yes of no use hence i am too using these in my Privacy Script Called by SetupComplete [Post Oobe Process] : https://forums.mydigitallife.net/threads/win10-tweaking-scripts.82116/page-11#post-1635772 Forum Thread of My Scripts : https://forums.mydigitallife.net/threads/win10-tweaking-scripts.82116 Thanks & Regards
Returning to the question Where does the Windows traffic go if there is NO TCP \ UDP traffic? When installing Windows between the client machine and Microsoft servers, a peer-to-peer network is created, each user by default is a potential link. User interactions on the home ISP side are identified as chaotic connections to random hosts. The number of connections of a client with a white IP on average varies around the four thousand mark. In addition to the payload, this includes the exchange of service information with other routers on the network and transit traffic. Conclusion where the traffic is merged and it is not at the same time, which cannot be detected, the result may be I2P or an analogue of the Yggdrasil Network through which user information is merged from keystrokes to screenshots, etc.
Shutup 10 = Smoke and Mirrors O&O; the company that displays a large "GOLD MICROSOFT PARTNER" logo on their website? Microsoft would NEVER in a million years partner with a company that claims to "disable antispy features" - because doing so would go against the companys whole status quo (data collection). So they partner with this ((Microsoft-Friendly)) company, support their app that reduces data collection BUT will not eliminate it at all. The logical thought process to follow here is that MS would much rather collect SOME data than NOTHING from customers that WANT to DISABLE Telemetry. MS Shills are instructed to recommend Shutup10 whenever the topic of data collection comes up. Once you recognize this it's obvious that it's all smoke and mirrors. That said I would recommend Blackbird (remember to back up everything beforehand). Interesting! Rather than catching the network activity, have you tried testing with a system kernel driver; bypass all security checks and see if any suspicious MS IO-activity shows up, with the appropriate filters applied? I might look into this as I'm experimenting with a powerful kernel filter driver at the moment, running at the highest altitude independant on any existing MS modules. In theory, from what I understand, it should pick up everything.
That's a bit extreme. Shutup 10 actually does apply the configurations that it says it does. I don't disagree with the rest of your comments, but being Microsoft Gold Certified partner does not mean that O&O Software GmbH is controlled by MS and must only create software dictated by MS... Also I can trust Shutup 10 a little more than other apps, because it is rare that anyone does anything out of goodness of their hearts and for the benefit of humanity. In this case O&O Software incentive for creating Shutup 10 is to bring more attention and potential customers for their other products.
Please Go Through This Thread & Check $OEM$ Pack which consist of almost all win10 Privacy Apps With Best Configurations. How to Use : Just Copy $OEM$ to Sources Directory of ISO & Repack it Using any Among these ISO Apps Ultra ISO or Power ISO & there You Go. Spoiler: $OEM$ Code: https://forums.mydigitallife.net/threads/win10-tweaking-scripts.82116/
It's setting Disable Telemetry, does not even touch any telemetry setting, it only disables 2 services (one used for notifications, so people will most likely revert it anyway) and the old logger, MS is using a new one for years (Diagtrack-Listener).
Thanks for the suggestion, I tried and it did somethings but I don't see anything blocked neither in the HOSTS file nor in the firewall. Where is it actually blocking the stuff ?? I double checked everything is blocked and status is green.
RegFromApp is easy, but Process Monitor is more informative, you just have to filter results, usually App's name and Operation RegSetValue will do.
Thanks. Very helpful but Process Monitor shows me the registry path app is accessing but not the changes it's making to a particular key, is there any way to get those. Getting error with Regfromapp.
Process Mon & Process Exp worked when regfromapp fails & is more informative. or Simply Reg Changes View will also do the same. capture reg snapshot then do some changes & match with current reg will result in showing what you change.
Taking registry snapshots and comparing them is very time intensive process. @TairikuOkami screenshot shows the exact registry key accessed by the process and reg data too. Looking for something similar. Thank you for the reaction though.
stubs returned in assembly server 20324, and the new assembly already contains indications of this: the MUI file of the Windows.CloudStore.dll library found a line with the word "Placeholder" - "stub".
Yes, you should definitely publish it. If you can easily revert such a setting in time, the user usually doesn't need to be notified. But if the program fails to revert the setting (or fails to do in a timely manner), notify the user immediately so (s)he can take action manually.