Right, so there's a list there, but where do the entries go? Into command prompt? Into hosts? Into router firewall? Into third party app? Thanks
It's quite easy to figure out if you look at s1ave77 signature. The answer is staring you in the face... lol
I'm grateful for this resource! Earlier, I had blocked too much, which had the cost of limiting function. Edit: What didn't work: The main fail (for me) has been with Ip "wack a mole" blocking. I've tried this a few more times at the cost of blocking too much function and not nearly enough of what I wanted to block. What did work: Hosts file (as in Post#1) is excellent. Removing scheduled tasks (as in Post#1) is excellent. PeerBlock used as a logger (not a blocker) is excellent for information (especially if you put the computer in standby or hibernate and then wake it, while still logging, during your login). Windows Firewall Control, while a bit less effective at logging, did spot that my only remaining "Leak" is C:\Windows\explorer.exe, which is overly chatty on port 443. However, there could be omissions in that log. I suppose this could be streamlined with firewall rules that restrict multicast of svchost and dashost, to the local network and restrict explorer.exe (the file browser) so that it can't use port#443. After these efforts, Peerblock (used for logger) still reports these persistent leaks: (IP addresses contacted without my permission) 23.36.33.135 akamai 23.48.106.243 akamai 23.204.68.66 akamai 23.205.214.76 akamai 40.77.226.221 Microsoft 40.77.226.223 Microsoft 52.167.222.147 Microsoft 65.52.108.103 Microsoft 65.52.108.254 Microsoft 104.87.88.177 Microsoft 104.89.242.39 akamai 131.253.34.230 Microsoft 131.253.61.64 Microsoft 131.253.61.68 Microsoft 131.253.61.96 Microsoft 131.253.61.100 Microsoft 157.56.77.149 Microsoft 157.56.77.148 Microsoft 172.230.215.85 akamai 204.79.197.200 Microsoft 216.58.208.46 google At the cost of causing the PC to wait for timeouts, I've blocked those ip addresses with the linux router DD-WRT iptables firewall rules. There's an awful lot of traffic at login and right after; however, these 2 keep going through the whole session: iptables -I FORWARD -d 131.253.34.230 -j DROP iptables -I FORWARD -d 65.52.108.254 -j DROP Instead of that game of IP Wack-A-Mole, it would be preferable to restrict the leaky software at the PC. This is where Windows Firewall and WFC logging gets spotty; and, without the information of which program file leaked what, then I can't ban it from leaking (restrict it to local-network or ban from using port 443). Is there a list of Windows *.exe files that leak (so I can block them)?
So, with all this hard work, there is still no way to actually disable ALL Windows 10 Telemetry? BTW, I recall somewhere seeing that aside from Basic and Full feedback/reporting, there is possibility to select SECURITY when some registry tweaks are applied...
All I know of is that on Enterprise, Government, and Education licenses, the policy settings are much more effective at stopping unwanted internet usage such as telemetry and a few other data (mining) related features. These settings have reduced functionality in Home and Pro, especially true after the threshold/anniversary updating. Some of the things we're shooting at, probably aren't telemetry/datamining; however, really frequent encrypted communication to the internet, without full documentation as to what and why, could cause at least some form of insecurity. However, for home and pro, I've got some homework to do with an external firewall's logs, to experimentally determine which Windows files are "leaking." Logging of Windows Firewall itself is incomplete, as some internet communication with microsoft, slips by without a mention in the logs. I'm thinking that a Windows Firewall rules list would work; but, only if the list was complete (requires specific filenames). For example, this policy: gpedit.msc, Computer Configuration \ Administrative Templates \ Windows Components \ OneDrive, is supposed to control the internet usage of the file explorer, C:\Windows\explorer.exe. However, even though the file browser used the internet less frequently, mine still chatted to 131.253.34.230, 23.205.214.76, 23.36.33.93, 65.52.108.254. . . Sihclient.exe wanted to chat with 191.232.80.53. Sihclient and usoclient are windows update scheduled tasks (every 20 hours) that weren't removed by the scheduled tasks blocking at post#1. Sihclient is meant to heal (reverse) settings that prevent contacting microsoft (supposedly just updates). Setting it to single instance (uncheck repeat), turns it off. In the root of scheduled tasks, after starting it as admin, was found a OneDrive entry, which could cause the file browser to use the internet; so, I turned off that task. Even so, explorer.exe, the file browser, is still busy online. It can be blocked from using the internet with Windows Firewall, like this: https://forums.mydigitallife.net/threads/windows-firewall-with-advanced-security.67148/#post-1353128 P.S. There is also gpedit.msc, Computer Config \ Admin Templates \ System \ Internet Communication (use the subfolder). It is pretty much a line-item veto for telemetry. It might be fully functional in the Enterprise version.
WFC or WFN (two different brands of Windows Firewall enhancement), have logging to make your list. It probably wasn't telemetry if/when a particular log entry doesn't show either port 80 or port 443.
If I use the "Delete Telemetry Services" commands, will ALL the telemetry/keylogger from Windows 10 be disabled?
They should work all, if used correctly . Next days i will adapt the lists to new 'RTM' build 16299.15. Any help is still and always appreciated .
Can someone tell me the port or ports needed to share the Windows updates with other computers in my local network?
Im using w10-w7 with ethernet disconnected to play my cracked games on story mode, watch movies, to administrate family folders, because there is not way, no solution, only disconnected myself from the internet. fck XD! Ive one pc for internet, and other with unplugged cable for the private life. don't congratulate me, its a cancer to have live like this, but you get used soon. days ago I thought that win7 was exempt but I'm wrong again. win7 too has telemetry, dataminers & keyloggers.. over 2 years ago I had been very unconscious, many times Ive chatted on webcam with my couple, now that I know all this I feel a terrible paranoid due from inteligence spying, there is no privacy on any scale. thankyou boys for allowing me to learn in this great community. i love to all of you.
Sorry for this noob question but does it exist a tool in order to remove telemetry instead of doing itself ? Thanks