Stop & uninstall Windows Telemetry/Tracking

This has been going around on the ‘Net the past few days. It has been found that Windows 10 uploads data to its servers even when every “feature” and app that normally might be expected to do that is disabled/uninstalled. For example, even if you don’t use the Cortana voice-command feature or Bing search, stuff is still being uploaded to Microsoft servers related to this. And even when users choose to not participate in any sort of customer improvement options and disable any kind of tracking, it is still tracking and uploading things.

maxresdefault

Not only is this a big privacy issue, there is also a system performance issue, as extra CPU cycles must be run and disk and network activity must occur to process these telemetry-related tasks.

And it is also the case that Windows 8.1 and 7 also are now doing this. Microsoft has been adding all these telemetry and tracking aspects to them lately through Windows Update, making them closer to Windows 10.

The advice from many experts now is to not go near Windows 10. Do not install it. Retain your privacy and control over your systems.

Below are instructions for disabling the unwanted telemetry/tracking in Windows 7 and 8.1

Continue reading “Stop & uninstall Windows Telemetry/Tracking”

Do I need An antivirus in linux?

Afraid to answer a bit background knowledge is necessary first.

Viruses hardly exists any more. Programs that infect other executables, overwrite parts of them and/or add new code to them is not how malware spreads nowadays in most cases. In windows that distinction is not really necessary, windows users use the term “virus” to describe every form of malware (and user error, sorry, couldn’t resist 😉 ). But in Linux that distinction is important as virus scanners in Linux do exactly what the name says…they scan for viruses. They don’t protect you against attacks from websites in any form. And on top of that they hardly even scan for Linux viruses…there are only very few proof-of-concept Linux viruses at all. And due to people never installing anything themselves but always packages provided by the distro through the package manager there is almost no attack surface for traditional viruses…no spreading of .exe saying they are the most fancy screensaver or similar. So the Linux virus scanners actually mostly scan for windows viruses, for example in a mail server scanning email attachments before delivering the mails.

Continue reading “Do I need An antivirus in linux?”

By updating Windows 7, 8 and 8.1 you are allowing Microsoft to spy on you

There’s been a lot of discussion about Telemetry in Windows as well as avoiding the Windows 10 upgrade. Here is the list of service bulletins we compiled and what they do. It should be noted that even when not installed, they may appear again so this will require some effort on your part. Most people will simply not bother with this but it’s great information for any tech to have at their disposal or simply for research purposes.

d6655803fa1ca967710fc6c164508726

If you have already installed Windows and did a few updates, then head over to Control Panel > Programs and Features > View Installed Updates then go from the top to the bottom through the list to ensure none of them is installed, if you do find one installed, then uninstall it, reboot, then check for updates and once it appears right click on it and hide it.

KB2505438 (Although it claims to fix performance issues, it often breaks fonts)
KB2670838 (This update often breaks AERO on Windows 7 and makes some fonts on websites fuzzy. A Windows 7 specific update only, do not install IE10 or 11 otherwise it will be bundled with them, IE9 is the max version you should install to avoid this.
KB2952664 (Windows 10 Upgrade preparation)
KB2976978 (Windows 10 Upgrade preparation)
KB2977759 (Windows 10 Upgrade preparation)
KB2990214 (Windows 10 Upgrade preparation)
KB3021917 (Windows 10 Upgrade preparatioon + Telemetry)
KB3022345 (Telemetry)
KB3035583 (Windows 10 upgrade preparation)
KB3068708 (Telemetry)
KB3075249 (Telemetry)
KB3080149 (Telemetry)

this Petition to let users opt out of Windows spying. sign it and protect your privacy!

How to: Get rid off Microsoft’s OneDrive with one file.

With this shellcode you can get rid of Microsoft’s OneDrive plague. Which allows Windows (10) automatically store you private stuff and can be access by Microsoft staff for “juridical” reasons  according to the privacy statement.
Paste this code below in into your favor text editor such as notepad++ (which i recommend).

@echo off
cls
set x86=”%SYSTEMROOT%\System32\OneDriveSetup.exe”
set x64=”%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe”
echo Closing OneDrive process.
echo.
taskkill /f /im OneDrive.exe > NUL 2>&1
ping 127.0.0.1 -n 5 > NUL 2>&1
echo Uninstalling OneDrive.
echo.
if exist %x64% (
%x64% /uninstall
) else (
%x86% /uninstall
)
ping 127.0.0.1 -n 5 > NUL 2>&1
echo Removing OneDrive leftovers.
echo.
rd “%USERPROFILE%\OneDrive” /Q /S > NUL 2>&1
rd “C:\OneDriveTemp” /Q /S > NUL 2>&1
rd “%LOCALAPPDATA%\Microsoft\OneDrive” /Q /S > NUL 2>&1
rd “%PROGRAMDATA%\Microsoft OneDrive” /Q /S > NUL 2>&1
echo Removeing OneDrive from the Explorer Side Panel.
echo.
REG DELETE “HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}” /f > NUL 2>&1
REG DELETE “HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}” /f > NUL 2>&1
pause

Then, save the file as file.cmd ( example OneDriveSucks.cmd), then execute the .cmd file as administrator by right click on it. Reboot computer and your are 1% in progress of privacy in Windows 10.

Why Linux Distro’s Are More Secured Than Any Other Operation Systems

Linux is an open source operating system where everyone can read the entire codes but still it is considered more secure as compared to the other operating systems. Linux has been extensively deployed in the tech market as many of the gadgets are Linux based and that is why more people are building trust on the Linux platform. To throw more light on why Linux has superior internet security capabilities, let us check out some of its security features.

Linux

Continue reading “Why Linux Distro’s Are More Secured Than Any Other Operation Systems”

The Complete Guide for Hidden Services And Staying Anonymous

The free Internet that many of us loved has become a surveillance web, serving governments and mega-corps, while abusing the rest of us. For those whose eyes are opening to this sad fact, I’ve have assembled this guide.

This purpose of this guide is to make Internet privacy as simple and concise as possible. Our intention is not just for you to understand, but for you to
act upon the information we give you.

Learning to protect yourself online is simple, and does not need to interfere with your daily activity. This is the complete  guide to surfing anonymously. What steps you choose to take depend upon what you wish to guard against. Each level will require more work or money to achieve, but gives much greater protection.

Large Man Looking At Co-Worker With A Magnifying Glass --- Image by © Images.com/Corbis
Large Man Looking At Co-Worker With A Magnifying Glass — Image by © Images.com/Corbis

Continue reading “The Complete Guide for Hidden Services And Staying Anonymous”

Free useful software for everyone.

Free as in beer, not free as in freedom – though some of it is both. I didn’t put trialware there, or things that require you to pay, to get certain features. You can use Ninite.com to install a lot of it automatically, without any toolbars and crap like that. I didn’t include things like Blender and Sketchup, as they are, in my opinion, very niche. If you need such software, I’d assume you would already know about it. Obviously most of it is for Windows, but a lot of it is multi-platform.

Continue reading “Free useful software for everyone.”

Warrant canary?! What the hell is a warrant canary?

warrant-canary

A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.

In 2002, the FBI used the newly-passed Patriot Act to demand that libraries secretly turn over records of patrons’ reading materials and Internet use. The libraries had to comply – even though such secret requests go against the entire ethos of a professional librarian. To get around the government’s mandate not to disclose the orders, some libraries came up with a potential workaround: they hung signs on their entrances stating, “The FBI has not been here (watch very closely for the removal of this sign).” The idea was that, like a canary in a coal mine, the presence of the sign would reassure the public, and its removal would signal to those watching closely that all was no longer well. An order not to disclose something may differ legally from an order compelling continued, false notices that no national security request has been served, and warrant canary notices work by exploiting that difference.

The hypothetical canary that provides individualized notices to each user illustrates the extent to which canaries are essentially end-runs around lawful gag orders. Companies exploit the potential legal loophole in the difference between compelled silence and compelled lies in order to communicate information that they would otherwise be prohibited from sharing. The fact that so many companies are adopting canaries, even at the risk of exposing themselves to litigation and—at the outside—potential criminal liability, highlights how out of step even routine national security requests have become with the companies’ willingness to turn over information on their users. Like Apple’s recent embrace of automatic encryption, canaries are a symptom of the growing public desire to maintain control over personal data. In the end, then, canaries do not only signal information about national security requests that companies couldn’t otherwise communicate; they also signal the dissonance between the government’s emphasis on secrecy and industry’s willingness to cooperate. The era of companies sharing data with the government in the name of patriotism with just a shake of the hand is now over.

Warrant Canary Examples:
  1. https://proxy.sh/canary
  2. https://www.ivpn.net/resources/canary.txt
  3. https://www.vpnsecure.me/files/canary.txt
  4. https://www.bolehvpn.net/canary.html
  5. https://lokun.is/canary.txt
  6. https://www.ipredator.se/static/downloads/canary.txt
Related warrant canary information:
Side-note: Using a VPN provider will not make you anonymous. But it will give you a better privacy. A VPN is not a tool for illegal activities. Don’t rely on a “no log” policy.