Current Affairs 12 December

12 December 2022

Content
1-On amending the cooperative societies Act
2-India urged to adopt ASEAN consensus on Myanmar
3-What is end-to-end encryption and why are tech companies focusing on it?
4-Example for Diplomacy
GS 2
Constitutional Amendment

On amending the cooperative societies Act

The Bill to amend the Multi-State Cooperative Societies (MSCS) Act, 2002, was introduced in the Lok Sabha on December 7.  Multi-State cooperatives are societies that have operations in more than one State — for instance, a farmer producer’s organisation which procures grains from farmers of multiple States. 

The amendments have been introduced to improve governance, reform the electoral process, strengthen monitoring mechanisms and enhance transparency and accountability. The Bill also seeks to improve the composition of the board and ensure financial discipline, besides enabling the raising of funds in multi-¬State cooperative societies.

According to the International Cooperative Alliance (ICA), cooperatives are people-centred enterprises jointly owned and democratically controlled by and for their members to realise common economic, social and cultural needs and aspirations. Multi-State cooperatives are societies that have operations in more than one State

International Relations

India urged to adopt ASEAN consensus on Myanmar

The five-point consensus of ASEAN includes

  1. An immediate end to violence in the country;
  2. Dialogue among all parties concerned;
  3. The appointment of a special envoy;
  4. Provision of humanitarian aid to Myanmar by ASEAN
  5. A visit by the bloc’s special envoy to Myanmar to meet with all parties as there has been a sharp surge in violence against civilians in Myanmar.
GS 3
Science and Technology

What is end-to-end encryption and why are tech companies focusing on it?

End-to-end encryption is a communication process that encrypts data being shared between two devices. It prevents third parties like cloud service providers, internet service providers (ISPs) and cybercriminals from accessing data while it is being transferred. The process of end-to-end encryption uses an algorithm that transforms standard text into an unreadable format. This format can only be unscrambled and read by those with the decryption keys, which are only stored on endpoints and not with any third parties including companies providing the service.

End-to-end encryption has long been used when transferring business documents, financial details, legal proceedings, and personal conversations. It can also be used to control users’ authorisation when accessing stored data.

End-to-end encryption is used to secure communications. Some of the popular instant-messaging apps that use it are Signal, WhatsApp, iMessage, and Google messages. However, instant messaging is not the only place where user data is protected using End-to-end encryption. It is also used to secure passwords, protect stored data and safeguard data on cloud storage.

GS 4

Example for Diplomacy-Ruchira Kamboij, India’s permanent representative to UN

Download pdf here

Leave a Reply

Your email address will not be published. Required fields are marked *

The maximum upload file size: 256 MB. You can upload: image, audio, video, document, spreadsheet, interactive, text, archive, code, other. Links to YouTube, Facebook, Twitter and other services inserted in the comment text will be automatically embedded. Drop file here