<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>PC should be ministering to user, not other way round</title>
    <link>https://www.pcministry.com/</link>
    <description>Recent content on PC should be ministering to user, not other way round</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 27 Jul 2019 17:23:34 +0300</lastBuildDate><atom:link href="https://www.pcministry.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Stats and Conclusions for Windows Server 2016</title>
      <link>https://www.pcministry.com/winsrv2016_telemetry/stats_and_conclusions/</link>
      <pubDate>Sat, 27 Jul 2019 17:23:34 +0300</pubDate>
      
      <guid>https://www.pcministry.com/winsrv2016_telemetry/stats_and_conclusions/</guid>
      <description>&lt;p&gt;In this article we present statistics and conclusions about privacy implications of Windows Server 2016.
This report is based on traffic recording of virtual machine running Windows Server 2016, which was run
continuously for 505 days, from 2018-02-03 to 2019-07-20. After the installation, Windows Server 2016
was switched to zero (Security) level of telemetry via Group Policy Editor (gpedit.msc). Then OS was
left alone. It had default settings and was running without any third party software installed.
In total, we have recorded and analyzed 39,921,165,760 bytes of received and transmitted data.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry: Summary: Top AS Numbers for Windows 10 Telemetry</title>
      <link>https://www.pcministry.com/winsrv2016_telemetry/summary/top_as_for_telemetry/</link>
      <pubDate>Sat, 27 Jul 2019 15:22:57 +0300</pubDate>
      
      <guid>https://www.pcministry.com/winsrv2016_telemetry/summary/top_as_for_telemetry/</guid>
      <description>&lt;p&gt;These AS numbers names were collected from 505 days of continuous recording of Windows Server 2016 telemetry traffic.
Virtual machine and traffic recording software was configured &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/&#34;&gt;as explained here&lt;/a&gt;.
Raw traffic dumps were processed &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/&#34;&gt;as explained here&lt;/a&gt;.&lt;/p&gt;
&lt;!--sbegin--&gt;
&lt;p&gt;First list of AS numbers has &lt;code&gt;20&lt;/code&gt; entries, sorted in descending order by total outgoing traffic
transmitted by Windows Server 2016. Second list of AS numbers has &lt;code&gt;18&lt;/code&gt; entries, sorted in descending order
by total incoming traffic received by Windows Server 2016. Telemetry level was set to zero (Security),
other settings were left at their defaults, and there was no third party software installed.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows Server 2016 Telemetry: Summary: Top Domains for Telemetry Over HTTP</title>
      <link>https://www.pcministry.com/winsrv2016_telemetry/summary/top_domains_for_telemetry_over_http/</link>
      <pubDate>Fri, 26 Jul 2019 18:18:45 +0300</pubDate>
      
      <guid>https://www.pcministry.com/winsrv2016_telemetry/summary/top_domains_for_telemetry_over_http/</guid>
      <description>&lt;p&gt;These domain names were collected from 505 days of continuous recording of Windows Server 2016 telemetry traffic.
Virtual machine and traffic recording software was configured &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/&#34;&gt;as explained here&lt;/a&gt;.
Raw traffic dumps were processed &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/&#34;&gt;as explained here&lt;/a&gt;.&lt;/p&gt;
&lt;!--sbegin--&gt;
&lt;p&gt;List of http-related domains has &lt;code&gt;31&lt;/code&gt; entry, sorted in descending order by total number of
outgoing HTTP connections initiated by Windows Server 2016 operating system (&lt;em&gt;with telemetry level set
to zero (Security) and without any third party software&lt;/em&gt;). We did not include domains which
had less than 3 outgoing HTTP connections.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows Server 2016 Telemetry: Summary: Top Domains for Telemetry Over HTTPS</title>
      <link>https://www.pcministry.com/winsrv2016_telemetry/summary/top_domains_for_telemetry_over_https/</link>
      <pubDate>Fri, 26 Jul 2019 18:09:25 +0300</pubDate>
      
      <guid>https://www.pcministry.com/winsrv2016_telemetry/summary/top_domains_for_telemetry_over_https/</guid>
      <description>&lt;p&gt;These domain names were collected from 505 days of continuous recording of Windows Server 2016 telemetry traffic.
Virtual machine and traffic recording software was configured &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/&#34;&gt;as explained here&lt;/a&gt;.
Raw traffic dumps were processed &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/&#34;&gt;as explained here&lt;/a&gt;.&lt;/p&gt;
&lt;!--sbegin--&gt;
&lt;p&gt;List of https-related domains has &lt;code&gt;336&lt;/code&gt; entries, sorted in descending order by total number of outgoing
HTTPS connections initiated by Windows Server 2016 operating system (&lt;em&gt;with telemetry level set
to zero (Security) and without any third party software&lt;/em&gt;). We did not include domains which had less
than 3 outgoing HTTPS connections.&lt;/p&gt;
&lt;p&gt;All this traffic was encrypted in such way that it can&amp;rsquo;t be decrypted by end user or ISP, only by Microsoft
and third parties trusted by Microsoft.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows Server 2016 Telemetry: Summary: Top IP Addresses for Telemetry Over HTTP</title>
      <link>https://www.pcministry.com/winsrv2016_telemetry/summary/top_ip_addresses_for_telemetry_over_http/</link>
      <pubDate>Fri, 26 Jul 2019 17:27:00 +0300</pubDate>
      
      <guid>https://www.pcministry.com/winsrv2016_telemetry/summary/top_ip_addresses_for_telemetry_over_http/</guid>
      <description>&lt;p&gt;These IP addresses were collected from 505 days of continuous recording of Windows Server 2016 telemetry traffic.
Virtual machine and traffic recording software was configured &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/&#34;&gt;as explained here&lt;/a&gt;.
Raw traffic dumps were processed &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/&#34;&gt;as explained here&lt;/a&gt;.&lt;/p&gt;
&lt;!--sbegin--&gt;
&lt;p&gt;List of http-related IP addresses has &lt;code&gt;358&lt;/code&gt; entries, sorted in descending order by total number of
outgoing HTTP connections initiated by Windows Server 2016 operating system (&lt;em&gt;with telemetry level set
to zero (Security) and without any third party software&lt;/em&gt;). We did not include IP addresses which had
less than 3 outgoing HTTP connections.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows Server 2016 Telemetry: Summary: Top IP Addresses for Telemetry Over HTTPS</title>
      <link>https://www.pcministry.com/winsrv2016_telemetry/summary/top_ip_addresses_for_telemetry_over_https/</link>
      <pubDate>Fri, 26 Jul 2019 17:16:03 +0300</pubDate>
      
      <guid>https://www.pcministry.com/winsrv2016_telemetry/summary/top_ip_addresses_for_telemetry_over_https/</guid>
      <description>&lt;p&gt;These IP addresses were collected from 505 days of continuous recording of Windows Server 2016 telemetry traffic.
Virtual machine and traffic recording software was configured &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/&#34;&gt;as explained here&lt;/a&gt;.
Raw traffic dumps were processed &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/&#34;&gt;as explained here&lt;/a&gt;.&lt;/p&gt;
&lt;!--sbegin--&gt;
&lt;p&gt;List of https-related IP addresses has &lt;code&gt;369&lt;/code&gt; entries, sorted in descending order by total number of
outgoing HTTPS connections initiated by Windows Server 2016 operating system (&lt;em&gt;with telemetry level set
to zero (Security) and without any third party software&lt;/em&gt;). We did not include IP addresses which had
less than 3 outgoing HTTPS connections.&lt;/p&gt;
&lt;p&gt;All this traffic was encrypted in such way that it can&amp;rsquo;t be decrypted by end user or ISP, only by Microsoft
and third parties trusted by Microsoft.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry: Summary Stats and Conclusions</title>
      <link>https://www.pcministry.com/win10_telemetry/summary_stats_and_conclusions/</link>
      <pubDate>Tue, 30 Jan 2018 15:41:40 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/summary_stats_and_conclusions/</guid>
      <description>&lt;p&gt;In this article we present summary statistics and conclusions about privacy implications of Windows 10.
This report is based on traffic recording of virtual machine with Windows 10, which was run continuously
for 346 days, from 2017-02-15 to 2018-01-27. After the installation, Windows 10 was left alone. This OS
had default settings and was running without any third party software installed. In total, we have recorded
and analyzed 55,945,178,210 bytes of received and transmitted data.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry: Summary: Top AS Numbers for Windows 10 Telemetry</title>
      <link>https://www.pcministry.com/win10_telemetry/summary/top_as_for_telemetry/</link>
      <pubDate>Mon, 29 Jan 2018 15:22:57 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/summary/top_as_for_telemetry/</guid>
      <description>&lt;p&gt;These AS numbers names were collected from 346 days of continuous recording of Windows 10 telemetry traffic.
Virtual machine and traffic recording software was configured &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/&#34;&gt;as explained here&lt;/a&gt;.
Raw traffic dumps were processed &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/&#34;&gt;as explained here&lt;/a&gt;.&lt;/p&gt;
&lt;!--sbegin--&gt;
&lt;p&gt;First list of AS numbers has &lt;code&gt;38&lt;/code&gt; entries, sorted in descending order by total outgoing traffic
transmitted by Windows 10. Second list of AS numbers has &lt;code&gt;54&lt;/code&gt; entries, sorted in descending order
by total incoming traffic received by Windows 10. We did not include autonomous systems which had less
than 128 Kb of transmitted/received data. Windows 10 had default settings and had no any third party
software installed.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry: Summary: Top Domains for Windows 10 Telemetry Over HTTP</title>
      <link>https://www.pcministry.com/win10_telemetry/summary/top_domains_for_telemetry_over_http/</link>
      <pubDate>Mon, 29 Jan 2018 13:40:45 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/summary/top_domains_for_telemetry_over_http/</guid>
      <description>&lt;p&gt;These domain names were collected from 346 days of continuous recording of Windows 10 telemetry traffic.
Virtual machine and traffic recording software was configured &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/&#34;&gt;as explained here&lt;/a&gt;.
Raw traffic dumps were processed &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/&#34;&gt;as explained here&lt;/a&gt;.&lt;/p&gt;
&lt;!--sbegin--&gt;
&lt;p&gt;List of http-related domains has &lt;code&gt;327&lt;/code&gt; entries, sorted in descending order by total number of
outgoing HTTP connections initiated by Windows 10 operating system (&lt;em&gt;with default settings and without
any third party software&lt;/em&gt;). We did not include domains which had less than 3 outgoing HTTP connections.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry: Summary: Top IP Addresses for Windows 10 Telemetry Over HTTP</title>
      <link>https://www.pcministry.com/win10_telemetry/summary/top_ip_addresses_for_telemetry_over_http/</link>
      <pubDate>Mon, 29 Jan 2018 13:40:32 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/summary/top_ip_addresses_for_telemetry_over_http/</guid>
      <description>&lt;p&gt;These IP addresses were collected from 346 days of continuous recording of Windows 10 telemetry traffic.
Virtual machine and traffic recording software was configured &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/&#34;&gt;as explained here&lt;/a&gt;.
Raw traffic dumps were processed &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/&#34;&gt;as explained here&lt;/a&gt;.&lt;/p&gt;
&lt;!--sbegin--&gt;
&lt;p&gt;List of http-related IP addresses has &lt;code&gt;1241&lt;/code&gt; entries, sorted in descending order by total number of
outgoing HTTP connections initiated by Windows 10 operating system (&lt;em&gt;with default settings and without
any third party software&lt;/em&gt;). We did not include IP addresses which had less than 3 outgoing HTTP connections.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry: Summary: Top Domains for Windows 10 Telemetry Over HTTPS</title>
      <link>https://www.pcministry.com/win10_telemetry/summary/top_domains_for_telemetry_over_https/</link>
      <pubDate>Mon, 29 Jan 2018 13:40:25 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/summary/top_domains_for_telemetry_over_https/</guid>
      <description>&lt;p&gt;These domain names were collected from 346 days of continuous recording of Windows 10 telemetry traffic.
Virtual machine and traffic recording software was configured &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/&#34;&gt;as explained here&lt;/a&gt;.
Raw traffic dumps were processed &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/&#34;&gt;as explained here&lt;/a&gt;.&lt;/p&gt;
&lt;!--sbegin--&gt;
&lt;p&gt;List of https-related domains has &lt;code&gt;1017&lt;/code&gt; entries, sorted in descending order by total number of outgoing
HTTPS connections initiated by Windows 10 operating system (&lt;em&gt;with default settings without any
third party software&lt;/em&gt;). We did not include domains which had less than 3 outgoing HTTPS connections.&lt;/p&gt;
&lt;p&gt;All this traffic was encrypted in such way that it can&amp;rsquo;t be decrypted by end user or ISP, only by Microsoft
and third parties trusted by Microsoft.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry: Summary: Top IP Addresses for Windows 10 Telemetry Over HTTPS</title>
      <link>https://www.pcministry.com/win10_telemetry/summary/top_ip_addresses_for_telemetry_over_https/</link>
      <pubDate>Mon, 29 Jan 2018 13:40:13 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/summary/top_ip_addresses_for_telemetry_over_https/</guid>
      <description>&lt;p&gt;These IP addresses were collected from 346 days of continuous recording of Windows 10 telemetry traffic.
Virtual machine and traffic recording software was configured &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/&#34;&gt;as explained here&lt;/a&gt;.
Raw traffic dumps were processed &lt;a href=&#34;https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/&#34;&gt;as explained here&lt;/a&gt;.&lt;/p&gt;
&lt;!--sbegin--&gt;
&lt;p&gt;List of https-related IP addresses has &lt;code&gt;1837&lt;/code&gt; entries, sorted in descending order by total number of
outgoing HTTPS connections initiated by Windows 10 operating system (&lt;em&gt;with default settings and without
any third party software&lt;/em&gt;). We did not include IP addresses which had less than 3 outgoing HTTPS connections.&lt;/p&gt;
&lt;p&gt;All this traffic was encrypted in such way that it can&amp;rsquo;t be decrypted by end user or ISP, only by Microsoft
and third parties trusted by Microsoft.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry, Part 4: Processing of Raw Traffic Dumps</title>
      <link>https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/</link>
      <pubDate>Sun, 28 Jan 2018 00:47:20 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/part4_processing_of_raw_traffic_dumps/</guid>
      <description>&lt;p&gt;Windows 10 telemetry traffic collection experiment is over. We have collected 55,945,178,210 bytes
of data, which was recorded continuously during 346 days, from 2017-02-15 to 2018-01-27.&lt;/p&gt;
&lt;p&gt;Let&amp;rsquo;s discuss tools and scripts we need to extract useful statistics from these raw dumps of traffic.
We will rely on &lt;code&gt;tcpdump&lt;/code&gt; builtin filtering packets, and also on standard &lt;code&gt;grep&lt;/code&gt;, &lt;code&gt;sed&lt;/code&gt; and &lt;code&gt;awk&lt;/code&gt;
UNIX tools for processing text information extracted from these packets.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry, Part 3: Telemetry Overviews From Microsoft</title>
      <link>https://www.pcministry.com/win10_telemetry/part3_telemetry_overviews_from_microsoft/</link>
      <pubDate>Fri, 14 Jul 2017 19:25:03 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/part3_telemetry_overviews_from_microsoft/</guid>
      <description>&lt;p&gt;Our experiment is running smoothly. So far we have accumulated 17.9 Gb of data to be analyzed.&lt;/p&gt;
&lt;p&gt;In the meanwhile, Microsoft has published two overviews of telemetry transmitted by Windows 10.
These overviews are composed in such way that Basic level of telemetry appears to transmit a lot
of data (it is presented in extremely detailed style) and Full level of telemetry appears to
transmit much less data (it is presented in condensed style).&lt;/p&gt;
&lt;p&gt;On the contrary, our measurements indicate that Full level of telemetry transmits much more bytes
over the wire.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry, Part 2: Recording Traffic of the Virtual Machine</title>
      <link>https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/</link>
      <pubDate>Wed, 15 Feb 2017 14:58:42 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/part2_recording_traffic_of_the_virtual_machine/</guid>
      <description>&lt;p&gt;In this part of the guide, we will tune up ZFS filesystem, prepare the hypervisor,
create virtual disk for Windows 10, and create Windows 10 VM control scripts.&lt;/p&gt;
&lt;p&gt;Then we will install Windows 10 into the virtual machine and leave Windows 10 virtual machine
for prolonged execution with traffic recording enabled.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry, Part 1: Setting Up the Network</title>
      <link>https://www.pcministry.com/win10_telemetry/part1_setting_up_the_network/</link>
      <pubDate>Tue, 14 Feb 2017 12:56:56 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/part1_setting_up_the_network/</guid>
      <description>&lt;p&gt;Windows 10 will run in the virtual machine powered by bhyve hypervisor, under FreeBSD 11.0 operating
system. It will have access to the internet via virtual local network, and all its traffic will be
recorded for further analysis. This virtual network will consist of two hosts: DHCP server/router
and Windows 10 virtual machine.&lt;/p&gt;
&lt;p&gt;In this part of the guide, we will configure network interfaces, firewall, routing, NAT, DHCP server,
and also set up &lt;code&gt;sshd&lt;/code&gt; and &lt;code&gt;tmux&lt;/code&gt; for convenient remote access to our FreeBSD server.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Privacy Implications of Windows 10 Telemetry: About Experiment</title>
      <link>https://www.pcministry.com/win10_telemetry/privacy_implications_about_experiment/</link>
      <pubDate>Sat, 11 Feb 2017 20:11:33 +0200</pubDate>
      
      <guid>https://www.pcministry.com/win10_telemetry/privacy_implications_about_experiment/</guid>
      <description>&lt;p&gt;In subsequent few months we will be conducting an experiment which involves installation of Windows 10
with default settings and recording all telemetry traffic which is transmitted by this OS. Received traffic
will be recorded as well. Windows 10 will sit in mostly idle state for a few months in a virtual machine
deployed on the always powered-on server. Besides basic OS setup, there will be not much activity in apps
and browser, in order to record as much clean telemetry traffic of this OS as possible.&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>
