Skip to main content

Privacy over security

Overview

About this category

This category contains privacy scripts for Windows.

These changes use Windows system commands to update your settings.

Caution: Mixed Risk Levels

Be careful running these scripts. This category includes scripts with high impact:

  • 🔴 Some not recommended scripts. They should only be used by advanced users. They may break important functionality.
  • 🟡 Some recommended scripts only if you understand its implications. Some non-critical or features may no longer function correctly after running this this category.
Implementation Details
  • Language: batch

  • Scripts Count: 254 scripts

  • Subcategories: 57

  • Required Privileges: Administrator rights

  • Compatibility: Windows only

  • Reversibility: All changes can be reverted

Apply now

These scripts are written using Batch (batchfile) scripting language.

Choose one of two ways to apply:

  1. Automatically via privacy.sexy: The easiest and safest option.
  2. Manually by downloading: Requires downloading a file.

Alternative 1. Apply with Privacy.sexy

privacy.sexy is free and open-source application that lets securely apply this action easily.

Open privacy.sexy

It allows selectively choose parts of this action to conduct. You can fully restore this action (revert back to the original behavior) using the application. Additionally, you can apply only the recommended scripts, instead of applying all of the scripts.

privacy.sexy instructions
  1. Open or download the desktop application
  2. Search for the category name: Privacy over security.
  3. Check the category by clicking on the checkbox of the category.
  4. Click on Run button at the bottom of the page.

Alternative 2. Download

You can choose to apply only scripts with less impact or also those with higher impact:

Strict

Recommended if you understand its implications. It may cause some non-critical features to no longer function correctly.

Scroll

All

Not recommended for daily use as it breaks important functionality. It provides military-grade privacy, for special use-cases. Do not run it without having backups and system snapshots.

Scroll

Consider restarting your computer for all changes to take affect.

Reversible

This action is completely reversible, you can restore your changes to the initial/default state. The restore/revert methods provided here can help you fix issues.

If something goes wrong, use the Revert script provided above.

Strict

This script includes Standard and Strict recommendation levels.

Use with Caution

This script is only recommended if you understand their implications of every single change. Some non-critical or features may no longer function correctly after running this script.

Download Strict scripts:

Download script

Restore these changes if you decide to revert them by downloading the restore script:

Download restore script

All

This script includes Standard, Strict recommendation levels along with unrecommended scripts.

Not Advised

This script should only be used by advanced users. Some of these changes are NOT recommended for daily use as it breaks important functionality. Do not run it without having backups and system snapshots.

Download all scripts:

Download script

Restore these changes if you decide to revert them by downloading the restore script:

Download restore script

Explore further

This category includes total of 254 scripts and 57 subcategories.

Explore its 3 subcategories:

Disable Defender

This category offers scripts to disable Windows security components related to Defender. Defender is also referred to as Microsoft Defender or Windows Defender. Although designed to protect you, its features may compromise your privacy and decrease computer performance. Privacy concerns include: This allows Microsoft to collect and potentially access your sensitive information. This prevents users from controlling what data Microsoft collects about them. This discourages users from using...

Disable automatic updates

Disabling automatic updates is often considered counterintuitive when it comes to securing your system. However, there are substantial arguments to consider this option if you're privacy-centric: 1. Patching and Pre-Approval: Manual control over update deployment allows for pre-emptive approval of patches. This strategy is useful in environments requiring the highest level of security. For instance, military agencies frequently employ air-gapped systems that mandate careful review of each up...

Support

This website relies on your support.

Support now

Your donation helps keep the project alive and improves its content ❤️.

Share this page: