![]() ![]() A search for the sub-domain turned up a guess that it might be the Microsoft customer experience center. When I viewed the site in a browser, it returned 2021.1019.1.0, whatever that means. Since it went to the HTTPS port (443) it was surely encrypted. NOTE: I did not log the actual data being transmitted between my computer and Microsoft. What I did is quite repeatable, feel free to try it yourself. Twenty seconds after opening a socket to these two computers, SystemSettings.exe closed the socket.Ĭlearly Windows 10 spies on you any time you use the System Settings. The first was to port 443 (HTTPS) at IP address 13.107.21.200 which is The second was to port 443 at IP address 96.17.141.116 which is. We see that program C:\Windows\ImmersiveControlPanel\SystemSettings.exe made two outbound requests. I didn't change anything, just looked at a couple settings.ĭNSLookupView showed that this generated two DNS queries, one for and another forĬ. With the DNS logging programs running, I happened to look at the System Settings. ![]() Many of the scheduled telemetry tasks were disabled. Every customization I could find in the Systems Settings was disabled. It was also locked down as much as possible. It was logged on with a local account, not a Microsoft account. The computer in question was running Windows 10 Home Edition, service pack 20H2, build 19042.1083, which means it has bug fixes as of July 6, 2021. So, I have been running both of them side by side to see the pros/cons of each.Īnd, while logging DNS requests on a Windows 10 machine, I came across some interesting stuff. He already had a DNS logging program called DNSQuerySniffer but the new program gets its raw data from a different source. Recently, he released a new DNS logging program DNSLookupView. He creates great utilities for Windows and his software is both free and portable. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |