Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

How Microsoft is Lying

Name: Anonymous 2018-09-29 9:59

https://blogs.windows.com/windowsexperience/2015/09/28/privacy-and-windows-10/
This includes data like an anonymous device ID, device type, and application crash data which Microsoft and our developer partners use to continuously improve application reliability. This doesn’t include any of your content or files, and we take several steps to avoid collecting any information that directly identifies you, such as your name, email address or account ID.

1. IP address, time, geographical location and device ID could be reliably used to tract the user down, and used as evidence in the court. Microsoft also keeps track of what sites user visits, so if user visits child porn web site, Microsoft will know it, and police may know it as well.
2. Microsoft also receives memory samples, which may as well include information incriminating you, like say child porn pictures. Is there a guarantee Microsoft won't hint police if such data identifies pedophile?

https://answers.microsoft.com/en-us/windows/forum/windows_10-security-winpc/privacy-settings-feeback-and-diagnostics/f5a0eebc-82db-4786-9ba5-9c09182c5b5b
This option also lets us collect enhanced diagnostic information, such as the memory state of your device when a system or app crash occurs, as well as measure reliability of devices, the operating system, and apps.

Even before that, Microsoft was of great help to evil governments in persecuting innocent people, such as pedophiles, by for example making them unaware of hidden thumb.db files:
https://repo.zenk-security.com/Techniques%20d.attaques%20%20.%20%20Failles/THUMBS%20DB%20FILES%20FORENSIC%20ISSUES.pdf
As an example, a suspect in a child pornography
case could easily have hundreds of graphics stored
in their system in thumbs.db files.
Once created, they maintain information on each of the individual
files. If graphics files ar
e deleted from the folder, the thumbs.db file
will retain them. So, a suspect who
has deleted evidence of photos prior
to seizure of the computer, may still have thumbnail images of the
graphics stored in the thumbs.db files. These graphi
cs will remain, even if the folder is renamed or they
may be located in unallocated space as deleted files.
This can be potentially important evidence, espe-
cially in light of a suspect who denies t
hose types of files were on their system.

Name: Anonymous 2018-10-06 7:10

Can Microsoft even record what sites I'm visiting if I use Firefox + a VPN? What about if I use Tor?

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List