It nulls out a bunch of telemetry related addresses in your /etc/hosts file, and allows you to configure over a 100 different privacy settings from 1 place.
Microsoft have a long history of overriding and ignoring hosts configurations to their own addresses so I am skeptical on the utility of this. I think you might be a little too trusting.
I do not have time to repeat the efforts outlined by government contractors in the above links with this add on applied, I doubt you do either.
They do ignore the hosts file, it’s true - but they don’t ignore windows built-in firewall. I used it to blacklist a bunch of hosts when I had wireshark open to diagnose an unrelated problem and noticed all my keystrokes in the start menu search box were being sent to MS, as well as details about every application I launched. The search box keystrokes were going to onedrive - presumably to show me files matching from there, but I don’t see why they can’t download a list of files and locally search that. Sending every keystroke in that box is unnecessary.
I don't think it's a matter of being too trusting. I know what I'm getting into by using Windows.
I don't sweat it because I know I did everything I could on my end to minimize being spied on without it really affecting me in a negative way. Like you said, I don't have time to match the efforts of full time govt employees.
I spent a grand total of 30 minutes researching and tinkering with privacy related settings since I started using Windows 10, and I'm ok with that.
I use the tool I linked not only for modifying my hosts file, but it's a 1 stop menu to access all of Microsoft's scattered privacy settings.
No, I understand that I'm not in full control over what MS does with privacy related settings.
By using Windows, I'm accepting that, and in my case, instead of hunting through 15 different privacy settings screens in the control panel, I use that app to have them all in 1 place.
You conveniently left this out of your original comment, where you called people silly for not having things configured correctly.
This is a bit like saying that you've never had a problem with your car guzzling gas, or falsifying emissions, and then later casually mentioning that you actually own an electric motorcycle.
> You conveniently left this out of your original comment, where you called people silly for not having things configured correctly.
To prevent the issue the article spoke of only requires setting (2) options in the standard Microsoft settings, and also not signing in with a Live account.
Working without javascript requires development time. Running old versions of HTTP doesn't. Version 1.1 is going to be fully supported for a long time.
Running old versions of HTTP requires nothing because people will need to support legacy devices for a long time, and it's obviously already implemented in all major components (Servers, CDNs, Clients, etc.)
You (will) run HTTP/3, because it is more efficient, meaning that your servers will be able to service more request.
You run HTTP/2 and HTTP/1, because a lot of people are still using that, and you don't want to lose them. This especially applies to mobile devices, many of which are stuck with software that cannot be updated for various reasons.
There's no threat of the majority of websites going HTTP/3 anytime soon. By the time that might be a possibility, Tor will catch up.
Unless they lose 99% of their users, there's enough demand. Your level of pessimism on this specific detail is ridiculous. Tor might not last forever, but it won't be lack of HTTP support that kills it.
If you wait a few years for HTTP/3 to settle, proxies will be available that could be glued into tor inside a weekend hackathon.
> If you wait a few years for HTTP/3 to settle, proxies will be available that could be glued into tor inside a weekend hackathon.
In 16 years they have not managed to support UDP and now you say of a project (you are not familiar with...), that they can get it up over a weekend hackathon.
Do you have a contact address? I could mark my calendar for 2025. "some proxy with HTTP >= 3 and HTTP < 3 will exist" is a very basic prediction. It wouldn't have to be integrated into the tor codebase either, just spawned by the tor process.
Tor doesn't have UDP support right now because it doesn't need it for anything. The last 16 years are not equal to the next 16 years, surprisingly enough.
Still not getting it. Every site is hosted. The hosting company needs to spend money on HTTP/2, and be allowed to use it. The networks need to allow TCP through. All the steps down to the transport layer now require legacy maintenance.
Lots of things need to happen for HTTP/2 to 'stay alive'.
Your use of the future tense does not convince me.
Downvoted because of the "you geniuses". You're making a fair point that I hadn't thought of yet (I'm also a fan of Tor), but the delivery method is just plain rude.