mfioretti: identity theft*

Bookmarks on this page are managed by an admin user.

3 bookmark(s) - Sort by: Date ↓ / Title / Voting / - Bookmarks from other users for this tag

  1. Unlike the Passport Officer, the RTO, the Electoral Officer, the CEO of UIDAI does not take any legal liability to certify the number as a proof of anyone’s identity, address or existence. Furthermore no one has verified or audited the database to establish how many of the billion numbers that are linked to data submitted by the outsourced parties are real individuals.

    The resulting Aadhaar database is the database being used to “purify”, as described by Ajay Bhushan Pandey the CEO of UIDAI, all databases that are seeded with Aadhaar. The seeding of other databases with the Aadhaar number is also unlike any other identification document. This seeding threatens to exclude the genuine and include the fake into other existing databases by seeding Aadhaar to other databases. The case of over 13,000 fake employees in Satyam’s who got salaries every month for years before being exposed is still fresh in India.

    As the government embarks to link the entire Consolidated Fund of India’s receipts and expenditure to this database, is it not reasonable to establish some CAG certificate on the existence of every person in this database?

    Mr. Nilekani has often highlighted the use of biometric to authenticate who you are as the core strength of the Aadhaar database. What he fails to state is that even if biometric could uniquely establish your identity uniquely throughout your life, which it cannot, its use for authentication is absurd.

    Once stolen, your biometric can be used, in a multiple of ways differing in simplicity and ease, by the thief, to perpetuate crimes that will be attributed to you and may be difficult, if not impossible, for you to deny.

    It is precisely this difference between the enrolment and use models of the Aadhaar in comparison with any other ID are a threat to you as well as the nation.
    https://tech.economictimes.indiatimes...ts/how-does-aadhaar-threaten-you/2277
    Voting 0
  2. and I warmly dedicate this to all those who are losing their sleep over the "how do I establish my identity, by getting ONE account across all Mastodon instances" non-issue. Forget "fakes", think to the other real "you". It's the picture and description that you associate to it that establish who you are, not the username.
    https://www.theguardian.com/us-news/2.../apr/03/identity-theft-racial-justice
    Tags: , by M. Fioretti (2017-04-08)
    Voting 0
  3. surveillance activities as those of the former Tunisian regime create another kind of vulnerability that concerns not only what you send, but also what you receive
    http://www.techdirt.com/articles/2011...raffic-to-rewriting-emails-more.shtml
    Tags: , , , by M. Fioretti (2012-02-09)
    Voting 0

Top of the page

First / Previous / Next / Last / Page 1 of 1 Online Bookmarks of M. Fioretti: Tags: identity theft

About - Propulsed by SemanticScuttle