Stories
Slash Boxes
Comments

SoylentNews is people

posted by LaminatorX on Saturday August 22 2015, @07:01PM   Printer-friendly
from the I'll-be-watching-you dept.

The administrator of AE News (an online news portal for Czech and Slovak expatriates) writes a very revealing article regarding the Windows 10 collection of user data. Here is the original Czech article. Here is a Bing translation to English. Here is a English condensed version translated by a blogger. And finally a PDF of the original Czech article.

In the post the AE News administrator states:

With the advent of Windows 10, I decided to undergo several tests. The collected knowledge for someone may be alarming. The Windows operating system 10 is essentially the end terminal, more than the operating system, because many of the processes and functions of this system is directly or indirectly dependent on remote servers and databases to Microsoft.

All text typed on the keyboard is stored in temporary files, and sent (once per 30 mins) to:
oca.telemetry.microsoft.com.nsatc.net
pre.footprintpredict.com
reports.wes.df.telemetry.microsoft.com

AE News also references an arstechnica.co.uk article which states it might be impossible to stop this communication:

And finally, some traffic seems quite impenetrable. We configured our test virtual machine to use an HTTP and HTTPS proxy (both as a user-level proxy and a system-wide proxy) so that we could more easily monitor its traffic, but Windows 10 seems to make requests to a content delivery network that bypass the proxy."

arstechnica.co.uk also "asked Microsoft if there is any way to disable this additional communication or information about what its purpose is". Microsoft did not reply as to a way to disable this chatter but did respond to the 'additional communication' stating Microsoft is now 'delivering Windows 10 as a service'.

Although the original source for this story is skeptical, Smart nerds on soylentnews can easily fire up Wireshark and reveal the communication for themselves. It appears that MS has fully embraced the cloud where your OS is now a terminal. And regarding privacy? Well, according to arstechnica.co.uk: Windows 10 privacy policy is the new normal


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Saturday August 22 2015, @08:24PM

    by Anonymous Coward on Saturday August 22 2015, @08:24PM (#226382)

    No it doesn't. Just monitor traffic to those domains. A very simple filter.

  • (Score: 0) by Anonymous Coward on Saturday August 22 2015, @10:04PM

    by Anonymous Coward on Saturday August 22 2015, @10:04PM (#226412)

    If your average russian botnet can use random domains so can micro$oft.

  • (Score: 1) by massa on Saturday August 22 2015, @11:09PM

    by massa (5547) on Saturday August 22 2015, @11:09PM (#226427)

    Let me fix that for you: JUST DON'T ALLOW ANY TRAFFIC TO those domains. Blacklist them on the router. And in the hosts file.

    • (Score: 5, Insightful) by tftp on Sunday August 23 2015, @02:11AM

      by tftp (806) on Sunday August 23 2015, @02:11AM (#226492) Homepage

      JUST DON'T ALLOW ANY TRAFFIC TO those domains.

      At some point you will grab your laptop and go somewhere else. There you will connect via an open WiFi, or through your friends' WiFi, bypassing your router... and you will notice that your laptop is happily uploading tens of GB of stuff that it could not upload from your home. Or... you are using wired Ethernet at home, but your neighbor has an open WiFi. Windows may activate the wireless card (what can you do about that? there are no mechanical switches) and connect. You will never know.

      It is very difficult to defend yourself because you need to close all holes, all the time, without seeing the code - whereas Windows needs only one hole, at least once. It is much safer to avoid using such an "OS". Even WinXP will be safer, with all ports closed at the built-in firewall, unless you surf the worst corners of the Internet with IE.

      • (Score: 2) by el_oscuro on Sunday August 23 2015, @02:39AM

        by el_oscuro (1711) on Sunday August 23 2015, @02:39AM (#226500)

        That is why my laptop is running Kali Linux: "The quieter you become, the more you are able to hear"

        --
        SoylentNews is Bacon! [nueskes.com]
      • (Score: 0) by Anonymous Coward on Sunday August 23 2015, @10:46AM

        by Anonymous Coward on Sunday August 23 2015, @10:46AM (#226635)

        and you will notice that your laptop is happily uploading tens of GB of stuff

        Despite repeated advice against it, my mother sold her soul and bought a Macbook, iPad and iPhone. Our once responsive though low Mb broadband connection instantly slowed to a crawl. The router revealed that the iShits were perpetually hogging all available bandwidth, making it barely possible to even load a web page on another computer. When I told the crapple fanboys at work they wouldn't even believe me.

    • (Score: 2) by Runaway1956 on Sunday August 23 2015, @02:22AM

      by Runaway1956 (2926) Subscriber Badge on Sunday August 23 2015, @02:22AM (#226494) Homepage Journal

      If I'm smart enough to use encryption and VPN's to bypass government censorship, then I suppose that Microsoft has probably figured that stuff out. Microsoft has been battling botnets long enough to have learned how to run one, don't you think?

      --
      Abortion is the number one killed of children in the United States.
  • (Score: 2) by hemocyanin on Sunday August 23 2015, @02:41AM

    by hemocyanin (186) on Sunday August 23 2015, @02:41AM (#226502) Journal

    No it doesn't. Just monitor traffic to those domains. A very simple filter.

    You assume that those are the only ones. To trust that all have already been found is sort of naive. To discover new ones requires actual monitoring.

    • (Score: 0) by Anonymous Coward on Sunday August 23 2015, @06:23AM

      by Anonymous Coward on Sunday August 23 2015, @06:23AM (#226570)

      To think the subject is prevention is odd. The subject is how to verify the stories claims easily. A filter on a traffic capture is just that. Please read in context before the ad hominems next time.

      • (Score: 2) by hemocyanin on Monday August 24 2015, @04:10AM

        by hemocyanin (186) on Monday August 24 2015, @04:10AM (#226833) Journal

        You're kind of thin skinned too aren't you?

        If Win10 only periodically phones home to the mothership, like just once a week, even being smart won't be enough, its going to take lots of effort to catch it in the act.

        That comment was to a starting comment wherein the writer wondered what the less-than-uber-geek was to do -- I can't figure out if that poster was being sarcastic or not about avoiding MS' products.

        So you see, when you responded to that blockquoted comment above with "just look at the specific cited domains", the context had nothing to do with story confirmation. In fact, the comment you commented on, was pointing out just how much work figuring out all the domains MS uses would be. In that context, your comment suggesting filtering on specific already known domains when the topic was to find out all the active domains, was -- to be extremely charitable -- naive.