Status
Not open for further replies.

NoMetadata

Junior Member
Dec 9, 2017
11
0
1
Vulnerbilities in all OS and software are put there in purpose by developers.

If you think about what a developer offers you (most times for "free") goes straight into your computer and starts interacting with your OS (no matter if is Mac, Windows, Linux, Android or other) that is designed to collect your private data to be sent straight into "security" datacenters like the one located in Bluffdale, Utah,

see: Blimp flies over NSA center in Bluffdale in aerial protest

Therefore this developer and the corporation he or she belongs to, becomes an intermediator between you and security organizations and/or cybercriminals, making your private life is persistently exposed to more people you can imagine.

The heroes of putting your life in third partie´s hands are: The Internet Engineering Task Force (In charge of making ISO rules that govern Internet protocols in a way if it is more intrusive is better)

Regarding metadata hidden inside pictures we have Gimp (GNU Image Manipulation Program) that really means: GIMP = PMIG = Profile MIGration

Your profile classified by encripted metadata captured by programmatic inventions and enviroments like. ODBC, WMIC, ICMP,Microsoft NET, PowerShell, icc profiles, regular expressions and so on is a very profitable way to steal your critical data (specially useful for "servicing" politicians, scientifics, writters and many others) , as there are more than 8.000 million digital devices to capture out there, used by non programming oriented consumers that rely on corporations that show them a big smile while really are intruders into their homes by their backdoor.

This last point is what really make happy corporative evangelists see: Ballmer`s happiness

If you don`t want to collaborate with this insane current reality be very careful in how and what you put inside your computer.

In next posts I will give you some practical advice to make your metadata not available to others.
 

NoMetadata

Junior Member
Dec 9, 2017
11
0
1
Regarding Windows in order not to receive unwanted intruders to sell your private life to others as first security measure is a must you change permissions in whole OS Partition: get rid of "TrustedInstaller" and "Authenticated Users" groups and the "Everyone" group special audit entry in every file and folder of your hard disk. (very time demandink task, but is worth to do it) if anyone out there has a fast way to do it, will be more than appreciated.

In order to do this, first activate "Administrator" Built in user and work always as Administrator (of course Windows will tell you this is a security risk) and delete any other "standard user"

As a matter of fact every time a pop up notification tells you that there is a security risk in what you do to secure yourself against hackers attacks is exactly what you need to do.

In other words security from Windows point of view is to unsecure private data belonging to consumers.

Obviously Microsoft disrespects one of its mayor Father of Nation, Benjamin Franklin that stated: "Those who would give up Liberty, to purchase security, deserve neither Liberty nor Safety".







I see this as more of a rant than anything else to help users.

I see no documentation/links/other authors to back up your "claims"

This thread is locked.


esquared
Anandtech Forum Director
 
Last edited by a moderator:

UsandThem

Elite Member
May 4, 2000
16,068
7,383
146
Obviously Microsoft disrespects one of its mayor Father of Nation, Benjamin Franklin that stated: "Those who would give up Liberty, to purchase security, deserve neither Liberty nor Safety".

The term is "founding fathers", and that quote used in proper context was about taxes.

And I agree with the poster above me. Everything you do digitally is collected, analyzed, or monitored is some form or another. And one last thing is it's a bad idea for non-tech or non-enthusiast people to do their daily stuff in an administrative account.
 

XavierMace

Diamond Member
Apr 20, 2013
4,307
450
126
Regarding Windows in order not to receive unwanted intruders to sell your private life to others as first security measure is a must you change permissions in whole OS Partition: get rid of "TrustedInstaller" and "Authenticated Users" groups and the "Everyone" group special audit entry in every file and folder of your hard disk. (very time demandink task, but is worth to do it) if anyone out there has a fast way to do it, will be more than appreciated.

In order to do this, first activate "Administrator" Built in user and work always as Administrator (of course Windows will tell you this is a security risk) and delete any other "standard user"

As a matter of fact every time a pop up notification tells you that there is a security risk in what you do to secure yourself against hackers attacks is exactly what you need to do.

In other words security from Windows point of view is to unsecure private data belonging to consumers.

Obviously Microsoft disrespects one of its mayor Father of Nation, Benjamin Franklin that stated: "Those who would give up Liberty, to purchase security, deserve neither Liberty nor Safety".

LOL. I have no other words for this point.
 

NoMetadata

Junior Member
Dec 9, 2017
11
0
1
Above is explained not even the first part of all

Once you have got administrative rights comes a bunch of tedious work like
selecting which files inside OS are needed by you and which files are needed by controllers of your data (parasitic files like all iis files) and many other steps that include reprograming .ini .xml .comments .config and others plus recompiling hundreds of dll files.

My Windows was originally 14 GB now is 5.3 GB with not a single symbolic link inside nor System Volume Information folder and works more than fast, never gets slower, not a single .tmp gets stuck there and History / Temporary Internet Files Folder folders are persistently empty no matter which applications are running nor which internal processes are being executed by degraded services my computer tries to run.

I think that just accepting
Everything you do digitally is collected, analyzed, or monitored is some form or another.
"Everything you do digitally is collected, analyzed, or monitored is some form or another." is like accepting that dude builds your house had the right to watch when you have sex with your wife and what your children talk at home or how many steps you walk daily inside your own house just because you don`t know how to cut wood or put bricks together.

So would be reasonable there were some developers like me to go against not just talking but colaborate by developing stupid devices in contrast to smart ass devices are overpopulating our world leading our grandchildren to be judged by a compuper and not by a jury.

In addition: my naive approach to defend data of my customers is getting these kind of results, for example when testing my machines using network online tools provided by Shields Up! :

1.gif
Attempting connection to your computer. . .
Shields UP! is now attempting to contact the Hidden Internet Server within your PC. It is likely that no one has told you that your own personal computer may now be functioning as an Internet Server with neither your knowledge nor your permission. And that it may be serving up all or many of your personal files for reading, writing, modification and even deletion by anyone, anywhere, on the Internet!
reddash.gif
Your Internet port 139 does not appear to exist!
One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion.
reddash.gif
Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.

graypixel.gif

transpixel.gif


passed.gif
trustealthanalysis.gif
passed.gif

transpixel.gif

graypixel.gif

transpixel.gif

Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice.
transpixel.gif

graypixel.gif



darkredpixel.gif
 

UsandThem

Elite Member
May 4, 2000
16,068
7,383
146
I think that just accepting "Everything you do digitally is collected, analyzed, or monitored is some form or another." is like accepting that dude builds your house had the right to watch when you have sex with your wife and what your children talk at home or how many steps you walk daily inside your own house just because you don`t know how to cut wood or put bricks together.

So would be reasonable there were some developers like me to go against not just talking but colaborate by developing stupid devices in contrast to smart ass devices are overpopulating our world leading our grandchildren to be judged by a compuper and not by a jury.
darkredpixel.gif

kroqr.jpg


Seriously, this thread is getting way off topic for post in a security sub-forum. It's like they just found the sequel to 1984 in Orwell's estate.
 
Status
Not open for further replies.