Hindustan Times (Chandigarh)

Aadhaar is an evolving endeavour

Along with introducin­g new features, the system can also manage their transition at scale

- NANDAN NILEKANI

You can’t have your cake and eat it too. Economists call this maxim a ‘trade-off’. You are always balancing between opposing forces, having it all is not an option. In the late 1800s, you could either take a carriage and ride slowly but comfortabl­y or ride faster, but solo (and uncomforta­bly), on horseback. That was the case, until it changed in 1912, thanks to Henry Ford. You could now travel both comfortabl­y and fast. This is why new technology has always been lauded in society, because it changes the nature of these trade-offs entirely.

As the usage of Aadhaar grows, there has been concern from some about the ‘linking’ of Aadhaar to various services. The concern was that a unique identifier such as Aadhaar being seeded in multiple databases opens up the possibilit­y of deep profiling and tracking. Images of ‘1984’ and the birth of a ‘panopticon’ have been conjured up. These fears are over-hyped and baseless.

For a moment, consider another unique identifier, your mobile number. A typical urban, young Airtel user, has probably ‘linked’ her mobile number to Ola for booking cabs, Zomato for ordering food and Whatsapp for messaging. Yet, one cannot say that by doing so, Airtel knows where she goes, what she eats or whom she talks to. This is because ‘linking’ is a one-way process. Ola knows your Airtel number, but Airtel doesn’t get data from Ola. The same is the case with Aadhaar. UIDAI doesn’t know where you’ve linked your Aadhaar, and why.

Even then, in the rare case, if Ola, Zomato and Whatsapp were to collude and share your data, they could ‘link’ the data using your mobile number. With current technology, you could get multiple sim cards and handsets for summoning a cab, ordering food or sending a message but that is impractica­l.

The answer to this trade-off is tokenisati­on technology.

Basically, tokenisati­on in our example would mean a different mobile number is automatica­lly assigned for every Zomato, Ola and Whatsapp you link to. Moreover, you can create your own virtual mobile number if you want. UIDAI had originally considered tokenisati­on in the early days of Aadhaar in 2010, but it was an idea then ahead of its time.

Now that tokenisati­on has been announced, it has changed the nature of the trade-off itself, increasing privacy and security, without compromisi­ng usability. There are three new features which have been launched.

First, the new limited EKYC will not give away your Aadhaar number, unless the law requires it. Second, every organisati­on using Aadhaar will necessaril­y get a token, i.e. an ID number, that no one else in the world will have. This token cannot be used to reveal your Aadhaar number, nor can two colluding organisati­ons ‘link’ your records. This is a guaranteed tokenisati­on on the backend, with no action required from the user. Your privacy is protected as a default.

Third, if you’re still not satisfied with the UIDAI’S tokenisati­on, you can optionally generate your own 16-digit Virtual ID. This Virtual ID is a pseudo-aadhaar number and will be usable everywhere an Aadhaar number is. More importantl­y, UIDAI recognises that this service should be available to all, so you do not need a laptop or a smartphone to get or replace a Virtual ID.

In fact, this sort of inclusion by design has been a feature of Aadhaar from the very beginning. Even the homeless could get an Aadhaar, without a valid proof of address, by the introducer system. The UIDAI team knew that the introducer system has challenges, but the trade-off was to exclude people from getting an Aadhaar because of a lack of documentat­ion. I’m glad the UIDAI chose inclusivit­y. The recent move to enable facial recognitio­n as another way of Aadhaar authentica­tion is one more step in the interest of inclusivit­y.

I’m glad that news headlines are dedicated to important technologi­cal challenges such as protecting user privacy, but unfortunat­ely, the quality of the debate leaves a lot to be desired. While Aadhaar took centre stage in the debate, it was a distractio­n from all the other real issues that are detrimenta­l to an Indian’s privacy. From my example above on linking, you may have realised that your mobile number creates the same privacy issues as Aadhaar did before tokenisati­on. In fact, a recent article in The New York Times quoted an FBI agent saying that a mobile number is more dangerous than a social security number because it is in 10x more databases, it is the exact same for every service, it is connected to a device that is always on you, and can even track your location.

What delights me the most though is that the Aadhaar architectu­re is flexible, fast, constantly innovating. It is not just able to introduce new features, but also manage their transition at scale. Systems are not born through Immaculate Conception, they get there through constant improvemen­ts. We should applaud the UIDAI for being responsive to the concerns of the public. We need to recognise that providing a unique, secure identifica­tion, with instant authentica­tion anywhere, to 1.3 billion Indians is an evolving endeavour. What India has accomplish­ed in less than nine years is nothing short of a revolution!

 ??  ?? The fears that Aadhaar will lead to deep profiling and tracking are baseless
The fears that Aadhaar will lead to deep profiling and tracking are baseless
 ??  ??

Newspapers in English

Newspapers from India