We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Unpacking Aadhaar: How biometric id for a billion really works

00:00

Formal Metadata

Title
Unpacking Aadhaar: How biometric id for a billion really works
Subtitle
Governments around the world are implementing digital identity programs that don't work
Alternative Title
Unpacking the compromises of Aadhaar, and other digital identities inspired by it: Governments around the world are implementing digital identity programs that don't work
Title of Series
Number of Parts
254
Author
License
CC Attribution 4.0 International:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Aadhaar is India's national biometric identity database, with over one billion records comprising fingerprints, iris scans and basic demographic information. It is presented as identity technology, allowing an individual to identify themselves, but also as an identification technology, allowing the state to see an individual, identify fraudulent welfare beneficiaries, and thus realise savings. These claims are not complementary. They are in fact contradictory, compromising each other. If one must be true, the other must somehow be false, and this is the reality of Aadhaar. This talk will demonstrate how Aadhaar's attempt to be a cure for all kinds of ailments has in fact resulted in large scale exclusion and fraud. We will look at a series of design assumptions in Aadhaar's architecture, the gaps in them, and then examples of how these gaps were exploited, from public news reports. Aadhaar is often touted as a revolutionary technology that has simultaneously given identity to billions and realised substantial savings from fraud for the government. These utopian visions are finding buyers around the world. Jamaica, Morocco and Kenya have all adopted projects inspired by Aadhaar, and more countries are following suit. Unfortunately, Aadhaar is not magic, and there is now an urgent need for a sober understanding to be taken worldwide. The Kaarana project began in 2017 as a collaboration between programmers and lawyers, to document architectural assumptions and their impact on human rights. The project's findings were presented as evidence to the Supreme Court of India in 2018, and are acknowledged in a scathing dissent by Justice Chandrachud (September 2018). This dissent was in turn cited by the Supreme Court of Jamaica to shut down a biometric identity program in that country (April 2019). In September 2019, Kaarana member Anand Venkatanarayanan also appeared as a witness in the Supreme Court of Kenya in a petition against Huduma Namba, the Kenyan biometric identity program. We hope that this presentation at CCC will help public interest technologists from around the world prepare for a critical examination of similar programs in their countries.
Keywords
Plane (geometry)NP-hardAnalogyIdeal (ethics)Digital libraryPoint cloudPhysical systemEntire functionPlastikkarteVideo gameStatement (computer science)Identity managementIdentical particlesInterior (topology)BiostatisticsDigitizingHacker (term)Physical systemSelf-organizationComputer programmingSpacetimeMedical imagingPoint cloudMathematicsOrder (biology)Optical disc driveDifferent (Kate Ryan album)Line (geometry)FingerprintGoodness of fitProjective planeDigital photographyComputer animationJSON
State of matterInformationTask (computing)Uniqueness quantificationIdentity managementService (economics)SineNumerical digitMachine visionCyberspaceDivision (mathematics)Point (geometry)DatabaseWebsiteNumberQuicksortNeuroinformatikComputer programmingCASE <Informatik>Computer animation
Uniqueness quantificationNumerical digitIdentity managementService (economics)SineNumbering schemeExpressionAverageData storage deviceComplex (psychology)CASE <Informatik>Hacker (term)Statement (computer science)WaveSet (mathematics)WordQuicksortArithmetic meanCausalityComputer animation
GenderAddress spaceDigital photographyFingerprintPantographBiostatisticsInformationPasswordPhysical systemInformation privacyUniqueness quantificationIdentity managementValidity (statistics)DatabaseRight angleConnected spaceNumberField (computer science)PlastikkarteSource codeMaxima and minimaBasis <Mathematik>InformationSocial classFingerprintMechanism designCore dumpPhysical systemDigital photographyDatabase transactionCondition numberOrder (biology)DatabaseUtility softwareProcess (computing)System identificationUniqueness quantificationState of matterAddress spaceComputer programmingMatching (graph theory)BiostatisticsRow (database)Sign (mathematics)Physical lawProof theoryPort scannerKey (cryptography)Data structureAuthenticationPasswordDigitizingMereologyIdentity managementAuthorizationUniverse (mathematics)Computer animation
Service (economics)Mechanism designHaar measurePublic key certificateNumberPoint (geometry)Graph coloringSound effectComputer animation
AuthenticationNumberDifferent (Kate Ryan album)ImplementationTelecommunicationDatabaseCASE <Informatik>Drop (liquid)Operator (mathematics)Connected spaceMereologyRandom number generationAuthenticationNeuroinformatikSystem identificationInstance (computer science)Order (biology)Identical particlesElectronic mailing listAuthorizationRegulator genePasswordSimulationFingerprintPlastikkarteLecture/Conference
Bridging (networking)HypermediaDependent and independent variablesChemical equationDistribution (mathematics)Physical systemParsingInformation privacyService (economics)AuthenticationDatabaseMathematical analysisInformationIdeal (ethics)Mechanism designFreewareUniqueness quantificationPeer-to-peerProcess (computing)Turing testCore dumpBiostatisticsState of matterComputer-generated imageryInternetworkingNetwork topologyCompilerStatisticsExplosionSineWebsiteFAQIdentity managementWordModule (mathematics)PRINCE2Mobile WebNumberWave packetState of matterRight angleMultiplication signVotingDependent and independent variablesMechanism designMereologyFingerprintPhysical systemExpressionBitDatabaseMobile WebElectronic mailing listBackupPoint (geometry)Row (database)AuthorizationConnected spaceMathematical optimizationAuthenticationOperator (mathematics)Goodness of fitFundamental theorem of algebraCondition numberFamilyTraffic reportingCoefficient of determinationExterior algebraClosed setGroup actionDistribution (mathematics)Channel capacityTerm (mathematics)Extension (kinesiology)Video gameDifferent (Kate Ryan album)Metropolitan area networkCASE <Informatik>Beta functionCompilation albumThumbnailRational numberRemote procedure callPoint cloudTelecommunicationReal numberFormal verificationNetwork topologyInternetworkingHacker (term)MathematicsComputer animation
NumberCoefficient of determinationPlastikkarteTraffic reportingGodConnected spaceCASE <Informatik>Exception handlingBiostatisticsPhysical systemPoint (geometry)Meeting/Interview
Computer-generated imageryOperator (mathematics)Process (computing)CloningFingerprintHacker (term)Proxy serverSoftwareSoftware developerPhysical systemBiostatisticsServer (computing)AuthenticationCellular automatonTwitterArmState of matterProcess capability indexIdentity managementSystem programmingMathematicsMetropolitan area networkPhysical lawElectronic mailing listStatement (computer science)Boss CorporationEqualiser (mathematics)NumberProjective planePosition operatorSampling (statistics)ResultantDatabaseProcess (computing)Vulnerability (computing)Multiplication signProfil (magazine)ExistencePoint (geometry)Quicksort19 (number)State of matterWorkstation <Musikinstrument>Condition numberDistanceSystem callWindows RegistryWebsiteIncidence algebraBitSingle-precision floating-point formatIntegrated development environmentWhiteboardOperator (mathematics)Source codeHypermediaDependent and independent variablesTraffic reportingIdentity managementChemical equationGroup actionCASE <Informatik>WordReading (process)Student's t-testPhysical systemRevision controlLogicIdentical particlesSoftwareLevel (video gaming)AuthenticationShift operatorPower (physics)MereologySign (mathematics)Module (mathematics)Repository (publishing)Centralizer and normalizerBiostatisticsHacker (term)Computer fileClient (computing)Term (mathematics)Lecture/ConferenceMeeting/Interview
Digital photographyNP-hardAnalogyIdeal (ethics)Digital libraryPoint cloudPhysical systemEntire functionState of matterNumberCentralizer and normalizerQuicksortVotingPublic key certificateWindows RegistryPhysical lawFraction (mathematics)Civil engineeringTerm (mathematics)PlastikkarteMachine visionState of matterDifferent (Kate Ryan album)Stack (abstract data type)Total S.A.EstimatorFlow separationDatabaseRight angleLevel (video gaming)Identity managementProcess (computing)Equivalence relationCASE <Informatik>InformationMereologyImplementationObservational studyBuffer overflowInternetworkingRoundness (object)Service (economics)Physical systemNatural numberLeakSystem identificationMultiplication sign1 (number)Event horizonPoint (geometry)Image registrationIntrusion detection systemAuthorizationTrailKeyboard shortcutOperator (mathematics)ArmOnline helpScripting languageRow (database)BitStatement (computer science)Link (knot theory)Water vaporPredictabilityBasis <Mathematik>WebsiteDecision theoryGraph coloringOcean currentMoment (mathematics)Position operatorComputer animation
Computer animation
Transcript: English(auto-generated)