Google already knows this.Reminds me of an episode of Black Mirror called "The entire history of you".
The scheduled forum maintenance has now been completed. If you spot any issues, please report them here in this thread. Thank you!
Google already knows this.Reminds me of an episode of Black Mirror called "The entire history of you".
Shush you, you're not supposed to hold conspiracy theories to any sort of evidentiary standard, much less actually test them!I've heard that multiple times.
Testing this, I do not see it.
A Win 10 VM VirtualBox guest, in a Win 11 Pro host.
Wireshark running on the Win 11, monitoring traffic.
Doing whatever on the Win 10, I do NOT, repeat do NOT, see "keystroke" traffic from the Win 10 system moving outwards.
Do you have any other evidence of this?
I thought the same exact thing! Rewind, which is available for Mac and was supposed to come out for Windows at some point, is even more like the episode because it captures and interprets audio. Better still, the company that makes Rewind, Limitless, is coming out with an audio-recording pendant that captures all of your conversations all day long!Reminds me of an episode of Black Mirror called "The entire history of you".
This is just rhetoric and prejudice. You haven't achieved anything besides coming off as ignorant. For one thing you are assuming it's a conspiracy theory in an uncritical way. Please tell us what "evidentiary standard" means? Perhaps its because many hold your mentality that the world is full of nasty scandals and unconstitutional people taking away our rights. The really interesting part is it's people who are ignorant that are the real victims and they are apparently not even aware.Shush you, you're not supposed to hold conspiracy theories to any sort of evidentiary standard, much less actually test them!
That won't fly in MANY offices and workspaces around the world.its only a matter of time until a live webcam is mandatory.
Simple:For one thing you are assuming it's a conspiracy theory in an uncritical way. Please tell us what "evidentiary standard" means?
This is really problematic for all-party consent states such as California. They'll be exposing their customers to legal liability unless the pendant is able to filter out voices other than that of the owner.I thought the same exact thing! Rewind, which is available for Mac and was supposed to come out for Windows at some point, is even more like the episode because it captures and interprets audio. Better still, the company that makes Rewind, Limitless, is coming out with an audio-recording pendant that captures all of your conversations all day long!
I have no horse in this race, but just want to state that this is not a trivial task if: Data is encrypted for transmission, and the data isn't sent back in real time, but instead batched for transmission.Simple:
- A claim is made that Microsoft is logging all keypresses and sending them back over a network connection
- Evidence for this would be trivial to gather: logging network traffic from a machine running windows and capturing the packets containing that keylogging data. Tools like BSI's Telemetry Monitoring Framework can also inspect the data that is gathered even in isolation without a network connection.
Except the encryption needs to happen on the local device, so is subject to certificate injection (same way employers can decrypt packets from managed devices regardless of SSL/TLS/HTTPS).I have no horse in this race, but just want to state that this is not a trivial task if: Data is encrypted for transmission, and the data isn't sent back in real time, but instead batched for transmission.
Like train conducters? Or mayors? Superintendants?This is what happens when you give people power, they strip you of your rights.
Why would i not want an internet connection?It's only a matter of time until you literally can't use your PC without a live internet connection, its only a matter of time until a live webcam is mandatory. The crucial key here is slow gradual changes, this, as the dogmatists have long been aware of, is a perfect unfailable mechanism for weeding out criticism, it works everytime.
Can't it be encrypted by a subroutine and key in the kernel that cannot be altered without bricking the OS (except the very first time the OS is installed with its license key in order to generate the unique key for that installation)?Except the encryption needs to happen on the local device, so is subject to certificate injection (same way employers can decrypt packets from managed devices regardless of SSL/TLS/HTTPS).
No dice: the OS would need to verify that key against something, and you also have control over whatever something the key is being verified against.Can't it be encrypted by a subroutine and key in the kernel that cannot be altered without bricking the OS (except the very first time the OS is installed with its license key in order to generate the unique key for that installation)?
You don't have control over which license keys actually unlock the OS for use. Microsoft has control of that.No dice: the OS would need to verify that key against something, and you also have control over whatever something the key is being verified against.
Windows activation keys are not encryption keys. The 'key' is more like a very short signed certificate: a key can be tested for validity, but is not used to encrypt or decrypt any content (either locally or remotely). This is why you can - for example - host a KMS to pass license keys to Windows without ever contacting Microsoft's servers.You don't have control over which license keys actually unlock the OS for use. Microsoft has control of that.
PGP: The end user has an encryption key but doesn't have the decryption key. And good luck generating a new key if there is no known public key to generate it with.
No kidding. The key would serve as the unique seed during part of the generation of the OS-level encryption key. MS would have no problem decrypting it as it would be able to access this activation key as long as your computer is attached to the internet.Windows activation keys are not encryption keys. The 'key' is more like a very short signed certificate: a key can be tested for validity, but is not used to encrypt or decrypt any content (either locally or remotely). This is why you can - for example - host a KMS to pass license keys to Windows without ever contacting Microsoft's servers.
I'm just arguing here that one doesn't need to use an encryption protocol that can be man-in-the-middled if one (MS) has initial control over both the operating system of the origination system and the destination system.except the very first time the OS is installed with its license key in order to generate the unique key for that installation
This is really problematic for all-party consent states such as California. They'll be exposing their customers to legal liability unless the pendant is able to filter out voices other than that of the owner
Thanks a bunch. When you test it can you try to find people with very similar voices (both pendant wearer and non-wearer, as well as two non-wearers in a three person discussion)? Theoretically the device could distinguish between people based on directional sound, and it would be interesting whether it does.I can't wait for this to come out so I can test to see how well the consent feature actually works. That would be the absolute first thing I'd try with it and, if it fails at all, the product has a huge problem.
Here's the thing. Vast majority aren't aware he exists nevermind what he talks of. And the leftover doesn't care.Though I suspect if Microsoft was doing anything like that they'd have a Snowden moment
Snowden and Assange were leaking information *about* the US government. A whistleblower *telling* the US government that MS is spying on them would have a hell of a different response, especially given MS's recent large-scale breaches.Here's the thing. Vast majority aren't aware he exists nevermind what he talks of. And the leftover doesn't care.
And the US government has been busy chasing both Snowden and Julian Assange. There will be no justice for them, because just like one comic says if you accuse your government of committing crimes, you'd be prosecuted for it.
This is why companies like Microsoft can do this. And unless there's a titanic uproar(not virtual ones like on TH) nothing will change and they will continue to up the ante.
So what?Snowden and Assange were leaking information *about* the US government. A whistleblower *telling* the US government that MS is spying on them would have a hell of a different response, especially given MS's recent large-scale breaches.
whooshSo what?
Doing wrong is justified because it's "guvernment"? Bad is bad. They are headed towards corruption and authoritarianism not seen since Nazi Germany days.