Latest posts by TheStartupMojo (see all)
- Do We Really Need Cryptocurrency? – A Modern Exploration of Money - June 27, 2018
- Should I Hire an Independent Freelancer or an Employee? - June 7, 2018
- Should Your Company Become a Blockchain Business - June 5, 2018
From your retina to fingerprints, bank accounts to birth certificate, family details to address and phone number, every digital imprint of your so called confidential space is at stake!
In one of the scams reported by Tribune it read “Anonymous sellers over WhatsApp that provided unrestricted access to details for any of the more than 1 billion Aadhaar numbers created in India thus far. It took just Rs 500, paid through Paytm, and 10 minutes in which an “agent” of the group running the racket created a “gateway” for this correspondent and gave a login ID and password. Lo and behold, you could enter any Aadhaar number in the portal, and instantly get all particulars that an individual may have submitted to the UIDAI (Unique Identification Authority of India), including name, address, postal code (PIN), photo, phone number and email.”
Is Aadhar more a Trouble than a Resolve?
This breach seems to be ahead of everyone’s expectation and is clearly stating what havoc can happen when Governments are exposed to technology and they are unable to comprehend ways through which it can be misused. The leak also happenned to make us understand that how easily the database is exposed and thus possibilities of using the data for unethical practices must have been started already.
Speaking on the development to the Tribune Sanjay Jindal, Additional Director-General, UIDAI Regional Centre, Chandigarh, accepted the lapse and said, “Except the Director-General and I, no third person in Punjab ‘SHOULD’ have a login access to our official portal. Anyone else having access is illegal, and is a major national security breach.”
The overall sanctity behind launching Aadhar was to digitalise the existing ecosystem of Governement database to bring in cohesiveness and ease in promoting and managing government schemes with a purpose to curb corruption to zilch. However with the data leak, much of the existing ecosystem is at threat, if the duplication happens then nearly all the possible venues which use Aadhar authentication (especially Banking) can be easily misused to perform unethical practices and frauds. And eventually, the purpose of creating such a mechanism of validation is completely defeated.