Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:HOSTS file (Score 1) 415

There is criminal energy involved in sabotaging mechanisms such as the hosts-file in order to deceive users. Even thinking of it requires significant criminal energy, and the strong intent to harm users.

Looked up reference for getaddrinfo, GetAddrInfoEx and variants there is no namespace identifier other than NS_DNS to be found that allows or even mentions addressing DNS separate from the hosts file... ... minutes later ...

I guess you learn something new every day. For those interested in joining Microsoft in the pits of hell add DNS_QUERY_NO_HOSTS_FILE to the options flag of DnsQuery().

Comment Re: HOSTS file (Score 1) 415

More info on this? I set my router's DNS server to resolve the two telemetry servers to 127.0.0.1. Would that fix the problem or no?

If you have a DNS server one way is to create a zone matching the name of the Microsoft host and simply leave the zone empty. It won't resolve to anything and the Microsoft stack won't even try to make a connection.

--
"Finally, we will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary."

Comment Endless parade of lame excuses (Score 4, Interesting) 318

Excuse #1 - Google, Apple..etc are doing it too. This is what 5 year old children say when they get caught doing something they know they shouldn't while their brother (Google) or sister (Apple) does not (this time). If you don't understand why this is a completely nonsensical position try following defense in court.. "yes your honor ... I was drinking and driving but everyone else I was with did it too so its ok."... Go ahead...see what happens.

Excuse #2 - ALL of your data is necessary to provide a feature. Examples like Siri, Cortana, Google voice are often paraded around. They need to rummage through your address book to know who "Frankenstein" is before they can call ... Need to know what's in your calendar and where you are at...right? Well no... your "Intelligent Agent" needs to know. There isn't any reason said agent can't execute locally and provide the same services if user prefers not to upload a list of all of their acquaintances and agendas to Microsoft. These systems are architected the way they are because spying is profitable not because they maximize value to end users. Your phone can know your at the florist without sending your location to Microsoft. Your phone can remind you to pick up flowers when you call someone. It isn't impractical or unrealistic to implement. It just isn't profitable.

Excuse #3 - Browser information leaks... Chrome, Firefox, IE keep thinking up new excuses with mostly negative to users to get a piece of everything you are doing with every revision. Some of this shit is offensive blatant one finger salute ...Sending your searches to bing even when you don't use bing.... Uploading your browsing history to Microsoft...there is no rational excuse for this and I can't believe anything approaching a majority of people want this to happen by "default" for any reason.

Excuse #4 - You can turn it off - Coupled with intentional UX design blurring demarcation between local and internet promoting accidental leakage and turns the leakage spigot to 11 by default knowing most users won't know, care or understand enough to change settings which increasingly are ultimatums or don't actually stop data leakage they purport to stop. Now the pot is really starting to heat up... Now Microsoft is retroactively saying fuck you people we will collect shit and there is nothing you can do about it. That they have the gall to say this to their *customers* I personally find amazing.

--
"Finally, we will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary."

Comment Re:A significant difference between HW and SW sale (Score 1) 318

Microsoft, since its only product is software, has to go to great lengths to protect and extend that property base. "Extend" here is Googly data mining.

Nobody is making money on hardware as a commodity. Software is a much sweeter deal.

Apple, on the other hand, makes money by selling you the hardware. The protection is the physical ownership of the device.

Apple operating system can be installed on hardware purchased from not Apple. There are a number of howto's floating around including for install as VM guests.

This may not be a popular opinion, but I trust Microsoft more than Google, Apple -way more- than Microsoft, and the NSA more than any commercial company.

I trust humans to abuse power they are given like they always have throughout the entirety of recorded history. I trust the continued aggregation of power into the hands of a few mega corporations who are increasingly able to know everything about everyone and have increasing say over what can be executed on a general purpose computer will only end badly for all.

Comment Strange game (Score 1) 98

I think hardware support for voice recognition would be awesome if it can be leveraged to provide a usefully accurate local recognition capability.

Yet I very much doubt this will ever happen because the whole point of voice recognition these days seems to be nothing more than an excuse to send data to MS / Apple / Google / Nuance / LEA / whomever.

Comment Re:Time to hold the government accountable (Score 5, Insightful) 211

Again, read the article - they are saying sometimes the methods used to capture the criminal are not always pushed up the chain to the prosecutors. That's a problem, but it's not some heinous problem that people are making it out to be.

Intentionally withholding and or conspiring to withhold information to wit the defense is entitled *IS* absolutely heinous. Intentionally providing false information in the form of "parallel construction" is also absolutely heinous.

They aren't violating the supreme law of the land.

How do you know? Are you a lawyer? Courts have ruled both ways on 4th amendment violations. The arguments used to justify this is that people don't have any expectation of their location privacy.. because...drumroll ... telcos get the information... I would very much like to know in what context can "no expectation of privacy" even be falsified in the 21st century.

When someone violates my rights, though, I want them caught and punished, even if it's just stealing the loose change out of my car's change holder.

Any thoughts about the rights of the (quoting TFA) "many of those arrested" who were never prosecuted to not be molested by police fishing expeditions?

--
"Finally, we will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary."

Comment It's a capabilities war (Score 2) 211

I know technical solutions to political problems but cheap and trivial availability of technology is what's directly fueling these shortcuts.

Running software on mobile handsets to detect and map the use of stingrays is hardly unreasonable or impractical. If enough people did it stingrays might become sufficiently risky and worthless such that police departments would find the time to ask a judge for warrant to get information from Telcos.

Comment Re:I remember feeling sorry for Windows users (Score 1) 284

NT required a much more powerful machine, not like today where you can get a usable computer for $250 new.

RAM pricing history:
http://www.jcmit.com/memorypri...

Early in 1995 it would have been several hundred dollars cheaper to run Win95 this all but evaporates circa 96 and beyond.

Requirements for NT 3.5.1 workstation:

12MB of RAM
90 MB free drive space
VGA level video support
Keyboard
IDE, EIDE, SCSI or ESDI hard drive
386 or 486/25 processor or better
CD-ROM, floppy or active network connection

Requirements for Windows 95:

Personal computer with a 386DX or higher processor (486 recommended)
4 megabytes (MB) of memory (8 MB recommended)
50-55 MB

Comment I remember feeling sorry for Windows users (Score 1) 284

Never understood why Microsoft saw fit to torture their customers with 95,98,ME.etc. for all those years when they had NT.

Of course this was all back in the good old days when software companies actually had to provide new value to their customers in order to make money. Now it seems all software vendors are capable of doing is repainting the shell and spying on customers.

--
"Finally, we will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary."

Comment Re:Privacy is dead. (Score 1) 316

I actually agree with the first AC, there is no such a thing as complete privacy. I agree that I don't want to live in some 1984 type of world where the government knows all my thoughts or what ever. But I'm a realist and there is almost no amount of off the grid that you can go as to get real privacy,

There is no such thing as a complete vacuum. Even in interstellar space.

--
"Finally, we will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary."

Comment Re:Probably just not optimized yet (Score 1) 316

It's good these posts come out, but having worked with it, it's probably just a case of some calls that didn't check for the telemetry lockdown registry key. Say what you will, but it's not likely they have a secret cabal going to collect which live tiles you resized to "large" or unpinned. There's enough of us that either ride with defaults or are actually OK with them learning how to make a better OS based on how we use it. Given how rushed it was on the last few months fixing major issues, it doesn't surprise me that a few things slipped through.

One thing having always bugged me about this line of thinking is the quantity of traffic and number of systems out there that would all be generating these requests is simply enormous... must be one hell of a noise floor to go unnoticed.

Comment Re:Windows 8 is suddenly looking good .. (Score 4, Informative) 316

Windows 7 is looking even better. Staying put.

In windows 7 I disabled every call home excuse under the sun from UI, group policy, CLI, scheduler... Must have spent hours disabling various bullshit yet despite considerable efforts windows 7 still keeps making connections to settings.data.microsoft.com, telemetry.microsoft.com with nothing running, with updates set to manual while doing absolutely nothing but executing tcpdump. In the end I gave up and blackholed these sites in DNS to get it to stop.

To be clear I am not nor would I ever make the lame argument that windows 7 does it too as an excuse to give win10 a pass or cover to try and justify a fundamentally indefensible activity. Microsoft's squandering of their customers trust will ultimately only end badly for them. Wireshark is your friend... try it and see what all windows 7 is doing don't assume that Windows 7 is trustworthy.

--
"Finally, we will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary."

And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones

Working...