Advertisement
Guest User

Untitled

a guest
Aug 11th, 2015
6,414
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Batch 5.52 KB | None | 0 0
  1. REM This should be run with command prompt as an adminstrator.
  2. REM Disable the antivirus and Windows Defender.
  3. REM After disabling those, rename the file extension from .txt to .cmd
  4. REM Then run this script.
  5. REM This does not fix all privacy issues, you will still need to turn off some.
  6.  
  7. REM First, block Windows from sending data about you to their servers.
  8.  
  9. echo ## BEGIN Windows 10 privacy settings ##>>%windir%\system32\drivers\etc\hosts
  10. echo 127.0.0.1  vortex.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
  11. echo 127.0.0.1  vortex-win.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
  12. echo 127.0.0.1 telecommand.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  13. echo 127.0.0.1 telecommand.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
  14. echo 127.0.0.1 oca.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  15. echo 127.0.0.1 oca.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
  16. echo 127.0.0.1 sqm.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  17. echo 127.0.0.1 sqm.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
  18. echo 127.0.0.1 watson.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  19. echo 127.0.0.1 watson.telemetry.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
  20. echo 127.0.0.1 redir.metaservices.microsoft.com>>%windir%\system32\drivers\etc\hosts
  21. echo 127.0.0.1  choice.microsoft.com>>%windir%\system32\drivers\etc\hosts
  22. echo 127.0.0.1 choice.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
  23. echo 127.0.0.1  df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  24. echo 127.0.0.1 reports.wes.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  25. echo 127.0.0.1 wes.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  26. echo 127.0.0.1 services.wes.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  27. echo 127.0.0.1 sqm.df.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  28. echo 127.0.0.1  telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  29. echo 127.0.0.1 watson.ppe.telemetry.microsoft.com>>%windir%\system32\drivers\etc\hosts
  30. echo 127.0.0.1  telemetry.appex.bing.net>>%windir%\system32\drivers\etc\hosts
  31. echo 127.0.0.1  telemetry.urs.microsoft.com>>%windir%\system32\drivers\etc\hosts
  32. echo 127.0.0.1 telemetry.appex.bing.net:443>>%windir%\system32\drivers\etc\hosts
  33. echo 127.0.0.1  settings-sandbox.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
  34. echo 127.0.0.1  vortex-sandbox.data.microsoft.com>>%windir%\system32\drivers\etc\hosts
  35. echo 127.0.0.1 survey.watson.microsoft.com>>%windir%\system32\drivers\etc\hosts
  36. echo 127.0.0.1  watson.live.com>>%windir%\system32\drivers\etc\hosts
  37. echo 127.0.0.1  watson.microsoft.com>>%windir%\system32\drivers\etc\hosts
  38. echo 127.0.0.1  statsfe2.ws.microsoft.com>>%windir%\system32\drivers\etc\hosts
  39. echo 127.0.0.1 corpext.msitadfs.glbdns2.microsoft.com>>%windir%\system32\drivers\etc\hosts
  40. echo 127.0.0.1 compatexchange.cloudapp.net>>%windir%\system32\drivers\etc\hosts
  41. echo 127.0.0.1  cs1.wpc.v0cdn.net>>%windir%\system32\drivers\etc\hosts
  42. echo 127.0.0.1  a-0001.a-msedge.net>>%windir%\system32\drivers\etc\hosts
  43. echo 127.0.0.1 statsfe2.update.microsoft.com.akadns.net>>%windir%\system32\drivers\etc\hosts
  44. echo 127.0.0.1 diagnostics.support.microsoft.com>>%windir%\system32\drivers\etc\hosts
  45. echo 127.0.0.1  corp.sts.microsoft.com>>%windir%\system32\drivers\etc\hosts
  46. echo 127.0.0.1  statsfe1.ws.microsoft.com>>%windir%\system32\drivers\etc\hosts
  47. echo 127.0.0.1  pre.footprintpredict.com>>%windir%\system32\drivers\etc\hosts
  48. echo 127.0.0.1 i1.services.social.microsoft.com>>%windir%\system32\drivers\etc\hosts
  49. echo 127.0.0.1 i1.services.social.microsoft.com.nsatc.net>>%windir%\system32\drivers\etc\hosts
  50. echo 127.0.0.1  bingads.microsoft.com>>%windir%\system32\drivers\etc\hosts
  51. echo 127.0.0.1  www.bingads.microsoft.com>>%windir%\system32\drivers\etc\hosts
  52. echo ## END Windows 10 privacy settings ##>>%windir%\system32\drivers\etc\hosts
  53.  
  54. REM First, opt-out of some, but not all, of the privacy settings.
  55. REM Not all anti-privacy settings have been found.
  56.  
  57. REM settings -> privacy -> general -> let apps use my ID …
  58. reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo\ /v Enabled /t REG_DWORD /d 0 /f
  59. reg delete HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo\ /v Id /f
  60. reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo\ /v Enabled /t REG_DWORD /d 0 /f
  61.  
  62. REM settings -> privacy -> general -> let websites provide locally …
  63. reg add “HKCU\Control Panel\International\User Profile\ /v HttpAcceptLanguageOptOut” /t REG_DWORD /d 1 /f
  64.  
  65. REM settings -> privacy -> general -> speech, inking, & typing
  66. reg add HKCU\SOFTWARE\Microsoft\InputPersonalization\ /v RestrictImplicitTextCollection /t REG_DWORD /d 1 /f
  67. reg add HKCU\SOFTWARE\Microsoft\InputPersonalization\ /v RestrictImplicitInkCollection /t REG_DWORD /d 1 /f
  68. reg add HKCU\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore\ /v HarvestContacts /t REG_DWORD /d 0 /f
  69. reg add HKCU\SOFTWARE\Microsoft\Personalization\Settings\ /v AcceptedPrivacyPolicy /t REG_DWORD /d 0 /f
  70.  
  71. REM Disables web search in the search box
  72. reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\ /v BingSearchEnabled /t REG_DWORD /d 0 /f
  73.  
  74. REM Block telemetry.
  75. powershell.exe -command "Get-Service DiagTrack | Set-Service -StartupType Disabled"
  76. powershell.exe -command "Get-Service dmwappushservice | Set-Service -StartupType Disabled"
  77. reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection\ /v AllowTelemetry /t REG_DWORD /d 0 /f
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement