Tema: Re: win10 vis siūlo
Autorius: Caponi
Data: 2016-02-12 02:25:53
Nu aš matau vieną išeitį - blokuot visą ta xuinią ant routerio.
Smallnetbuilder forumuose mačiau Asusų atšakoj ta tema jau kuris laikas 
kažkas vyksta, tik labai dar nesigilinau, ale gal reikės :-)


-- 
Caponi
http://caponi.skelbimai.lt/




"Bronco" <TRINTI_bronco.mail@gmail.com> wrote in message 
news:n9j56i$dlo$1@trimpas.omnitel.net...
> On 2016-02-11 18:30, Caponi wrote:
>> dalis su jobana "telemetrija"
>
> Su šituo reikalu tai MS "xod kaniom" padarė :) Ale, "aaa, tai jūs 
> neinstalinat mūsų nuostabiųjų Win10 tik dėl to, jog bijote telemetrijos, 
> tai še jums telemetrija ir į windows 7, turėkite! :))".
>
> Kaip ir logiška gaunasi, jei jau abi sistemos užšiktos telemetrijomis, tai 
> gal jau ir nebėra skirtumo win7 ar win10 naudot :)) Pridurkai, blin... :)
>
> O dabar truputį baisių istorijų papostinsiu, kad ramiau miegotumėte :]
>
> *********************
>
> While users may disable some, for instance by using privacy tools (of 
> which there are plenty), others cannot be disabled or stopped that easily, 
> for instance because of hardcoded host and IP address information that 
> bypass the Hosts file of the operating system.
>
> a long time member at dslreports says the following:
>
>
> www.msdn.com
> msdn.com
> www.msn.com
> msn.com
> go.microsoft.com
> msdn.microsoft.com
> office.microsoft.com
> microsoftupdate.microsoft.com
> wustats.microsoft.com
> support.microsoft.com
> www.microsoft.com
> microsoft.com
> update.microsoft.com
> download.microsoft.com
> microsoftupdate.com
> windowsupdate.com
> windowsupdate.microsoft.com
>
> You can't block above names with hosts file. They all were hardcoded in 
> this DLL: %WINDIR%\system32\dnsapi.dll
>
> more terror about MS from long time poster at dslreports:
>
> All text typed on the keyboard is stored in temporary files, and sent 
> (once per 30 mins) to:
> oca.telemetry.microsoft.com.nsatc.net
> pre.footprintpredict.com
> reports.wes.df.telemetry.microsoft.com
>
> Telemetry is sent once per 5 minutes, to:
> vortex.data.microsoft.com
> vortex-win.data.microsoft.com
> telecommand.telemetry.microsoft.com
> telecommand.telemetry.microsoft.com.nsatc.net
> oca.telemetry.microsoft.com
> oca.telemetry.microsoft.com.nsatc.net
> sqm.telemetry.microsoft.com
> sqm.telemetry.microsoft.com.nsatc.net
>
> Typing the name of any popular movie into your local file search starts a 
> telemetry process that indexes all media files on your computer and 
> transmits them to:
> df.telemetry.microsoft.com
> reports.wes.df.telemetry.microsoft.com
> cs1.wpc.v0cdn.net
> vortex-sandbox.data.microsoft.com
> pre.footprintpredict.com
>
> When a webcam is first enabled, ~35mb of data gets immediately transmitted 
> to:
> oca.telemetry.microsoft.com
> oca.telemetry.microsoft.com.nsatc.net
> vortex-sandbox.data.microsoft.com
> i1.services.social.microsoft.com
> i1.services.social.microsoft.com.nsatc.net
>
> Everything that is said into an enabled microphone is immediately 
> transmitted to:
> oca.telemetry.microsoft.com
> oca.telemetry.microsoft.com.nsatc.net
> vortex-sandbox.data.microsoft.com
> pre.footprintpredict.com
> i1.services.social.microsoft.com
> i1.services.social.microsoft.com.nsatc.net
> telemetry.appex.bing.net
> telemetry.urs.microsoft.com
> cs1.wpc.v0cdn.net
> statsfe1.ws.microsoft.com
>
>
> While the inital reflex may be to block all of the above servers via 
> HOSTS, it turns out this won't work: Microsoft has taken the care to 
> hardcode certain IPs, meaning that there is no DNS lookup and no HOSTS 
> consultation. However, if the above servers are blocked via HOSTS, Windows 
> will pretend to be crippled by continuously throwing errors, while still 
> maintaining data collection in the background. Other than an increase in 
> errors, HOSTS blocking did not affect the volume, frequency, or rate of 
> data being transmitted.
>
> ****************
>
> Žodž, kai eisite savaitgalį namie pro kompą, tai užsidėkite prieš tai 
> triusikus. Dėl viso pikto :]
>
>