Posted in Common Man, Financial Risk, Frauds, Human Tendency, Management Lessons, Media, Personality, Privacy, Relationship, Security, Show Off, Slogging, Social Networking Platforms, Technology, Victim

Flaunting too much on social networking platforms? – Beware you are being watched

Are you obsessed with flaunting too much on social networking platforms? Do you enjoy sharing all the events happening in your personal life with the virtual world? Is everyone in your network always aware about your travelling plans? Do you feel proud in flashing with the online community, your event calendar, which comprises of all the forthcoming events that you are planning to attend? If your head nodded against any of the above questions then better beware because you are being watched.

At the outset, let me make it very clear that your social networking account is solely your property and it’s only you who have the right to decide that what and how much you want to reveal about yourself and your activities with the virtual world. I am no one to stop you from sharing your stuff with whoever you wish too. I very well know that it’s none of my business to interfere in your personal life. Hence, this blog is not meant to question your personal choice in any manner, rather it’s an attempt to throw some light on the risk involved with opening up too much on social networking platforms. I urge everyone to read this blog with an open mind and also educate others about the risk they carry with their social networking accounts.

No doubt there is an ocean of data available on the subjects pertaining to the dangers and precautions to be taken while dealing with the virtual world. Still, all of us tend to make mistakes every now and then and hence we need timely reminders to save us from any unfortunate event that might occur otherwise in our life. As such, I have tried to jot down three of the most common practical mistakes visible on social networking platforms which make us vulnerable to a lot of threatening incidences.

The three most common mistakes on social networking platforms are excessive sharing of –

  1. Personal Information – If you feel proud to share your personal life and most importantly your pictures every now and then revealing yourself in expensive attires, displaying the places you often visit, your workplace, your contact details, exposing the details about your family members, name of your kid’s school or any place they frequently visit, etcetera. Then better be cautious because you and your family members are prone to very high risk. The social networking platforms are being watched from every corner and who knows you might soon be hosting an uninvited guest knocking at your door. Sharing of excessive information might also lead to someone stalking you. So it’s better for you to keep a check on things you want to share with others so that you don’t risk your life, as well as, the life of your closed ones. Now next time before sharing too much of your personal information make sure that you at least have a Z+ security by your side to safeguard you from any kind of unwanted incidences happening in your life.
  1. Travel Plans – One of the biggest blunders being committed on social networking accounts is to share the travelling plans. I mean just imagine that you are leaving your home and you publish that information in front of the entire world. By this kind gesture of yours “especially towards the thieves” you not only open your gates for them to trespass your home with utmost ease but, at the same time, you also put the life of your loved ones back home, at stake. Just because you want to flaunt in front of the entire world that you are travelling to different locations on business, personal or vacation trips, you publish such critical information, which in itself is a sufficient data for a person with malicious intentions to take advantage of. Such casual posts of yours, act as the most vital information about your absence from the place of residence. Don’t forget that in this data mining age your account details could very well be churned up based on your past information to extract details such as the most likely time for your next vacation trip, etcetera. Now you can just imagine how safe you, your family members and your property back home is, after that post of yours. Isn’t it a suicidal attempt?
  1. Event Calendar – If you feel proud in flashing with the online community, your event calendar consisting of all the forthcoming events you are planning to attend in the near future, then it’s the right time for you to hear the danger bell ringing exclusively for you. No doubt you get that urge to exhibit in front of the entire world, the prestigious events (which others can’t afford to go) or even the social gatherings you are going to attend, but by this small act of yours, you simply give an opportunity to someone with malicious intentions to either stalk you or even trespass your place in your absence. Showcasing things to the outside world may be a matter of extreme pride for you, but do give it a thought that is your over flaunting attitude somehow making your life too prone to unwanted risk or what.

However, one could easily counter on this by replying that sharing their personal stuff is a means of being in touch with other people. If they wouldn’t be sharing all that, then such platforms would never have been a real success. If people like them don’t flaunt themselves on such platforms then how would others be able to pass their time? It’s only because of people like them who share the so-called interesting stuff that others get the opportunity to peek into their life and enjoy. To all this, I would simply like to say that we are extremely obliged to them for sharing their personal stuff in abundance and we also look forward to more and more “personal” stuff coming from them.

Now, it’s up to you whether you want to “Share Smartly or Simply Share”. The choice is yours after all life is yours. Further, if you think that sharing your details only with “Friends” or “Friends of Friends” is quite safe, then sooner or later this bubble of yours will get burst too, because when the social networking accounts of big personalities are easily being hacked then you can just imagine how safe your account is.

As rightly said by Mr. Johann Wolfgang von Goethe “Precaution is better than cure”, so let us all be cautious before any unfortunate event happens with anyone of us because of our excessive information sharing attitude. Everything has a positive and a negative side attached to it and it’s for us to decide and take advantage of the positive side, while not getting carried away by the negative side. Stay safe and do take a very good care of yourself and everyone around you. Be guided and share the information with others too. Act smart and make use of the social networking platforms wisely.

Be in touch.

God Bless!

Peyush Jain

Posted in Common Man, Crime, Government, Investigation Agencies, Management Lessons, Peace, Privacy, Security, Slogging, Technology, Terrorism, Terrorist, Victim

Apple Inc. vs. FBI – Is it a clash between Privacy and Security?

In this blog let us dissect from a “layman’s point of view” the major issue that has popped up from the much talked about legal case between the company named Apple Inc. and the Federal Bureau of Investigation (FBI), over the decryption issue of an iPhone (Smartphone), which is alleged to be used by a convicted person in the San Bernardino terrorist attack. The most important question that the aforementioned case evokes in our mind is that “what is more important for us, Privacy or Security”?

At the outset, let me make it very clear that this blog is not meant to take sides of any of the parties concerned in the said case, which is pending before the court of law. However, this blog talks about a serious issue which is going to arise in front of every country and their citizens in the near future, as the technology keeps climbing the advancement stages. This clash between humans and technology is going to take a more extreme form in the days to come. So let’s be prepared to enjoy the technological growth, face the new challenges and bear the consequences in the near future.

In this blog, I have taken reference of the Message dated 16th February 2016, communicated to their customers, by Mr. Tim Cook, CEO of Apple Inc. Although, I have cited the relevant points of the said message at relevant places in this blog, however, for the complete message kindly check the company’s official website. (Source:

In his message, Mr. Cook has strongly opposed the United States government order demanding decryption of the iPhone. He claims that this government order not only threatens the security of their customers but also has implications far beyond the legal case at hand. Let us see if this message is clear enough on all the points that arise in our mind or is it that some very important questions are still left unanswered. Mr. Cook has tried to clarify Apple’s stand in 4 points. So, herewith, let us try to comprehend all those points, along with the blogger’s view on the respective points –

1. The Need for Encryption

Apple’s stand – All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple, we are deeply committed to safeguarding their data.

Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.

For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach because we believe the contents of your iPhone are none of our business.

Blogger’s View – Apple’s stand on encryption and commitment towards safeguarding a customer’s data is quite clear and appropriate. There is no argument on the point that all the information needs to be protected without fail from hackers and criminals. Indeed, we all, as a customer, do expect technology companies to protect our personal information and no exceptions should be tolerated on this front by any company or individual. At the same time, we also need to ask ourselves that do we want to safeguard the information that any criminal might be using against anyone of us. Will this not lead to putting the personal safety of the masses at risk?

It is rightly said in the message that information needs to be protected without fail from “hackers and criminals”. Now the only doubt that I have in my mind is that, on one hand, we are talking about protecting our database from hackers/criminals, while on the other hand, we are letting the other criminals use our “protecting measures”, as a shield against all the criminal activities in which they are involved into. Isn’t this contradictory to our very own purpose? First of all, we should be clear in our mind that whose data we want to protect. Can the same rules be applied to an innocent individual, as well as, a criminal? Shouldn’t there be a difference in approach while dealing with a criminal?

2. The San Bernardino Case

Apple’s stand – We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.

When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.

We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software – which does not exist today – would have the potential to unlock any iPhone in someone’s physical possession.

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

Blogger’s View – Every sane person will undoubtedly condemn any kind of illegal activities and terrorist attacks. We all mourn for the losses of life and sympathies with all those affected by such cruel attacks, anywhere on this earth. We all want justice and stand united against all the terrorists. As claimed, Apple has taken every effort which was within their power and within the law to help in the investigation. This is worth appreciating and it would be right to mention here that it is the responsibility of each one of us to cooperate and help with the investigating agencies in each and every single case.

Further, it is being mentioned that “But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create”. Herewith, the 4 words in the above statement i.e. “too dangerous to create” caught my attention. After reading those 4 words, I stopped for a minute and questioned myself that what could be more dangerous than innocent people being killed in a terrorist attack. Atom bombs, nuclear bombs, hydrogen bombs and all other destructive weapons are dangerous, but still, we create it in the name of our safety.

I can very well understand the implication that this creation will have when it passes on “in the wrong hands”. But isn’t that risk attached to each and every single activity? Aren’t all the technologies dangerous if they reach in the wrong hands? Aren’t we all bound to live with the risk of destructive weapons reaching in the wrong hands? So, can decrypting a terrorist’s iPhone pass this test of “dangerous to create”?

It is further being quoted that “They have asked us to build a backdoor to the iPhone”. Since I am not an expert in the field of technology, so I won’t be able to comment much on the same. However, I seriously think that if we do not agree to any suggestion then we should come up with another suggestion or try to figure out any other possible option, instead of straight away discarding the possibility of taking any course of action. I do hope that those who can build such powerful encrypted software could surely come up with a technology which could be used to decrypt the same, without weakening the privacy of other users. If this is not feasible then any other solution could be figured out, but only if we desire to reach on to some solution.

3. The Threat to Data Security

Apple’s stand – Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers – including tens of millions of American citizens – from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.

Blogger’s View – As per my personal views, decrypting any encrypted software could never be a simple solution. It’s a tough task that requires expertise. As far as, the basics of digital security and the significance of the government demand are concerned, a generalized view could not be applied to each and every single case. Cases which are pertaining to the security of the people and wherein the life of innocent people are at stake, needs to be looked upon with a larger perspective.

The last line in the above mentioned point states that “Criminals and bad actors will still encrypt, using tools that are readily available to them”, which means that even Apple agrees to the fact that the criminals and persons with malicious intentions are always working hard in decrypting all the encrypted software’s in the world, in which they are interested. Doesn’t it mean that no system is full proof? If we agree to this fact then wouldn’t it be advisable for each and every single company which is responsible for the protection of the data to be upfront in decrypting their own software to find out bugs, even before their system is hacked by other hackers/criminals? I am sure all the big technology companies must be having such teams in their research wings. If this sounds feasible enough, then there is a slight possibility of decrypting the iPhone used by the terrorist. If not, then for sure the learned and experienced technical persons can come up with some way out to tackle this decrypting issue.

I completely agree with the concern raised in the above-mentioned point that “Once created, the technique could be used over and over again, on any number of devices”. However, let us take a hypothetical situation wherein one has to enter a premise captured by the terrorists, which has been locked by an encrypted lock which could only be unlocked by decrypting the lock. Now, tell me in this situation, will we back off from decrypting this lock just because all other similar locks could be decrypted post we create that decrypting software? Doesn’t that tantamount to providing a shield to the criminals? Now, it is for each one of us to think with a sound mind and decide that what should be our priority in such crucial situations, security or privacy.

It is also mentioned that “The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers”. Well, if the government is asking to decrypt all the users, irrespective of being a criminal or not, then without any second thought we can say that Apple has rightfully done in declining that demand straight away. But if that demand is only to decrypt the iPhone of a specific terrorist then it could not be generalized by saying that the government is asking Apple to hack their own users. I leave it on your good sense to decide whom we consider as our customers the innocent people or the terrorists?

4. A Dangerous Precedent

Apple’s stand – Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.

The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.

Blogger’s View – As I am not a subject matter expert so it would not be right on my part to comment on the specific act applicable to the United States. However, with regard to implications of the government’s demands as mentioned in the above point, I would like to once again state that “if the government is asking/asks in future to decrypt all the users, irrespective of being a criminal or not, then without any second thought, such demands should straight away be declined by the concerned company.

Now, I would like to end this blog with these thoughts that sooner or later we all will have to decide whether technology could be allowed to compromise the security of a nation and its citizens or not? What should be our priority, Privacy or Security? Could anything be more important than the life of a living being? Could governments be allowed to break into our privacy in the name of our security? As far as, standalone viewpoints of both the parties i.e. Apple Inc. and FBI, are concerned there is nothing wrong with them. None of the parties could be said to have bad intentions. However, we do hope that the parties concerned looks into the matter with a larger perspective and are able to reach on to some consensus. Finally, it’s for the court to decide the outcome of the case, so let’s wait and watch what lies in the womb of future.

I hope this blog will compel our mind to think on a serious issue which is going to hit every nation and citizens thereof, in the near future. It’s the right time that we take necessary action to overcome any future obstacles that can arise due to technological advancements. The need of the hour is to strike the right balance between technology, privacy, and security.

I wish the almighty bless us with good sense. God bless you all!


Peyush Jain

Posted in Belief, Common Man, Hope, Human Tendency, Inspiration, Management Lessons, Slogging, Technology

Smartphone in Rs. 251 – Why can’t the ringing bells be heard in that amount?

There is a lot of fuss about the ambitious project of providing ‘Freedom 251’ smartphones in just Rs. 251/-, by the company named ‘Ringing Bells’. Many fingers have been raised and doubts have been placed on the very thought that “a smartphone can be made available in a nominal amount of just Rs. 251/-”. Not only the competitors (as obvious) but also the experts, common men, as well as, the virtual world’s productive souls on social media, have grabbed this opportunity to thrash away any possibility of this sort to come true in the real world. Obviously, it’s for the experts to comment on the feasibility of providing a smartphone in that amount, but still, there could be a different perspective to such issues which has to be looked upon by keeping the set parameters aside for some time.

Note: Let me make it very clear that I haven’t booked the “Freedom 251” smartphone, firstly because I am not smart enough to own smartphones and secondly as the amount of Rs. 251/- is also beyond my capacity to afford it. As such my thoughts in this blog are not biased. This blog is not to defend this ambitious project or to analyse about its feasibility. But this blog is to dig on the more prominent issue of Human Tendency to doubt every new thing with utmost negativity.

History is the witness that every time a new idea is brought forward by ‘someone else’, we humans have the tendency to not only kill that idea but also, we don’t leave any chance of demotivating and cursing the originator of that idea. Usually, this human tendency is seen against the newbies in the respective field. Once, the entrepreneurs have made their mark in any field, their next idea/step is mostly not slashed away or questioned “in the light of being impossible to achieve”, even though that idea may be too crazy or far from reality. Ever thought that why are we so cruel towards any new idea of other human beings?

When the world showed faith in an Indian, Mr. Ratan Naval Tata, who dreamt of providing a car in just Rs. 1 lakh (which later on became a reality), when the people can believe and lay confidence on the project of travelling to Mars and book their seats in advance, at the same time, when the first low-cost airlines could reduce the airfares substantially to provide the facility of travelling by air with the cheapest air fares, than why can’t a smartphone be made available in just Rs. 251/- or for that matter may be in an amount less than that?

The experts can rightly question the feasibility by analysing the ‘existing’ technology and cost involved in any project. But can they brush aside any possibility of a paradigm shift in the technological field, which may help in reducing the cost substantially? Herewith, I am not discarding the chances that such schemes could be the company’s marketing strategy to gain public attention and be in the news even though being a new entrant in the field or may be such schemes are solely aimed with the intention to commit fraud, etcetera. However, the question is that how can we reach this conclusion even without looking into the details?

If we doubt anything we should first analyse that very thing in detail, before jumping on to the conclusions. I do hope that the experts analyse the case in detail before thrashing away any idea. But do we, as a layman, ever back our judgements with any solid analysis? Don’t we all judge everything with our pre-conceived notions or flowing with the wind of rumours? Is it that we want everyone else to fail in their endeavours, just because we don’t have the courage and confidence in ourselves to work on our ideas? Do we envy others success?

There is nothing wrong in having different views, but at the same time, there is also nothing right in dismissing any idea altogether, without even looking into and understanding the thought process behind that idea. For example, no one compelled us to book the smartphones in Rs. 251/-, all those who booked may be the ones who either placed their belief in that idea or the ones who are comfortable in keeping their hard-earned money at stake.

Herewith, let me make it very clear that I am not advocating that we should believe everything with closed eyes and ears. I am a student of the school of thought that believes in being cautious and taking every step with utmost awareness. I am against any kind of Ponzi Schemes which are designed to trap people and run away with their hard earned money. At the same time, I also don’t promote discarding and demotivating any new ideas. If we believe that the idea is worth and the originator is committed to achieving it then nothing should stop us from showing our support and motivating the idea, as well as, the brain behind the same.

Like other revolutionary changes, a smartphone at a nominal price of Rs. 251/- could be a reality in the near future. Who knows, one-day smartphones are available in nominal price to hone the hands of the already smart common men and we hear ringtones like “Ringing Bells, Ringing Bells, Ringing all the way”. Let’s wait and watch, because there is a slight possibility that it may turn out to be the next ‘Nano’ in the mobile field. If not this company, then any other, could surely take it up as a challenge and show the world that if one decides then nothing is impossible.

Peyush Jain

Posted in Equality, Free Basics, Freedom, Hindustan, India, Net Neutrality, Slogging, Technology

Free Basics vs. Net Neutrality in the light of Freedom

A lot of material is available to guide on the concept of free basics and net neutrality. Enough has been said about both these things that there is nothing new I could bring on to the table. At the same time, being a layman my understanding about these terms is, as good as, a drop of water in an ocean of knowledge. As such, at the start of this blog let me make it very clear, that this blog may not enhance the knowledge about free basics or net neutrality, but for sure this blog will throw some light on the mindset of people behind pioneering these concepts. This blog is dedicated to people who vomit their filthy thoughts by advocating British dominion over India just because they were not able to materialize their plan of snatching away the freedom of the virtual world. This blog is an attempt to view free basics and net neutrality in the light of ‘Freedom’.

First of all, let me describe from a layman’s point of view, what do the terms free basics and net neutrality actually means. Free Basics, in this context, means that access to the basic services of internet shall be available free of cost i.e. without any charges (or may be at nominal charges). While Net Neutrality, in this perspective, means the availability of a neutral internet platform i.e. an unbiased internet connection regardless of the source and without favouring or restricting anyone, for that matter. Both these concepts seem noble, right? But, wait a minute, before we jump on to any conclusion, let us dig and find out the real agenda of the people, behind initiating these noble concepts in the virtual world.

Free Basics, indeed sounds a noble thought when seen in the light of the simple meaning of the term, but as it is said that the grass may not be as green, as it appears to the plain eyes. In the same way, there is a hidden agenda behind bringing up this so-called ‘social cause’ of free basics into the virtual world and in order to know the reality we need to look beyond the upper layer of the grass. The concept of free basics is based on the thought that basic access to the internet shall be provided free of cost, while the advanced usage, shall be charged based on personal tie-ups among the telecom providers and the respective companies etcetera. It means that not only the tariffs shall be discriminatory based on company to company, as decided by the originator, but at the same time, the originator will also have the right to permit or restrict the websites/applications from appearing on the free basics platform, solely based on the preference of the originator, as per their tie-ups/rivalry with the respective companies.

It would not be wrong to say that Free Basics is the first step of dominion over the virtual world by the people who don’t care for the freedom “in real sense”. On the contrary what they actually care about is merely their self-interests. I mean there is nothing wrong in doing business, but stop fooling people in the name of charity or social cause. Don’t cover up your hidden agendas in the blanket of social service. In a way, Free Basics is based on the same divide and rule policy adopted years back by the British to rule over India, but in a different packaging and platform this time.

Now, in order to curb the ill effects of the hidden agenda behind free basics, the concept of Net Neutrality arises. As defined above, net neutrality advocates a neutral internet platform that is provided irrespective of any personal tie-ups etcetera. Net Neutrality does not differentiate the usage of internet based on the source from which it originates, as well as, it does not favour or restrict the website/applications from appearing during the usage session. It is completely against the whole concept of a differentiated virtual world, which is for the benefits of the few business houses, who wants to snatch away the freedom of virtual world, in the same way, like people enjoy snatching away the freedom of others in the real world by ruling and dominating over the countries and the mindset of the people residing over there.

In the above paragraph, I deliberately mentioned the phrase “snatching away the freedom of the virtual world” because the mindset of the person governing the companies was recently reflected in the tweets of one of the members of the Board of Directors of the same company which initiated the concept of Free Basics. In his tweet, the person concerned left his ‘Mark’ by saying that “India would be basking in a brighter economic reality if it remained under British rule and didn’t bother with ‘anti-colonialist’ ideas like net neutrality”. Wow, Mr. Intelligent, you really did open our eyes and it was nice to know the thoughts of advocators of free basics about the freedom of a nation.

Mr. Intelligent, I want to throw some questions towards you and as I am not using your Free Basics platform, so I do hope that I don’t need your permission before asking these questions. Mr. Intelligent, please guide us that how could anyone who advocates dominion of other countries, could be trusted to be a believer of anything that comes ‘Free’? Isn’t there any hidden agenda that you wanted to materialize in the name of the social cause? Just because your plans could not be successful does it give you the right to vomit filthy comments on public platforms against a peace loving nation?

Mr. Intelligent, we enjoy our Freedom, but we are not FreeDumb that you can compel us to believe and act as per your wish. Who better than an Indian would know the true worth of Freedom? We love freedom and won’t let our freedom to be snatched away by anyone, for that matter. We very well know how useful and important social networks are these days, but no not at the cost of anyone attacking the pride of our Motherland. You crossed the limit which is not expected from anyone who is holding a post of high calibre.

Although, you had to delete your tweets, as well as, had to publicly apologize later on for your act, at the same time, your colleagues also had to sideline themselves from the tweet of an ‘important’ person of their organisation. But still, it was too late, as the arrow had already left the bow and the entire covering up actions was not enough to hide the real agenda of you people, who went crazy when their biased concept of Free Basics was slashed away by the Telecom Regulatory Authority of India (TRAI). Hats Off to TRAI for taking up a bold step in chasing away Free Basics from the virtual boundaries of Motherland India.

Mr. Intelligent, it’s only you and the people around you, who knows whether your apology was a real one or not, in the sense that you actually wanted to apologize from your heart or not, for whatever you said. I know many actions in the corporate world are to be taken in compulsion, and as such, at times people have to do things against their will, as well. Everyone is aware of the fact that people have to apologize at times in the light of losing a big market like India. But still, I hope that you really felt bad about your thoughts, actions and you would not repeat such thing with any other person or nation in the future. At the same time, I also believe that no one else around you shares the same thoughts like you did.

Mr. Intelligent, although, you said “Good Bye India”, but in reality, none of the businesses and countries can stay away from our developing nation with immense opportunities and a large user base. So next time think twice before vomiting poison against anyone. Just to apprise you Mr. Intelligent, many of the world’s largest companies are headed by Indians like Mr. Satya Narayana Nadella (Microsoft) and Mr. Sundar Pichai (Google), who are of Indian origin. We Indians are proud of all our countrymen who are leaving their mark all over the world and glorifying the soil of their Motherland. Who knows one day your organisation may also be headed by an Indian. “This is an advice to you Mr. Intelligent that never disgrace any country whether small or big and never hurt the sentiments of any true countrymen”. It’s this attitude of treating others with inequality that had led to the downfall of many organisations and people in the past. Hope, you realize your mistake and don’t repeat it in the future. Once again, we Indians remind you that freedom means Net Neutrality and not discrimination with Free Basics. So think about it and do join our endeavour of keeping the virtual world free “in real sense”.

At last, this unknown citizen of a world famous Independent Largest Democratic nation called INDIA, wish that the almighty blesses everyone with good sense and may they get well soon from the sick thoughts running in their mind.


Peyush Jain