Nu aš matau vieną išeitį - blokuot visą ta xuinią ant routerio. Smallnetbuilder forumuose mačiau Asusų atšakoj ta tema jau kuris laikas kažkas vyksta, tik labai dar nesigilinau, ale gal reikės :-) -- Caponi http://caponi.skelbimai.lt/ "Bronco" <TRINTI_bronco.mail@gmail.com> wrote in message news:n9j56i$dlo$1@trimpas.omnitel.net... > On 2016-02-11 18:30, Caponi wrote: >> dalis su jobana "telemetrija" > > Su šituo reikalu tai MS "xod kaniom" padarė :) Ale, "aaa, tai jūs > neinstalinat mūsų nuostabiųjų Win10 tik dėl to, jog bijote telemetrijos, > tai še jums telemetrija ir į windows 7, turėkite! :))". > > Kaip ir logiška gaunasi, jei jau abi sistemos užšiktos telemetrijomis, tai > gal jau ir nebėra skirtumo win7 ar win10 naudot :)) Pridurkai, blin... :) > > O dabar truputį baisių istorijų papostinsiu, kad ramiau miegotumėte :] > > ********************* > > While users may disable some, for instance by using privacy tools (of > which there are plenty), others cannot be disabled or stopped that easily, > for instance because of hardcoded host and IP address information that > bypass the Hosts file of the operating system. > > a long time member at dslreports says the following: > > > www.msdn.com > msdn.com > www.msn.com > msn.com > go.microsoft.com > msdn.microsoft.com > office.microsoft.com > microsoftupdate.microsoft.com > wustats.microsoft.com > support.microsoft.com > www.microsoft.com > microsoft.com > update.microsoft.com > download.microsoft.com > microsoftupdate.com > windowsupdate.com > windowsupdate.microsoft.com > > You can't block above names with hosts file. They all were hardcoded in > this DLL: %WINDIR%\system32\dnsapi.dll > > more terror about MS from long time poster at dslreports: > > All text typed on the keyboard is stored in temporary files, and sent > (once per 30 mins) to: > oca.telemetry.microsoft.com.nsatc.net > pre.footprintpredict.com > reports.wes.df.telemetry.microsoft.com > > Telemetry is sent once per 5 minutes, to: > vortex.data.microsoft.com > vortex-win.data.microsoft.com > telecommand.telemetry.microsoft.com > telecommand.telemetry.microsoft.com.nsatc.net > oca.telemetry.microsoft.com > oca.telemetry.microsoft.com.nsatc.net > sqm.telemetry.microsoft.com > sqm.telemetry.microsoft.com.nsatc.net > > Typing the name of any popular movie into your local file search starts a > telemetry process that indexes all media files on your computer and > transmits them to: > df.telemetry.microsoft.com > reports.wes.df.telemetry.microsoft.com > cs1.wpc.v0cdn.net > vortex-sandbox.data.microsoft.com > pre.footprintpredict.com > > When a webcam is first enabled, ~35mb of data gets immediately transmitted > to: > oca.telemetry.microsoft.com > oca.telemetry.microsoft.com.nsatc.net > vortex-sandbox.data.microsoft.com > i1.services.social.microsoft.com > i1.services.social.microsoft.com.nsatc.net > > Everything that is said into an enabled microphone is immediately > transmitted to: > oca.telemetry.microsoft.com > oca.telemetry.microsoft.com.nsatc.net > vortex-sandbox.data.microsoft.com > pre.footprintpredict.com > i1.services.social.microsoft.com > i1.services.social.microsoft.com.nsatc.net > telemetry.appex.bing.net > telemetry.urs.microsoft.com > cs1.wpc.v0cdn.net > statsfe1.ws.microsoft.com > > > While the inital reflex may be to block all of the above servers via > HOSTS, it turns out this won't work: Microsoft has taken the care to > hardcode certain IPs, meaning that there is no DNS lookup and no HOSTS > consultation. However, if the above servers are blocked via HOSTS, Windows > will pretend to be crippled by continuously throwing errors, while still > maintaining data collection in the background. Other than an increase in > errors, HOSTS blocking did not affect the volume, frequency, or rate of > data being transmitted. > > **************** > > Žodž, kai eisite savaitgalį namie pro kompą, tai užsidėkite prieš tai > triusikus. Dėl viso pikto :] > >