Thanks already read it. I should stop listen people spreading FUD about windows telemetry and start listen to people like you. Didn't have time (read excuse to laziness here) to setup a sniffer and see by myself what is transmitted. Seems a lot of people will render windows 10 in an unusable piece of *** removing essential things in a foolish attempt to stop telemetry.
there pros and cons to any method using blocking via firewall and making change to OS might make it slower due more resources using to fillers and increase the risk OS will behave unproperly when protocol is disabled its avoid starting the process, which save lots of IO and Microsoft will make change to OS when new update installed make it back to normal as they did before anyways win10 is almost dead to me due evolving of NWO eula
TinyWall in theory should block the telemetry entirely. However, it's using the Windows Firewall, what guarantee do we have that stuff is not bypassing the firewall ?
Did you guys saw the menu: Computer Management > Performance > Data Collection > Startup Event Trace Sessions There are plenty of loggers there
if someone gets a chance to test the program in my previous post today, Id appreciate it. I haven't time till later in the week to really sit down and give it a good look-see. TIA
A couple of questions for the very experienced here: Is there a preferred, or at least better choice of firewall than the stock windows firewall? Can the effectiveness of firewalls be tested and compared by programs such as wireshark?
I've run Peerblock on 8.1 , 7 and 10 and results show this not to be true. No MS chatter in 8 and 7 while 10 is constant even with everything shut off.
Do users realize that this only to turn off getting Windows Malicious Software Removal Tool through WU? Code: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t REG_DWORD /d 1 /f
and also this one Code: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Metadata" /v "PreventDeviceMetadataFromNetwork" /t REG_DWORD /d 0 /f that just changes the driver updates to "No, let me decide what to do"
:: Don't send information to Microsoft when you activate windows. Turns off Online Client Activation Validation Telemetry Code: REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\CurrentVersion\Software Protection Platform" /v "NoGenTicket" /t REG_DWORD /d 1 /f REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Activation" /v "NoGenTicket" /t REG_DWORD /d 1 /f