Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Such an analysis does not exist because that traffic is encrypted.

... by software that resides on the same system, with keys that are in memory on the same system.

I'm not saying it's trivial to decrypt the traffic, but it's certainly possible, and much, much harder reverse engineering is routinely being performed.



Then go right ahead and do that, there will be a myriad of official government instutions, from all over the world, that would be very interested in your findings.

Or MS could simply share the keys with those government institutions there have been literally asking for it, to see wether Windows is actually sending home privacy relevant data.

But the matter of fact is it's a very real issue and still on-going problem.

Just because investing a lot of effort could shed some further light on it does not really change anything about that or the non-compliant behavior MS engages in.

Security only being as good as the effort lobbed at it to break it, is not really a novel or useful insight in this scenario.


What addresses are connected: https://learn.microsoft.com/en-us/windows/privacy/manage-win...

What data is sent: https://learn.microsoft.com/en-us/windows/privacy/required-d...

The Diagnostic Data Viewer is a Windows app that lets you review the Windows diagnostic data your device is sending to Microsoft, grouping the info into simple categories based on how it's used by Microsoft. https://learn.microsoft.com/en-us/windows/privacy/diagnostic...


Yes we know all that. What I want is a demonstration of live decryption of telemetry data traffic.


> with keys that are in memory on the same system

I'm not sure that actually holds — the encryption keys are in memory, but the decryption keys don't necessarily have to be.

The pre-encrypted payloads definitely are in memory at some point; however snatching them probably involves larger-scale reverse-engineering.


If they're using standard TLS, the actual data encryption is symmetric, so the encryption keys are the decryption keys and must be in memory during the encryption process.


If it is TLS you can get the keys used in the session from lsass’ memory. I’ve even written a tool to do so in PowerShell https://gist.github.com/jborean93/6c1f1b3130f2675f1618da5663.... This will generate a log file that contains the keys needed for Wireshark to decrypt TLS traffic.


My claim is it's not standard TLS or there's an additional layer (external encryption key) because an actual decryption of telemetry traffic has never been demonstrated.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: