{"id":15087,"date":"2015-07-31T17:43:14","date_gmt":"2015-07-31T17:43:14","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4318"},"modified":"2019-11-15T22:58:17","modified_gmt":"2019-11-15T11:58:17","slug":"windows-10-data-control","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/windows-10-data-control\/15087\/","title":{"rendered":"Windows 10: keeping control over your data"},"content":{"rendered":"<p>We\u2019ve <a href=\"https:\/\/business.kaspersky.com\/microsoft-updates\/4305\" target=\"_blank\" rel=\"noopener nofollow\">written about a rather radical approach to updates delivery<\/a>, which Microsoft adopts with Windows 10. Now, since the OS arrived two days ago, new security-related concerns have surfaced. First and foremost, it is about control over the data on Windows 10-based PCs and other devices.<\/p>\n<p>It\u00a0all started with this tweet, which caught our eye yesterday:<\/p>\n<p>https:\/\/twitter.com\/kaepora\/status\/626773729197064193<\/p>\n<p>The author isn\u2019t just a random Twitter user; he\u2019s a PhD student at the French Institute for Research in Computer Science and Automation, studying applied cryptography (according to his own Twitter userinfo), so he apparently knows a thing or two on the matter.<\/p>\n<p>\u201cWell, really?\u201d was our initial reaction. We decided to dig deeper, and here\u2019s what we found:<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Windows 10: keeping control over your data<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2Evd&amp;text=Windows+10%3A+keeping+control+over+your+data\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>BitLocker<\/strong><\/p>\n<p>First of all, device encryption is not new and unique to Windows 10; it\u2019s been introduced in Windows Vista, which makes it a 9-year-old feature. It was present in the top-tier editions of OS, though: Ultimate\/Pro and Enterprise.<\/p>\n<p>According to Microsoft\u2019s BitLocker-related FAQ, BitLocker Recovery Keys indeed may be saved to online Microsoft accounts, albeit it is also possible to save them to a local file.<\/p>\n<p>Also, take a look at <a href=\"https:\/\/randomoracle.wordpress.com\/2013\/09\/16\/all-your-keys-are-belong-to-us-windows-8-1-bitlocker-and-key-escrow\/\" target=\"_blank\" rel=\"noopener nofollow\">this 2013 article<\/a>. It reads:<\/p>\n<p><em>\u201cFor domain-joined machines, there is also the \u201coption\u201d to upload recovery keys to Active Directory\u2014 in other words key-escrow to the IT department, (In quotes because the decision is not made by end users but configured centrally by IT policy.)\u201d<\/em><\/p>\n<p>And the most \u201cinteresting\u201d option is to use Microsoft\u2019s own cloud as an \u201ckey-escrow agent.\u201d And since Windows 8.1, any machine that happens to have requisite TPM hardware, BitLocker disk encryption will be enabled with recovery keys escrowed to MSFT automatically.<\/p>\n<p>In Windows 10 the BitLocker recovery keys are also stored to your account at OneDrive (Microsoft\u2019s cloud service) by default. This is grounds for at least some privacy concern, namely who actually owns the keys. Although it is unlikely that Microsoft may have actual access to these keys, hence the data encrypted with them.<\/p>\n<p><strong>Data gathering, in troves<\/strong><\/p>\n<p>There are many other things to consider, though. Take a look at this article at <a href=\"http:\/\/thenextweb.com\/microsoft\/2015\/07\/29\/wind-nos\/\" target=\"_blank\" rel=\"noopener nofollow\">The Next Web<\/a>. It appears Microsoft has introduced into Windows 10 a bit too many tools to gather data on users\u2019 activities.<\/p>\n<p><em>\u201cSign into Windows with your Microsoft account and the operating system immediately syncs settings and data to the company\u2019s servers. That includes your browser history, favorites and the websites you currently have open as well as saved app, website and mobile hotspot passwords and Wi-Fi network names and passwords\u201d,<\/em> the article says. It is possible to deactivate, but this will require a deep dig into settings, which many users may not be willing to do.<\/p>\n<p>Then there is the virtual assistant, Cortana, for which Microsoft will need some data. Namely:<\/p>\n<p><em>\u201c\u2026Your device location, data from your calendar, the apps you use, data from your emails and text messages, who you call, your contacts and how often you interact with them on your device.<\/em><\/p>\n<p><em>Cortana also learns about you by collecting data about how you use your device and other Microsoft services, such as your music, alarm settings, whether the lock screen is on, what you view and purchase, your browse and Bing search history, and more.\u201d<\/em><\/p>\n<p>As the TNW author notes, \u201cLots of things can live in those two words \u2018and more.'\u201d In fact, Cortana would be next to useless without this data, but again, there are privacy concerns.<\/p>\n Hello, Cortana. So you need some info?..\n<p>In addition, Microsoft is apparently going to collect the data \u201cfrom you and your devices\u201d \u00a0\u2013 and, as we know, Windows 10 is going to form a unified ecosystem for both PC and mobile devices. Windows 10 will log your activities \u2013 including the apps you run and networks you connect to \u2013 and will also generate a unique advertising ID for each device. And it will show the ads, ostensibly tailored just for you. This feature can be turned off as well in any device, but again \u2013 it sits deep in the settings.<\/p>\n<p>As for networks, there is a function called Wi-Fi Sense, which is said to be able to \u201ctap into your network of Facebook contacts\u201d. \u201c<em>Technically, Windows Wi-Fi is a third-party app that accesses your Facebook friends so Microsoft knows who you\u2019re friends with<\/em>.\u201d<\/p>\n<p>That doesn\u2019t sound encouraging. And reading <a href=\"http:\/\/www.windowsphone.com\/en-us\/how-to\/wp8\/connectivity\/use-wi-fi-sense-to-get-connected\" target=\"_blank\" rel=\"noopener nofollow\">the official sources<\/a> won\u2019t help much:<\/p>\n<p><em>\u201cWi-Fi Sense automatically connects you to nearby Wi-Fi networks\u2026 Wi-Fi Sense can do a lot of things for you to get you connected to the Internet using Wi-Fi, so you don\u2019t have to do them on your own. These include:<\/em><\/p>\n<ul>\n<li><em>Automatically connecting you to crowdsourced open Wi-Fi networks it knows about.<\/em><\/li>\n<li><em>Accepting a Wi-Fi network\u2019s terms of use on your behalf and providing additional info for you to networks that require it.<\/em><\/li>\n<li><em>Letting you exchange password-protected Wi-Fi network access with your contacts to give and get Internet access without seeing each other\u2019s Wi-Fi network passwords.<\/em><\/li>\n<\/ul>\n<p><em>You can have it do all of these things, some of them, or none at all. That\u2019s up to you.\u201d<\/em><\/p>\n<p>It\u2019s obvious this is a \u201clazy\u201d feature for the mobile end-users who don\u2019t give a (insert your four-letter word of choice here); they just want to hook up to a neighboring network and get online. Besides, all those \u201cfriends\u201d \u2013 not only Facebook, but also Skype and Outlook \u2013 won\u2019t get to see your password and you won\u2019t see theirs. But we\u2019ve yet to see if this system is bullet-proof; data\u00a0security compromises could be\u00a0in the making.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Have a nice, sheer bout of #security paranoia.\u00a0<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2Evd&amp;text=Have+a+nice%2C+sheer+bout+of+%23security+paranoia.%C2%A0\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Now, there are extra notable entries in the new <a href=\"https:\/\/www.microsoft.com\/en-us\/privacystatement\/default.aspx\" target=\"_blank\" rel=\"noopener nofollow\">Privacy Policy<\/a> and <a href=\"https:\/\/www.microsoft.com\/en-gb\/servicesagreement\/default.aspx\" target=\"_blank\" rel=\"noopener nofollow\">Service Agreement<\/a>:<\/p>\n<p>\u201c<em>We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to protect our customers or enforce the terms governing the use of the services.\u201d<\/em><\/p>\n<p>Sounds vague, to put it mildly. And while the wording here is a subject matter for lawyers, the actual control over your data is in question here, too.<\/p>\n<p>Our readers might like to read this Reddit <a href=\"https:\/\/www.reddit.com\/r\/crypto\/comments\/3f0j44\/windows_10_backs_up_your_bitlocker_recovery_key\/?sort=new\" target=\"_blank\" rel=\"noopener nofollow\">thread<\/a> as well \u2013 some clarifications are available there, as long as chaff and weeds are separated \u2013 and the chaff is abundant there.<\/p>\n<p><strong>So what? <\/strong><\/p>\n<p>As we have written before, the level of security of your data depends \u2013 to a large degree \u2013 on the level of control you retain over it. The data owner should know what is going on with the data, where it is, and how to not lose access to it.<\/p>\n<p>Microsoft\u2019s new terms of service is, well, a sort of \u201cenvironmental condition\u201d \u2013 it\u2019s unlikely that the OS maker is going to change them, unless the feedback is overwhelmingly negative. And it is, in turn, unlikely too, because all of these features are quite trendy \u2013 without any malice suggested. Things like Cortana and Windows Wi-Fi are just what people want \u2013 things that do a lot of routine operations for them.<\/p>\n<p>But it is not necessarily welcome for businesses. These fancy new additions may threaten data integrity across various devices. And as for encryption, it<a href=\"https:\/\/business.kaspersky.com\/data-encryption-in-kaspersky-small-office-security-the-way-to-be-sure\/1265\" target=\"_blank\" rel=\"noopener nofollow\"> is a good tool to prevent data loss<\/a>, but in case the recovery keys are lost for some reason, so is the data.\u00a0All in all, recovery keys are best stored in a safe place, without escrowing them.<\/p>\n<p>As for the functions that may light up privacy concerns, it looks like they can mostly \u2013 if not totally \u2013 be deactivated. They probably <em>should be<\/em> in order to retain control over the data across devices. Additional issues with BYOD are likely\u00a0bound to arrive with all of those fashionable things like Wi-Fi credentials sharing.<\/p>\n<p>The most important thing here is to know how Windows 10 works, and what it does with the data by default \u2013 and how to change it, if possible and necessary. And read the EULAs, of course.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since Windows 10 arrived two days ago, new security-related concerns have surfaced. First and foremost, they&#8217;re about control over the data on Windows 10-based PCs and other devices.<\/p>\n","protected":false},"author":209,"featured_media":15504,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[261,38,113,1018],"class_list":{"0":"post-15087","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-encryption","10":"tag-microsoft","11":"tag-windows","12":"tag-windows-10"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/windows-10-data-control\/15087\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/windows-10-data-control\/7974\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/windows-10-data-control\/3095\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/windows-10-data-control\/15087\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/windows-10-data-control\/15087\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/encryption\/","name":"encryption"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=15087"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15087\/revisions"}],"predecessor-version":[{"id":24713,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15087\/revisions\/24713"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15504"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=15087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=15087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=15087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}