Without any processes ever running. Or any files of this data ever appearing or taking up space. Or any firewall rules allowing it access. Or data being sent. Ever. You... are aware of how computers work, right..?
Do you watch your processes all the time 24/7? What if the process is on for a second while you are looking away? Sometimes all it takes is a second to gather sensitive data. As for it getting access and sending data, windows update can allow that for those using updates.
Or any files of this data ever appearing or taking up space. Which is still unaddressed, even if this non existant process did ever run. As is Windows Update neither having access to or being shown sending this imaginary invisible data. Come on, how is it being stored? Where? Why has it never been found? Why has not one person ever observed this happen? How is this process - a disabled package - triggered to run? Surely you have some actual proof to present other than rambling speculation.
One minor note to that; Data being prevented from transmitting, or the ease of which people can go and see that these things are stopped, isn't opinion. It's factual, provable, testable, by anyone. It doesn't need defending any more than any other established fact does. It just is. The idea of mysterious untraceable processes, services, data logs that somehow take up no space and somehow get sent without being seen or showing in any way shape or form isn't opinion or speculation. It's utter, utter paranoid nonsense with no more backing to it than if I started claiming invisible unicorns visit their computers at night while they sleep and teleport the data without turning the computers on. It's a waste of time, and adds nothing at all. It should stop, because discussion needs to be focused on actual verifiable reality, not fantasy.
@mrbbq: And totally ignoring a proof of concept presented to you on a silver platter is utterly ridiculous and dangerous. Do you do real-time network monitoring on your system, 24/7? Are you completely aware of the contents of all upstream and downstream communication with Microsoft during Windows updates? Have you done any programming? What part of the source code in the link that I posted do you not understand? Please feel free to let us know. Veteran programmers such as myself will gladly take the time to explain it to you. :MJ
use it or lose it in that case why use Microsoft's operating system? go bite in to an apple or get a tux for free
@Eurisoph: What you say smacks of truth. But it makes no sense to accuse someone of this without providing proof. Others will look at the proof presented here and make the same determination that both you and I have made. But without that proof, I would only appear to be a ranting fool or an antagonist with an agenda. :MJ P.S. Welcome to MDL
Go gettem MJ. lol I know you know your sh*t. I wish I knew what you know...maybe one day I can catch up. lol
I'm an advocate agonist with an agenda for accurate information dissemination. We'll continue be increasingly more able to accurately control W10's behavior as time passes. That's all I have to say right now.
Rapid answer time; That is a proof of concept FOR RECLAIMING and/or blanking of data from SLACK SPACE, if you actually read the text; ...Not for hiding these undetectable files created by invisible processes and teleported by faries to blocked destinations - which still not one actual piece of evidence has been pointed at. Slack space CANNOT be used for that. I know - I've used slack space! Because, and again I quote; "writing meaningless data to the disc can become tragic if the byte offset from the beginning of disc is wrong ( the next cluster over can be a system file)" It is too unpredictable and small a space to be used. That's why people stopped doing it. Continuing; Yes, I do. Yes, I am. This is what firewall and traffic logging is for. As are the millions of other people out there who admin Windows systems - notice how none of them have ever reported anything odd? Again; If this data is being sent where is it? What processes are creating it despite them being NO LONGER THERE? How is it getting out of the system WHEN IT PHYSICALLY CANNOT DO SO AND IS NOT SHOWN TO DO SO? Yes, I have. Since the ZX Spectrum. People outside the US of similar age quite often have done actual programming to the metal. I've also worked for one of the three largest software developers and publishers in the world. One last time; Evidence, a shred of proof, anything other than distraction attempts, the mutual circle jerk of self reaffirmation going on, and something worth discussion please, please, please. 1) Evidence of a process running, a system file storing, even one single byte of logged data, after the tweaks and blocks and removals are applied. Surely with all this data you claim they're archiving that isn't hard, right? 2) An explanation of how this is sent when it is blocked from being sent. 3) How these things go on, utterly invisible to anyone or anything, for millions of users. Any of those will do. Nothing further will be responded to, because it is a waste of keystrokes debating when the other side has no data they can back it up with. I and others have humoured this conspiracy nonsense for long enough.
Who has the balls to start a counter-thread? [h=2]ALL of the Windows Anti-Spy Tweaks work! DATA MINING TERMINATED[/h] Don't look at me - they took my balls a long time ago.
@pf100: I look forward to your findings. I'd like to be able to tell others that I have a high level of confidence about Windows 10. :MJ