That report says they didnt catch it not that it cant do it ? Was it called from outside by microsoft ?
I don't know how many other people would, but I would definitely welcome such a guide with open arms. Windows 10 is not the same OS it was 4.5 years ago. Combine that with the deluge of tools and guides you don't really know if it's applicable your version or not. I'd like to have something definitive I can refer back to.
Don't get W10 updated, once you have it working well and setup properly. We have many ways to get protection aside from MS SW update s**te...
and what do we do when we have blocked almost everything, we are building a new operating system ? we actually differentiated here between pro, enterprise edition, LTSC it's all so crazy, which way do you want to go, half turn off, but the BS doesn't work ? or let's get the china source and rebuild it
I like the chef cook, put a lot of work into it, but his instructions seem to me that it is only applicable to a pro version. I could not read out that the other versions were treated, for me an exchange of the dll files is not a problem, but honestly I don't check an update non-stop
There was information that the sfc / scannow command back included telemetry parameters! Who checked? Spoiler: РУС Появилась информация, что выполнение команды sfc /scannow обратно включает параметры телеметрии! Кто проверял?
There is a new telemetry option called "Allow Commercial Data Pipeline" that was added into "Data Collection and Preview Builds" in Group Policy Editor. This option is non-existent on Windows 10 LTSC 2019 1809 (build 17763.316), but now that Windows has updated to (build 17763.973) this new option has appeared. There is no way to truly disable it (not even sure exactly what it does). You just have the option of choosing whether data collected from your device is transferred to Microsoft via "Windows Enterprise Data Pipeline" or "Windows Standard Data Pipeline" Has anyone else heard of this or know anything about it?
Can I set telemetry level wia registry editor without group policies? I mean bypassing Group Policy settings completely (Including registry). Does telemetry have separate settings in any registry branch?
@CHEF-KOCH still here? My mate, how are you? You probably won't remember me since I've changed accounts. But you should migrate to a blog outside of Github. Anyway, for all people sensitive to their privacy. Good news is you can actually tame %99.99 of Windows. Tweaking settings only takes you so far. You need to remove them. The best way to go: Download NTLite (an expensive paid program but totally worth it) Load an untouched ISO. Untick crapware-spyware (which is more than half of Windows lol) Create a new ISO and burn it (It'll of course be smaller than the original) Format using the new ISO Install a good firewall (sphinx maybe) Host process and System should be allowed only to make local connections, not to the internet If any windows s**t pops up (like windows installer etc.) just disable all its connections Don't use built-in windows update Download updates manually every month if you want from catalog
Still a third party firewall using Windows filtering platform can block these connections, right? Like sphinx
Question: Which DNS is safer to use? 51.158.168.202 163.172.170.19 208.67.222.222 208.67.220.220 9.9.9.9 149.112.112.112 1.1.1.1 1.0.0.1 Question: What DNS is not within the jurisdiction of the United States and is not subject to SORM interception? Question: Is it safe to use DNSSEC? Is the data being modified? Spoiler: RUS Вопрос: Какой DNS безопаснее исользовать? 51.158.168.202 163.172.170.19 208.67.222.222 208.67.220.220 9.9.9.9 149.112.112.112 1.1.1.1 1.0.0.1 Вопрос: Какой DNS не относится к юрисдикции США и не подлежит СОРМ перехвату? Вопрос: Безопасно использовать DNSSEC? данные проходят модификацию?