F5F Stay Refreshed Software Operating Systems Searching for a specific distribution type

Searching for a specific distribution type

Searching for a specific distribution type

Pages (3): Previous 1 2 3 Next
R
rhyno747
Member
79
07-05-2023, 05:17 PM
#11
I’m unsure why you bring this up. If it’s meant to clarify something I’m saying, I don’t understand what point you’re trying to make. Keeping nothing valuable on my device makes me potentially untouchable by threats like ransomware—like wiping drives if needed. I’m not a target for governments or criminals. I’m just a low-income person who doesn’t want to be exploited. Windows is inherently insecure from a security standpoint. The only real risk comes from people trying to access my data to execute social engineering tactics, which is essentially the same as what big companies like Facebook, Google, and now Microsoft do. Microsoft developed operating systems that avoided this issue. Edited June 6, 2022 by Bombastinator
R
rhyno747
07-05-2023, 05:17 PM #11

I’m unsure why you bring this up. If it’s meant to clarify something I’m saying, I don’t understand what point you’re trying to make. Keeping nothing valuable on my device makes me potentially untouchable by threats like ransomware—like wiping drives if needed. I’m not a target for governments or criminals. I’m just a low-income person who doesn’t want to be exploited. Windows is inherently insecure from a security standpoint. The only real risk comes from people trying to access my data to execute social engineering tactics, which is essentially the same as what big companies like Facebook, Google, and now Microsoft do. Microsoft developed operating systems that avoided this issue. Edited June 6, 2022 by Bombastinator

M
Meowables
Senior Member
608
07-08-2023, 07:34 AM
#12
Exploits, particularly zero-day attacks, are accessible to anyone. You can find numerous guides on YouTube created by young people. Is that really the case? Probably not... Have a great day.
M
Meowables
07-08-2023, 07:34 AM #12

Exploits, particularly zero-day attacks, are accessible to anyone. You can find numerous guides on YouTube created by young people. Is that really the case? Probably not... Have a great day.

M
MaliciousWolf
Member
228
07-09-2023, 05:16 PM
#13
You wonder if Windows 7 contains hidden spyware. That’s a curious thought. While it does use “call home,” the extent of the issue is relatively minor. I’ve had to accept that. It might be more accurate to say the VM-only version of Windows 10 is safer. Zero-day threats can’t be fully stopped except perhaps by creating a physical barrier. Security relying on obscurity isn’t something I trust. Handling the internet always comes with some risk, but it’s similar across most platforms. Still, it’s a distinct challenge. Should we be concerned? Absolutely not—air gaps are impractical, and fighting these problems isn’t worth it. Maybe I just prefer to give up and accept the situation.
M
MaliciousWolf
07-09-2023, 05:16 PM #13

You wonder if Windows 7 contains hidden spyware. That’s a curious thought. While it does use “call home,” the extent of the issue is relatively minor. I’ve had to accept that. It might be more accurate to say the VM-only version of Windows 10 is safer. Zero-day threats can’t be fully stopped except perhaps by creating a physical barrier. Security relying on obscurity isn’t something I trust. Handling the internet always comes with some risk, but it’s similar across most platforms. Still, it’s a distinct challenge. Should we be concerned? Absolutely not—air gaps are impractical, and fighting these problems isn’t worth it. Maybe I just prefer to give up and accept the situation.

H
henrybp44
Junior Member
4
07-10-2023, 12:47 PM
#14
I just recommended avoiding Windows 7 and especially not connecting it to the internet, since it no longer receives security updates. You're free to proceed as you see fit.
H
henrybp44
07-10-2023, 12:47 PM #14

I just recommended avoiding Windows 7 and especially not connecting it to the internet, since it no longer receives security updates. You're free to proceed as you see fit.

L
Lozzylula
Member
63
07-15-2023, 01:54 PM
#15
Watch games that don’t track your data. Avoid installing game providers like Steam; keep software open source for transparency. Refrain from using Discord in any browser—opt for clients supporting Matrix (such as nHeko or Fractal) instead. Stay vigilant by monitoring all outbound and inbound connections with tools like iPerf or pfSense at the network firewall. Review system logs in /var/log and /home/$USER/.var/log. Microsoft Windows versions have included telemetry malware since Service Pack 1, while Windows 10 and 11 add more features. If this worries you, consider avoiding Windows entirely or never connecting it to the internet during setup.
L
Lozzylula
07-15-2023, 01:54 PM #15

Watch games that don’t track your data. Avoid installing game providers like Steam; keep software open source for transparency. Refrain from using Discord in any browser—opt for clients supporting Matrix (such as nHeko or Fractal) instead. Stay vigilant by monitoring all outbound and inbound connections with tools like iPerf or pfSense at the network firewall. Review system logs in /var/log and /home/$USER/.var/log. Microsoft Windows versions have included telemetry malware since Service Pack 1, while Windows 10 and 11 add more features. If this worries you, consider avoiding Windows entirely or never connecting it to the internet during setup.

G
Greenybomb
Member
158
07-15-2023, 02:11 PM
#16
I understand this perspective. It seems to involve a setup where data passes through a middle layer between the device and the internet. A separate system would fetch the packet, evaluate its safety, and then either forward it to the VM or block it, sending back a fake packet if needed. This would function like an advanced firewall with port forwarding. The Windows client wouldn’t actually reach the raw internet, even if it appeared to. Creating such a system would likely be complex and slow, which is why I’m curious about which distros might handle it. It might not be feasible at all due to inherent design issues.

Edited June 6, 2022 by Bombastinator
G
Greenybomb
07-15-2023, 02:11 PM #16

I understand this perspective. It seems to involve a setup where data passes through a middle layer between the device and the internet. A separate system would fetch the packet, evaluate its safety, and then either forward it to the VM or block it, sending back a fake packet if needed. This would function like an advanced firewall with port forwarding. The Windows client wouldn’t actually reach the raw internet, even if it appeared to. Creating such a system would likely be complex and slow, which is why I’m curious about which distros might handle it. It might not be feasible at all due to inherent design issues.

Edited June 6, 2022 by Bombastinator

P
Piru_PvP
Junior Member
13
07-15-2023, 07:54 PM
#17
Windows doesn’t spy but it does handle tracking. This isn’t malware or spyware—it’s just tracking. Linux setups can also monitor your activity (for instance, the popcon package). There are instructions for boosting privacy on Windows, though third-party apps may still collect data. Even open-source tools aren’t foolproof (Audacity has faced criticism). You can still browse safely online.
P
Piru_PvP
07-15-2023, 07:54 PM #17

Windows doesn’t spy but it does handle tracking. This isn’t malware or spyware—it’s just tracking. Linux setups can also monitor your activity (for instance, the popcon package). There are instructions for boosting privacy on Windows, though third-party apps may still collect data. Even open-source tools aren’t foolproof (Audacity has faced criticism). You can still browse safely online.

H
Hampus07
Member
217
07-15-2023, 08:49 PM
#18
I don’t notice the distinction when tracking details are then sold. If they were merely using it for internal research to develop future offerings, that would be fine. But in reality, Apple does this. Once removed, it’s still leveraging personal information to exploit users for profit. Someone else is handling it. When data is sold to third parties, it becomes essentially spyware. This profitability is why I avoid using Facebook or Google products.
H
Hampus07
07-15-2023, 08:49 PM #18

I don’t notice the distinction when tracking details are then sold. If they were merely using it for internal research to develop future offerings, that would be fine. But in reality, Apple does this. Once removed, it’s still leveraging personal information to exploit users for profit. Someone else is handling it. When data is sold to third parties, it becomes essentially spyware. This profitability is why I avoid using Facebook or Google products.

C
COLIN20052012
Posting Freak
857
07-21-2023, 12:52 AM
#19
Tracking has its issues, yet it remains available in Linux or open-source environments. I'm sorry for any confusion. I discovered an old Windows 7 tracking article, which suggests using outdated OS versions isn't practical. https://www.techradar.com/news/computing...es-1029906 I hope this clears up your concerns.
C
COLIN20052012
07-21-2023, 12:52 AM #19

Tracking has its issues, yet it remains available in Linux or open-source environments. I'm sorry for any confusion. I discovered an old Windows 7 tracking article, which suggests using outdated OS versions isn't practical. https://www.techradar.com/news/computing...es-1029906 I hope this clears up your concerns.

N
NoobyTree
Junior Member
13
07-23-2023, 10:47 AM
#20
It’s more about gathering and monetizing the information collected. Monitoring itself isn’t a major issue. What matters is combining it with other actions. Raising your hand in the air isn’t illegal unless it directly harms someone. Dividing the process of collecting data and exploiting it is similar to stopping someone from using their own body against them.
N
NoobyTree
07-23-2023, 10:47 AM #20

It’s more about gathering and monetizing the information collected. Monitoring itself isn’t a major issue. What matters is combining it with other actions. Raising your hand in the air isn’t illegal unless it directly harms someone. Dividing the process of collecting data and exploiting it is similar to stopping someone from using their own body against them.

Pages (3): Previous 1 2 3 Next