani says, but only about 40 million who file returns.

      Not everyone who has a PAN has to file return.

    9. People who fear Modi find this ominous. They say that the technology of Aadhaar makes it easy for a strongman like him to spy on his rivals and citizens. “The end of privacy,” they write in articles that have Modi appearing to peer into your private lives.

      Trying to derail the debate by making it Anti Modi. The debate started much before modi got elected.

    10. When the Unique Identification programme was launched in 2009 during the Congress regime, everyone thought it was only for the poor.

      He missed the discussion about privacy which started the day the document got leaked.

  5. Mar 2017
    1. ಕೆಲವರು ನಾರೀ ತುನಾರಾಯಣಿ(ಹೆಣ್ಣು ದೇವರಿಗೆ ಸಮಾನ) ಎನ್ನುತ್ತಾ ಮೋದಿಯವರನ್ನೇ ಪ್ರಶ್ನಿಸಲು ಮುಂದಾದರೆ

      ಪ್ರಶ್ನಾತೀತರ ?

    2. ಸಿಖ್ಖಳಾದ ಗುರ್‌ಮೆಹರ್‌ಗೆ ಸಿಖ್ಖಪಂಥದ ಇತಿಹಾಸ, ಗುರುಗೋವಿಂದ್ ಸಿಂಗ್, ಅವರ ಮಕ್ಕಳನ್ನು ಕೊಂದವರ ಮತ ಇವೆಲ್ಲ ಗೊತ್ತಿರಲೇಬೇಕು ಅಲ್ಲವೆ?

      ಈಗಿನ ಚರ್ಚೆಗೂ ಇದಕ್ಕೂ ಏನು ಸಂಬಂಧ. ಹಾಗೂ ಯುದ್ದ ಭಾರತ ಹಾಗೂ ಪಾಕಿಸ್ತಾನದ ಮಧ್ಯೆ. ಮತ ಎಲ್ಲಿಂದ ಬಂತು?

    1. However, even VVPAT is not a foolproof system. It can be prone to the same risks as the EVMs are.

      What are those?

    2. VM to be connected to Internet but EVMs have no internet connection. So, hacking an EVM is not possible.

      Why it needs to be connected to internet to be hacked?

    3. t such chips can be inserted in

      Again this is talking about only one kind of attack. Of course hardware insertion is difficult. How about software manipulation?

    4. Can electronic voting machines be tampered with? 5 points you must know
      • No experts interviewed on either side
      • No author information
    5. How EVMs can be tampered?

      This is not the only way. Potentially there could be hundreds of ways. But this is just one example.

    1. "I am not very pessimistic, but it is a challenging task and I tend to believe that 60-65 per cent of them are just not trainable," Capgemini India's chief executive Srinivas Kandula said. "A large number of them cannot be trained. Probably, India will witness the largest unemployment in the middle level to senior level."
      1. Can't be retrained.
      2. No specific reason as to why can't they be retrained.
    1. As for budget dates, it is plain silly to claim that all normal governmental activities should be abandoned when the czars of the EC do their jobs.

      Not all bug big government announcements are always restricted. Its not new or only applied this time.

    2. He obviously does not read too many newspapers or he would have known without the government having to inform him.

      CEC meant official means of communication and not the newspaper way to communicate.

  6. Feb 2017
    1. Marathas defeated the Mughal empire centuries late
      • There are so many movies about Marathas.
      • There are also movies about Vijayanagar empire in Kannada and Telugu.
      • There are also movies about Ashoka, Pulakeshi etc which author totally missed
      • Author also seems to think only Bollywood as Indian cinema
    2. However, similar books as Shashi Tharoor’s exposing British rule in India as tyrannical could also be written about the Mughals and other Islamic invaders. Mughal rule commonly practised genocide of Hindus and destruction of temples, not merely by Aurangzeb. Such studies could be made on Tamerlane’s genocide of north India and on the older Delhi Sultanate overall – notably Alauddin Khilji, who pillaged India north and south. They could be written on many Islamic invaders and rulers in India over the centuries, some of whom are portrayed as heroes in Indian history books today. But most scholars would not dare conduct such research, as political motives override their willingness to tell the truth.

      No examples of hindu kings are mentioned.

    3. British and the Mughals that took shape only under Nehru.

      India became India only after Independence under Indian constitution. Until then we had hundreds of princely states. Under the leadership of Sardar Vallabhbhai Patel, they were unified into India.

    4. From Swami Vivekananda’s Yoga-Vedanta revival, to Lokmanya Tilak’s back to the Gita message, to Sri Aurobindo and his honouring of the Vedas, to the Ram Rajya ideal that extended to Mahatma Gandhi, this respect for India’s past was prominent and proud. Images of Bharata Mata, and songs like Vande Mataram expressed such inspiration

      Totally misses personalities like Ambedkar who was very critical of Vedas, Shastras and Smritis.

    5. could also be written about the Mughals and other Islamic invaders.

      and also about Hindu leaders and dynasties.

    1. how technology is being effectively used to end the menace of corruption and black money

      BHIM is just a money transfer app. Just like any other wallet app. There is no basis for this statement? No studies, surveys or research paper.

    2. Bharat Interface for Money (BHIM), a government app,

      No. Its not a Government App. Its a product of National Payments Corporation of India (NPCI) which is a Section 25 company under Companies Act 1956 (now Section 8 of Companies Act 2013).

      NPCI has ten promoter banks namely, State Bank of India, Punjab National Bank, Canara Bank, Bank of Baroda, Union Bank of India, Bank of India, ICICI Bank, HDFC Bank, Citibank and HSBC. The Board constitutes of Shri Balachandran M as the Chairman, Nominee from RBI, Nominees from ten core promoter banks, two Independent Directors and Shri A. P. Hota, Managing Director and Chief Executive Officer, NPCI.

      Ref: National Payments Corporation of India (NPCI) About us page

    1. How could USCIRF outsource a report harshly critical of India, one of the most important democratic allies of the US, to an activist with a history of supporting separatist causes against India that too often employ terrorism against innocent civilians? How can USCIRF give its imprimatur to a report citing debunked sources and smearing the Hindu religion?

      Again. India and Hinduism are not same.

    2. left tens of thousands of Hindus and Sikhs dead

      Reference for the numbers required.

    3. Beyond the litany of attacks against India and the Hindu religion in the latest USCIRF special report, what should alarm any observer, is the document’s authorship.

      It doesn't attack India. IT attacks Hinduism. They are different.

    4. Attacking Hinduism And India

      How are they same?

      Hinduism is a religion and India is a country.

    5. for the first time in USCIRF’s history, the commission makes the overtly Hinduphobic declaration that caste-based discrimination is rooted in Hindu scripture.

      caste-based discrimination is rooted in Hindu scripture

      is a well known and well debated subject. Read The Annihilation of Caste - Dr. B. R. Ambedkar

      Dr. B. R. Ambedkar says

      The literature of the Hindus is full of caste genealogies in which an attempt is made to give a noble origin to one caste and an ignoble origin to other castes. The Sahyadrikhand is a notorious instance of this class of literature.

      There is no code of laws more infamous regarding social rights than the Laws of Manu. Any instance from anywhere of social injustice must pale before it.

      But whether the doing of the deed takes time or whether it can be done quickly, you must not forget that if you wish to bring about & breach in the system then you have got to apply the dynamite to the Vedas and the Shastras, which deny any part to reason, to Vedas and Shastras, which deny any part to morality. You must destroy the Religion of the Shrutis and the Smritis. Nothing else will avail. This is my considered view of the matter.

  7. Nov 2015
    1. With Whom Does IRCTC Share Information? : IRCTC will not share your personal data with advertisers, business partners, sponsors, and other third parties without your express consent. However, we may divulge aggregate information about our users. For example, we may disclose how frequently the average user visits www.services.irctc.co.in, or the age distribution of our aggregate customer set or the frequency of use of PNR enquiry page etc. etc. Please be aware, however, that we will release specific personal information about you if required to do so in order to comply with any valid legal process such as a search warrant, court order etc