Skip to main content

Chinese Student Sues Microsoft for Privacy Violation


A Beijing college student claims that Microsoft's antipiracy program violates his privacy, according to a Chinese government-controlled news site.

A Beijing college student has sued Microsoft Corp., claiming that its antipiracy program violated his privacy, a Chinese government-controlled news site reported last week.

According to China.org.cn, a news portal run by China's State Council Information Office, Lu Feng has sued Microsoft and its Chinese subsidiary, Microsoft (China) Co., in a People's Court.

Lu's lawsuit said Microsoft's Windows Genuine Advantage (WGA) antipiracy software posed a threat to his privacy and the security of his PC, which runs Windows XP. He also claimed that he was not properly informed before XP installed WGA Notifications, a separate program that flags counterfeit copies and nags users running pirated versions.

" The suit asks the court to order Microsoft to delete the information it harvested from Lu's PC, provide an uninstaller for Notifications, publicly apologize, and pay Lu US$179 as compensation. "

A Microsoft spokesperson in China was quoted by China.org.cn as saying that the company would have no comment on the case.


Comments

Anonymous said…
Oi, achei seu blog pelo google está bem interessante gostei desse post. Gostaria de falar sobre o CresceNet. O CresceNet é um provedor de internet discada que remunera seus usuários pelo tempo conectado. Exatamente isso que você leu, estão pagando para você conectar. O provedor paga 20 centavos por hora de conexão discada com ligação local para mais de 2100 cidades do Brasil. O CresceNet tem um acelerador de conexão, que deixa sua conexão até 10 vezes mais rápida. Quem utiliza banda larga pode lucrar também, basta se cadastrar no CresceNet e quando for dormir conectar por discada, é possível pagar a ADSL só com o dinheiro da discada. Nos horários de minuto único o gasto com telefone é mínimo e a remuneração do CresceNet generosa. Se você quiser linkar o Cresce.Net(www.provedorcrescenet.com) no seu blog eu ficaria agradecido, até mais e sucesso. (If he will be possible add the CresceNet(www.provedorcrescenet.com) in your blogroll I thankful, bye friend).

Popular posts from this blog

Dhivehi to English translation with Microsoft translator

  The Dhivehi language translation feature included in Microsoft translator and Microsoft 365 lets you press a button and translate written Dhivehi into English. Though there are a few hiccups here and there, the service is great and provides an understanding of the overall document. This is more than what we see from any existing models. I was amazed to see a link in one of my outlook web emails, it says “translate message to: English” which could mean nothing usually, however, when I saw the next sentence which said “Never translate from: Divehi”, I thought why would it says Divehi specifically if it doesn’t understand that the entire email was written in Dhivehi? Out of curiosity, I pressed the button, and to my surprise, it was quite good. The essence of the message was retained very well. For example, something like އިޙްތިރާމް ޤަބޫލުކުރެއްވުން އެދެން could be translated as “ I would like to respect you ”, which is ok in terms of translation, but what it meant was greeti...

Fortifying Cybersecurity: A NIST CSF Perspective on Zero Trust and Passkeys

Cybersecurity is like protecting a fortress from invaders. Traditionally, we built strong walls around our castle, trusting those inside and keeping potential threats outside. But in today's digital world, threats can come from within and outside, making traditional defences inadequate. This is where the concept of zero trust comes in. What is Zero Trust? Imagine your home. You don't blindly trust everyone who walks in, right? You might ask for identification or make sure they have a reason to be there. Zero trust is similar. It means not automatically trusting anyone or anything trying to access your digital "home" (like your network or data). Instead, it's about constantly verifying and monitoring every access attempt, regardless of where it comes from. Why Zero Trust Matters: Zero trust addresses three key goals in cybersecurity, often called the CIA triad: Confidentiality : Just like you wouldn't want strangers snooping through your person...

Why Understanding Your Risks is Your Best Cyber Defence

  In today's digital age, headlines blare about "unprecedented data breaches" and "nation-state cyberattacks." It's easy to feel overwhelmed by the ever-evolving cyber threat landscape, where sophisticated zero-day exploits can bypass even the most fortified defences. But amidst this complexity, a fundamental truth remains: effective cybersecurity starts with understanding your risks. As Bruce Schneier stated, "Security is not a product, but a process." Just as a military commander wouldn't enter battle without understanding the terrain and potential threats, organizations must grasp the digital landscape in which they operate. Imagine a battlefield shrouded in thick fog. You wouldn't blindly charge ahead, would you? Risk assessment is akin to possessing a high-powered thermal sight, piercing the fog to reveal the hidden dangers lurking in the digital landscape. It's a systematic process of identifying your organization's critical a...