On 2016-04-21 23:10, Caponi wrote: > Šiaip jei tau pačiam iš tiesų įdomu, tai pirmyn pats googlint ar bingint, Spėju, jog jam neįdomu, nes jis jau "žino", jog čia "viskas gerai, normalu, taip turi būti, o visi kiti, kas su juo nesutinka, yra paranojikai" :) Copy > paste iš mano senesnio posto kitame treade apie telemetrijas ir kitus paslėptus "skanėstus": While users may disable some, for instance by using privacy tools (of which there are plenty), others cannot be disabled or stopped that easily, for instance because of hardcoded host and IP address information that bypass the Hosts file of the operating system. a long time member at dslreports says the following: www.msdn.com msdn.com www.msn.com msn.com go.microsoft.com msdn.microsoft.com office.microsoft.com microsoftupdate.microsoft.com wustats.microsoft.com support.microsoft.com www.microsoft.com microsoft.com update.microsoft.com download.microsoft.com microsoftupdate.com windowsupdate.com windowsupdate.microsoft.com You can't block above names with hosts file. They all were hardcoded in this DLL: %WINDIR%\system32\dnsapi.dll more terror about MS from long time poster at dslreports: All text typed on the keyboard is stored in temporary files, and sent (once per 30 mins) to: oca.telemetry.microsoft.com.nsatc.net pre.footprintpredict.com reports.wes.df.telemetry.microsoft.com Telemetry is sent once per 5 minutes, to: vortex.data.microsoft.com vortex-win.data.microsoft.com telecommand.telemetry.microsoft.com telecommand.telemetry.microsoft.com.nsatc.net oca.telemetry.microsoft.com oca.telemetry.microsoft.com.nsatc.net sqm.telemetry.microsoft.com sqm.telemetry.microsoft.com.nsatc.net Typing the name of any popular movie into your local file search starts a telemetry process that indexes all media files on your computer and transmits them to: df.telemetry.microsoft.com reports.wes.df.telemetry.microsoft.com cs1.wpc.v0cdn.net vortex-sandbox.data.microsoft.com pre.footprintpredict.com When a webcam is first enabled, ~35mb of data gets immediately transmitted to: oca.telemetry.microsoft.com oca.telemetry.microsoft.com.nsatc.net vortex-sandbox.data.microsoft.com i1.services.social.microsoft.com i1.services.social.microsoft.com.nsatc.net Everything that is said into an enabled microphone is immediately transmitted to: oca.telemetry.microsoft.com oca.telemetry.microsoft.com.nsatc.net vortex-sandbox.data.microsoft.com pre.footprintpredict.com i1.services.social.microsoft.com i1.services.social.microsoft.com.nsatc.net telemetry.appex.bing.net telemetry.urs.microsoft.com cs1.wpc.v0cdn.net statsfe1.ws.microsoft.com While the inital reflex may be to block all of the above servers via HOSTS, it turns out this won't work: Microsoft has taken the care to hardcode certain IPs, meaning that there is no DNS lookup and no HOSTS consultation. However, if the above servers are blocked via HOSTS, Windows will pretend to be crippled by continuously throwing errors, while still maintaining data collection in the background. Other than an increase in errors, HOSTS blocking did not affect the volume, frequency, or rate of data being transmitted.