The UID is device-agnostic. Whether an Indian enters her Aadhaar number into a virus-infested desktop at a local cyber cafe or a highly secure iPhone, her device is linked to and authenticated by the Aadhaar database. In almost all cases, there is a two-step authentication process, involving a one-time password from the user. The UID Authority of India claims such authentication (at its most basic level) is a simply “Yes/No” interaction of the Aadhaar database with the machine, and that no biometric or personal information is sent back. Biometric or demographic records of Indians are available today in multiple databases, and hardly an invitation to target Aadhaar servers. Based on the specific transaction involved – filing tax returns, transferring money or purchasing health insurance – Aadhaar, however, creates a “map of maps” of Indians identifying, the platform, device, location and successful/failed attempts at authentication. Coupled with the demographic data that can anyway be extracted from an insecure mobile phone or app, this Aadhaar authentication data is of strategic value to a foreign adversary. (READ MORE)
Be updated on daily news, latest news, bollywood news, business news, market news and much more.
Friday, 24 March 2017
Aadhaar linking to everything poses serious national security challenges
The UID is device-agnostic. Whether an Indian enters her Aadhaar number into a virus-infested desktop at a local cyber cafe or a highly secure iPhone, her device is linked to and authenticated by the Aadhaar database. In almost all cases, there is a two-step authentication process, involving a one-time password from the user. The UID Authority of India claims such authentication (at its most basic level) is a simply “Yes/No” interaction of the Aadhaar database with the machine, and that no biometric or personal information is sent back. Biometric or demographic records of Indians are available today in multiple databases, and hardly an invitation to target Aadhaar servers. Based on the specific transaction involved – filing tax returns, transferring money or purchasing health insurance – Aadhaar, however, creates a “map of maps” of Indians identifying, the platform, device, location and successful/failed attempts at authentication. Coupled with the demographic data that can anyway be extracted from an insecure mobile phone or app, this Aadhaar authentication data is of strategic value to a foreign adversary. (READ MORE)
Subscribe to:
Post Comments (Atom)
Down under, ‘King’ Kohli is thunder: Why Aussies are going gaga over Virat
The Indian skipper’s exploits apart, the broadcasters may have little choice: With local stars Smith and Warner banned, they might grab so...
-
Tata Motors and Ashok Leyland were trading higher by 3% each, recovering from their respective intra-day lows, after they reported a ...
-
Varun Beverages moved higher by 17% to Rs 762 on the BSE in noon deal after a block deal executed on the counter. At 10:33 AM; around ...
-
STOCK MARKET - Shares of Britannia Industries surged over 7% to hit its lifetime high od Rs 4,214 after the FMCG major reported 1.41%...
No comments:
Post a Comment