top of page

By:

Abhijit Mulye

21 August 2024 at 11:29:11 am

Shinde dilutes demand

Likely to be content with Deputy Mayor’s post in Mumbai Mumbai: In a decisive shift that redraws the power dynamics of Maharashtra’s urban politics, the standoff over the prestigious Mumbai Mayor’s post has ended with a strategic compromise. Following days of resort politics and intense backroom negotiations, the Eknath Shinde-led Shiv Sena has reportedly diluted its demand for the top job in the Brihanmumbai Municipal Corporation (BMC), settling instead for the Deputy Mayor’s post. This...

Shinde dilutes demand

Likely to be content with Deputy Mayor’s post in Mumbai Mumbai: In a decisive shift that redraws the power dynamics of Maharashtra’s urban politics, the standoff over the prestigious Mumbai Mayor’s post has ended with a strategic compromise. Following days of resort politics and intense backroom negotiations, the Eknath Shinde-led Shiv Sena has reportedly diluted its demand for the top job in the Brihanmumbai Municipal Corporation (BMC), settling instead for the Deputy Mayor’s post. This development, confirmed by high-ranking party insiders, follows the realization that the Bharatiya Janata Party (BJP) effectively ceded its claims on the Kalyan-Dombivali Municipal Corporation (KDMC) to protect the alliance, facilitating a “Mumbai for BJP, Kalyan for Shinde” power-sharing formula. The compromise marks a complete role reversal between the BJP and the Shiv Sena. Both the political parties were in alliance with each other for over 25 years before 2017 civic polls. Back then the BJP used to get the post of Deputy Mayor while the Shiv Sena always enjoyed the mayor’s position. In 2017 a surging BJP (82 seats) had paused its aggression to support the undivided Shiv Sena (84 seats), preferring to be out of power in the Corporation to keep the saffron alliance intact. Today, the numbers dictate a different reality. In the recently concluded elections BJP emerged as the single largest party in Mumbai with 89 seats, while the Shinde faction secured 29. Although the Shinde faction acted as the “kingmaker”—pushing the alliance past the majority mark of 114—the sheer numerical gap made their claim to the mayor’s post untenable in the long run. KDMC Factor The catalyst for this truce lies 40 kilometers north of Mumbai in Kalyan-Dombivali, a region considered the impregnable fortress of Eknath Shinde and his son, MP Shrikant Shinde. While the BJP performed exceptionally well in KDMC, winning 50 seats compared to the Shinde faction’s 53, the lotter for the reservation of mayor’s post in KDMC turned the tables decisively in favor of Shiv Sena there. In the lottery, the KDMC mayor’ post went to be reserved for the Scheduled Tribe candidate. The BJP doesn’t have any such candidate among elected corporatros in KDMC. This cleared the way for Shiv Sena. Also, the Shiv Sena tied hands with the MNS in the corporation effectively weakening the Shiv Sena (UBT)’s alliance with them. Party insiders suggest that once it became clear the BJP would not pursue the KDMC Mayor’s chair—effectively acknowledging it as Shinde’s fiefdom—he agreed to scale down his demands in the capital. “We have practically no hope of installing a BJP Mayor in Kalyan-Dombivali without shattering the alliance locally,” a Mumbai BJP secretary admitted and added, “Letting the KDMC become Shinde’s home turf is the price for securing the Mumbai Mayor’s bungalow for a BJP corporator for the first time in history.” The formal elections for the Mayoral posts are scheduled for later this month. While the opposition Maharashtra Vikas Aghadi (MVA)—led by the Shiv Sena (UBT)—has vowed to field candidates, the arithmetic heavily favors the ruling alliance. For Eknath Shinde, accepting the Deputy Mayor’s post in Mumbai is a tactical retreat. It allows him to consolidate his power in the MMR belt (Thane and Kalyan) while remaining a partner in Mumbai’s governance. For the BJP, this is a crowning moment; after playing second fiddle in the BMC for decades, they are poised to finally install their own “First Citizen” of Mumbai.

Who Took the Cookie Out of the Jar?

cookie

In today’s hyper-connected world, the word ‘cookie’ evokes more than just the buttery delights that accompany a cup of tea. Beyond the realm of nankhatai and chocolate chip confections lies another, far less appetizing variety: the digital cookie. These virtual snippets, invisible to the naked eye, are the linchpin of modern online functionality, facilitating everything from smoother website logins to tracking consumer habits. Yet, just as cookies crumble under a bite, so too can the veil of digital privacy when these data packets are misused.


The Good Cookies: Embedded in websites and stored on users’ devices, cookies were created to enhance online experiences. Their role in streamlining the digital journey is significant: session management, personalized browsing, and efficient data retention are just a few examples of how cookies can be beneficial.


Cookies: These ephemeral files exist only for the duration of a user’s visit. When a browser is closed, session cookies vanish. Their utility is most evident in maintaining a seamless experience. For instance, preserving login status or retaining items in a shopping cart.


Persistent Cookies: Unlike their transient counterparts, persistent cookies linger on devices for a predetermined time. They allow websites to remember user preferences, such as language settings or recurring login details.


First-Party Cookies: Cookies generated by visited sites enable core functions and basic analytics. When used responsibly, they enhance convenience and create a personalized digital experience. But as the saying goes, every rose has its thorn.


Not all cookies are benign. What starts as a simple text file can quickly become a tool for intrusion. The shift from convenience to compromise is seamless and often invisible to users.


While cookies aid data retention for targeted advertising, they also offer opportunities for cybercriminals. Browsing data can turn into exploitable digital dossiers, escalating tracking from ad personalization to security risks. This fuels a data brokerage industry where user data is compiled and sold, blurring the line between utility and intrusion. Cookies underpin this multi-billion-dollar market, often unbeknownst to users whose actions are part of a hidden auction.


One of the more insidious exploits, session hijacking, can be triggered through man-in-the-middle (MITM) attacks or Cross-Site Scripting (XSS). By stealing session cookies, cybercriminals can bypass login credentials and impersonate users. In cases of online banking or cryptocurrency platforms, the implications are severe. Reports from 2019 to 2020 highlighted a wave of incidents where session cookies were used to gain unauthorized access, leading to substantial financial thefts.


In sensitive sectors like banking, stolen session cookies let attackers impersonate users and access accounts without passwords, highlighting the need for strong security measures like encryption and multi-factor authentication. Persistent cookies are prime targets for phishing schemes, capturing data on fraudulent sites and enabling identity theft. Modern phishing campaigns use advanced techniques where cookies are key, embedding malicious code in legitimate-seeming emails or sites to deceive users into revealing data.


Persistent cookies also find their way into shadowy practices involving ‘supercookies’ and ‘zombie cookies’ - variations that can regenerate even after deletion. These are used to track user behaviour far more invasively, making it difficult for individuals to regain control over their data. Supercookies bypass conventional cookie management settings and, when combined with device fingerprinting, can build a uniquely identifiable profile of users that is nearly impossible to erase.


The banking sector, among others, has seen the risks of cookie exploitation play out in stark detail. In documented cases between 2019 and 2020, cybercriminals successfully stole session cookies to impersonate users, accessing accounts and draining funds. The response from the financial industry included ramped-up security protocols and increased user education—an acknowledgment that even the most innocuous digital elements can harbour latent threats.


Another high-profile incident involved a series of attacks on cryptocurrency platforms, where stolen session cookies were used to bypass two-factor authentication (2FA). This allowed attackers to infiltrate digital wallets and trading accounts, siphoning off significant sums and eroding trust in the security of such platforms.


To mitigate cookie risks, understanding their dual nature is essential. Users should clear cookies and browser history regularly, use tools to block third-party cookies, stay vigilant against phishing, and use HTTPS sites. Multi-factor authentication (MFA) adds a defence layer even if session cookies are compromised. Organizations need to educate users, update security protocols, use ‘HttpOnly’ and ‘Secure’ cookie attributes, and promote logging out when accounts are not in use to minimize risks.


Cookies, much like their edible namesakes, can bring comfort and delight or, in the wrong hands, create a mess. While they undoubtedly enrich the online experience when properly managed, their potential misuse calls for vigilance. Users must stay informed, and organizations must continuously bolster cybersecurity to ensure that digital crumbs do not invite unsavoury guests to the table.


(The writer is a cyber security expert and serves as a technical advisor to the Maharashtra government. Views personal.)

Comments


bottom of page