Chris Williams at The Register reports that 32TB of Win10 internal builds, including some source code for core processes, is available for download. T
[See the full post at: Windows 10 source code leaked]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Windows 10 source code leaked
Home » Forums » Newsletter and Homepage topics » Windows 10 source code leaked
- This topic has 13 replies, 6 voices, and was last updated 7 years, 11 months ago by
anonymous.
AuthorTopicViewing 6 reply threadsAuthorReplies-
anonymous
GuestJune 23, 2017 at 5:59 pm #121866If true or not, Microsoft needs to make a public announcement tout suite. Private communications with their top clients over the next few days will not be enough with something as crazy as this.
If true and hackers have the OS source code (and access/security codes) they can build exploits that penetrate firewalls. Enterprise and Industry that have already migrated to Windows 10 will need to batten down the hatches. They have no choice.
-
thymej
AskWoody Lounger -
anonymous
Guest -
woody
Manager -
anonymous
Guest
-
-
MrBrian
AskWoody_MVPJune 23, 2017 at 9:21 pm #121892From Under pressure, Western tech firms bow to Russian demands to share cyber secrets:
“Russian authorities are asking Western tech companies to allow them to review source code for security products such as firewalls, anti-virus applications and software containing encryption before permitting the products to be imported and sold in the country.”
-
anonymous
Guest
-
-
-
Deep Lurker
AskWoody Lounger -
Ascaris
AskWoody MVPJune 23, 2017 at 11:55 pm #121909Linux has rejected “security by obscurity” from the start, though. Any code can have undiscovered bugs or unintended behavior in novel conditions that can be exploited to breach the security measures in place; Linux’s open source nature simply makes it a lot easier to discover those bugs, which is the first step in fixing them (and exploiting them).
Windows, though, has long been hidden from view. Security bugs that would have been discovered and fixed ages ago (under the “all bugs are shallow with enough eyes” theory) in Linux may still exist within the closed-source Windows code, and once that code is made public, there could be some new exploits discovered. While the Linux detractors like to trot out a few well-publicized examples of long-standing Linux security bugs that didn’t prove to be shallow enough, the observation that Linux isn’t, in your words, a “fantasyland playground for viruses and bug-exploitation” shows that there is at least some truth in the philosophy.
In the short term, the leak of source code may mean Windows will be more vulnerable, but as those exploits are discovered and patched, it will end up more secure than it would have been. Fixed security holes are better than unknown ones any day, since “unknown” status cannot be guaranteed to persist.
Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11)1 user thanked author for this post.
-
-
anonymous
GuestJune 24, 2017 at 12:59 am #121911AFAIK, M$’s Win 10 computers regularly phone home to M$’s servers with users’ private Telemetry & Data which are encrypted by M$ before being collected.
… If hackers have access to M$’s secret encryption keys and the servers, they can create various exploits and opportunities, eg plant ransomware/malware, spy on “valuable” Win 10 users/targets for trade secrets and insider business dealings, etc. -
anonymous
GuestJune 24, 2017 at 2:57 am #121920
-
-
MrBrian
AskWoody_MVPJune 24, 2017 at 3:48 am #121933 -
anonymous
GuestJune 24, 2017 at 12:12 pm #121958You are forgetting public key cryptography (aka asymmetric cryptography). They can encrypt it with one key (public) in the source code (or even publicly disclose the key) and decrypt it on their en with their private key that doesn’t ever have to leave the building (aka not in any source code).
Viewing 6 reply threads - This topic has 13 replies, 6 voices, and was last updated 7 years, 11 months ago by
-

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Google’s Veo3 video generator. Before you ask: yes, everything is AI here
by
Alex5723
6 hours, 43 minutes ago -
Flash Drive Eject Error for Still In Use
by
J9438
8 hours, 16 minutes ago -
Windows 11 Insider Preview build 27863 released to Canary
by
joep517
1 day, 1 hour ago -
Windows 11 Insider Preview build 26120.4161 (24H2) released to BETA
by
joep517
1 day, 1 hour ago -
AI model turns to blackmail when engineers try to take it offline
by
Cybertooth
5 hours, 15 minutes ago -
Migrate off MS365 to Apple Products
by
dmt_3904
6 hours, 4 minutes ago -
Login screen icon
by
CWBillow
1 hour, 14 minutes ago -
AI coming to everything
by
Susan Bradley
4 hours, 2 minutes ago -
Mozilla : Pocket shuts down July 8, 2025, Fakespot shuts down on July 1, 2025
by
Alex5723
1 day, 17 hours ago -
No Screen TurnOff???
by
CWBillow
1 day, 17 hours ago -
Identify a dynamic range to then be used in another formula
by
BigDaddy07
1 day, 18 hours ago -
InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords
by
Alex5723
2 days, 5 hours ago -
How well does your browser block trackers?
by
n0ads
1 day, 16 hours ago -
You can’t handle me
by
Susan Bradley
16 hours, 2 minutes ago -
Chrome Can Now Change Your Weak Passwords for You
by
Alex5723
1 day, 8 hours ago -
Microsoft: Over 394,000 Windows PCs infected by Lumma malware, affects Chrome..
by
Alex5723
2 days, 17 hours ago -
Signal vs Microsoft’s Recall ; By Default, Signal Doesn’t Recall
by
Alex5723
1 day, 20 hours ago -
Internet Archive : This is where all of The Internet is stored
by
Alex5723
2 days, 17 hours ago -
iPhone 7 Plus and the iPhone 8 on Vantage list
by
Alex5723
2 days, 17 hours ago -
Lumma malware takedown
by
EyesOnWindows
2 days, 5 hours ago -
“kill switches” found in Chinese made power inverters
by
Alex5723
3 days, 2 hours ago -
Windows 11 – InControl vs pausing Windows updates
by
Kathy Stevens
3 days, 2 hours ago -
Meet Gemini in Chrome
by
Alex5723
3 days, 6 hours ago -
DuckDuckGo’s Duck.ai added GPT-4o mini
by
Alex5723
3 days, 6 hours ago -
Trump signs Take It Down Act
by
Alex5723
3 days, 14 hours ago -
Do you have a maintenance window?
by
Susan Bradley
1 day, 19 hours ago -
Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms
by
Nibbled To Death By Ducks
2 days, 16 hours ago -
Cox Communications and Charter Communications to merge
by
not so anon
3 days, 17 hours ago -
Help with WD usb driver on Windows 11
by
Tex265
1 hour, 25 minutes ago -
hibernate activation
by
e_belmont
4 days, 2 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.