Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Windows Vista Features and Services Harvest User Data for Microsoft - From your machine!
Softpedia ^ | 07/02/07 | Marius Oiaga

Posted on 07/02/2007 7:38:03 AM PDT by Salo

Forget about the WGA! 20+ Windows Vista Features and Services Harvest User Data for Microsoft - From your machine!

By: Marius Oiaga, Technology News Editor

Are you using Windows Vista? Then you might as well know that the licensed operating system installed on your machine is harvesting a healthy volume of information for Microsoft. In this context, a program such as the Windows Genuine Advantage is the last of your concerns. In fact, in excess of 20 Windows Vista features and services are hard at work collecting and transmitting your personal data to the Redmond company.

Microsoft makes no secret about the fact that Windows Vista is gathering information. End users have little to say, and no real choice in the matter. The company does provide both a Windows Vista Privacy Statement and references within the End User License Agreement for the operating system. Combined, the resources paint the big picture over the extent of Microsoft's end user data harvest via Vista.

Reading Between the EULA Lines

Together with Windows Vista, Microsoft also provides a set of Internet-based services, for which it has reserved full control, including alteration and cancellation at any given time. The Internet-based services in Vista "coincidentally" connect to Microsoft and to "service provider computer systems." Depending on the specific service, users may or may not receive a separate notification of the fact that their data is being collected and shared. The only way to prevent this is to know the specific services and features involved and to either switch them off or not use them.

The alternative? Well, it's written in the Vista license agreement. "By using these features, you consent to the transmission of this information. Microsoft does not use the information to identify or contact you."

The Redmond company emphasized numerous times the fact that all information collected is not used to identify or contact users. But could it? Oh yes! All you have to know is that Microsoft could come knocking on your door as soon as you boot Windows Vista for the first time if you consider the system’s computer information harvested. Microsoft will get your "Internet protocol address, the type of operating system, browser and name and version of the software you are using, and the language code of the device where you installed the software." But all they really need is your IP address.

What's Covered in the Vista License?

Windows Update, Web Content, Digital Certificates, Auto Root Update, Windows Media Digital Rights Management, Windows Media Player, Malicious Software Removal/Clean On Upgrade, Network Connectivity Status Icon, Windows Time Service, and the IPv6 Network Address Translation (NAT) Traversal service (Teredo) are the features and services that collect and deliver data to Microsoft from Windows Vista. By using any of these items, you agree to share your information with the Redmond Company. Microsoft says that users have the possibility to disable or not use the features and services altogether. But at the same time Windows update is crucial to the security of Windows Vista, so turning it off is not really an option, is it?

Windows Vista will contact Microsoft to get the right hardware drivers, to provide web-based "clip art, templates, training, assistance and Appshelp," to access digital software certificates designed "confirm the identity of Internet users sending X.509 standard encrypted information" and to refresh the catalog with trusted certificate authorities. Of course that the Windows Vista Digital Rights Management could not miss from a list of services that contact Microsoft on a regular basis. If you want access to protected content, you will also have to let the Windows Media Digital Rights Management talk home. Windows Media Player in Vista for example, will look for codecs, new versions and local online music services.

The Malicious Software Removal tool will report straight to Microsoft with both the findings of your computer scan, but also any potential errors. Also, in an effort to enable the transition to IPv6 from IPv4, "by default standard Internet Protocol information will be sent to the Teredo service at Microsoft at regular intervals."

Had Enough? I Didn't Think So!

Microsoft has an additional collection of 47 Windows Vista features and services that collect user data. However, not all phone home and report to Microsoft. Although the data collection process is generalized across the list, user information is also processed and kept on the local machine, leaving just approximately 50% of the items to both harvest data and contact Microsoft. Still, Microsoft underlined the fact that the list provided under the Windows Vista Privacy Statement is by no means exhaustive, nor does it apply to all the company's websites, services and products.

Activation, Customer Experience Improvement Program (CEIP), Device Manager, Driver Protection, Dynamic Update, Event Viewer, File Association Web Service, Games Folder, Error Reporting for Handwriting Recognition, Input Method Editor (IME), Installation Improvement Program, Internet Printing, Internet Protocol version 6 Network Address Translation Traversal, Network Awareness (somewhat), Parental Controls, Peer Name Resolution Service, Plug and Play, Plug and Play Extensions, Program Compatibility Assistant, Program Properties—Compatibility Tab, Program Compatibility Wizard, Properties, Registration, Rights Management Services (RMS) Client, Update Root Certificates, Windows Control Panel, Windows Help, Windows Mail (only with Windows Live Mail, Hotmail, or MSN Mail) and Windows Problem Reporting are the main features and services in Windows Vista that collect and transmit user data to Microsoft.

This extensive enumeration is not a complete illustration of all the sources in Windows Vista that Microsoft uses to gather end user data. However, it is more than sufficient to raise serious issues regarding user privacy. The Redmond company has adopted a very transparent position when it comes to the information being collected from its users. But privacy, much in the same manner as virtualization, is not mature enough and not sufficiently enforced through legislation. Microsoft itself is one of the principal contributors to the creation of a universal user privacy model.

The activation process will give the company product key information together with a "hardware hash, which is a non-unique number generated from the computer's hardware configuration" but no personal information. The Customer Experience Improvement Program (CEIP) is optional, and designed to improve software quality. Via the Device Manager, Microsoft has access to all the information related to your system configuration in order to provide the adequate drivers. Similarly, Dynamic Update offers your computer's hardware info to Microsoft for compatible drivers.

Event Viewer data is collected every time the users access the Event Log Online Help link. By using the File Association Web Service, Microsoft will receive a list with the file name extensions. Metadata related to the games that you have installed in Vista also finds its way to Microsoft. The Error Reporting for Handwriting Recognition will only report to Microsoft if the user expressly desires it to. Through IME Word Registration, Microsoft will receive Word registration reports. Users have to choose to participate in the Installation Improvement Program before any data is sent over at Microsof.

Ever used a print server hosted by Microsoft? Then the company collected your data through Internet Printing. Network Awareness is in a league of its own. It does not premeditatedly store of send directly information to Microsoft, but it makes data available to other services involving network connectivity, and that do access the Redmond company. Via Parental Controls, not only you but also Microsoft will monitor all the visited URLs of your offspring.

Hashes of your Peer Name tied to your IP address are published and periodically refreshed on a Microsoft server, courtesy of the Peer Name Resolution Service. Every time you install a Plug and Play device, you tell Microsoft about it in order to get the necessary device drivers. The same is the case for PnP-X enabled device, only that Windows Update is more actively involved in this case.

The Program Compatibility Assistant is designed to work together with the Microsoft Error Reporting Service, to highlight to Microsoft potential incompatibility errors. For every example of compatibility settings via the Compatibility tab, Microsoft receives an error report. The Program Compatibility Wizard deals with similar issues related to application incompatibility. File properties are sent to Microsoft only with the item that they are associated with.

You can also volunteer your name, email address, country and even address to Microsoft through the registration process. A service such as the Rights Management Services (RMS) Client can only function in conjunction with your email address.

All the queries entered into the Search box included in the Windows Vista Control Panel will be sent to Microsoft with your consent. The Help Experience Improvement Program also collects and sends information to Microsoft. As does Windows Mail when the users access Windows Live Mail, Hotmail, or MSN Mail. And the Windows Problem Reporting is a service with a self explanatory name.

But is this all? Not even by a long shot. Windows Genuine Advantage, Windows Defender, Support Services, Windows Media Center and Internet Explorer 7 all collect and transmit user data to Microsoft. Don't want them to? Then simply turn them off, or use alternative programs when possible or stop using some services altogether. Otherwise, when your consent is demanded, you can opt for NO.

What Happens to My Data?

Only God and Microsoft know the answer to that. And I have a feeling that God is going right now "Hey, don't get me involved in this! I have enough trouble as it is trying to find out the release date for Windows Vista Service Pack 1 and Windows Seven!"

Generally speaking, Microsoft is indeed transparent – up to a point – about how it will handle the data collected from your Vista machine. "The personal information we collect from you will be used by Microsoft and its controlled subsidiaries and affiliates to provide the service(s) or carry out the transaction(s) you have requested or authorized, and may also be used to request additional information on feedback that you provide about the product or service that you are using; to provide important notifications regarding the software; to improve the product or service, for example bug and survey form inquiries; or to provide you with advance notice of events or to tell you about new product releases," reads a fragment of the Windows Vista Privacy Statement.

But could Microsoft turn the data it has collected against you? Of course, what did you think? "Microsoft may disclose personal information about you if required to do so by law or in the good faith belief that such action is necessary to: (a) comply with the law or legal process served on Microsoft; (b) protect and defend the rights of Microsoft (including enforcement of our agreements); or (c) act in urgent circumstances to protect the personal safety of Microsoft employees, users of Microsoft software or services, or members of the public," reveals another excerpt.

And you thought that it was just you... and your Windows Vista. Looks like a love triangle to me... with Microsoft in the mix.


TOPICS: Conspiracy; Weird Stuff
KEYWORDS: bigbrother; microshaft; operatingsystems; privacy; spying; windows
Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-122 next last
To: HairOfTheDog

Oh. Sorry. I forgot you work for microsoft. Until the ridicule, scorn and sarcasm directed at a customer with a problem reminded me.


101 posted on 07/02/2007 11:18:46 AM PDT by null and void (Tired of living in the shadows? Move to Sunny Mexico!)
[ Post Reply | Private Reply | To 91 | View Replies]

To: null and void

22 KB is not very big. What size should it have?


102 posted on 07/02/2007 11:19:30 AM PDT by HairOfTheDog
[ Post Reply | Private Reply | To 100 | View Replies]

To: null and void

I don’t work for Microsoft.


103 posted on 07/02/2007 11:19:58 AM PDT by HairOfTheDog
[ Post Reply | Private Reply | To 101 | View Replies]

To: null and void

Have you checked in your temp area? Sometimes you get lucky and documents, or substantial parts of them, end up there.


104 posted on 07/02/2007 11:25:41 AM PDT by Salo
[ Post Reply | Private Reply | To 101 | View Replies]

To: discostu; HairOfTheDog
Was the document inside an e-mail?

Bingo, sort of. I downloaded the attachment and worked on in in orifice.

Office has a long standing habit of getting itself confused by doc files in e-mails, especially if you’re using Outlook.

"As for Outlook... I've used it for years without any problem. It's better than any other mail/calendar/contact manager I've seen." ~ HairOfTheDog

The problem comes in that Outlook (and other e-mail apps) make temporary versions of these files and with Word works on them it works on the temp version so unless you specifically redirected the save location out of Outlook’s favorite temp folder it saved there, then if you closed the e-mail without saving your changes are gone.

ACK!

If you got lucky and actually saved the changes to the e-mail and you still have the e-mail you might actually get your post modification version of the doc.

I thought I was saving it as a new document. I even changed the file name.

Another possibility is that you were logged in as a different user so your current user knows nothing about the doc.

Don't think so.

There are lots of ways to confuse Office.

Really???

On the bright side, this is only delaying my provisional patent app, and the venture capitalist is only hinging $2-5M on it.

105 posted on 07/02/2007 11:30:43 AM PDT by null and void (Tired of living in the shadows? Move to Sunny Mexico!)
[ Post Reply | Private Reply | To 96 | View Replies]

To: HairOfTheDog

The rule of thumb used to be one full page of text was ~1 KB.

22KB seems a bit high for an utterly blank page.


106 posted on 07/02/2007 11:34:06 AM PDT by null and void (Tired of living in the shadows? Move to Sunny Mexico!)
[ Post Reply | Private Reply | To 102 | View Replies]

To: null and void

Well, OK then... That explains where the error came from, working on the attachment is an easy place for you to have made an error. Did you save the email or not?

As a matter of habit, I copy attachments to my own location if I’m going to change them, so that I can keep a record of what the original was, and so that I file it in the right place.

Good habit to get into.


107 posted on 07/02/2007 11:35:39 AM PDT by HairOfTheDog
[ Post Reply | Private Reply | To 105 | View Replies]

To: null and void
The rule of thumb used to be one full page of text was ~1 KB. 22KB seems a bit high for an utterly blank page.

But it's not just text. It's a Document with formatting in it, even if you've not typed anything, it has a default font, margins, print settings, all kinds of information. It's not just text any more.

108 posted on 07/02/2007 11:38:06 AM PDT by HairOfTheDog
[ Post Reply | Private Reply | To 106 | View Replies]

To: HairOfTheDog

You should.


109 posted on 07/02/2007 11:42:11 AM PDT by null and void (Tired of living in the shadows? Move to Sunny Mexico!)
[ Post Reply | Private Reply | To 103 | View Replies]

To: HairOfTheDog
Did you save the email or not?

Yes. But the modified file is simply gone. The old one is there in all its incomplete glory.

110 posted on 07/02/2007 11:44:29 AM PDT by null and void (Tired of living in the shadows? Move to Sunny Mexico!)
[ Post Reply | Private Reply | To 107 | View Replies]

To: HairOfTheDog
Aye. It's also a lot of information tracking the originator and every move keystroke they've made.
111 posted on 07/02/2007 11:46:02 AM PDT by null and void (Tired of living in the shadows? Move to Sunny Mexico!)
[ Post Reply | Private Reply | To 108 | View Replies]

To: null and void
You should.

If they would agree, I would agree. :~D

112 posted on 07/02/2007 11:57:02 AM PDT by HairOfTheDog
[ Post Reply | Private Reply | To 109 | View Replies]

To: null and void
Aye. It's also a lot of information tracking the originator and every move keystroke they've made.

So... do you want it saving things or not? Make up your mind!

113 posted on 07/02/2007 11:57:40 AM PDT by HairOfTheDog
[ Post Reply | Private Reply | To 111 | View Replies]

To: HairOfTheDog
I want it to let me find the things it is allegedly saving!

Just as a point of interest, I also worked on an Excel file attached to the selfsame e-mail. It saved that with absolutely no problems or errors.

114 posted on 07/02/2007 12:01:16 PM PDT by null and void (Tired of living in the shadows? Move to Sunny Mexico!)
[ Post Reply | Private Reply | To 113 | View Replies]

To: HairOfTheDog

Use me as a reference?


115 posted on 07/02/2007 12:01:47 PM PDT by null and void (Tired of living in the shadows? Move to Sunny Mexico!)
[ Post Reply | Private Reply | To 112 | View Replies]

To: null and void

Nully, it’ll save what you tell it to save, if you do it right. I understand how you made the error... I’ve done it. It’s far better to save a copy to your own folder before working on it than it is to work in the attachment. At some point it asked you if you wanted to save the attachment, and you quite simply answered wrong.


116 posted on 07/02/2007 12:11:22 PM PDT by HairOfTheDog
[ Post Reply | Private Reply | To 114 | View Replies]

To: null and void

Did you download it via a browser? Browsers tend to do the same kind of stuff e-mail apps do. The core problem is temp files and who owns them. When you open a Word doc via e-mail or a browser what Word is actually being handed is a temp file, and worse still a temp file that it doesn’t own. Unless you’re either very careful or very lucky the non-Word application is going to maintain ownership of that file and will probably either revert or delete the file. And unfortunately because the modern world is built around “seamless” integrations you pretty much need to know you’re at risk of running into these problem to avoid them, Word doesn’t know it’s working with a file it doesn’t own, it was told to open this file for editing so it did. And it’s not an MS only thing, I know people that work on Macs or Linux that have run into similar problems, integrating products so well the user doesn’t have to think about it means the user often doesn’t think about it.

For future stuff here’s some habits I developed to avoid this particular problem (which has bitten me multiple times):
Don’t open documents you intend to change from inside a browser or e-mail app, save them to your hard drive somewhere and work from that
If you do wind up opening the doc from inside a different app do a save as and make sure you put your saved as in a folder other than the default, the default is going to the folder your browser/ e-mail stores temporary files and will periodically be cleaned up (some apps do a better job of cleaning up than others, for you the better the app cleans up the worse it is for you), changing the file name is often not enough because that’s still going to leave it in the temp folder and some apps kill their entire folder on shutdown
When in doubt before closing Office open up Windows Explorer and see if you can find the file, open it (this will probably lead to Office complaining the file is already open, but it should still let you get to it read only), and verify your changes are actually in it

If you follow those three steps you’ll be fine, and once you train yourself to always do 1 or 2 you don’t have to do 3.

As for finding your file, first thing to do is look to see if there’s something really goofy in your recent documents list. If you have something that looks like ~1234567.tmp that might be your document. If you don’t get that lucky figure out where the app you used to access the file keeps its temps and go poking through the files in there, turn on thumbnail views and any Word docs in there should (OK let’s say might) show their first page. If neither of those works then you’re probably SOL.

Sadly many VC funds have been lost because computers like to appear smarter than they are. I hope you find it.


117 posted on 07/02/2007 12:43:32 PM PDT by discostu (indecision may or may not be my biggest problem)
[ Post Reply | Private Reply | To 105 | View Replies]

To: HairOfTheDog; Salo
Yeah. Stupid computer did what I told it to.

I can forgive it that, but what irks me is that it doesn’t show it as a "Recent Document".

Well, duh! Even if I saved it in the wrong place, or with a wrong name, it should still remember that I spent hours working on it! What else would "Recent Documents" mean???

Salo pointed me in the right direction and I was able to recover a full day’s work, even if the damm application insisted that I did nothing memorable that day.

118 posted on 07/02/2007 12:44:11 PM PDT by null and void (Tired of living in the shadows? Move to Sunny Mexico!)
[ Post Reply | Private Reply | To 116 | View Replies]

To: discostu

Sage advice.

Default, dear Brutus lies not in the stars, but within our computers...


119 posted on 07/02/2007 12:48:19 PM PDT by null and void (Tired of living in the shadows? Move to Sunny Mexico!)
[ Post Reply | Private Reply | To 117 | View Replies]

To: TChris

we must live close, mine is 192.168.1.1


120 posted on 07/02/2007 2:31:58 PM PDT by postaldave (republicans need spending rehab before trying to control congress again.)
[ Post Reply | Private Reply | To 5 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-122 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson