Computing

How Aadhaar UID verified the identity of an anonymous Twitter handle 1

How Aadhaar UID verified the identity of an anonymous Twitter handle

Something strange came to my attention today. An otherwise anonymous Twitter profile, but it had an Aadhaar UID number in the place of the name. The profile said the person was a IITian, a Brajwasi, Swayamsewak, BJPite, Gaurakshak and slave of the Indian state. Oooookay. After speaking and tweeting and writing critically about the Aadhaar …

How Aadhaar UID verified the identity of an anonymous Twitter handle Read More »

income-tax-dept-server-result

What is this address we are supposed to report black money to?

This post has been updated to take out some points that were misunderstood by me and have been clarified and another issue which appears to be resolved. Okay, I’m spooked. I don’t understand this enough to even claim something is wrong. This is the most bizarre “email situation” I have ever seen. It began with …

What is this address we are supposed to report black money to? Read More »

legion__group

5 things that tell you “Legion” hackers are yet another BJP front

So a few days ago,anonymous hackers calling themselves “Legion” hacked Rahul Gandhi’s Twitter account and made profane tweets from it. Anonymous legion hackers then compromised the official Congress handle and other accounts, all of them with official inc.in email IDs. Yesterday, the anonymous hackers calling themselves “Legion” hacked Barkha Dutt’s Twitter account followed by Ravish Kumar’s. The …

5 things that tell you “Legion” hackers are yet another BJP front Read More »

Illustration of how a file or document is sent using Public key encryption by Johannes Landin

DEITY National Encryption Policy is as good as forbidding encryption

First of all, what is National Encryption Policy? “Under Section 84A of Information Technology Act, 2000 Rules are to be framed to prescribe modes or methods for encryption”. So DeitY has framed a draft of such rules which will decide the future of how encrypted services are to be used or provided to users in …

DEITY National Encryption Policy is as good as forbidding encryption Read More »

The Diaspora Yatra

Zuck: Yeah so if you ever need info about anyone at Harvard Just ask. I have over 4,000 emails, pictures, addresses, SNS† Friend: What? How’d you manage that one? Zuck: People just submitted it. I don’t know why. They “trust me” Dumb *ucks. The Zuck in the above conversation is Mark Zuckerberg. And they are …

The Diaspora Yatra Read More »

U.S. Central Command @CENTCOM Twitter hacked

ISIS hacks CENTCOM Twitter and Youtube accounts

The Twitter and Youtube accounts of CENTCOM (Central Command) appear to be hacked and are posting pro ISIS content, threats as well as what appears to be detailed information for officers. The account claims to have breached computers in all military bases. The account is currently suspended.. Others on Twitter have expressed skepticism about the hacked …

ISIS hacks CENTCOM Twitter and Youtube accounts Read More »