Those of you with high flying corporate jobs that provide you with encrypted laptops and VPNs for security, that are maintained by a tech department will understand this one one best.

Worth noting here is that the UIDAI account often has people messaging them their Aadhaar numbers, phone numbers and other details as needed. While using a phone to respond to Twitter is not inherently risky, this isn’t so much a “security breach” as a lack of adequate protocols for secure official communications.

It is actually a fairly good parallel with Aadhaar. Twitter may be secure, but if the device you use to access it is not, your Twitter account and those you have access to, to whatever extent may not be secure. Good time to add: Just like, your Aadhaar database may be secure, but if the devices of data access are not, then the data is not secure either – to whatever extent the method has access. Gives a whole new insight into random laptops using off market scanners to do enrolments, doesn’t it.

Vidyut is a commentator on socio-political issues with a keen understanding of tech and policy. She has been observing and commenting on Aadhaar since 2010 from a perspective of human rights, democracy and technological robustness.

Leave a Reply

Your email address will not be published. Required fields are marked *