Alexander Nicholi
what do you know about computing?
- 5,500
- Posts
- 14
- Years
- Age 26
- Research Triangle / Jakarta
- Seen Feb 14, 2024
I'm not going to pretend I know what Microsoft is up to, but at the same time neither do you. You only evaluated one possible course of action that could be taken with your file, and there are many many possibilities besides that. It's a stretch of an argument. You should see below, where I've outlined the control aspects of software.Mostly 'cause I'm pressed for time this morning. Anyway, I had some particular files on my computer that I could locally host as to exploit my Wii U by exploiting flaws in the webkit that it uses. However, Windows detects them as viruses unless you create an exception for them, which I didn't at the time. I copied those particular files to my computer, and the computer ended up automatically quarantining them. When I attempted to restore them, they weren't the same - the parts of the files where the exploit actually was ended up being scrubbed. Nothing else in the file was changed, just where the overflow code was. It also, at the time asked me if I wanted to send the information in, I simply clicked No and went on my way.
Besides, you have to be realistic here. If you have a cracked application (For the sake of argument, let's say it's a large application, 300MB) that has a virus inside of it that you aren't aware of, would it be wise to upload that entire 300MB, and waste bandwidth, or just upload what was relevant - say, a checksum of the file and a snippet of the actual virus?
I'm sorry, but it's still a massive exaggeration of my defense. It's a mimicking of my points in an effort to discredit them through absurdity, is it not?Anyway, it's not hyperbole. This is true because if you look at users vs age, there's less and less information as you get into older ages because they don't use the internet as much - they didn't grow up with it and never saw the need for it. Granted there are a few exceptions, but for the most part, most of people 55 and older don't use the internet as regularly as people younger than that do. Inherently, there's less information about them that companies can make use of, and that's because they aren't using the internet.
Heck, look at the Ashley Madison hack. Most of the people on there are young, not old. This correlation confirms my point.
This is a thread about Microsoft. Why on Earth would I bring up Samsung in a debate about Microsoft's privacy practices?Now this is hyperbole. You're comparing people that are pointing out the flaws in the arguments of people wearing those "tin foil hats" to, essentially, fascists. Besides, it's not just Microsoft that's doing this. Facebook is doing it, Google probably, Yahoo, Samsung, the list goes on. I don't get why you're exclusively targeting Microsoft when tons of other companies are doing the exact same thing. You're looking at just one front of an entire issue. While I don't agree with what these companies are doing, the fact that many companies are doing it without backlash means that it's something you're eventually going to have to live with, whether you like it or not.
So yeah, let's all just passively take it lying down from a lot of corporations we don't care enough to combat! Right? There's no point in fighting, might as well just give up. Isn't that a bit weak-minded? That isn't hyperbole, is it?
Nowhere have you, Team Fail, or anyone defending Microsoft's practices cited anything that contributes to your general rebuttal whatsoever. That is a fact. What is also fact is that because you completely lack citations for your claims, your arguments are therefore baseless, which means it is completely logical and reasonable to "gloss over them," as you put it.No one is being an apologist when they're merely stating facts that you have glossed over.
Thanks for the judgment God, but I don't think throwing around buzzwords does anything but add to the confusion.I think you're reading way too much into things lately, and unfortunately you seem to have believed all the FUD out there on Windows 10.
SourceTwiggy said:No, really, a lot of them aren't even remotely true - at least after you consider what's going on, and the fact that pretty much every single one of them is controllable.
Wired Magazine said:Both non-free software and SaaSS can spy on the user, shackle the user, and even attack the user. Malware is common in services and proprietary software products because the users don't have control over them. That's the fundamental issue: while non-free software and SaaSS are controlled by some other entity (typically a corporation or a state), free software is controlled by its users.
Based on that excerpt, none of whatever Windows settings you mentioned are "controllable." Free software is controlled by its users; proprietary software is controlled by its owners. Ergo, Microsoft is the one truly controlling those dials you fool around with – you haven't the slightest clue what the infinite layers of code beneath are made up of and neither do I. Control is out, for you.
That's a real disappointment Twiggy. You take this so seriously that you're going to cop out of the debate here before it's finished! Why? Is debating not fun? Is it because we're winning?Twiggy said:I'm done arguing.