mfioretti: biometrics* + privacy*

Bookmarks on this page are managed by an admin user.

16 bookmark(s) - Sort by: Date ↓ / Title / Voting / - Bookmarks from other users for this tag

  1. Unlike the Passport Officer, the RTO, the Electoral Officer, the CEO of UIDAI does not take any legal liability to certify the number as a proof of anyone’s identity, address or existence. Furthermore no one has verified or audited the database to establish how many of the billion numbers that are linked to data submitted by the outsourced parties are real individuals.

    The resulting Aadhaar database is the database being used to “purify”, as described by Ajay Bhushan Pandey the CEO of UIDAI, all databases that are seeded with Aadhaar. The seeding of other databases with the Aadhaar number is also unlike any other identification document. This seeding threatens to exclude the genuine and include the fake into other existing databases by seeding Aadhaar to other databases. The case of over 13,000 fake employees in Satyam’s who got salaries every month for years before being exposed is still fresh in India.

    As the government embarks to link the entire Consolidated Fund of India’s receipts and expenditure to this database, is it not reasonable to establish some CAG certificate on the existence of every person in this database?

    Mr. Nilekani has often highlighted the use of biometric to authenticate who you are as the core strength of the Aadhaar database. What he fails to state is that even if biometric could uniquely establish your identity uniquely throughout your life, which it cannot, its use for authentication is absurd.

    Once stolen, your biometric can be used, in a multiple of ways differing in simplicity and ease, by the thief, to perpetuate crimes that will be attributed to you and may be difficult, if not impossible, for you to deny.

    It is precisely this difference between the enrolment and use models of the Aadhaar in comparison with any other ID are a threat to you as well as the nation.
    https://tech.economictimes.indiatimes...ts/how-does-aadhaar-threaten-you/2277
    Voting 0
  2. Could flashing the "peace" sign in photos lead to fingerprint data being stolen? Research by a team at Japan's National Institute of Informatics (NII) says so, raising alarm bells over the popular two-fingered pose. Fingerprint recognition technology is becoming widely available to verify identities, such as when logging on to smartphones, tablets and laptop computers. But the proliferation of mobile devices with high-quality cameras and social media sites where photographs can be easily posted is raising the risk of personal information being leaked, reports said. The NII researchers were able to copy fingerprints based on photos taken by a digital camera three meters (nine feet) away from the subject.
    https://science.slashdot.org/story/17...3A+Slashdot%2Fslashdot+%28Slashdot%29
    Tags: , by M. Fioretti (2017-01-16)
    Voting 0
  3. While Bethany Howell napped on the couch last week, her daughter Ashlynd, 6 years old, used her mother’s thumb to unlock her phone and open the Amazon app. “$250 later, she has shopped for all her Christmas presents on Amazon,” said Ms. Howell, of Little Rock, Ark.

    After Ashlynd’s parents received 13 order confirmations for Pokémon items, they initially thought they’d been hacked, then they figured Ashlynd had bought them unintentionally. “No, Mommy, I was shopping,” Ms. Howell said her daughter told her. “But don’t worry—everything that I ordered is coming straight to the house.” Ms. Howell added: ”She is really proud of herself."

    The Howells could return only four of the items. So Ms. Howell came up with a solution and told Ashlynd, “Well, Santa found out and that is what Santa is going to bring you for Christmas.”

    Zeke Tischler, a 30-year-old social-media professional from Northridge, Calif., had the same sort of gift problem outside of the Christmas season. Ads for engagement rings began popping up in his Facebook news feed after he searched for rings online last year.

    One evening, as his girlfriend was looking over his shoulder, an ad for opal engagement rings—her favorite gemstone—popped up on his Facebook news feed. Mr. Tischler said he tried to pass it off as a glitch.

    Several weeks later, however, when he got down on one knee and presented the opal engagement ring, his girlfriend presented her own ring for him. Online ads ”ruined one of the largest surprises in my life,” Mr. Tischler said. His fiancée, he added, “thinks it’s pretty hilarious.”
    Take a Look at Other Recent A-Heds

    What’s Worse Than an Office Holiday Party? A Virtual Office Holiday Party
    Xi Jinping Likes English Beer and Iowa Farms—And Now All of China Does, Too
    Are You My Mother? These Birds Must Never Know

    A crush of package deliveries undid Brenna Jennings. Her United Parcel Service Inc. driver showed up so often to her New Hampshire home that her 8-year-old daughter started pondering the imponderable. Ms. Jennings shut it down with an explanation: Amazon and UPS are Santa’s helpers.
    http://www.wsj.com/articles/those-ads...rnet-are-ruining-christmas-1482507745
    Voting 0
  4. In Ghagaon, where a women’s cooperative runs the fair price shop, the internet has not worked even once. “We have to stand on the wall, or go near the pond, and ask everyone to come there to look for signal on the point of sale device,” said Mongra Sidar, a Gond Adivasi. “Or, we try inside the ration shop, then one person has to climb the chabootra elevated platform » , while another person stands on the ground to note down the details in the notebook.”

    In Raipur, officials said one lakh out of three lakh transactions using fingerprint authentication did not go through – a failure rate as high as 30%. They attributed the failures primarily to network connectivity problems and skin abrasions on fingers.
    Photographs as backup

    With fingerprint authentication failing for even genuine card holders who have been verified by local authorities, Chhattisgarh has come with an innovation: ration shop owners have been asked to take photographs of such people before giving them food rations.

    This photograph is stored in the government’s server. “It will serve as deterrent to ration dealers that even if there is a complaint six months later, the government can check if grains were given to the right beneficiaries,”

    “Earlier, we sent one boy on the bicycle to lift the rations for three households,” lamented Tapaswani Yadav, a middle-aged woman. “Now, it is a waste of time for everyone. Many elderly persons cannot walk, it is difficult for a few to even sit astride a motorcycle.”

    She added: “The machine is so slow, sometimes people reach the ration shop in the morning and return when the day is over.”

    Five technologies need to work together for biometric authentication to be successful – the point of sale device, internet connectivity, biometrics, the National Informatics Centre server, and the Unique Identity Authority of India servers. Invariably, one of the five fails.

    Shyamlal Dansena, the ration dealer in Dilari panchayat in Raigarh, said fingerprint authentication failed for 20% of the ration card holders on an average. But in October, he had to give grains to all 386 ration card holders after taking their photographs since the Samsung tablet purchased by the panchayat for enabling the Aadhaar-based transactions had stopped functioning.

    Dansena was preparing to travel 20 kilometers to Raigarh to get the tablet repaired. “The food officer said we can give November month’s grains only after the software is loaded again,” he said.
    http://scroll.in/article/822764/chhat...ar-when-fingerprints-fail-take-photos
    Voting 0
  5. Aadhaar reflects and reproduces power imbalances and inequalities. Information asymmetries result in the data subject becoming a data object, to be manipulated, misrepresented and policed at will.

    Snowden: “Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.”

    Snowden’s demolition of the argument doesn’t mean our work here is done. There are many other tropes that my (now renamed) Society for the Rejection of Culturally Relativist Excuses could tackle. Those that insist Indians are not private. That privacy is a western liberal construct that has no place whatsoever in Indian culture. That acknowledging privacy interests will stall development. This makes it particularly hard to advance claims of privacy, autonomy and liberty in the context of large e-governance and identity projects like Aadhaar: they earn one the labels of elitist, anti-progress, Luddite, paranoid and, my personal favourite, privacy fascist.
    http://scroll.in/article/748043/aadha...n-its-the-only-way-to-secure-equality
    Voting 0
  6. US citizens and other non-EU nationals who enter Europe will be asked to have their faces image-captured and fingerprints scanned upon arrival at a half-dozen major airports.

    The biometric dragnet is part of a pilot test of the EU’s so-called ‘smart borders’ package. Passengers can refuse to give the data for now but there are plans to eventually make it obligatory.

    A draft internal EU document dated Wednesday (18 February) and seen by this website says the “proof of concept” is set to start in March and will run until September this year.

    “Should traveller participation be lower than expected, there would be a high risk that the results of the tests would be biased or would not reflect reality,” notes the multi-million euro project.
    https://euobserver.com/justice/127719
    Voting 0
  7. UID, popularly known as Aadhaar, was conceptualised as a one stop solution as ID and address proof of the citizens of India. It was implemented to make programmes like the Public Distribution System efficient and ensure that benefits sent by the Government reach the right person.

    Aadhaar, despite being an important reform and a unique idea, was executed badly by the UPA. Over Rs 3,500 crore have been spent so far in the scheme which has already enrolled about 63 crore people. But it proved to be of no use to the people. The Congress-led UPA instead tried to use the crucial information for its personal gains during election by distributing money and enroll illegal immigrants to get India’s citizenship, who’ll ultimately vote for the Congress for its benevolence.

    During his campaign as BJP’s Prime Ministerial candidate Narendra Modi slammed the Congress-led UPA Government over the Aadhaar card project, questioning the deployment of massive funds for it, virtually smelling corruption.

    A previous NitiCentral report titled ‘Nilekani’s Aadhaar a danger to our privacy’, narrated how on March 10, 2014, the Mumbai Police busted a fake Aadhaar card and voter identity card racket in Byculla, which they believe is part of a much larger racket in creation of fake identities. Three persons were arrested for forgery of official records and their equipment, including iris and fingerprint scanners were seized. Among the fake election cards seized, at least three had different names but a similar number (ZHS 4001377).

    Instead of providing solutions, the UPA, due to poor planning, opened a can of worms. People might end up losing their privacy as crucial information (e.g. biometric data) is shared with foreign-based private operators, which could be misused by intelligence agencies to fulfil their nefarious intentions.

    Since all of the biometric data is being shared online, which is prone to hackers and snoops, with private operators, privacy of millions has been put at risk. Most of the companies working for UID are US-based and several of them reportedly had or are working for its intelligence agencies like CIA.
    http://www.niticentral.com/2014/06/17...ust-reboot-aadhaar-scheme-231800.html
    Voting 0
  8. The latest controversy involving the Unique Identification Authority of India (UIDAI) is a testament to the basic privacy concerns raised at the scheme’s inception and repeatedly thereafter. In a sense, the Goa court order that sparked this particular incident — directing the UIDAI to give the CBI the biometrics of all enrolled people in the state in order to help investigate the gangrape of a seven-year-old girl — was inevitable.
    http://www.dnaindia.com/analysis/edit...edit-blindfolding-big-brother-1970614
    Voting 0
  9. The electoral verdict is evidence against the diagnosis and remedy of World Bank Group and its Indian votaries. The verdict indicates that political parties that support Aadhaar are bound to pay heavy electoral cost for their involvement and complicity in putting citizens to inconvenience through tried, tested and failed identification technologies of transnational companies.
    http://www.moneylife.in/article/aadha...d-abandon-the-biometric-id/35827.html
    Voting 0
  10. this binary code doesn't encompass the entire fingerprint, only certain aspects of it like the curve of individual lines on your finger. Biometric scanner companies also tend to use different templates from one another, which aren't compatible across different platforms. Therefore, your binary fingerprint is unlikely to be the same on an iPhone as it would be, say, on an Android device or a Ford car. If a hacker figures out how to capture your template data -- for instance, using a popular technique called a "man-in-the-middle" cyber attack -- he or she wouldn't be able to use that data to hack into every account that uses your fingerprint to verify you. Compare that with the password, which can be, and often is, reused on multiple accounts -- so a hacked Twitter password can quickly lead to a compromised Gmail, Facebook and bank account also.
    http://www.huffingtonpost.com/rohit-sethi/biometrics-privacy_b_3997729.html
    Tags: , by M. Fioretti (2013-10-01)
    Voting 0

Top of the page

First / Previous / Next / Last / Page 1 of 2 Online Bookmarks of M. Fioretti: Tags: biometrics + privacy

About - Propulsed by SemanticScuttle