Karl`s PC Help Forums

FYI: Win 10 Caveat Emptor Info
JackInCT - 27-8-2015 at 20:09

FYI: Win 10 Caveat Emptor Info: Digital Section--Q & A Section Of Today's NY Times (08/27/15)

Q. Is it true that Windows 10 records what I type on the computer? If so, why?

A. By default, Microsoft collects data from your interaction with Windows 10. This includes typing on the keyboard, using spoken commands or writing with a stylus on a tablet or touch-screen computer. As for recording your keystrokes, the company says it does “collect your typed and handwritten words to improve character recognition and provide you with a personalized user dictionary and text completion suggestions.” Some of this collected data is stored on your PC, but some of it is uploaded to Microsoft to help improve those tools.

Along with your typed, scrawled or spoken input, Windows 10 uses information from your Contacts and Calendar programs to “help personalize your experience,” particularly in interacting with the voice-activated Cortana software. Other virtual assistant apps, like Google Now and Apple’s Siri, also need access to your personal information for similar reasons, so Microsoft is not alone. Most apps these days also want to get the location information from your computer or device, for mapping and marketing reasons, so you see geographically relevant ads.

If you chose the “Get going fast” Express settings route over the more hands-on Custom option when you originally set up Windows 10, most of the data-sharing permissions are on by default. However, you can always go back into the system and change things. Keep in mind that by doing so, you may not be able to use some of the Windows 10 apps and services that need access to your information.

To adjust your privacy controls, go to the Start menu and select Settings; you can also press the Windows and I keys to open the Settings box. On the Settings screen, choose Privacy and go through the several categories of listed permissions until you feel more at ease.


marymary100 - 27-8-2015 at 22:22

Seems a bit "minority report". Allegedly to target advertising by location/interest but data being collated for other reasons.


LSemmens - 28-8-2015 at 06:30

And????? Tell us something new. ;)


Katzy - 28-8-2015 at 09:57

Their attitude is "Google have been doing it, for years, with Android, so...?"

Many companies are going to refuse to update to W10 and are looking at migrating to Linux.

Company data being splurged all over the net? If M$ can access it, you can bet that the nefarious can, too.


LSemmens - 28-8-2015 at 11:19

I've no argument with you there, Katzy, which is one reason I also tend to be a little wary of cloud storage.....


Katzy - 28-8-2015 at 20:52

I've never used it and I never will. :D


JackInCT - 29-8-2015 at 03:01

Quote:
Originally posted by Katzy
...you can bet that the nefarious can, too.


Question: would you include the USA's NSA among the "nefarious", and I feel safe in presuming as well as ALL the industrialized countries since they all have intelligence gathering services (and all highly automated too with the capability to translate any language).

They are all sitting on top of a treasure trove of our data and could make the proverbial pretty penny by going commercial and selling it on the open market. At least that would do away with the façade/farce of govt integrity.


Katzy - 29-8-2015 at 14:41

That, simply, is why governments have never tried to shut the net down. They can spy on ANYTHING you do.

Since 1998, it's been mooted that there have been chips, in computers, that log every keystroke and send it off, along with everything else. Indeed, Toshiba got caught out, with that, ages ago.

If I needed to send you something and ensure that nobody else could see it, I've thought of a way of doing it, funnily enough... :D


JackInCT - 29-8-2015 at 20:06

Quote:
Originally posted by Katzy
If I needed to send you something and ensure that nobody else could see it, I've thought of a way of doing it, funnily enough... :D


Just how many carrier pigeons do you have?:D


Katzy - 30-8-2015 at 09:19

Heh. :)

It's quote easy, really. I could attach something, here, for you to try to crack, if you fancy a challenge. :D


LSemmens - 24-9-2015 at 14:55

A bit more on Windoze privacy......or not!


Katzy - 25-9-2015 at 09:27

Trust... For me, that's never existed, between me, M$and Google.

Google don't track me, because I've made it so. M$ don't track me, either. They probably do, when I use my tablet, as that runs Android. But, I only use that to read e-books, anyway.

The thing is, I'm just a "User", to them. But, if I was a company member, who works with sensitive information, which I would never want disclosed to others, the last thing I'd ever use, is the cloud, no matter how great it is, according to M$'s ads. I certainly wouldn't install W10 on my computer system and I'd watch the W7 updates, carefully, too. Or, of course, I'd switch to Linux. But, even then, I wouldn't assume that I'm safe.

Nothing, on the net, is 100% private.

In fact, if I wanted to do something, on my computer, that was 100% private, the first thing I'd do is disconnect it from the net.

For me, the term "Trust" isn't in the internet lexicon, at all.


LSemmens - 25-9-2015 at 10:17

I tell everyone that, if you want to have a private conversation on the 'net think of it as standing on one side of the main road in your favourite city talking to your friend on the other side of the road. Anybody can hear what you say, very few will listen, one or two might stop and listen and possibly record it for posterity" If it's that secret, if I did "trust" my computer there would be no way that I would be storing it on that machine and I'd be running a drive wipe over it as soon as I'd finished.


Katzy - 25-9-2015 at 17:49

That sums it up beautifully. :)


JackInCT - 26-9-2015 at 15:55

This possible "workaround" crossed my mind re snoops type intelligence agencies intercepting my emails: IF I wrote an email offline (in any word processing type program), and then made a printscreen image file of its contents, and then attached that image file to an email (file attachment), since all the snoops are using an automated computer system to do the intercepts, i. e., untouched by human hands, would that keep these computers from reading the contents of my email; as far as I know, you need to use OCR tech to read the text in an image; I further presume that while these snoop computers are super-sophisticated, I would wonder if they really could have the capability to distinguish between a printscreen image file and a run of the mill photograph of Aunt Mary (since they both have the same file format).


LSemmens - 27-9-2015 at 02:36

You'd be surprised what the snoops can do. They can seem to detect other nasty images (child porn - e.g.) so why not text in an image. I suspect that you'd be better off encrypting your data in some way, and then using a VPN to transmit it.


JackInCT - 27-9-2015 at 18:10

Quote:
Originally posted by LSemmens
You'd be surprised what the snoops can do...


Plan B

Let me risk beating this to death, and offer up Plan B:

Suppose you take the printscreen image file of the text, and using just about any image file editor, chop (subdivide) the original file into, lets say, 4 "sections" which will become 4 image files. To further complicate the snoops "gear", you can, using the following options from the image file editor, (1) Rotate Canvas, (2) Flip Horizontal, (3) Flip Vertical, & (4) Flip Arbitrary each of these 4 separate files.

You then send the recipient the 4 files, and with the same image file editor, he stitches the 4 files back into one (after reversing the options).

I'm not going to underestimate what the snoops are capable of, but it would blow my mind if they have an automated computer program with an algorithm that can figure out my devious plan, and automatically reassemble the files, and with their OCR read my 'letter'.


LSemmens - 28-9-2015 at 05:59

Personally, that sounds like a lot of work, I'd be looking at some form of encryption using something like truecrypt or whatever has replaced it. Even a zip archive with a password inside another zip archive also password protected, might work.


Katzy - 28-9-2015 at 09:55

zip it. Password protect that, as you do it.

Delete the extension name.

Rar it, with password protection.

Delete the file extension.

Ace it, with password protection.

Delete the file extension

7zip it, LZX it, LHA it, gz it, KGB it, deleting the extension, as you go. Give it a file extension, when you've finished. Something innocuous, like .png, or summat.

Go as crazy as you like, with that. As long as the recipient knows the filetypes and passwords, they should be pretty safe.


LSemmens - 28-9-2015 at 10:52

My point perzackerlee!


Katzy - 28-9-2015 at 14:09

For secrecy, I'd use the more obscure archivers, like KGB, if I were to do this.

MIME types.


LSemmens - 29-9-2015 at 04:35

From what I have read, but it might be old, TrueCrypt has still to be broken even though it is no longer supported. Do you know of that one Katzy?


Katzy - 29-9-2015 at 10:18

I remember seeing that they advise TrueCrypt users to switch to BitLocker, as TrueCrypt "may contain unfixed security issues".

I've never had the need to encrypt anything, myself. Anyone can watch what I do, online. It doesn't bother me, other than the fact that their shenanigans will affect my bandwidth. So, I can't say whether any way of hiding something is any better than another, with good faith.

This is an area where the old Amiga was way ahead of Winderz. You never had to f@rt about with file extensions, or any of that rubbish. The system knew what the file was, whatever you named it. Always did, right from it's inception.


LSemmens - 26-10-2015 at 10:22

Installing W10 from scratch. Ok, by now we should all know that for the free upgrade to work you must first perform an in place upgrade and that M$ magically then knows that your machine is allowed to re-install Windoze and activate without having to go through the whole "Load the old OS and then Upgrade it to W10" process.

Here's the rub!!!! There are two versions of Windoze 10 apart from the 32/64bit difference, you also have "Home" and "Pro". So far, that sounds normal, except, with recent versions of Windoze you could get away with one disk to fix most problems. Not this time! I've just spent a day stuffing around attempting to convince my media server that I can perform clean install as I've already done my in place upgrade and activated it. Problem is, my media server was my only machine running W7 Ultimate which is what caught me out. That version upgrades to W10 Pro, all my other machines were W7 home which upgraded to W10 Home. Be warned You'll need a separate disk for W10 Pro to W10 Home. With W7 I only needed one disk, not this time.


Katzy - 26-10-2015 at 19:35

You've convinced me, more, that I'm gonna keep clear of W10.


LSemmens - 27-10-2015 at 00:53

Here's another issue: Windoze would not let me go past the Partitioning stage until I had unplugged ALL drives including USB drives except the one to which I was installing Windoze!!!!!! Srtangely enough, though it was happy to let me continue using the USB stick I was installing from!




Aaaaaarrrrgh! It has now decided that it did not like something else and has decided to cancel my installation!!!!!!! LINUX is starting to look more and more attractive by the day! (and I have issues with getting Linux to do what I need, too)