Is the Aadhaar database secured enough?

Group Discussion
Points to remember before you participate in this discussion:
  • Assume you are one of the members of a real group discussion.
  • Take the initiative to participate and contribute your thoughts.
  • Contribute your positive thoughts towards providing the solution.
  • Post your thoughts here.
Discussion:
174 comments Page 18 of 18.

Shekhar said:   3 years ago
The answer is Yes. These databases are handled by the ministry of electronics and information technology. All the data is stored in 7000 servers in Bangalore and Manesar. These databases are so secure and no one can attack this database. If we want to verify our adhar card we need OTP for that so it is a very secure Adhar card.
(20)

Yashit Tripathi said:   3 years ago
Yes, it can be handled by the ministry of E&IT cell.

Aadhar is mandatory because it is a basic document which means other documents are also dependent on it. It proves that you are a legal and authenticate INDIAN person.

It also takes our IDs like our Retina, fingerprint and so on.

And that's the reason it is a crucial and secure document in INDIA.
(13)

Ruchitha said:   2 years ago
Yes. Aadhar is essential for everyone. This card contain 12 digits handled by the Ministry of Electronics and Information Technology. 7000 servers stores information of users. This process is more secure and if want you to access your Aadhar you need to get OTP on a particular Mobile number once it's verified you can access your Aadhar card.
(6)

Aniyah said:   1 year ago
The security of the Aadhaar database, managed by the Unique Identification Authority of India (UIDAI) , has been a topic of extensive debate. UIDAI has implemented multiple layers of security, including encryption and regular audits, to protect the data. However, concerns about data breaches, unauthorized access, and privacy have persisted.

While UIDAI continues to enhance security measures, the effectiveness of these safeguards remains a point of discussion among security experts and privacy advocates.
(1)


Post your thoughts here:

Your comments will be displayed after verification.