Why You Shouldn't Use Microsoft Windows11.
...
Windows11 was released on October 5th in 2021 but was leaked online long before its release.
First of all, not everyone running Windows10 will be able to update to Windows11, because of newly introduced "Security" and "Gaming" features, which requires better hardware.
Advantages so far:
When it comes to CPU's ( Your Processor ) it is recommended your system has Intel 8th generation CPUs, AMD Zen 2 or Qualcomm 7 and 8 Series that have the right hardware features and full support for security, reliability and performance.
For those running INTEL 7th generation CPUs or AMD Zen CPUs, they have the hardware features, but are according to Microsoft are "Limited". Thus anything older than this simply will not work out of the box.
Even if you're using the world's best VPN, it's not going to protect your data from going directly to Microsoft if you're signed into one of their accounts. Also using Android apps from Amazon will for sure leak even more of your data.
Microsoft Teams shell integration could be used to build a profile on you and your friends.
Windows 11's desktop widgets uses AI to present tailored information, like advertisements to you by monitoring your interests. Meaning they collect alot of data on you.
Microsoft provides a privacy dashboard on its account website to help you manage your search and browser history, as well as the information Cortana has on you. You can clear your location history and manage your app data too, kind of like Google.
Lets not forget the data that Office sends to Microsoft as of Office version 1904.
This is far from the whole statement, but it lists the most important parts you really need to learn about.
"Microsoft collects data from you, through our interactions with you and through our products. You provide some of this data directly, and we get some of it by collecting data about your interactions, use, and experiences with our products. The data we collect depends on the context of your interactions with Microsoft and the choices you make, including your privacy settings and the products and features you use. We also obtain data about you from third parties."
Microsoft collects data from you, through our interactions with you and through our products for a variety of purposes described below, including to operate effectively and provide you with the best experiences with our products. You provide some of this data directly, such as when you create a Microsoft account, administer your organization’s licensing account, submit a search query to Bing, register for a Microsoft event, speak a voice command to Cortana, upload a document to OneDrive, sign up for Microsoft 365, or contact us for support. We get some of it by collecting data about your interactions, use, and experience with our products and communications.
We protect data obtained from third parties according to the practices described in this statement, plus any additional restrictions imposed by the source of the data. These third-party sources vary over time and include:
Data brokers from which we purchase demographic data to supplement the data we collect.
Services that make user-generated content from their service available to others, such as local business reviews or public social media posts.
Communication services, including email providers and social networks, when you give us permission to access your data on such third-party services or networks.
Service providers that help us determine your device’s location.
Partners with which we offer co-branded services or engage in joint marketing activities.
Developers who create experiences through or for Microsoft products.
Third parties that deliver experiences through Microsoft products. Publicly-available sources, such as open public sector, academic, and commercial data sets and other data sources.
The data we collect depends on the context of your interactions with Microsoft and the choices you make (including your privacy settings), the products and features you use, your location, and applicable law.
Name and contact data. Your first and last name, email address, postal address, phone number, and other similar contact data.
Credentials. Passwords, password hints, and similar security information used for authentication and account access.
Demographic data. Data about you such as your age, gender, country, and preferred language.
Payment data. Data to process payments, such as your payment instrument number (such as a credit card number) and the security code associated with your payment instrument.
Subscription and licensing data. Information about your subscriptions, licenses, and other entitlements.
Interactions. Data about your use of Microsoft products. In some cases, such as search queries, this is data you provide in order to make use of the products. In other cases, such as error reports, this is data we generate.
Other examples of interactions data include:
Content of your files and communications you input, upload, receive, create, and control. For example, if you transmit a file using Skype to another Skype user, we need to collect the content of that file to display it to you and the other user. If you receive an email using Outlook.com, we need to collect the content of that email to deliver it to your inbox, display it to you, enable you to reply to it, and store it for you until you choose to delete it. Other content we collect when providing products to you include:
Video or recordings. Recordings of events and activities at Microsoft buildings, retail spaces, and other locations. If you enter Microsoft Store locations or other facilities, or attend a Microsoft event that is recorded, we may process your image and voice data.
Feedback and ratings. Information you provide to us and the content of messages you send to us, such as feedback, survey data, and product reviews you write.
Traffic data. Data generated through your use of Microsoft’s communications services. Traffic data indicates with whom you have communicated and when your communications occurred. We will process your traffic data only as required to provide, maintain, and improve our communications services and we do so with your consent.
In accordance with European Union Regulation (EU) 2021/1232, we have invoked the derogation permitted by that Regulation from Articles 5(1) and 6(1) of EU Directive 2002/58/EC. We use scanning technologies to create digital signatures (known as “hashes”) of certain images and video content on our systems.
These technologies then compare the hashes they generate with hashes of reported child sexual exploitation and abuse imagery (known as a “hash set”), in a process called “hash matching”. Microsoft obtains hash sets from organizations that act in the public interest against child sex abuse. This can result in sharing information with the National Center for Missing and Exploited Children (NCMEC) and law enforcement authorities.
Protecting rights and property. We use data to detect and prevent fraud, resolve disputes, enforce agreements, and protect our property. For example, we use data to confirm the validity of software licenses to reduce piracy. We may use automated processes to detect and prevent activities that violate our rights and the rights of others, such as fraud.
We also share data with Microsoft-controlled affiliates and subsidiaries; with vendors working on our behalf; when required by law or to respond to legal process; to protect our customers; to protect lives; to maintain the security of our products; and to protect the rights and property of Microsoft and its customers.
For more information about data we disclose in response to requests from law enforcement and other government agencies, please see our Law Enforcement Requests Report.
In some cases, your ability to access or control your personal data will be limited, as required or permitted by applicable law. How you can access or control your personal data will also depend on which products you use.
Read the whole Privacy statement here.
Virtualization based security is on by default and it makes use of TPM 2.0 ( Trusted Platform Module ) for BitLockers Full-disk encryption, its a chip that was introduced in 2016. This chip generates and stores the actual encryption keys.
Basically it means that if someone pulls your harddrive, they won't be able to decrypt it without the TPM chip holding the keys. However if something should happen and the chip stops working, then what do you do?
Using BitLocker without a TPM chip, works, but is less secure and in order to bypass the chip requirement, you need to make a Group Policy change. If this is your own PC and it isn’t joined to a business domain or similar, then you can use the Local Group Policy Editor to change the setting. Otherwise you will need to contact your network administrator.
Windows 11 offers DirectX 12 Ultimate, which enables immersive graphics at high frame rates. DirectStorage for faster load times and more detailed game worlds and Auto HDR for a wider, more vivid range of colors.
Microsoft states that if you buy a new PC that carries the logo of DX12 Ultimate, it is guaranteed to support all next-generation graphics hardware features.
This includes:
All these features will ensure that your computer will be able to play next-generation games that depend on this.
Nvidia GeForce RTX 3090, 3080 (Ti), 3070 (Ti), 3060 (Ti), RTX 30/20 series laptops, TITAN RTX, 2080 (Ti), 2080 Super, 2070 (Ti), 2070 Super, 2060 and 2060 Super.
AMD RDNA 2: AMD Radeon™ RX 6000 Series graphics cards.
Minimum system requirements listed by Microsoft:
For all Windows 11 editions, internet access is required to perform updates and to download and take advantage of some features.
Note: Additional requirements may apply over time and for updates.
A Microsoft account is required for some features.
Windows 11 Pro for Workstations: Supports up to 4 CPUs and 6TB of memory to rocket through demanding workloads.
IMPORTANT: I have left out some new features added in Windows11 that I just don't find interesting enough.
Windows has always been the preferred platform for gaming, but after STEAM's interest in Linux more game developers are making their games natively available for Linux.
All information on this website is published in good faith and for general educational purposes and for use in safe testing environments only. While linuxexperten.com strives to make the information on this site as accurate as possible, linuxexperten.com does not warrant its completeness, reliability and accuracy.
We are not responsible for any losses or damages associated with the use of our website. While we strive to provide only links to useful websites, we have no control over the content of these sites and links to other sites do not constitute a recommendation for all content contained on these websites.
This is a professional review site that receives compensation from the companies whose products reviewed. Each service or product are thoroughly tested and given high marks if considered to be the very best. Independently owned and the opinions expressed here are no one elses.