Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

How Microsoft is Lying

Name: Anonymous 2018-09-29 9:59

https://blogs.windows.com/windowsexperience/2015/09/28/privacy-and-windows-10/
This includes data like an anonymous device ID, device type, and application crash data which Microsoft and our developer partners use to continuously improve application reliability. This doesn’t include any of your content or files, and we take several steps to avoid collecting any information that directly identifies you, such as your name, email address or account ID.

1. IP address, time, geographical location and device ID could be reliably used to tract the user down, and used as evidence in the court. Microsoft also keeps track of what sites user visits, so if user visits child porn web site, Microsoft will know it, and police may know it as well.
2. Microsoft also receives memory samples, which may as well include information incriminating you, like say child porn pictures. Is there a guarantee Microsoft won't hint police if such data identifies pedophile?

https://answers.microsoft.com/en-us/windows/forum/windows_10-security-winpc/privacy-settings-feeback-and-diagnostics/f5a0eebc-82db-4786-9ba5-9c09182c5b5b
This option also lets us collect enhanced diagnostic information, such as the memory state of your device when a system or app crash occurs, as well as measure reliability of devices, the operating system, and apps.

Even before that, Microsoft was of great help to evil governments in persecuting innocent people, such as pedophiles, by for example making them unaware of hidden thumb.db files:
https://repo.zenk-security.com/Techniques%20d.attaques%20%20.%20%20Failles/THUMBS%20DB%20FILES%20FORENSIC%20ISSUES.pdf
As an example, a suspect in a child pornography
case could easily have hundreds of graphics stored
in their system in thumbs.db files.
Once created, they maintain information on each of the individual
files. If graphics files ar
e deleted from the folder, the thumbs.db file
will retain them. So, a suspect who
has deleted evidence of photos prior
to seizure of the computer, may still have thumbnail images of the
graphics stored in the thumbs.db files. These graphi
cs will remain, even if the folder is renamed or they
may be located in unallocated space as deleted files.
This can be potentially important evidence, espe-
cially in light of a suspect who denies t
hose types of files were on their system.

Name: Anonymous 2018-09-29 10:05

>>1
BTW, numerous services, like Steam, and Windows activation itself associate device ID with your credit card and other completely identifying your information:
https://support.microsoft.com/en-za/help/20530/windows-10-reactivating-after-hardware-change
A Windows 10 digital license is associated with your PC hardware. So if you make significant changes, such as replacing your motherboard, Windows will no longer find a license that matches your PC.

So yeah, Microsoft does collect everything police needs to identify you in a short amount of time.

Name: Anonymous 2018-09-29 10:24

BTW, it is very easy to keep thumbnail cache encrypted, using original image as a key, but Microsoft for some reason haven't done that, helping to incriminate its users. That proves that Microsoft first of all serves the interest of policing population.

Name: Anonymous 2018-09-29 12:27

What loungeramming language is this?

Name: Anonymous 2018-09-29 12:45

Make your're game

Name: Anonymous 2018-09-29 14:32

still using NSA/Windows
https://i.imgur.com/blur92Z.png

Name: Anonymous 2018-09-29 15:20

go away, creeps

Name: Anonymous 2018-09-30 6:46

FBI persecutes people based solely on IP address and device id (MAC) with a help of backdoor in Mozilla Firefox:
https://infoskirmish.com/2017/12/17/how-government-uses-malware-and-honeypots-to-find-you/
NIT, at that time, took advantage of a security flaw in the Mozilla’s Firefox web browser. It is no coincidence the TOR web browser is based on Mozilla Firefox and NIT exploited a security flaw in the underlying technology. Once NIT secretly installed itself and it’s dependencies onto the end-user’s (target’s) machine it then sent back to a government server the infected machine’s “…Internet Protocol (IP) address, operating system information, operating system username, and its Media Access Control (MAC) address…” (United States v. Horton). Because IP and MAC address can be masked / spoof, also included was a unique NIT generated identifier that the government server would use to ensure the data they were getting was coming from the same computer. Agents very likely could later use this unique identifier during physical forensic examination of a suspect’s computer to undoubtedly tie the physical computer to the data which they had earlier received.



So, yes, Microsoft completely confirmed working with terrorist American government to persecute innocent pedophiles.

Name: Anonymous 2018-09-30 17:03

Its ironic that pedophiles serve as canary in the coal mine for privacy. If some kind of privacy crisis looms overhead, the first victims will be pedos, since their exposure/incarceration/persecution is morally justified and supported by vast majority. In fact government can justify almost anything if its somehow can be spun as a measure targeting pedophiles.
That doesn't mean pedophiles aren't complete scum, their position as social pariahs is a lever that can be manipulated to gain public support for anything controversial - its a convenient tool to establishing a police state.
Lets take for example NSA(or any agency with internet surveillance capability), it has vast databases on anything on the internet and can possibly track every child porn site in real-time with its filtering algorithms. But its hampered by regulations limiting its activities to "global problems". Now suppose government wants to expands the legal surveillance powers of NSA:
All it needs to do is to make it seems the new powers granted are necessary to catch pedophiles(but of course can't be limited to just that thing. That is like releasing the genie from the bottle. Instantly gain near 100% public support and anyone voting against it will be labeled pedophile sympathizer by the media(i.e. ruining their political career). Counter-terrorism can be used in a similar way, but public opposition to encroachment on freedoms and vague definition of terrorist activity, makes this harder to push - there is actual opposition.
Pedophiles are in contrast are much harder to defend, so any measure against them will not create public opposition: i.e. debate will be severely limited by social climate.

Name: Anonymous 2018-09-30 22:20

>>9
That doesn't mean pedophiles aren't complete scum

Pedos born that way. That is not their choice. And pedos sitting at home don't harm anyone, so they are no bigger scum than the schizos, masturbating at ISIS beheading videos, with the only difference being that ISIS beheading videos are legal, while videos of naked children on the beach are not. But, nope, FBI doesn't bust mosque visiting schizos, who have bomb making manuals beside their Quran.

Name: Anonymous 2018-10-06 7:10

Can Microsoft even record what sites I'm visiting if I use Firefox + a VPN? What about if I use Tor?

Name: Anonymous 2018-10-06 7:11

I'm not a pedo btw, but I'm considering becoming a DNM drug dealer.

Name: Anonymous 2018-10-06 9:50

>>11
Microsoft has telemetry, which includes keylogger. Basically, Microsoft can access anything you type on keyboard. If FSB starts some anti-pedophile campaign, Microsoft can issue individual autoupdates for pedophilia suspect computers. They can also do screen grab or hash parts of screen, which then can be checked against childporn hashes. So yes, if you are a pedo and use Windows 10, then you're already on arrest list. FBI guys just don't want to catch all pedos in a single day, because then they will have no work and will get disbanded, losing jobs.

Name: Anonymous 2018-10-06 9:54

>>12
Forget it. Drugs market is controlled by government related people, who make huge fucking money from it (protection racket). They wont just arrest you like a pedo, they will fucking kill you, if you work without their permission.

Name: Anonymous 2018-10-06 9:59

>>14
Can confirm. I was growing weed under my bed and selling it online and one day I was being hung by my ankles off a yacht and told to stop, they said they were lostos mafia but it was pretty obvious they were CIA because of their Yale pedigree. Shit is real on the dnm.

Name: Anonymous 2018-10-06 10:49

>>15
Well, government guys can easily leak your identity to their mafia connection, which will murder you, skinning alive and publishing it at youtube. It is not a huge secret, that say Russian mafia is controlled by Russian government, even more, it is part of the government.

Name: Anonymous 2018-10-06 12:15

>>16
Doesn't youtube ban that stuff? Liveleak could be better.

Don't change these.
Name: Email:
Entire Thread Thread List