A decent multi virus program could detect it anyway. Even noob users like me know how to stop that. Not that I download any files or things
normal virus/malware programs work on signature based recognition, and unless the MS key logger is reported, hashed, and added to the list, it would not be reported. a heuristic virus/malware program might notice and act based on the similarities with malicious behavior.
now, if you accept the EULA, you agree to allow MS to do anything they said in said EULA, so by that measure it is not malicious.
however, you can turn it off
by following these steps if you are curious if MS is going further down the rabbit hole of invasion of privacy, check out
all these tools just to help users make the proper configurations to minimize user exposurehowever, even with all the privacy guards turned on, and key-loggers disabled, etc, etc, including disabling cortana, Network sniffers still show traffic that is still heading to Redmond (Microsoft servers)
here is an example of this using Wireshark protocol analyzerthis is why I want nothing to do with Windows 10. I did upgrade my new laptop to 10 for a week, and then reverted back to 8.1, and 95% of the time I am in Linux. but once in a while I do need windows for some school item.
some people say "I do nothing wrong, so what do I care?", well, if MS ever gets a major hack, your data will be part of that, and that scares me.
we are told to be security minded, not throw away old tax fillings, without shredding them, but we do our taxes on a computer, or banking, and everything else, and it is OK, to share that with a single corporation for them to do what-ever they want with it? I think not.
now, it is possible that all of this data is just to make your experience better, and I hope so. however, you give someone a key to any lock to help catch crooks or put out fires, and someone will use them for financial gain. I know absolute power corrupts absolutely, and even the
Stanford Prison Experiment seems to point to our inability to use restraint.
Please note, I work in the Cyber Security field, and work on Military networks, so these concerns are a daily issue for me, and I deal in the nuances of minor settings and changes and why they matter. here is an example, my windows machine has the administrator user account renamed to a generic name (like tom, but not tom
) because any black hat hacker that can see a list of accounts will try to locate the administrator's account to gain that access if possible, however, in a Windows world, you cannot lock-out the administrators account (who would unlock it? ). if you try 3 times and do not get your password right, you are locked out. you can try the administrators password as much as you want in a dictionary attack or brute force attack and it will never lock out.