Tema: Re: win10 vis siūlo
Autorius: Bronco
Data: 2016-02-12 01:24:02
On 2016-02-11 18:30, Caponi wrote:
> dalis su jobana "telemetrija"

Su šituo reikalu tai MS "xod kaniom" padarė :) Ale, "aaa, tai jūs 
neinstalinat mūsų nuostabiųjų Win10 tik dėl to, jog bijote telemetrijos, 
tai še jums telemetrija ir į windows 7, turėkite! :))".

Kaip ir logiška gaunasi, jei jau abi sistemos užšiktos telemetrijomis, 
tai gal jau ir nebėra skirtumo win7 ar win10 naudot :)) Pridurkai, 
blin... :)

O dabar truputį baisių istorijų papostinsiu, kad ramiau miegotumėte :]

*********************

While users may disable some, for instance by using privacy tools (of 
which there are plenty), others cannot be disabled or stopped that 
easily, for instance because of hardcoded host and IP address 
information that bypass the Hosts file of the operating system.

a long time member at dslreports says the following:


www.msdn.com
msdn.com
www.msn.com
msn.com
go.microsoft.com
msdn.microsoft.com
office.microsoft.com
microsoftupdate.microsoft.com
wustats.microsoft.com
support.microsoft.com
www.microsoft.com
microsoft.com
update.microsoft.com
download.microsoft.com
microsoftupdate.com
windowsupdate.com
windowsupdate.microsoft.com

You can't block above names with hosts file. They all were hardcoded in 
this DLL: %WINDIR%\system32\dnsapi.dll

more terror about MS from long time poster at dslreports:

All text typed on the keyboard is stored in temporary files, and sent 
(once per 30 mins) to:
oca.telemetry.microsoft.com.nsatc.net
pre.footprintpredict.com
reports.wes.df.telemetry.microsoft.com

Telemetry is sent once per 5 minutes, to:
vortex.data.microsoft.com
vortex-win.data.microsoft.com
telecommand.telemetry.microsoft.com
telecommand.telemetry.microsoft.com.nsatc.net
oca.telemetry.microsoft.com
oca.telemetry.microsoft.com.nsatc.net
sqm.telemetry.microsoft.com
sqm.telemetry.microsoft.com.nsatc.net

Typing the name of any popular movie into your local file search starts 
a telemetry process that indexes all media files on your computer and 
transmits them to:
df.telemetry.microsoft.com
reports.wes.df.telemetry.microsoft.com
cs1.wpc.v0cdn.net
vortex-sandbox.data.microsoft.com
pre.footprintpredict.com

When a webcam is first enabled, ~35mb of data gets immediately 
transmitted to:
oca.telemetry.microsoft.com
oca.telemetry.microsoft.com.nsatc.net
vortex-sandbox.data.microsoft.com
i1.services.social.microsoft.com
i1.services.social.microsoft.com.nsatc.net

Everything that is said into an enabled microphone is immediately 
transmitted to:
oca.telemetry.microsoft.com
oca.telemetry.microsoft.com.nsatc.net
vortex-sandbox.data.microsoft.com
pre.footprintpredict.com
i1.services.social.microsoft.com
i1.services.social.microsoft.com.nsatc.net
telemetry.appex.bing.net
telemetry.urs.microsoft.com
cs1.wpc.v0cdn.net
statsfe1.ws.microsoft.com


While the inital reflex may be to block all of the above servers via 
HOSTS, it turns out this won't work: Microsoft has taken the care to 
hardcode certain IPs, meaning that there is no DNS lookup and no HOSTS 
consultation. However, if the above servers are blocked via HOSTS, 
Windows will pretend to be crippled by continuously throwing errors, 
while still maintaining data collection in the background. Other than an 
increase in errors, HOSTS blocking did not affect the volume, frequency, 
or rate of data being transmitted.

****************

Žodž, kai eisite savaitgalį namie pro kompą, tai užsidėkite prieš tai 
triusikus. Dėl viso pikto :]