UIDAI In Discussions With World Bank, UN To Develop Global Identity System

The UIDAI (Unique Identification Authority of India) is making efforts to develop global identity system and working with the United Nations and the World Bank to achieve it.
Gold Wars: From Demonetization To DeAurization. S11

The main cause of the financial ruin in the interval 2008-2012 was this currency manipulation, without any gold left to back it up. If the countries are not of European origin, they are all subjected to what we can now call as gold wars or pipeLine wars in which Iraq and Libya are knocked out […]
Are Indians Donkeys Or Rats Or Thieves of Carla Hills? Fingerprint The Thieves! S05

A US Trade Official, Carla Hills, had once triggered a massive outrage by calling Indians thieves and criminals. So, are Indians the Thieves of Carla Hills, the Thieves of the Bhagavad Gita or Unique Indian Donkeys of the UID Aadhaar project, or as the author of Mein Kampf would say — are we Rats following […]
Quantum Entanglement And The Indian Cavemen – S04

Did anyone of India’s theoretical physicists provide any input at all on the quantum entanglement theory and its role in both cracking the current Cryptographic Keys and in providing an in-theory-un-crackable key to the Aadhaar Project Managers? A Mathematical algorithm is used to calculate a number from the iris scan taken during the Aadhaar card […]
Indian Students Or Criminals Of Indian Government? S03

Are schools in India an automated production line converting Indian students to slaves? Don’t the managements no longer have the wisdom to think any better? Don’t they care whether the children of their schools are called criminals by their own Government? In addition to the well-known “PRISM” and “Boundless Informant” data mining programs being run […]
UIDAI Information Technologists Or Ill-Informed Monkeys? S02

Is the kind of complete negligence, carelessness and shabby-sloppiness exhibited by UIDAI to be the hallmark of Digital India? India is rumored to have made great strides in the field of Information Technology — or so we are told. While the public is treated to Big Words such as: “continuously updating security parameters” and “threats […]