Andrew Douma, a vendor-neutral consultant, writes in Penetration Testers’ Guide to Windows 10 Privacy & Security:
Safeguarding the privacy and security of myself and my clients’ data — while still allowing me to execute a penetration test is the goal.
Having concluded in September that Qubes OS was best suited as a portable lab, I have adopted Windows 10 Pro v1607 as my offensive platform.
You will be able to apply these techniques to your personal system, drastically improving your security posture and keeping your affairs private.
Microsoft has made much progress improving the security capabilities of their Operating System (OS). However, their pervasive use of “telemetry” and forcing software installation/upgrades, has cost them the trust of their customers.
On principle, I never want to see any persistent outbound UDP connections that I did not setup myself. I also do not want my network captures polluted.
So here we are: I trust neither my OS nor my hardware vendor. Welcome to my Windows 10 hardening guide
Did you like this post? Or did it help you solve a problem?