The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.
← Previous page

    Windows 10's "upgrade" prompt has officially adopted malware-like tactics

    Discussion in 'Windows OS and Software' started by D2 Ultima, May 23, 2016.

  1. Mr.Koala

    Mr.Koala Notebook Virtuoso

    Reputations:
    568
    Messages:
    2,307
    Likes Received:
    566
    Trophy Points:
    131
    In before the flood of "but your Mac and Linux systems do exactly the same thing! I know it!" comments.
     
  2. ratinox

    ratinox Notebook Deity

    Reputations:
    119
    Messages:
    1,047
    Likes Received:
    516
    Trophy Points:
    131
    This is why, in addition to removing telemetry-related updates and telemetry-related services, I also tell the Windows firewall to block outgoing traffic to all of Microsoft's telemetry-related IP addresses. This is superior to null-routing in the hosts file because a number of the telemetry points use hard-coded IP addresses.
     
  3. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,567
    Messages:
    23,559
    Likes Received:
    36,826
    Trophy Points:
    931
    Can you guide me how to do that bro?
     
  4. ratinox

    ratinox Notebook Deity

    Reputations:
    119
    Messages:
    1,047
    Likes Received:
    516
    Trophy Points:
    131
  5. Spartan@HIDevolution

    Spartan@HIDevolution Company Representative

    Reputations:
    39,567
    Messages:
    23,559
    Likes Received:
    36,826
    Trophy Points:
    931
  6. Mr.Koala

    Mr.Koala Notebook Virtuoso

    Reputations:
    568
    Messages:
    2,307
    Likes Received:
    566
    Trophy Points:
    131
    You should do that on the router. The OS itself can override whatever it wants to without you knowing.

    Obviously the IPs can change without notice as well.
     
  7. ratinox

    ratinox Notebook Deity

    Reputations:
    119
    Messages:
    1,047
    Likes Received:
    516
    Trophy Points:
    131
    The Windows firewalls are part of the network stack. Bypassing the firewall would require telemetry to have it's own network stack capable of running in parallel with the system stack. While this is possible it is also very, very obvious.
     
  8. Mr.Koala

    Mr.Koala Notebook Virtuoso

    Reputations:
    568
    Messages:
    2,307
    Likes Received:
    566
    Trophy Points:
    131
    They can easily update the main network stack to either have a hard-coded override or respond to a special flag/pattern from the telemetry services. This is certainly easy to detect if you try, but to be honest the amount of 3rd party effort and information of Windows 10 telemetry analysis currently available to the public is way lower than where it should be. If MS starts to override it tomorrow, it will take a while before someone tells you about it.

    The incentive to do this, beside stopping users from disabling the telemetry, could come from defense against other malware or handling bad network connection as well. After all, they have already decided it's a good idea to use hard-coded IPs instead of a proper domain name system.
     
  9. ratinox

    ratinox Notebook Deity

    Reputations:
    119
    Messages:
    1,047
    Likes Received:
    516
    Trophy Points:
    131
    Again, this would be very obvious, and we would have seen it exploited by now. Neither of these are the case.

    What's out there and available to the general public is all there is -- and there's actually quite a lot of it. Literally everything that Windows telemetry services are capable of doing is thoroughly documented and the actual code as released to customers has been independently verified on numerous occasions to comply with all of that documentation.
     
← Previous page