NB: the following is advice on how to help cut down on any snooping by Microsoft if you already have or plan to upgrade to Windows 10 - the firm advice of this Ning is to avoid upgrading to Windows 10 at all!
There is no guarantee that the methods listed below will ensure that you are not being snooped on, nor will they guarantee that you will avoid any other negative consequences of upgrading to Windows 10.
The tips below apply to any operating system should you wish to take steps to protect your privacy
----------------------------------------------------------------------------------------------------------------------------------
In light of the new Zetatalk regarding the new Windows 10 set to arrive for free to users, I'm posting this information for people to help evade or "get around" any snooping activity by Microsoft and others if they end up using Windows 10 or any Windows for that matter. Hackers and crackers have been getting around spying and snooping activities for years now so that should tell you that no matter what, where there is a will there is a way to protect yourself on the internet from spying- especially with the Internet being fairly uncontrollable for many reasons that the Zetas have already explained. Using Windows 8.1 or even the new 10, there are many things people can do to protect their online activity from snooping regardless of any secret backdoor access built into Windows 10.
With the copyright infringement legal mess stemming from a lot of greed from corporations and the government spying activities detailed by Snowden, many people over the last couple of years have turned to what is called a VPN service for some degree of privacy while surfing the internet. There are now many VPN providers available, some free, others charge. A VPN is a Virtual Private Network. Essentially it creates a new IP address identity that all of your internet activity is filtered through so that your real IP address and location are hidden. Many VPN services even offer even stealthier protection in the form of a fully encrypted VPN connection. This is just one way to help protect your privacy.
Another way, and one that can be combined with a VPN, is by utilizing Virtual PC created on top of your original OS (Windows). It essentially creates an operating system of your choosing built into utilizing Virtualized Hardware technology - like a PC within or on top of your primary PC OS that you can boot up many different types of Operating systems including many Linux Operating systems and older versions of Windows even. Personally I like using Ubuntu due to its ease of use but there are a ton of Linux OS's out there that are very secure due to the fact that hackers typically do not target them as much as there are not a lot of people using them... kind of how Apple's OSX is more secure in that it is less of a target as well. So a virtual machine created with Linux is kind of like a separate sandbox where you increase some levels of privacy for yourselves by running an operating system on top of and within Windows 10 as it is separated virtually from the Host OS.
Now if using Windows 10 you can combine some of these options to become a lot more private even while using Windows 10. A VPN is good, but if not an option, another one is to use what is called the Tor Browser Network - an anonymizing network and browser that uses anonymous proxy connections while you are surfing the web.
So in theory and likely in practice, an ultra secure way to browse and work on your Windows PC would be using a virtual machine OS such as Ubuntu or Redhat Linux or many other flavors of Linux distros, a VPN of some kind, and surfing the web with the Tor browser network all at the same time.
These are just suggestions that will help privatize your activities, but to what degree they work against the power snoopers out there, I don't know for certain as I do not know the full capabilities of what the NSA has access to, but... I do know that in general and in theory all of these options will add to your overall level of privacy on any Windows OS. If you would like to know more, do some googling on these things and find out how exactly they work. The links below can help you get started in protecting your privacy regardless of what version of Windows used. While there may not be a 100% anonymous privacy solution for people, I hope these suggestions help. From what I understand, they do. To what degree, that is hard to determine with the NSA's secrecy on tactics and operations. I utilize many of these solutions myself from time to time and find them to, at the very least, ease my mind a little and know for a fact that it raises the bar of privacy on any PC. There are certainly different levels of internet as the Zetas have described. The "official" levels and then other parts that are much more hidden.. like the Deep Web, of which the creator of it, was recently thrown in prison for life for creating it. One thing to Add here is... IMHO; you simply cannot trust the cloud for securing your personal data and information. Just look at what happened when Apple's cloud servers got hacked... lots of private information and notorious personal photos got stolen. Practice KISS (Keep It Simple Stupid) Don't store your personal information ONLINE! Store it offline on a personal encrypted storage device- AND KEEP IT OFFLINE :)
Popular Virtual Machine Software:
Note: Many older PC's, a decade or more older, may not have the built in hardware technology to support creating and using a virtual machine. In this case, a good alternative is dual-booting your PC between one OS and another. Multi-booting NOTE: Virtual Machine Software like VMWARE Workstation can also run on LINUX! This means you can create a virtual machine sandbox to run Any version of Windows (XP, 7, 8, etc.) right from within your booted up main LINUX OS! There is EVEN A WAY TO RUN MAC OSX on a PC! Google HACKINTOSH - VPN's can be used on the main host OS and/or within the Virtual Machine Sandbox you are running. So if you are running a version of Linux on your PC but need Windows XP or 7 to run say Adobe Photoshop, you can create a Virtual Machine VM to boot up Windows from within your Linux OS and from there install Photoshop on Windows. When done using Photoshop, you simply shut down the Virtual PC of Windows and go back to using your primary Linux OS! So many options today if you know where to look. To learn, one has a vast knowledge base at their fingertips that IS the INTERNET :) However, as is often stated in this BLOG, a TRUE Hacker believes that anything is hackable given time and energy to hack it whether it truly is or not. A great new TV show on the USA network called "MR ROBOT about a team of hackers similar to ANONYMOUS is really good.. it doesn't go into a lot of details, but you can get the idea of how easy information can be accessed by someone that knows how to get it. So with that mentality, you can never be too safe in trying to protect your privacy, personal information, and identity!
Linux:
A Windows PC with nearly all of the best and highest rated Linux Operating Systems installed and running great. Any of them can be booted up at will and used with ease. Most of these Linux OS's also install and run great natively on many PC's out there.
UBUNTU (A classic favorite for many with distributions based on Debian and also a GNOME based version)
LINUX MINT: For People needing something to transition from Windows. Similar interface and built in Windows emulation by installing WINE emulation app for running many Windows programs natively.
Linux CENTOS:
FreeBSD:
GNOME:
KALI Linux:
VPN services:
The TOR Browser network:
As always a good Antivirus program, Firewall, AND and Anti-Malware program, can help from catching trackers and bugs out on the internet. The other good thing about using a virtual machine on top of your main Operating system, is that any infections will likely never be able to escape the "sandbox" virtual machine and infect your main operating system. So infections can be kept safely away from your main (host Operating System) entirely.
Good luck and be safe out there. Couple other small tips:
And if anyone else has any tips, suggestions, methods to keep safe on the Internet, Please feel free to post anything.
Thanks
RECENT ZETATALK ~
They are giving the upgrade away for free to all Windows 7 and 8 users, which means 70% of all desktops in the world. This should in and of itself should start alarm bells ringing when you consider that the cost of developing an MS operating system will be many billions of dollars; why for free - this has never been done before - and at a time when we are expecting the announcement any moment? Then, if you read the system requirements, you see that you need an internet connection and a Microsoft account to use the OS and you will not be able to stop it from updating itself with anything that Microsoft pushes out - no option to choose which updates to install for yourself any more. It would seem that anyone upgrading would be handing complete power of their computer usage to Microsoft, who can decide remotely whether to delete your accounts and stop you using your PC if you start causing trouble, ie. after the announcement, and install nefarious software without your knowledge, yet I have been unable to find anyone on the internet sounding a warning over this.
[and from another]
http://en.wikipedia.org/wiki/Usage_share_of_operating_systems
[and from another]
http://www.microsoft.com/en-US/windows/
Yes, free! This upgrade offer is for a full version of Windows 10, not a trial. 3GB download required; standard data rates apply. To take advantage of this free offer, you must upgrade to Windows 10 within one year of availability. Once you upgrade, you have Windows 10 for free on that device.
SOZT
We have repeatedly been asked if the Internet will survive and continue to be open, and our response has from the start of ZetaTalk been that we anticipate that the establishment will NOT be able to shut it down. The reason is that commerce and industry, government business as well as private, use the Internet extensively and to simply shut it down would create too much havoc for those in power. Their approach has instead been to try to get the populace to use VERSIONS of the Internet, connecting to floating platforms like the Outernet or Project Loon.
http://www.zetatalk.com/newsletr/issue388.htm
These provide information to the populace but don’t allow updates or email from the populace, but an Internet that is no more than an interactive TV did not generate interest from the public.
The Internet was designed to be able to function despite blockages, flowing like water
http://www.zetatalk.com/newsletr/issue162.htm
around them. Even if the media, TV and radio, were tightly controlled, the Internet allows the public to provide information to others and learn what is happening around the world. If this cannot be stopped, how can the elite control this? Disinformation is designed to COUNTER the facts, but is most effective when used early so it does not look like a reaction. The facts themselves then are cloaked like a reaction, as they arrive second. To achieve this, Windows 10 will be a gigantic snooping operation, given away free with lots of goodies so hopefully installed on a massive number of personal computers and mobile devices.
EOZT
Comment
http://www.pcworld.com/article/2978239/windows/microsoft-slips-user...
Ghacks discovered four recent KB updates for Windows 7 and 8, all designed to send Microsoft regular reports on your machine’s activities.
Disabling the tracking tools in the Recommended KB3068708 update isn’t simple, either. It connects to vortex-win.data.microsoft.com and settings-win.data.microsoft.com, which are hard-coded to bypass the Windows HOSTS file. In other words, it’s tricky to block unless you have a firewall that can block HTTPS connections as well as be configured manually, ExtremeTech explains. There are options in GPEdit.msc that allow you to disable application telemetry and CEIP participation, but it’s unknown if they behave correctly after the new patches are installed.
If you don’t want these new tracking tools on your PC, the best thing to do seems to be simply uninstalling the offending updates, then blocking them from being reinstalled.
To do so, head to Control Panel > Programs > Uninstall or change a program. Here, click View installed updates in the left-hand navigation pane. In the search box in the upper-right corner, search for the KB3068708, KB3022345, KB3075249, and KB3080149 updates by name. If they’re installed, they’ll pop right up. If you find one, right-click on it and select Uninstall to wipe it from your system.
To block the updates from being downloaded again, dive back into the Control Panel and head to System and Security > Windows Update > Check for updates. The system will look for updates, then say you have a certain number of updates available, separated by status (Optional, Recommended, Critical). Simply click the recommended updates link, find the KB3068708 and KB3022345 updates, then right-click them and select Hide update. Boom! Done.
Now dive into the optional updates and hide KB3075249 and KB3080149 as well.
For those who want to try linux there are also live CD versions. https://www.linux.com/learn/tutorials/377416:the-five-best-linux-li...
Senior Russian lawmaker seeks ban on Windows 10 in state agencies
The State Duma’s vice speaker has asked the Russian government to ban the use of the Windows 10 OS among Russian civil servants over fears the American software may give access to classified information and Russian officials’ personal data.
In his letter to Prime Minister Dmitry Medvedev, MP Nikolai Levichev of the center-left Fair Russia party said the service agreement signed by any Windows 10 users allows Microsoft to access all passwords, password prompts and other information used for data protection. The US corporation also receives other types of data, from users’ contacts, their emails and even location.
Microsoft warns that the received information will be stored and processed in the United States or any other country for an indefinite period of time and transferred to US state agencies.
Levichev has therefore asked Medvedev to consider a complete ban on the Windows 10 operating system in Russia’s bodies of state power, state-owned corporations, and state-sponsored scientific and research institutions. The MP has also sent a letter to the head of the Russian internet watchdog Roskomnadzor, Aleksander Zharov, asking whether Microsoft’s user service agreement contravenes Russian laws.
Senator Aleksander Volkov supported Levichev’s initiative in an interview with the Regnum news agency, adding that Russia needed its own protected software to replace Microsoft products.
Levichev’s letter echoes one sent to Prosecutor General Yuri Chaika by Communist Party MP Vadim Solovyov in August. Solovyov wrote that Russian laws stipulated the gathering and processing of personal information should only be conducted by companies included in the National Register of Personal Data Operators. Microsoft is not on that! The communist MP also feared use of the new OS in Russian state structures could end in leaks of classified information to foreign intelligence services. The Prosecutor General’s Office is yet to reply to the MP’s concerns.
Microsoft’s press service replied saying transfer of personal information is only possible with the user’s consent, and that it gave users access to a comprehensive suite of privacy settings.
In mid-2014, the Russian parliament passed a law obliging all internet companies to store the personal information of Russian citizens inside the country. In order to give foreign and domestic internet companies enough time to create data-storage facilities in Russia, the act won’t come into force until September 2016 at the earliest. Source: rt.com
Russian lawyers wrote Attorney General about the threat of privacy in Windows 10
Moscow law firm "Bubnov and partners" asked the Prosecutor General Yuri Chaika to direct Microsoft's idea of eliminating violations of the law allegedly committed in the propagation of the operating system Windows 10, told RIA Novosti lawyer Alexei Kuznetsov.
According to a statement of the law office, the use of Windows 10 threatens confidential user information, which in turn may lead to violation of the Russian legislation, in particular the law on personal data and the Law on Advocacy.
Lawyers said the Attorney General that, according to their data, the operating system collects and transmits the history of visited user sites, passwords, stores the coordinates of the user fragments of postal correspondence, the data calendar events by samples of his voice.
The statement notes that the information Microsoft may use both in their own purposes, and transfer to third parties - from advertisers to the courts and the state security services. Of particular concern is the problem of preservation of lawyers attorney-client privilege. According to the applicants, neither the lawyer using Windows 10, can not guarantee the safety of the principal received information from him.
Lawyers believe that the function of the collection of information by default to be disabled, it can turn the users themselves. In their view, only under this condition can give Microsoft permission to distribute a new operating system in Russia, it said in the appeal to the Prosecutor General.
As Microsoft did not agree with these accusations. The company noted that Windows 10 allows users to choose how their information will be used, but Microsoft does not provide any government direct access to e-mail and content customers.
Earlier inquiry Seagull for the new operating system mismatch legislation directed the deputy Communist Party faction in the State Duma Vadim Solovyov. According to him, given that many Russian state structures are used in the operating system Windows, may leak classified information to foreign intelligence services.
Microsoft launched the Windows 10 operating system in late July. It allows you to manage the devices via voice commands, gestures, or written notes. Developers of a new computer operating system solved the problem with a browser, replacing it with a new - Microsoft Edge, with which users can do on the Web pages of handwritten notes and share them with friends and viewed in read-only mode. The transition to the new OS is free for a year for users who is a licensed version of one of the previous operating systems - Windows 7, or Windows 8 / 8.1.
Source: ria.ru
https://translate.google.com/translate?sl=auto&tl=en&js=y&a...
Windows 10 surveillance is just horse play compared to this ultimate pièce de résistance for the elite.
http://www.pbs.org/wgbh/pages/frontline/government-elections-politi...
More than two years later, the Edward Snowden leak continues to reverberate.
On Saturday, a joint investigation by The New York Times and ProPublica provided striking new detail on the extraordinary cooperation provided to the National Security Agency in the surveillance of Americans’ communications records by the second-largest wireless carrier in the country, AT&T.
According to the report, AT&T provided the NSA with access to billions of communications records — including emails and phone call data — as they passed through its domestic network system in the U.S. The report also found that the company installed surveillance equipment in at least 17 of its Internet hubs on U.S. soil, had its engineers test surveillance technology invented by the NSA, and even aided the organization in carrying out a court order permitting the wiretapping of online communications at United Nations headquarters in New York.
As the investigation noted:
While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed NSA documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as “highly collaborative,” while another lauded the company’s “extreme willingness to help.”
In a statement, an spokesman for AT&T told The Times, “We do not voluntarily provide information to any investigating authorities other than if a person’s life is in danger and time is of the essence.”
Still, internal NSA documents referenced in the report go on to show how AT&T not only provided the spy agency with data that travels over its own networks, but data transmitted by AT&T on behalf of other telecom companies — a practice known in the industry as “peering.”
In a 2006 lawsuit, Mark Klein, a retired AT&T technician, claimed that as early as 2003, he had discovered a secret room at an AT&T building in California where the company was providing the NSA with access to data it was transferring for other companies. The discovery was recounted by Klein in the below scene from the FRONTLINE investigation, United States of Secrets:
In 2008, Congress passed a law shielding U.S. companies from retribution for any cooperation in the government’s domestic surveillance efforts and Klein’s lawsuit was thrown out of court. But as ProPublica’s Julia Angwin and Jeff Larson note, “The newly disclosed documents seem to confirm the words of … Mark Klein.”
In one document cited in the report from 2013, for example, the NSA said that AT&T’s “corporate relationships provided unique accesses to other telecoms and ISP’s,” or Internet service providers.
In an interview with ProPublica, Kevin Bankston, the attorney who first brought Klein’s allegations, responded to the latest revelations from the Snowden leak.
“We were treated as crazy for years,” he said, ” … for allegations that we now know are substantially true.”
Is Microsoft snooping on your computer? Analysts claim Windows 10 sends identifiable information to tech giant EVEN when told not to
http://www.dailymail.co.uk/sciencetech/article-3198273/Is-Microsoft...
More than 14 million devices may be running Windows 10, but Microsoft is under fire for collecting users' information.
The tech giant angered privacy watchdogs with an updated privacy statement saying it can access private emails, address books and other files.
Now, a report suggests the system will even send identifiable information to Microsoft if a user activates the software's privacy protection settings and switches certain features off completely.
Microsoft, however, insists 'no query or search usage data is sent to Microsoft, in accordance with the customer's chosen privacy settings'.
Microsoft has previously said it does not collect data without users' consent, but work by Ars Technica could be interpreted as contradicting the statement.
The technology website's report seems to show that Windows 10 still contacts Microsoft even when certain internet-reliant features such as Bing and its Cortana personal assistant are are turned off.
While this is partly to test for an internet connection, OneDrive data seemed to be transmitted even when the feature is not active, said Ars Technica.
Data sent and requested from Microsoft to its OneDrive cloud storage service has a user ID attached,The Guardian reported.
The experts used a local login to Windows 10 rather than a Microsoft account and had every privacy protecting setting switched on.
'Windows 10 seems to transmit information to the server even when OneDrive is disabled,' Peter Bright writes.
Windows 7 and 8 are now being updated to get Telemetry, same tracking as Windows 10
https://www.reddit.com/r/conspiracy/comments/3g20wk/windows_7_and_8...
https://support.microsoft.com/en-us/kb/3068708
Will be switching to ubuntu today..
Wow! This is sweeping intel! If migration tracking surveillance satellites were destroyed by the CoW, the elite are now attempting to authorize themselves to use Windows 10 combined with ISP data to legally track everyone's movement.
http://www.zetatalk.com/ning/24ma2014.htm
We reported in 2012 that the failure of Russia’s Telekom-3 satellite launch was due to the intent to spy on migrants, so that Russian could block such migration. This was also the issue in 2013 when once again they had a dramatic failure to launch. Now in 2014, yet another dramatic failure, and is the message to Russia the same?
This 2014 satellite was ostensibly to provide Internet access and enhanced communication ability to remote regions of Russia, primarily to Siberia. But this was to be a two-way communication, so that the Russian government could trace movement within the Russian borders and identify communications between settlements. How is this different from the high-definition satellite images currently available, showing Earth from space with zoom capabilities? Enhanced surveillance capability would allow infra-red tracking so migrations could not be hidden beneath cover, nor could settlements hide beneath the ground.
Russia, China, and the US have vast territories, and rebellion against central governments is an established fact even when the territory is small and the culture, religion, and racial identity is homogeneous. The flooding and migration that will result during the Last Weeks and Aftertime are viewed as an opportunity by the Council of Worlds, where many souls can rise to the occasion to help others or fail in this regard. Opportunity is key, but if restricted into immobility by overloads who restrict all movement, these opportunities are lost. Any restrictions must be loose enough to allow circumvention. So sayeth the Council of Worlds.
https://www.rt.com/usa/311578-cisa-bill-security-internet/
Responding to a July query from Minnesota Senator Al Franken, DHS Deputy Secretary Alejandro Mayorkas said that some provisions of the Cybersecurity Information Sharing Act (CISA) “could sweep away important privacy protections” and that proposed legislation “raises privacy and civil liberties concerns.”
The bill authorizes companies to share information about cyber threats with “any federal entity.” Any company participating in the data sharing would be immune from consumer lawsuits.
Secret surveillance bill? Senate could pass CISA info-sharing bill with barely any debate http://t.co/SzNrPGVnINpic.twitter.com/O0raVtDLlu
— RT (@RT_com) July 31, 2015
If passed, it would mean that sectors of the federal government would begin to receive, store, and circulate sensitive information. The data would be exempt from Freedom of Information Act (FOIA) disclosures.
Opponents of the bill have argued that minimal requirements are in place for businesses to erase personal information before circulating cyber threat information – dubbed “cyber threat indicators” – before sharing that data with the government.
This has led to worries that such data could include a range of personal details including credit card histories, lists of goods purchased, and healthcare records.
Privacy activists have dubbed CISA the “Darth Vader bill,” citing concerns about the legal immunity that companies would receive under the legislation.
In addition, civil liberties groups argue that the bill would allow the National Security Agency (NSA) to use CISA to spy on people for reasons unrelated to cyber crime.
Last week, online privacy activists sent over six million anti-CISA faxes to Senate offices, saying they were using “1984 technology” because CISA is an Orwellian 1984-style bill. The non-profit group Fight for the Future was behind the stunt, setting up eight phone lines to convert emails and tweets into faxes.
Security breaches prompt unprecedented lobbying for CISA bill http://t.co/aeCW6uKBFUpic.twitter.com/5ZB4NpG9H1
— RT (@RT_com) May 5, 2015
Industry groups have launched their own campaigns to persuade lawmakers to pass the bill. The legislation is being supported by a number of major companies including Google, Facebook, AT&T, Bank of America, and Blue Cross Blue Shield Association.
Debate on the bill follows calls from President Obama for more information sharing between the public and private sectors. The issue came to the forefront after hackers breached Sony’s internal networks last year.
Although the bill passed nearly unanimously through the Senate Intelligence Committee in March, senators from both parties are pushing for amendments.
Debate on the bill could begin on Wednesday, with a vote on Thursday. However, it is possible that the bill will not be addressed before the summer recess – particularly because lawmakers may not have enough time to wade through the proposed amendments.
But Senate Majority Leader Mitch McConnell (R-Ky.) said on Tuesday that the Senate can indeed pass the bill before the recess begins – if lawmakers are willing to cooperate.
"With cooperation, we can pass the bipartisan bill this week," he said from the Senate floor, as quoted by the Hill. "There will also be opportunity for members of both parties to offer amendments."
Windows 10 is spying on almost everything you do – here’s how to op... Zetas Right Again!
Actually, here’s one excerpt from Microsoft’s privacy statement that everyone can understand:
Finally, we will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to: 1.comply with applicable law or respond to valid legal process, including from law enforcement or other government agencies; 2.protect our customers, for example to prevent spam or attempts to defraud users of the services, or to help prevent the loss of life or serious injury of anyone; 3.operate and maintain the security of our services, including to prevent or stop an attack on our computer systems or networks; or 4.protect the rights or property of Microsoft, including enforcing the terms governing the use of the services – however, if we receive information indicating that someone is using our services to traffic in stolen intellectual or physical property of Microsoft, we will not inspect a customer’s private content ourselves, but we may refer the matter to law enforcement.
Here are just a FEW of the already known public Privacy issues with Windows 10:
Take a look see and remember these are only the "publicly known" Privacy concerns. One could argue that google has already been doing some of these things (which is true) BUT when some of these "features of concern" are built into the most widely used Operating System in the World and as a feature that is ENABLED by DEFAULT - that should raise a few eyebrows for those paying attention. I'm sure more issues will be uncovered in the future. Wouldn't it be great if some of the more secretive designs of this OS somehow were discovered and made public?! Wow. that would be very interesting.
This free script provided by
JavaScript Kit
© 2024 Created by 0nin2migqvl32. Powered by
You need to be a member of Earth Changes and the Pole Shift to add comments!
Join Earth Changes and the Pole Shift