Multiple top leaders of India’s opposition parties and at least three journalists have received a notification from Apple, 

The email titled “ALERT: State-sponsored attackers may be targeting your iPhone” goes on to say, “These attackers are likely targeting you individually because of who you are or what you do. If your device is compromised by a state-sponsored attacker, they may be able to remotely access your sensitive data, communications, or even the camera and microphone.”



"Opposition's Charges Bizarre": Rajeev Chandrasekhar On Apple 'Hacking' Alert


States, opposition parties clueless even after four years of Section 57 of Aadhaar Act being declared unconstitutional. Five years after Supreme Court’s verdict, no right to privacy law in sight, audit of UIDAI & Aadhaar schemes by CAG reveals Aadhaar Act as Black law

UIDAI’s Central Identities Data Repository (CIDR) of UID/Aadhaar Numbers and related sensitive information is akin to what Cathy O’Neil refers to as Weapons of Math Destruction while explaining the societal impact of the algorithm. It reveals how the use of big data and algorithms in a variety of fields, including education, and policing, insurance and advertising can lead to decisions that harm the poor, facilitate profiling for the minorities of all shades, reinforce racism, and amplifies inequality and creates a “toxic cocktail for democracy.” Her book won the Euler Book Prize of the Mathematical Association of America in 2019. Features used by UIDAI and its foreign technology solution providers are opaque, unregulated, and difficult to contest. They are also scalable, thereby amplifying any inherent biases to affect increasingly larger populations. These Weapons of Math Destruction are essentially Weapons of Mass Destruction.

press release



Unchecked surveillance]

Rising digital authoritarianism

Authorities are forcing providers of Virtual Private Networks (VPNs) to retain the names and addresses of their customers and their computer IP addresses.

VPN providers have  threatened to pull out of the country ]

Cybersecurity experts in India and globally called on the Indian Computer Emergency Response Team (CERT-In) to suspend the rules ]

the government body has delayed implementation until September. Experts' call for further consultation to protect Indians’ privacy and ensure a framework that "truly strengthens cybersecurity that empowers users in India."

A see-sawing transparency regime Sarkari Secrets  Venkatesh Nayak Venkatesh Nayak, Aug 14 2022  The Criminal Procedure (Identification) Act (CPI Act). Now, even a Head Constable or a Head Jail Warder may forcibly collect biometrics, behavioural data and biological samples from any crime suspect, or a convict, or anybody jailed under preventive detention laws. .. Judicial scrutiny about the necessity of such an exercise is minimal -- all in the name of improving the quality of forensics-based criminal investigation for securing a higher crime conviction rate. .. The Union Cabinet note justifying the need for the CPI Act..has (after an RTI) also become a Sarkari secret, like several others covering important policy matters and governance-related decisions.

Twitter hires ‘alarming number’ of ex-spies – investigation  in recent years the company employed “dozens of individuals from the national security state to work in the fields of security, trust, safety and content.”.. “Twitter also directly employs active army officers. In 2019, Gordon Macmillan, the head of editorial for the entire Europe, Middle East and Africa region was revealed to be an officer in the British Army’s notorious 77th Brigade – a unit dedicated to online warfare and psychological operations. 

Ultimately, MintPress found that Twitter is not the only social media platform that’s “cultivating such an intimate relationship with the FBI and other groups belonging to the secret state.”