PookaMustard: I've been literally dying for this. Do you have definitive proof of 'spying', 'big-brothering' and 'advertising'? For the first two, they are again sending just as much data as has been sent in Vista, only this time it's been made clear by them.
Unless i'm mistaken, the EULA that you have to agree to, says they will make backups of your encryption passwords/keys, emails, files, etc. There's also mentioned a key logger that's built into the OS.
If they are actively spying or not, it's something important to consider: Decades ago they had to
break into your house to plant a bug to spy on you. With Windows 10 they just need to click a button (
assuming it isn't already active all the time, the default settings certainly allow it; Also after updates windows conveniently forgets your privacy options).
This isn't science fiction. Consider when they pushed XBone, one of the features was voice commands. So to get your console to turn on you had to say '
Xbox ON!' meaning the system is always listening, not to mention it had a big camera pointing into your living room; And don't forget XBone was intended to be Always-Online or it wouldn't work. For Cirri to work, the microphone has to always be on. What's to prevent the microphone from always transmitting data? Recently with VOIP tests i could get really good quality audio in about 4k a second, good enough to listen in on conversations or do voice chat while playing games. Not that long ago people started glancing at some of the traffic that Windows 10 was doing, and tracked it to some weird microsoft servers that had nothing to do with updates.
This is also based around '
trusted computing' which doesn't trust the owners of the computer, rather whoever wrote the software/hardware. Unless there's open source code we can compile and compare against the output, we don't really know WHAT the software is doing.
There's also a known fact that the
NSA is heavily plugged into MS especially skype. I recall reading an article where when using skype a user noticed he had a lot of odd traffic on certain sites, so he pushed an http address, then shortly after got a time-out message saying the attempts on his page forced a password reset, proving that it was hit something like 200 times within a minute, when NO ONE should have been able to access that address since he messaged himself (
or something similar).
Unless you encrypt everything, and DON'T type the password or store the passwords/keys on Windows (
so just use Win10 as a router), then they are as good as handed to MS and the NSA, and they have every right according to the EULA to pass that information straight off to law enforcement if they feel they need to, without needing permission from you.
Much smarter people talking about Windows 10 and the implications involved...