View Single Post
Staro 28.05.2016., 20:29   #3201
ivor55
Registered User
 
Datum registracije: May 2016
Lokacija: Kutina
Postovi: 7
Ovako. U vezi telemetrije pronašao sam ovaj post na netu. Da sad sve ne prevađam, postat ću ovdje na engleskom jeziku.
Dakako ovo mogu koristit samo oni koji razumiju šta se ovdje radi.

Meni je iskreno svejedno da li špijuniraju šta ja radim ili ne. Nemam šta sakriti. Znam da su mnogi zadovolji sa Win 10, ali da im ta stavka telemetrije smeta. Pa evo:

"After some work, I have found some more registry keys that can be used to disable some tracking. This is not an exhaustive list. The way I did this was to export a branch of the registry, usually HKCU, the used the FC.EXE file found in Windows. Make sure you use the /N and /U switches. I also found a comment section of The Register some modifications to the HOSTS file which you can use to block tracking. That Register article is how I linked here. Below is my work so far. I saved it as a text file, disable Windows Defender and any antivirus, run a powershell as an administrator, rename the file to a .cmd extension, and then run this script. The batch file is below."

REM This should be run with command prompt as an adminstrator.
REM Disable the antivirus and Windows Defender.
REM After disabling those, rename the file extension from .txt to .cmd
REM Then run this script.
REM This does not fix all privacy issues, you will still need to turn off some.

REM First, block Windows from sending data about you to their servers.

echo ## BEGIN Windows 10 privacy settings ##>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 vortex.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 vortex-win.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telecommand.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telecommand.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 oca.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 oca.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 sqm.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 sqm.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 watson.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 watson.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 redir.metaservices.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 choice.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 choice.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 reports.wes.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 wes.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 services.wes.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 sqm.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 watson.ppe.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telemetry.appex.bing.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telemetry.urs.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 telemetry.appex.bing.net:443>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 settings-sandbox.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 vortex-sandbox.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 survey.watson.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 watson.live.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 watson.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 statsfe2.ws.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 corpext.msitadfs.glbdns2.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 compatexchange.cloudapp.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 cs1.wpc.v0cdn.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 a-0001.a-msedge.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 statsfe2.update.microsoft.com.akadns.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 diagnostics.support.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 corp.sts.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 statsfe1.ws.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 pre.footprintpredict.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 i1.services.social.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 i1.services.social.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 bingads.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo 127.0.0.1 www.bingads.microsoft.com>>%windir%\system32\drivers\etc\hosts
echo ## END Windows 10 privacy settings ##>>%windir%\system32\drivers\etc\hosts

REM First, opt-out of some, but not all, of the privacy settings.
REM Not all anti-privacy settings have been found.

REM settings -> privacy -> general -> let apps use my ID …
reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo\ /v Enabled /t REG_DWORD /d 0 /f
reg delete HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo\ /v Id /f
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo\ /v Enabled /t REG_DWORD /d 0 /f

REM settings -> privacy -> general -> let websites provide locally …
reg add “HKCU\Control Panel\International\User Profile\ /v HttpAcceptLanguageOptOut” /t REG_DWORD /d 1 /f

REM settings -> privacy -> general -> speech, inking, & typing
reg add HKCU\SOFTWARE\Microsoft\InputPersonalization\ /v RestrictImplicitTextCollection /t REG_DWORD /d 1 /f
reg add HKCU\SOFTWARE\Microsoft\InputPersonalization\ /v RestrictImplicitInkCollection /t REG_DWORD /d 1 /f
reg add HKCU\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore\ /v HarvestContacts /t REG_DWORD /d 0 /f
reg add HKCU\SOFTWARE\Microsoft\Personalization\Settings\ /v AcceptedPrivacyPolicy /t REG_DWORD /d 0 /f

REM Disables web search in the search box
reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\ /v BingSearchEnabled /t REG_DWORD /d 0 /f

REM Block telemetry.
powershell.exe -command “”
powershell.exe -command “”
reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection\ /v AllowTelemetry /t REG_DWORD /d 0 /f

REM Finished.
ivor55 je offline   Reply With Quote