Aadhaar , India ’s monumental biometric database , is facing new allegement of compromise after local journalists report paying the eq of $ 8 in Amerindic rupee for full administrative accession .

The program was specify to give Indian residents well-situated access to social political program for healthcare , education , and general upbeat ; however , the program began speedily expanding in 2014 , not long after the Indian National Congress ( INC ) performed abominably in parliamentary elections . The authorities began seed Aadhaar numbers into legion government databases and , as BuzzFeed’sPranav Dixit report , major technical school companies such asAmazonand Uber have look for access for their own function .

Aadhaar has suffered breach before ; Gizmodo report 130 million Native American residents at risk of infection after a leak in biometric arrangement data point last spring . But refreshed theme from local source , highlighted by Dixit on Thursday , indicate security around the arrangement may be even worse than imagined .

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

diarist at local theme The Tribunereportthat for Rs 500 ( roughly $ 8) , they were able-bodied to purchase a username and countersign that pass on them full access to the Aadhaar system from a piece they reach using WhatsApp . gratuitous to say , UIDAI officials were occupy and , allot to The Tribune , authorities conceive this a “ major national security measure breach . ”

A secondreport , print by Amerind tidings website The Quint , detail a security loophole that gave anyone with administrative accession the power to grant anyone else full accession . “ have ’s say [ Person X ] gives access to somebody Y and person Z , ” the site explained : “ Persons Y and Z can then log onto the Aadhaar portal and add Persons A , B , C , and so on . ” With these privileges , users would have access code to entropy like name , speech , dates of nativity , parents ’ names , sexuality , nomadic number , speech — but not iris scans or fingerprint data .

Naturally , most of the disceptation around Aadhaar is center on the potential for privacy invasion , but identity theft is also a major concern . In an consultation last twelvemonth , an INC phallus tell Gizmodo that while the system itself is “ amazingly advanced ” and , in the right hands , able of much well , noticeably absent are privacy laws and the regulatory theoretical account one would expect to follow such a monumental data point accumulation effort .

William Duplessie

What ’s more , a high-pitched - technical school system design to pair unambiguously assigned number with biometric datum was turning — due to a lack of biometric sensors around the state — into something more consanguine to the Social Security numbers used in the United States , which is , of course , very problematic . essentially , Aadhaar number are not often checked against the fingerprint or iris scans of the cardholder , which crap these newly reported protection lapses in the arrangement a truly substantial outcome .

Last year , a breach at four national- and state - ladder databasesleakedas many as 130 - 135 million Aadhaar numbers racket . And this was a month after a spreadsheet , which could notice using Google , leakedcontaining thousands of number , addresses , and tax ID act .

[ BuzzFeed ]

Starship Test 9

Update , 3 postmortem : UIDAI is insisting publicly that there was no “ falling out , ” just a potential case of unauthorized use . So they ’re quibbling over semantics . A data breach come about when an organization fall back control over its data ; when someone who is not authorized manages to find it . For good example : Yesterday , the US Department of Homeland Securityannouncedthat entropy belonging to M of federal employees had been found in the self-possession of a former employee who should not have had admission to that data . That is a data point breach .

UIDAI is likely say that it was n’t hacked , i.e. , the dupe of a cyberattack , and that falls in stemma with what we ’ve seen and reported so far . But it has also insist that anyone who enter the Aadhaar system can be traced . That ’s just not how thing works . Anonymity online is fairly promiscuous to achieve .

AsBusiness Todaynotes , similar denials about breaches have been issue by UIDAI in the past following leak :

Lilo And Stitch 2025

This is in line with the UIDAI ’s rack on previous cases of Aadhaar data leak , like the November 2017 debacle when 210 government websites were found ready Aadhaar information world . Back then , too , the prescribed stand was that “ biometric information is never partake and is fully inviolable with high encryption at UIDAI and simple show of demographic information can not be misused without biometrics ” .

This statement looks like assert that a leak is only critical if it includes fingerprints or iris scans . But the people whose addresses , phone phone number , parents ’ names , and dates of birth may have been left accessible without authorization might disagree . What ’s important in a data severance is the information that ’s compromised ; not the bits you oversee to keep secure .

PrivacySecurity

CMF by Nothing Phone 2 Pro has an Essential Key that’s an AI button

Daily Newsletter

Get the best tech , scientific discipline , and culture intelligence in your inbox daily .

News from the future tense , delivered to your present tense .

You May Also Like

Photo: Jae C. Hong

Doctor Who Omega

Roborock Saros Z70 Review

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

William Duplessie

Starship Test 9

Lilo And Stitch 2025

Roborock Saros Z70 Review

Polaroid Flip 09

Feno smart electric toothbrush

Govee Game Pixel Light 06