Supposedly the key is hashed before being sent and cannot be used to deduce the actuall key. Therefore if the key is blacklisted that information must have been included with the original signatures. I have not seen any Lenevo keys pass (not saying that none have) and I have seen allot of the Dell ultimate keys fail. I think allot of Dell failures just mean that it was a popular key to use since it was one of the first leaked keys. I don't believe that the next signatures will target any other keys. I bet they would sure like to target Daz's loader and remove wat but I am thinking that bios mods that have consistent OEM data will be safe at least for a while, and I an sure that Daz and Hazar will cope with whatever MS does. Excerpt from the WGA/WAT privacy statement. This is the information that is supposedly sent to MS by WAT. What data is collected? To help you validate your software, Genuine Microsoft Software tools must collect a certain amount of configuration and status information from your computer. The tools do not collect your name, address, e-mail address, or any other information that Microsoft will use to identify you or contact you. The tools collect information such as: * Computer make and model * Version information for the operating system and software * Region and language settings * A unique number assigned to your computer by the tools (Globally Unique Identifier or GUID) * Product Key (hashed) and Product ID * BIOS name, revision number, and revision date * Hard drive volume serial number (hashed) * Whether the installation was successful if one was performed * The result of the validation check, including error codes and information about any activation exploits and any related malicious or unauthorized software found or disabled, including: o The activation exploit’s identifier o The activation exploit's current state, such as cleaned or quarantined o Original equipment manufacturer identification o The activation exploit’s file name and hash of the file, as well as a hash of related software components that may indicate the presence of an activation exploit * The name and a hash of the contents of the computer's start-up instructions file (commonly called the boot file) to help us discover activation exploits that modify this file. As standard procedure, your Internet Protocol (IP) address is temporarily logged when your computer connects to a Genuine Microsoft Software website or server. These logs are routinely deleted.