Hi,
So as you can see in the above link, the NYM Windows APP uses “Microsoft Edge WebView2“. This “Microsoft Edge WebView2“ collects and submits MICROSOFT TELEMETRY data back to Microsoft along with system telemetry.
Windows Enterprise and Education editions are the only editions of windows that allow you to change telemetry reporting to the most basic level of ZERO “0”, Home Pro edition only allow changing to level 1. Even when telemetry is set to the lowest level of 0, it still sends a lot of private software and hardware data like Motherboard device ID, system IDs, RAM.
“Microsoft Edge WebView2“ also sends this data along with the windows apps that use “Microsoft Edge WebView2“ including NYM Windows APP.
So that means Microsoft can connect the system telemetry System and Device ID and hardware software configuration data, with the “Microsoft Edge WebView2“ Nym Windows APP telemetry data like the following;
- “NYM VPN App”,
- Which Entry server did the app select,
- Which Exit server did the app select.
This is a massive security leak and hole.
Why can’t you make the windows app completely free of “Microsoft Edge WebView2“?
That would make it secure.
NYM VPN is probably the greatest DeVPN meshnet! How “Microsoft Edge WebView2“ compromises the entry point.
Can someone respond to this concern?
Thanks.