India’s Identity Card System Sparks Mixed Reactions: ‘Life Infrastructure Will Be Monitored at Every Step’

It’s hard for many in India to envision life before Aadhaar. Digital biometric IDs, which claim to be accessible to all Indians, were rolled out just 15 years ago, yet they have become an integral part of daily life.

An Aadhaar number is now essential for purchasing a home, securing employment, opening a bank account, paying taxes, receiving benefits, buying a vehicle, obtaining a SIM card, booking priority train tickets, and enrolling children. Infants receive their Aadhaar number immediately after birth. Although it is not obligatory, lacking an Aadhaar effectively renders one invisible to the state, according to digital rights advocates.

For Umesh Patel, 47, a textile businessman in Ahmedabad, Aadhaar has been a welcome change. He reminisces about the days of hauling stacks of paperwork to government offices just to verify his identity, often with little success. Now, with a quick glimpse of his Aadhaar, “everything flows smoothly,” he said, viewing it as “a testament to how our nation utilizes technology for its citizens’ benefit.”

“It’s a solid system that has simplified our operations,” Patel asserts. “Moreover, it enhances our country’s security by minimizing the risk of forged documents.”

“Aadhaar has become an integral part of Indian identity.”

The initiative has been deemed so effective that it caught the attention of the UK government, which considered the introduction of mandatory ID cards for its citizens. However, digital rights groups, activists, and humanitarian organizations highlight a less favorable perspective of Aadhaar and its effects on Indian society.

For some of India’s most underprivileged and least educated individuals (those unable to engage with the Aadhaar system due to issues like illiteracy, lack of education, or missing documentation), the system can be exclusionary and punitive, denying essential access to welfare and employment. With increasing moves to link Aadhaar to voting rights and citizenship, concerns arise that it may further disenfranchise and stigmatize the impoverished.

Apal Gupta, founder and director of the Internet Freedom Foundation in Delhi, stated that Aadhaar has become a digital obligation for many people in India, as Aadhaar-based verification is required to access government services, enter public venues, or carry on with their daily activities.

Mr. Gupta asserted that Aadhaar has “metastasized” since its inception, morphing into an extensive bureaucratic network of unique IDs required for business operations. “The essence of your existence is scrutinized at every juncture,” he remarked.

Critics contend that the current draft of India’s data protection and privacy law is inadequate for safeguarding privacy or preventing potential misuse of the invaluable Aadhaar database, which includes biometric data such as photos, facial and iris scans, and fingerprints of over a billion Indians.

Indian media has uncovered multiple instances of Aadhaar data breaches over the years, including a 2018 incident where data pertaining to 1.1 billion individuals was found to be sold online for a mere 500 rupees (£5).

Keir Starmer met Narendra Modi in Mumbai last week. During his visit, Mr. Starmer described the Aadhaar system as a “huge success”. Photo: Stéphane Rousseau/AFP/Getty Images

“According to this yet-to-be-notified law, there is no mechanism to ascertain if a data breach has been documented, and there is a lack of oversight on how Aadhaar data is consolidated with other databases, risking broader public surveillance and tracking,” Mr. Gupta noted. “Transparency is entirely absent.”

Although Aadhaar was initiated before Prime Minister Narendra Modi assumed office in 2014, his governing Bharatiya Janata Party (BJP) has significantly promoted and expanded the digital ID initiative. As India prepares to host the G20 summit in 2023, Prime Minister Modi referenced Aadhaar as one of the flagship achievements of ‘Digital India’, which he describes as an incubator for innovation. He asserts that India has saved over $22 billion by combating corruption in the welfare system.

The government highlights the extensive uptake of Aadhaar as an indicator of its success and inclusivity. As of last month, more than 1.42 billion Aadhaar numbers had been generated, corresponding to roughly the entire population of India, making it the largest digital identity program globally. Before this initiative, over 400 million Indians lacked any official identification and were unable to access banking services.

Yet the reality, particularly in rural and tribal regions, diverges sharply from the image portrayed by the government, as noted by Chakradhar Buddha, a senior researcher at Livetech India, an organization aimed at assisting those marginalized by India’s transition to digitalization.

Skip past newsletter promotions

“The deprivation of Aadhaar is pervasive among tribal communities, people in mountainous regions, and those in remote areas, and this reality is largely overlooked,” Buddha stated.

“This situation arises partly from a lack of proper documentation or incomplete documentation capture. Moreover, technological advancements create further obstacles that disproportionately affect the most vulnerable populations. Ultimately, this system undermines access to crucial social security and welfare for those most in need.”

Mr. Buddha challenged the government’s assertion that Aadhaar represents an infallible form of identification, recounting numerous instances where incorrect names and details led to significant issues for communities. For instance, in one village, tribal individuals lacked birth certificates and were assigned January 1 as their birthdate, while tribal names are often misspelled on Aadhaar cards due to unfamiliarity among officials.

Highlighting the recent example of millions of impoverished workers being erroneously removed from government support systems after the implementation of Aadhaar certification, Buddha cautioned that using Aadhaar as the universal standard for voting rights could result in “mass purges of the poorest from electoral registers.”

“These individuals have already been stripped of social equality. Now, Aadhaar is being utilized to deny them their right to political equality and universal suffrage,” Buddha stated.

Among those recently at risk of lacking an Aadhaar card was Ahram Sheikh, 34, an uneducated worker, who had important identification documents, including his Aadhaar card, stolen while on a train.

The aftermath was a nightmarish experience. He couldn’t recall his Aadhaar number from a decade earlier, rendering him unable to obtain a replacement card. Without it, he had to discontinue his construction job, losing crucial income for his family, and as a result, his son ultimately dropped out of school.

Months later, after traveling thousands of miles back to his village, Sheikh remained unable to resolve the issue and secure a new card. He now lives in constant fear of being declared an illegal alien without it.

“This Aadhaar system has turned into a nightmare for us. Why can’t the government establish proper institutions?” Sheikh lamented. “Everything in this country works against the poor, and this Aadhaar card is no exception.”

Aakash Hassan contributed reporting

Source: www.theguardian.com

Goodreads Owner Embraces Amazon Partnership, Affirms Reading as Integral to Identity

Nadia Odunayo may not have had the intention of taking on the formidable global giant that is Amazon, but she has undoubtedly become a hero for many book lovers who believe they don’t need Amazon.

For 18 years, bibliophiles logged their readings, left reviews and star ratings behind, and received their next reading suggestions from Goodreads, a platform founded by two Stanford University graduates in California.

In 2013, the creator of Goodreads sold the platform to Amazon, causing its already massive popularity to soar. Currently, Goodreads boasts an estimated 150 million users.

Among these users since 2012 is Odunayo, a software engineer and developer based in London. Six years ago, she sat down and envisioned an app that could complement Goodreads.

After creating a demo for several friends, she quickly realized that she had inadvertently created a potential competitor. The app leveraged AI to provide reader tracking tools, trends, and personalized book recommendations. As of this week, Storygraph has amassed 3.8 million active users, many of whom have made the switch from Goodreads.

In a blog post titled “Leave Goodreads in 2025!” just before Christmas, a book blogger and reviewer known as Bunny expressed dissatisfaction with Goodreads, stating, “I feel Goodreads is outdated. Its interface is clunky and offers limited functionality… I found Goodreads’ recommendations overwhelming and heavily skewed towards popular titles.”

Bunny announced her decision to switch to Storygraph, emphasizing, “I’ve loved it from the start! Not only is it female-owned, but it also offers a plethora of wonderful features.”

A Goodreads representative mentioned that the platform welcomes millions of readers, facilitating the exploration of hundreds of millions of books within the community. The spokesperson emphasized strong growth in user engagement with the platform.

Odunayo, 33, remarked, “I believe people appreciate the diversity of data we offer. With many exciting features and a engaged reader community…”

“But when people compare us to Goodreads, the prevailing sentiment is, ‘It’s the fact that Amazon doesn’t own it.”

Storygraph has attempted to address concerns surrounding malicious reviews and personal attacks by disallowing private messages and comments on reviews. Odunayo emphasized the importance of avoiding a scenario where users face unwarranted criticism or harassment.

Despite the increasing user base, Storygraph remains independently operated by Odunayo, who actively engages with users through social media and shares insights about the app and her reading habits.

As Storygraph experiences continued growth, the question arises: can it endure? What if Amazon attempts to acquire Goodreads competitors with lucrative offers?

Odunayo firmly states, “That’s not something we’re interested in. StoryGraph has had zero external investment; it’s a fully self-sustained venture. While anything is possible, we are currently content and committed to StoryGraph. I believe it’s the culmination of our life’s work.”

She further adds, “I believe there’s no cap on our potential growth while maintaining our current ethos. Our goal is to reach more users and become a globally acclaimed app.”

For Odunayo, the initial motivation behind all this stands stronger than ever – the love for books. Reflecting on her journey, she states, “I recall a friend caught up in social media for years, only managing to read 45 books.” She realized, “I’m single, no kids; with a 9 to 6 job, I only read 13 books this year.”

Currently, Odunayo reads 70 to 80 books yearly, distinguishing between fiction and non-fiction. Her current book is Time saving by Kaliane Bradley. She credits interacting with readers for broadening her reading choices and emphasizes, “Reading is ingrained in my identity as not just a CEO but a committed reader.”

Source: www.theguardian.com

DNA analysis confirms the identity of ‘Wellman’ skeleton with an 800-year-old Norwegian tale

Complete skeletal remains of “Wellman”

Eiji Hojem, NTNU University Museum

Researchers now believe they have identified the remains of a Norwegian story written more than 800 years ago that depicts a dead man being thrown into a castle well.

The Sverris Saga is a 182-section Old Norse document that records the exploits of King Sverre Sigurdsson, who came to power in the late 12th century. In one section, it is said that rival clans who attacked Sveresborg Castle near Trondheim, Norway, “took the dead, threw them into a well, and buried them with stones.”

The well was located within the castle walls and was the only permanent source of water for the area. It has been speculated that the man thrown into the well in this story may have been suffering from a disease, and that throwing him into the well may have been an early act of biological warfare.

In 1938, part of a medieval well in the ruins of Sveresborg Castle was drained, and a skeleton was discovered beneath the rubble and rocks at the bottom. The skeleton, known as “Wellman,” was widely believed to be the remains of the person mentioned in the story, but it was impossible to confirm that at the time.

now, Anna Petersen Researchers at the Norwegian Institute for Cultural Heritage in Oslo used radiocarbon dating and DNA analysis of the remains' teeth to show that the range of dates in which the man was alive is consistent with the castle raid. . Although it's not conclusive proof that the man is the person mentioned in the story, “circumstantial evidence is consistent with this conclusion,” Pellersen said.

The Well Man's skeleton was discovered in 1938

Riksantikvaren (Norwegian Directorate General for Cultural Heritage)

Additionally, the team was able to further enrich the story. “The investigation we conducted uncovered many details about both the incident and the person that were not mentioned in the story episode,” Petersen said.

For example, DNA suggests he likely had blue eyes and blonde or light brown hair. Researchers also believe, based on comparisons with modern and ancient Norwegian DNA,
that his ancestors came from Vest Agder County, in what is now the southernmost tip of Norway.

What they couldn't find was any evidence that the men were thrown into the well because they were sick or to make drinking water unavailable, but no evidence to the contrary. can't be found, and the question remains unanswered.

michael martin The researchers at the Norwegian University of Science and Technology in Trondheim say their approach of matching historical documents with DNA evidence will help them build family trees of long-deceased royal families and “physically reveal life stories such as movements.” He states that it may also be applicable to “describing and drawing schematically.” Anonymous people whose remains were recovered from archaeological excavations across geographic regions. ”

Researchers collected DNA from one of the skeleton's teeth

Norwegian Institute of Cultural Heritage (NIKU)

“To my knowledge, this is the earliest instance in which genomic information has been recovered from a specific person, or even a specific person, described in an ancient text,” Martin said.

He says generating genomic information from ancient skeletons can provide new details about a person. “These details are not included in the original text, so genetic data enriches the story and provides a way to separate fact from fiction,” Martin says.

topic:

Source: www.newscientist.com

The Webb’s ERO-BluDOG Mix-Up: A Space Incident of Mistaken Identity

Researchers re-evaluated extremely red objects (EROs) in the JWST data and found similarities with BluDOGs previously identified from Subaru Telescope data. This discovery contributes to a broader understanding of quasar evolution and points to the need for further research using advanced telescopes like GREX-PLUS. Credit: SciTechDaily.com

Space researchers have discovered that extremely red objects (EROs) exist in space. james webb space telescope This data is similar to the Subaru Telescope’s BluDOG, challenging previous assumptions and highlighting the complexity of studying quasar evolution.

Not every discovery is actually a new discovery. This is the case for extremely red objects (EROs) found in the James Webb Space Telescope (JWST) data. The analysis showed that it is very similar to a blue-excessive dust-covered galaxy (BluDOG) previously reported using data from the Subaru Telescope.

Quasars, some of the brightest objects in the universe, are powered by supermassive black holes with masses that can reach more than a billion times that of the Sun. Although these objects are the focus of much research, how they form is still poorly understood. A leading theory is that quasars form within galaxies with clouds of gas and dust that obscure the growing quasar until they become powerful enough to blow away the clouds. If this is true, we should be able to catch a short window of time when a quasar breaks out of the cloud.

A galaxy covered in blue excess dust (BluDOG) photographed by the Subaru Telescope.Credit: National Astronomical Observatory of Japan/HSC cooperation

Because the transition period is short, we must observe a large number of prequasar candidates and hope that we are lucky enough to catch a galaxy just as the quasar begins to erupt. Examining the JWST data, a group of extremely red objects (EROs) were identified as possible transitional quasars. But researchers at the Subaru telescope, a Japanese telescope in Hawaii, say that although ERO is called “red,” it is similar to the blue-excess dust-encrusted galaxy (BluDOG) found in big data. I noticed that it also has an important blue component. It was obtained from the Subaru Telescope and described in last year’s report.

Our analysis shows that ERO and BluDOG are likely objects of the same class, but that there are also important differences. One possibility is that ERO is at an earlier stage of evolution than BluDOG. More candidate samples need to be collected to determine the true relationship between ERO, BluDOG, and quasars. Larger samples will be studied by next-generation astronomical instruments, including a planned infrared space telescope project in Japan called GREX-PLUS.

References:

“Similarities between the compact, very red object discovered by JWST at the dawn of the universe and the blue, dust-covered galaxy known at the noon of the universe” Akatoki Noboriguchi, Akio Inoue, Toru Nagao, Yoshiki Toba, Toru Misawa, December 14, 2023 of Astrophysics Journal Letter.
DOI: 10.3847/2041-8213/ad0e00

“The extreme properties of four blue dust-covered galaxies revealed by optical spectroscopy” Akatoki Noboriguchi, Toru Nagao, Yoshiki Toba, Kohei Ichikawa, Masaru Kajisawa, Nanako Kato, Toshihiro Kawaguchi, Hideo Matsubara , Yoshiki Matsuoka, Kyoko Onishi, Masafusa Onoe, Nozomu Tamada, Koki Terao, Yuichi Terashima, Yoshihiro Ueda, Takuji Yamashita, December 23, 2022, of astrophysical journal.
DOI: 10.3847/1538-4357/aca403

“Optical properties of galaxies covered with infrared bright dust seen with Subaru Hyper Supreme Cam” Akatoki Noboriguchi, Toru Nagao, Yoshiki Toba, Mana Niida, Masaru Kajisawa, Masafusa Onoe, Yoshiki Matsuoka, Takuji Yamashita, Yuyan Zhang , Toshihiro Kawaguchi, Yutaka Komiyama, Kodai Nobehara, Yuichi Terashima, Yoshihiro Ueda, May 13, 2019, astrophysical journal.
DOI: 10.3847/1538-4357/ab1754

Source: scitechdaily.com

Opal Security secures $22 million in funding to help businesses manage access and identity

Venture capital investment trends in the cybersecurity market suggest that the sector is in decline, at least in recent months. according to According to Crunchbase, the number of cybersecurity deals fell from 181 in the second quarter to 153 in the third quarter. In a more detailed report, Crunchbase suggests third-quarter cybersecurity venture funding is down 30% year-over-year, with investment in the category likely to fall to its lowest level since 2019.

But some cybersecurity startups are somehow escaping the industry’s downturn. opal security. Today, Opal, a vendor that takes an automated approach to identity access management, announced that it has raised $22 million in a Series B round led by Battery Ventures with participation from Greylock and Box Group.

Raising Opal’s maximum funding to $32 million, the new tranche will go toward doubling Opal’s 30-person team by the end of 2024, expanding its enterprise customer support organization, and ramping up product development, the founder and CEO said. Umaima Khan told TechCrunch in an email interview. He added that product enhancements include a new visualization suite and AI-powered tools designed to remediate identity and access risks.

Khan founded Opal in 2020. Prior to that, he studied cryptography at MIT, worked in defense research and at startups such as Amplitude and Collective Health.

Khan said that during his work in the private and public sectors, where he was responsible for building internal authentication and authorization services, particularly the policy layer, he began to notice common issues around visibility and lack of understanding of user access behavior. I did.

“I’ve seen firsthand how common problems like lack of proper infrastructure and over-access can cause completely avoidable cascading failures,” Khan told TechCrunch in an email interview. . “The reality is that most best-in-class security engineering teams understand this and are building these systems in-house to the best of their ability. However, scaling and maintaining these systems is a significant effort even for large enterprises and impractical for smaller organizations. ”

To address the perceived need for a more scalable access and identity orchestration platform, Khan created a suite that provides enterprises with a unified view and control of employee access to internal tools, apps, platforms, and environments. Founded Opal. Opal allows customers with thousands of employees to create policy workflows to automate access policies and set up approval flows for access requests that cannot be automated.

Opal is not alone in the access management market. In addition to incumbents (such as Okta), vendors such as Veza, SailPoint, Cyber-Ark, and Saviynt also compete. Some have raised large amounts of venture capital. But Khan said that unlike some of its competitors, Opal is building on more analytics and his AI capabilities aimed at preventing identity-based threats, and ultimately more of companies will be attracted to his Opal solution.

“Because we are a data platform, along with log data from specific end systems, we have a detailed ground truth understanding of system policies, users, groups and how policies are used, approved, denied, created and We have both metadata about the changes,” Khan said. “This gives us a unique and rich dataset to provide a baseline on various forms of risk associated with access and to identify potentially anomalous actors and systems… I’ve been thinking a lot about how to build possible datasets. [access management] It is a readable and writeable layer that prioritizes enterprise readiness from an infrastructure and feature perspective. ”

Customers seem to agree. Opal’s annual recurring revenue has quadrupled since the company’s Series A in June 2022 across a customer base of approximately 40 brands, including Databricks, Scale AI, and Figma. However, Khan declined to say whether Opal was profitable.

“Our technology addresses the challenge of scaling access management with limited information in complex enterprise environments, which is a major pain point for technical decision makers across the industry,” said Khan. states. “Large organizations have fragmented data and systems. These organizations increasingly need easy-to-use, scalable data and workflow processes for identity access management. Our platform meets that need. It’s a great fit and gives CISOs and CSOs the tools they need to view and control their systems.”

Asked if he was concerned about challenges in cybersecurity VC funding and the broader startup ecosystem, Khan said requiring companies to more quickly disclose cybersecurity incidents and other related policy announcements. Opal pointed to new rules from the U.S. Securities and Exchange Commission as a tailwind for Opal.

“Continued challenging market trends are forcing businesses to be as efficient as possible. Our platform improves the efficiency of security, compliance, and IT teams,” said Khan. . “We’ve also seen a similar shift in the sophistication and scale of cyber breaches as more companies undergo digital transformation in the wake of the pandemic. Our platform is a layer of defense against these breaches, and this bucket is very sticky…This latest round of funding allows us to navigate ongoing market challenges while meaningfully investing in our team and product development.”

Source: techcrunch.com