Lukaszmik: Thank you. It's comforting to know this is not a permanent situation.
Doubly appreciate the response - the lack of any reply via e-mail wasn't encouraging.
adaliabooks: I kind of have to agree with the assessment that the OP is possessed of some serious aluminium millinery though.. from the various threads he's created on the topic he clearly has no idea what the script does or why it might be bad. You have articulated the worst case scenario of what might happen by white listing Cloudfront but the OP clearly believes it's an attempt to steal and sell his data...
Lukaszmik: Since this sums up pretty much all the somewhat reasonable accusations... you are welcome to correct if anything I write below is wrong.
If you connect to Amazon's cloud, for whatever reason, you do so by transmitting your IP address (well, duh) as well as the web page association where the script is used. Depending on the script, there can be additional information used either to initiate some server-side calculations, or used to parse correct version of scrip file, or whatnot. Depending on the client-side implementation, there could be more information sent if it is deemed desired.
The only way to know for certain is to investigate the page that requests the connection, and the code that is transmitted back. In the latter case, should one so desire, it is quite possible to obfuscate undesirable activity to make it extremely hard to detect even by users with professional level of knowledge. I mention this part merely as a theoretical consideration rather than something related to GOG specifically, but since you admire my heavy metal headgear, why not.
The easiest way to avoid any security issues, or unwanted data proliferation among data miners (as a slight aside Facebook just announced they will aggressively track non-users in environments including "apps" - first article I could find on this:
http://www.theverge.com/2016/5/27/11795248/facebook-ad-network-non-users-cookies-plug-ins) is to limit exposure to any contact with certain range of servers. For instance, I have all known Facebook IP ranges host-file-loopback blocked.
You are welcome to think whatever you want about my mental state, but if you just do some light reading on the subject you might find a lot of material supporting a very, very tight grip on your data, however indifferent it may initially appear.
Heh, both Google and Facebook (in partnership with Microsoft) are currently investing in private cables across the Atlantic. Both of the companies made their fortune by data mining and selling the results of such efforts.
Call me what you will. If anything, it's amusing, since I still remember the very same reaction in early 2000s to the warnings issued by technical people about U.S. federal agencies being engaged in internet monitoring on a scale nobody else wanted to believe. After Snowden, suddenly that changed to "oh, everybody knew that."