• rtxn@lemmy.worldM
    link
    fedilink
    English
    arrow-up
    3
    ·
    8 months ago

    Some sort of hidden, concealed, clandestine internal QoS implementation in Windows. Reserving a portion of network bandwidth for high priority traffic sounds like a good concept, but I don’t like the fact that this is so hidden (I’ve been working with computers for many years and I’ve never heard of it until now), and that the mechanism to determine the priority of a packet is unknown.

      • rtxn@lemmy.worldM
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        8 months ago

        I love shitting on Windows as much as anyone, but that is a completely baseless, fictitious accusation. And if not, give me a credible source.

        If anything, I’d keep spyware traffic as low-profile as reasonable in Microsoft’s place.

        • dust_accelerator@discuss.tchncs.de
          link
          fedilink
          arrow-up
          3
          ·
          edit-2
          8 months ago

          I tend to agree.

          Nevertheless, some unknown implementation can have bugs and things can go wrong and there’s nothing you can do about it, short of “rebooting” or d̷o̶w̸s̸i̷n̴g̸ ̴t̶h̸e̷ ̸h̵a̵r̵d̷ ̵d̷r̶i̴v̶e̷ ̵w̶i̴t̸h̷ ̸̞̺͠h̵̺͙̎̍o̸͔͠ͅḻ̷̀̇y̵͚͍̎ ̷͉̅̅w̸͎̔a̷̧̫̒́t̶̼̉̓ę̵̾͗r̶̫͑͑ ̴̣̿͒(̷͙̎a̸̬̺͝͝n̸̞̓̓d̴̬͌̍ ̸͇͕͌͝s̷̡̯̓͝u̸̡̳̇͝b̴̳͜͠s̷͍̘̽ë̵̜q̷̝͐̄ȕ̵̞̐e̷̲̠̐́ń̴̨̙͝t̸̛̬͝l̶̮̔͠y̴͕̪̑͝ ̵̖̆ḃ̴̪̟u̶̢͓͑̌y̵̜̤͌̏i̵̦̋ň̴̨͚̀g̸͓͑ ̴͍̬̽à̶͜ ̴͇͔̓n̴̬͂͜ì̷̢̛̯c̴̤̖̈́e̶̼̫̐̊ ̵̹̏͝f̸̙̀̑r̷̪̩͆͆e̸̤̫͛͋s̷̢̙̏h̷͇͔́ ̸̭̆͝N̷̰͗͛͜V̶͇͒̚M̸̟̍͜ě̷̛̟ ̸̢̞́͝a̷͙͔͒͒n̷̻͇͝d̸̘̥͌̾ ̴̜͓͑p̷̬͑͊ŭ̸̮̏t̸̲̀t̴̡͚̽í̶͎͓̑n̴͕̘̒̈́g̴͓̰̓͝ ̵͓̎a̴̻̼͗ ̷̦̍̈́s̷̥̅̈l̴̝̂e̴̞̅͊ḛ̴̊̅k̷͚̕ ̵̛̼̬͗D̴̻̾̽e̵̙͂̊b̷̝͘ī̵̢͇ą̵̂n̴͖̑ ̶̼̚h̴̼͂͑e̷̲͆̆a̵̡̋d̸̢͔̈l̶͕̍̍e̸̛͕̙̒s̶̞͔̀͠s̸̯͖̕ ̵͍̦̈́̉ ̸̨̨̓i̸̙͖͗̌ņ̶̯̍s̸̡̖͗̇ṯ̷́̒ä̵̦́̎l̶̼̄l̵̨͊̊ ̴̳͑͗ó̵͎̅ǹ̴͈̚ ̷͖͊͝i̷̠͇̊t̷̼̞͒͘)̵͎̤̔͌

        • Cosmicomical@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          8 months ago

          Well not spyware per se but over the years they found over and over bugs which are really just highways left open in your system ready to be exploited. But to be honest that’s not limited to windows.