Microsoft Data Harvesting Backported To Windows 7 & 8

Use Netsparker


So as a follow up to our recent article about the rather lax Windows 10 default privacy settings, Microsoft has decided that even if you aren’t upgrading – they want your data anyway.

Microsoft Backports Data Harvesting To Windows 7 & 8

The most complete cloud indeed, made up of telemetry from your machines. Microsoft is back-porting the data harvesting portions of Windows 10 to both Windows 7 and Windows 8 – nice eh? And yah, Microsoft data harvesting? Not really surprising to be honest.

We recently mused, half seriously, whether the entire point of the Windows 10 upgrade was to harvest your personal information. With Microsoft suffering from a serious case of Google envy, perhaps it felt it had some catching up to do.

Now Microsoft is revamping the user-tracking tools in Windows 7 and 8 to harvest more data, via some new patches.

All the updates can be removed post-installation – but all ensure the OS reports data to Microsoft even when asked not to, bypassing the hosts file and (hence) third-party privacy tools. This data can include how long you use apps, and which features you use the most, snapshots of memory to investigate crashes, and so on.

The updates are KB3068708 (“Update for customer experience and diagnostic telemetry” and mandatory) KB3075249 (“Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7”) and KB3080149 (also an “Update for customer experience and diagnostic telemetry”, both optional).


In my experience backports generally only exist in the *nix World, so Microsoft is upping their game here backporting Windows 10 ‘features’ into older operating systems, all seamlessly delivered via the patching system. The only example I really remember was a bunch of stuff from Windows Vista being backported to Windows XP when SP3 was released.

If people are only installing security updates, they might not get these as one is optional and two will show up under recommended.

The notes explain that diagnostic telemetry data is sent to settings-win.data.microsoft.com (64.4.54.253) over SSL. Privacy advocates note that the OS is hardwired to use that hostname, so trying to override the IP address it resolves to using your PC’s hosts file won’t work.

The tools relate to Microsoft’s CEIP (‘customer experience improvement program’). Disabling the monitoring tools is complicated, requiring tweaks via both the policy editor, and at application level.

If you’re not bothered by anonymised data being sent to Microsoft (or mobile data caps) then the telemetry elevations probably won’t bother you.

Microsoft’s creepy robo-buddy “contextual operating service”, Cortana – which has caused much of the privacy concerns, even though it’s fairly well explained – remains an exclusive to Windows 10 and Windows 8.1 Phone.

If you want details on how to disable the snooping, check here: Microsoft intensifies data collection on Windows 7 and 8 systems

Not super tough to stop it, but it would be nice to be asked in the first place.

Source: The Register

Posted in: Privacy


Latest Posts:


Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.
testssl.sh - Test SSL Security Including Ciphers, Protocols & Detect Flaws testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
testssl.sh is a free command line tool to test SSL security, it checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more.
Four Year Old libSSH Bug Leaves Servers Wide Open Four Year Old libssh Bug Leaves Servers Wide Open
A fairly serious 4-year old libssh bug has left servers vulnerable to remote compromise, fortunately, the attack surface isn't that big as neither OpenSSH or the GitHub implementation are affected.
CHIPSEC - Platform Security Assessment Framework CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.


Comments are closed.