Chipp.in Tech News and Reviews

Windows, Security & Privacy, Open Source and more

Menu
  • Home
  • Windows
  • Security & Privacy
  • Gaming
  • Guides
  • Windows 11 Book
  • Contact
  • RSS Feed
Menu
AI

Even Cortana was more useful than Windows Copilot is right now

Posted on November 27, 2023November 27, 2023 by Martin Brinkmann

Remember Cortana? Most may not remember the personal assistant that Microsoft baked into Windows. Even though it was rather mediocre, Cortana actually provided better Windows functionality than Microsoft’s new lovechild Windows Copilot.

Included in Windows 10, Cortana was Microsoft’s answer to Apple’s Siri and Amazon’s Alexa. It was a voice-activated tool designed to help users in various ways. Core functions included asking Cortana for directions, to add entries to a Calendar, open Windows apps or look up the weather forecast.

A tiny group of users liked Cortana. The vast majority ignored it and a small group of dedicated users tried various hacks to remove Cortana from their devices.

Microsoft announced the end of Cortana support this year. It was clear for a while that Cortana did not play a big role anymore in Microsoft’s plans and the deprecation of the app and service sealed its fate.

Now there is Windows Copilot and AI. Windows Copilot is not Cortana 2.0. At this time, it is mostly Bing Chat as a sidebar in Windows. Microsoft did highlight that Windows Copilot would support Windows-specific features, but it never published a full list and gave only a few basic examples.

Tip: you can disable Windows Copilot in Windows easily.

Cortana vs. Windows Copilot

Windows Copilot

Let’s start with Cortana. The personal assistant reacted to specific voice commands. Microsoft has an entire Help page on its website — still — that lists some of these.

Here is a selection of what you could use Cortana for:

  • Open Windows applications and Settings.
  • Look up Calendar information, including finding time to meet with someone.
  • Looking up Meeting information, including booking meetings.
  • Find out about people in an organization.
  • Make lists and set reminders.
  • Get definitions and answers to questions.
  • Make calculations, including currency conversions.
  • Get weather information.
  • Look up the latest news.
  • Control and play music.
  • Get directions.

Windows Copilot supports just a few of these options and some new ones. Microsoft describes Copilot’s Windows-specific functionality in the following way:

Need to enable Bluetooth or connect a new pair of headphones? Copilot can help. Not sure of the best way to capture a screenshot? Ask Copilot to do it for you. Copilot in Windows can change the way you use your PC and inspire you to try new things that you may not have thought of before. It is where productivity and creativity meet.

Microsoft improved Copilot to add at least some of the promised features. You may now ask Copilot to launch a Windows app and it will do so.

The process is somewhat complicated though. Write “open firefox” and press Enter to send the command to the AI. It will then process it in the cloud, which may take a couple of seconds, to return a “dialog box” in the end. You need to activate this box to start the program.

You can also open Start, type firefox and press Enter to launch the application this way. This is faster and does not require an Internet connection.

Similarly, Windows Copilot may open the Settings app or control, very specific, devices, such as Bluetooth. When asked to open the wireless Settings, Copilot returned a button to open the Settings and another to turn on Bluetooth. Not exactly what the command wanted.

Windows Copilot supports some of the other features that Cortana supported. You can get the weather forecast, get directions, or to make calculations.

The AI produces strange answers sometimes. When asked about next week’s appointments, it returned information about typical pregnancies.

odd answer Copilot

News is another weakness of Copilot, as it has no real-time access at the time. When you ask the AI about recent events, e.g., latest Football or Soccer scores, you will inadvertently end up with old information. The weather report is accurate, however.

Copilot’s weaknesses and flaws

Windows Copilot has certain weaknesses and flaws that make it less of an ideal assistant or partner on Windows.

Two of the main issues are that it requires an Internet connection for all of its functionality and that it lacks access to (most) real-time information.

The Internet requirement delays certain commands, including the opening of programs on the system. In fact, users still need to click on a button to launch a program, provided that Windows Copilot identified it correctly.

A better approach would be to process certain commands locally. It makes no sense to send the “open app” command to the Internet to return a button that the user needs to click to launch it.

Another issue is hallucinations. The AI may sometimes return information that is not accurate or unrelated to the user’s request.

Closing Words

Microsoft’s work on Windows Copilot continues; this is a good thing, as it needs work to become a useful tool for some users. Right now, it loses out against the deprecated Cortana in many regards.

The fact that most Windows users ignored Cortana or did not like it does not help make a case for Windows Copilot either.

Only time will tell whether Windows Copilot will become a useful tool for Windows users and administrators, or if it will land on Microsoft’s growing pile of deprecated services in the next couple of years (only to be replaced with the next big thing).

Now You: do you use digital assistants or AI tools?

Windows 11 Settings Homepage

How to hide the Windows 11 Settings Home page

Posted on November 24, 2023November 24, 2023 by Martin Brinkmann

Microsoft introduced the Settings app in 2015 as a replacement for the Control Panel. The Control Panel is still available, but Microsoft moved some of its features to Settings in the years that followed.

A recent addition is the Settings Home page. It is the new start page of the Settings app and lists a number of custom information and options to the user.

Apart from the name of the device and the Internet connection status, it also lists Windows Update information, recommended settings, personalization options and options linked to a Microsoft account.

Not all users need the homepage. Those who prefer to use the Settings app without it can hide in using two different methods. This restores the classic Windows 11 Settings startpage, which is System.

The first makes the change in the Group Policy Editor. Please note that this tool is only available in Pro, Education, Enterprise and Workstation editions of Windows 11. In other words, in all Windows 11 editions except for Windows 11 Home.

Microsoft launched Windows 11 version 23H2 and the Moment 4 update for Windows 11 recently.

Hide the Settings Home page in Windows 11 using the Group Policy Editor

Hie the Settings home page in Windows 11

The Group Policy Editor is a widely used tool to configure the operating system for specific or all users. It includes a policy to hide pages in Settings.

Note: it is recommended to back up the PC before you edit the Registry. You should not run into any issues if you follow the guide exactly, but backups are a good precaution nevertheless.

Here is a step-by-step guide to hide the homepage in Settings:

  1. Open the Start Menu, type gpedit.msc and select Edit Group Policy from the search results. This opens the Group Policy Editor.
  2. Navigate to Computer Configuration > Administrative Templates > Control Panel.
  3. Double-click on Settings Page Visibility to display the configuration window for that policy.
  4. Set the status to Enabled.
  5. Type hide:home in the Settings Page Visibility box.
  6. Select OK to apply the change.
  7. Restart the PC.

The home link is no longer visible in Settings after the restart. Windows 11 opens the System page in Settings from now on.

Remove the Home page in Settings using the Registry

Windows 11 Registry hack to hide home

Every Group Policy setting is matched in the Registry. Home administrators may make the same configuration change in the Registry to hide the Settings home page.

  1. Open the Start Menu, type Regedit and select the Registry Editor result.
  2. Confirm the UAC security prompt.
  3. Paste the following URL into the address field in Registry Editor: Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
  4. Right-click on Explorer (left sidebar) and select New > String Value.
  5. Name it SettingsPageVisibility.
  6. Double-click on the new entry and type hide:home.
  7. Select OK to apply the change.
  8. Close the Registry Editor and restart the PC.

Closing Words

Windows 11 users who prefer the classic experience may use the instructions above to restore it. Those who don’t mind or prefer the new Settings home don’t have to do anything, as this is the new default experience.

Now You: home or not, what is your take on the new homepage?

Update installation

Control Optional Windows Updates with Group Policy

Posted on November 23, 2023November 23, 2023 by Martin Brinkmann

Optional Windows Updates fly under the radar on many Home systems. They come as different types. The most common is the monthly non-security preview update for Windows 10 and Windows 11.

There are other optional updates, e.g., bug fixes, other non-security updates and also improvements.

Up until recently, administrators had to search for optional updates manually on Windows to install them. This changed with the introduction of a new setting in Windows Updates.

Administrators who open Settings > Windows Update on Windows 11 see the “Get updates as soon as they’re available” option there. The same option is also available on Windows 10.

Windows Update Settings about optional updates

Microsoft explains on this Help page that the setting allows users to get “the latest non-security and feature updates as soon as they become available”. The caveat; Microsoft says that this only applies if the update becomes available for the device.

In other words: while it ensures that the update is installed when it becomes available, it still leaves it to Microsoft when that happens.

The following happens when the functionality is enabled in Settings. The device “will be among the first to get the latest non-security updates, fixes, improvements, and enhancements” says Microsoft. The setting does not affect security updates, which will still be pushed to devices, even if set to Off.

The “check for updates” button of Windows Updates also downloads and installs the most recent updates for the device.

The Group Policy gives administrators more control over the functionality.

Optional Windows Updates Group Policy configuration

Optional Windows Updates

Administrators may use the Enable Optional Updates policy to control the installation of these updates on managed devices.

  1. Open the Start Menu, type gpedit.msc and select the Edit Group Policy from the results. This launches the program.
  2. Navigate to Local Computer Policy > Computer Configuration > Administrative Templates >B Windows Components > Windows Update > Manage updates offered from Windows Update > Enable optional updates.
  3. Set the policy to Enabled to configure the delivery of optional options. Set it to Disabled to turn off the optional updates delivery on the device.

A menu lists the three configuration options when Enabled is selected.

  • Automatically receive optional updates (including CFRs) — This installs the latest optional updates on the device. It includes Controlled Feature Rollouts and optional cumulative updates.
  • Automatically receive optional updates — Same as above, but without Controlled Feature Rollouts.
  • User scan select which optional updates to receive — The user is in control via Windows Updates in Settings.

Notes on optional updates and their delivery

At least some optional updates need to be considered beta. This is true for the optional non-security updates that Microsoft releases about two weeks before their inclusion in the regular cumulative updates for the operating system.

Most Windows users may want to skip the installation of optional updates, especially on production machines.

It is also a good idea to create backups regularly, not Windows Backup though, as it doesn’t include all data. Windows includes some restoration functionality, but it has failed for some users in the past.

Closing Words

Administrators may want to disable Optional Windows Updates on most managed devices to limit potential issues that could arise from the installation. Home users may also want to block these for the most part. There is still the option to activate the “check for updates” button, if you read about a new update that you want to install.

Now You: how do you handle optional updates?

There is more to security than Strong Passwords and 2FA

Posted on November 22, 2023November 22, 2023 by Martin Brinkmann

You may have heard it a thousand times already, but here it comes again: protecting accounts with strong and unique passwords, and using a second form of authentication is essential to security.

While the main focus seems to be on this recommendation, many guides fail to mention other essentials. One example: while strong passwords and 2FA keep attackers out, they won’t help you if you get locked out of an account.

What happens to your data if you get banned? What if your desktop computer, laptop or mobile device gets stolen?

There is more to security than strong passwords. This guide looks at these, often neglected, security options.

Encryption is key

Encryption protects data against unauthorized access. Encrypt data on all of your devices to make sure that it is protected. Encryption helps when devices are turned off. While it is still possible to create a dump of the storage device or try to brute force the encryption, this is a futile attempt if the password is strong.

Encryption is enabled automatically on Android and iOS devices when you pick a PIN. It is important to select a strong PIN, not the four-digit number that is convenient to type. Yes, that makes unlocking the device painful, but it is essential when it comes to protecting data on it.

On Windows, data gets encrypted, but only for Microsoft account users. While you may use Bitlocker on Pro, Education and Enterprise devices to protect the entire system, I recommend using a different encryption software. VeraCrypt is open source and can encrypt the system drive and any other storage device.

Recovery Codes

Passkey authentication

Recovery codes help you get back into accounts or devices if you forget your password or lose access to something else that you need to sign-in. This can be a Titan security key, a hardware key used for 2-step verification, or access to an email account.

The main idea behind recovery keys is to use them in emergency situations. You lose access to the dedicated two-factor authentication method and can’t sign-in to your account anymore. Setting up multiple methods helps against this, but you may also use recovery codes instead.

Recovery keys may be used to regain access to the account. Many online services that support two-factor authentication support recovery keys.

These are highlighted most of the time when you set up two-factor authentication for the account. It is a good idea to keep these codes secure, for instance as notes in your password manager.

Backups are essential

Backup Software

Backups are a burden as long as you don’t require them. They help you recover data that may not be accessible anymore. If a device breaks or gets stolen, when you forget your password or delete something accidentally.

Creating local backups regularly is an essential security precaution. Whether you keep all backups in one place or spread them is up to you. It depends on the device as well.

If data is important, you may want to store backups separate from the actual device.

Computer users may want to use external storage devices to create backups. These come in different shapes and form factors.

I recommend the free Paragon Backup & Recovery software for the task on Windows, but there are lots of other options available.

Android and iOS devices support backups to Google’s or Apple’s cloud infrastructure. You may also connect your device to your PC or Mac, and transfer important data, which often means images and videos, to the device.

Content Blockers

Content Blockers

Content blockers prevent certain types of attacks. Extensions such as uBlock Origin don’t just block advertisement, they may also block known malware sites, improve your privacy online and much more.

Advertisement is used regularly for attacks. This can be as simple as placing an ad for a program download to lure users to a site where malware is offered.

Using content blockers protects you while you are browsing the Internet. You may want to disable the blocker for sites that you value though, as they rely on the revenue and may shut down otherwise.

Antivirus and Firewall

On PC, you need to make sure that you have a proper antivirus solution and firewall installed. Most Windows users may find Windows Defender adequate.

Advanced users may install third-party antivirus solutions, such as BitDefender Free, to protect their PCs.

No antivirus solution is perfect. Thousands of new threats emerge daily and while most users will never notice most of them, there is always the chance that one slips through defences.

Common sense is important as well. The best antivirus solution can’t protect you if you allow malware to run on your devices.

Firewalls, when properly configured, control incoming and outgoing traffic. They may block certain threats outright, by refusing connections.

Windows comes with its own firewall, which is fine for most use cases. Most advanced antivirus solutions come with firewalls.

How to set up a Titan Security Key to protect your Google account (and others)

Posted on November 21, 2023November 21, 2023 by Martin Brinkmann

Google launched an updated Titan Security Key last week. The new hardware key supports FIDO2, which means that it is compatible with a wide range of services. While you may use it exclusively for Google accounts, you can store up to 250 entries using it.

Titan Security Key works similarly to other hardware keys, including latest generation YubiKey products. Google promises state of the art encryption and protections. For users, it is an option to protect their accounts with two-factor authentication. You’d use the hardware key instead of an authenticator app or other means to provide the second form of authentication.

I bought a Titan Security Key of the latest generation last week to check it out. This guide includes step-by-step instructions to set up the hardware key to protect your Google account and others. It includes important information also, for instance, how you can protect yourself to avoid locking yourself out.

Did you know that Google plans to delete inactive Google accounts?

Setting up the Google Titan Security Key

Google Titan Security Key Setup

The box includes the selected hardware key — there are two versions that have different USB ports, USB-A or USB-C, but are functional identical otherwise. It also includes a small getting started booklet, which simply tells you to go to this Google website to get started. There is also a bigger Safety & Warranty booklet that no one reads. The USB-A version includes an USB-C to USB-A adapter, the USB-C version of the hardware key none.

Protecting the Google account with the key is a simple process that requires the following steps:

  1. Open this Google Security page in a modern browser, e.g., Firefox, Microsoft Edge, Google Chrome, Safari, Vivaldi, Opera or Brave.
    • If you prefer to go there manually, open this Google Account Help page instead and click on “Enroll your security key” under Step 2.
  2. A prompt asks you to keep the key disconnected from the device for now. Select the Next button to continue.
  3. A set up request is displayed as a prompt. Select OK to continue the process.
  4. Another prompt explains that Google will see the make and model of the security now if you continue. Select OK to proceed.
  5. Connect the security key to the device when prompted to do so.
  6. Type a name for the key on the “Security Key registered” page and select Done.

This is the entire process.

Word of Caution

The Security Key becomes the default two-factor authentication option. It is advisable to make sure that there is at least one additional option enabled. This can be an authenticator app, voice or text message, another security key, Google prompts or backup codes.

If you lose the Titan Security Key and don’t have another option enabled in the account, you will be locked out of the account.

Signing-in with the Hardware security key

The first sign-in step is exactly the same as before. You need to supply your Google email address and password to continue.

The 2-step verification prompt lists the email address. Make sure it is the right one. There is a menu to switch to another email address; useful if you set up more than one account.

Select Continue to authenticate using the Titan Security Key. You may also select “Try another way”, which you need to do if you don’t have the hardware key with out. The option “Don’t ask again on this device” should only be used on personal devices.

You are now asked to touch your security key. It contains a small area that reacts to touch. This acts as local confirmation to proceed.

You should now be logged-in to the account.

The same option is also available on mobile devices. Just connect the security key to the mobile device and follow the instructions to sign-in.

Non-Google accounts

Non-Google accounts can be saved to the key. It supports up to 250 keys, e.g. passkeys, that you may add. Numerous services and companies support passkeys already and more will follow in the coming years.

Generally speaking, all you need to do is open the 2-step verification preferences at the service and follow the instructions to protect the account using a hardware key.

Other useful resources

Here is a list of Google resources that you may find useful:

  • Passkeys Management – this page lists all devices linked to the Google Account. You can edit or remove them, and create new passkeys on the page.
  • Security Keys Management — similarly, this page lists all security keys associated with the Google account.
  • Support page with information about lost security keys.

Google’s key or third-party keys?

There are other keys besides Google’s. I already mentioned Yubico keys as an alternative, but there are many more. To name a few: Onlykey, Feitian, or Thetis. All support FIDO2 and offer similar functionality.

Trust plays a role, but so may other factors, including price or the built-in security. There is no clear answer to that question. If you use a Google account and want to protect it, there is nothing wrong with using a Titan Security Key to do so. Similarly, you may use other hardware keys for the same protections.

Now You: do you use hardware keys?

Is Google turning Chrome into its agent?

Posted on November 17, 2023November 17, 2023 by Martin Brinkmann

What would you do, if you were in control of the world’s most used search engine and web browser, and also the world’s largest advertising company? Would you keep things strictly separate, even if it would mean leaving billions of Dollar on the table?

Google’s control of advertising, to a large degree at least, and the Chrome web browser is a problem. The company has made several attempts in the past to push technologies that favor it through Google Chrome.

The oddly named Privacy Sandbox is just one attempt. Google uses the name to portrait an image of improvement for users of the Chrome browser. While not totally wrong, as it is a better system in some regards than the currently used third-party cookie tracking system, it is not the Holy Grail of privacy efforts Google portraits it as.

See, privacy sandbox is still about tracking. What sets it apart from cookie-based tracking are two things: first, that users are associated with interest groups instead of individual interests. Chrome looks at the browsing history and assigns groups to the user. Browse lots of car, sports or knitting sites? Chrome picks these as your interests and advertisers may use the information to display advertisement that falls into the groups.

Second, because it puts Google at the center of control of the feature. Google controls Chromium by and large, and also Chrome. If the system is baked into the browser, Google is in control. It can make adjustments and other changes, and everyone has to play ball to avoid being shut out entirely from the system.

Manifest V3

Privacy Sandbox is not the only attempt that mixes Google’s core interests, advertising, with the development of Internet browsers.

Manifest V3 is a new ruleset for extensions. Google had to postpone the release multiple times as protests sounded loud and clear throughout the Internet.

Apart from some technical issues, missing APIs and the like, Manifest V3 is clearly aimed at making content blockers and other privacy tools less useful. It would go too far to dive deep into technicalities, only this much.

Content blockers, such as uBlock Origin, reign freely under Manifest V2 rules. When they are active, they tell the browser what to do with certain requests. The browser then acts accordingly, for instance by blocking advertisement or allowing a video to play.

Under Manifest V3, that power moves to the browser. The browser controls the blocking and extensions may only make “declarations”. The extension would tell the browser to block or allow a certain element, and the browser would act accordingly.

Google’s explanation for this is improved privacy. Extensions are no longer able to access “potentially sensitive user data”, which in turn makes extensions safer to use.

The argument is flawed, as extensions still have access to the data. They may still use the old API, but only with read access. This means, that they can still access all the data, which in turn means that nothing is won or lost in regards to privacy.

Google announced this week that it will go forward with Manifest V3. Old extensions, those based on Manifest V2, will be disabled automatically for most Chrome users by mid-2024. Enterprise users may get a 1-year extension through a special policy.

Closing Words

There is a conflict of interest at work. Google depends on the advertising business and will go through great lengths to expand it and keep its dominance in the sector. To be fair, the vast majority of changes that are made to Chromium and Google Chrome have nothing to do with Google’s advertising business.

Still, some of the changes appear to favor the business over the interests of users of the browser.

It remains to be seen if the changes will lead to a mass exodus of Chrome users to other platforms. It is too early to tell, especially since the changes affect a sizeable but still relatively small part of the entire Chrome population.

Now You: do you use Google Chrome?

Microsoft confirms that the new Outlook may be transferring third-party logins

Posted on November 16, 2023November 16, 2023 by Martin Brinkmann

The new Outlook app by Microsoft will replace the apps Mail and Calendar on Windows, and the classic Outlook desktop app in the future. This app may transfer email login information to Microsoft Cloud servers, if users use IMAP or SMTP accounts. This happens only if the sync feature is enabled according to Microsoft.

Put plainly; email account logins and passwords are transferred to Microsoft if users set up third-party email accounts via SMTP or IMAP in Outlook and if syncing is enabled.

Microsoft’s statement

Microsoft explained in a statement to Heise Online that the synchronization of emails delivers a consistent user experience for all accounts added in Microsoft Outlook. One such feature is the ability to mark emails as read or unread.

Users of Outlook are informed about the features in a support article. What Microsoft fails to mention to Heise and also in the support article is that it is transferring and storing login information when sync is enabled.

Microsoft confirmed that it is storing access data of IMAP providers that use the BasicAuth method in encrypted form in the user’s mailbox. Basic Authentication is a method that HTTP user agents use to provide username and password when requests are made. It is considered insecure, but still widely used.

This means, nevertheless, that Microsoft is storing the login information using encryption for these type of accounts.

Email providers that use newer standards, OAuth for instance, are handled different. Login information of providers like Gmail or Yahoo Mail are not stored by Microsoft. Microsoft has no access to the password of the account according to the statement.

The OAuth token used for authentication is only accessible by the user and the Microsoft service that communicates with the target servers.

While Microsoft may not have access to the account password, it still owns the infrastructure that has access to the OAuth token. Heise comes to the same conclusion. Microsoft has access to authentication data that it can use, and uses, to access email accounts.

Microsoft’s Syncing notification

Microsoft informs users of Outlook about the synchronization functionality, but the notification does not reveal that access data is transferred when sync is enabled and certain email accounts are added.

Outlook users need to enable the synchronization before it becomes available. Each third-party account added in the Outlook app can be synchronized or not. Microsoft says that users need to accept the syncing with the Microsoft Cloud each time a third-party account is added.

Still, there is no clear information that account data is transferred to Microsoft when users enable the synchronization.

Microsoft states furthermore that it stores the account data for as long as the email client is used actively by the user. The Account Lifecycle Process determines when inactive account data is deleted.

Outlook users may delete the data when they delete their account and select the option to remove the data from all devices.

Closing Words

The new Outlook app is a work in progress and most users may want to stay away from it at least for now. It needs to mature and the fact that Microsoft is gaining access to account access data, at least in theory, is the icing on the cake.

Alternatives like the open source Thunderbird email client respect user data and are without doubt the better option, at least for now.

Microsoft released the Moment 4 update for Windows 11 again?

Posted on November 15, 2023November 15, 2023 by Martin Brinkmann

Microsoft released security updates for all supported client versions of Windows yesterday. Only three non-Enterprise versions are supported right now: Windows 10 version 22H2, Windows 11 version 22H2 and the new Windows 11 version 23H2.

A quick check of KB5032190, the update for both Windows 11 versions, reveals, that it includes the Moment 4 features. Microsoft lists Copilot, Windows Spotlight, security and graphics changes on the support page.

If you follow releases of Microsoft updates, you may wonder why Microsoft highlights the update again here. Did not Microsoft release the Moment 4 update already in October 2023?

The chronology of the Moment 4 update for Windows 11

Microsoft announced in September 2023 that it would launch the Moment 4 update for Windows 11 on September 26, 2023. This was the first release of the update for the operating system.

At the time, it was part of the September 2023 preview update for Windows 11. Only users who installed the update manually or configured their devices to install optional updates automatically received it at the time.

Then came the October 2023 Patch Day update. Microsoft used the cumulative update for Windows 11 to deliver the Moment 4 update to Windows 11 devices.

The release of the preview update of the November 2023 security update included the Moment 4 update again.

Yesterday’s release of the November 2023 update for Windows 11 listed the features of the Moment 4 update again on the release notes page.

One has to wonder why the update is highlighted this often by Microsoft.

An explanation attempt

Microsoft did not post a news article or comment on this specifically. Clearly, most would have expected two announcements about the Moment 4 update integration in Windows 11.

First about the integration of the update in the preview update for the operating system, and second about the full integration for all users.

The repeat performance is puzzling. Martin Geuß over at the German site Dr. Windows suggests that it has something to do with Microsoft’s staged rollout approach to updates.

Many features are not enabled for all users at the same time. Microsoft controls features on the server side. It is an explanation that makes sense. Microsoft did not enable Moment 4 on all devices when it released the update in October 2023.

We don’t even know if the November 2023 announcement is the final one for the update.

This topic may not be of interest to average users of Windows. They don’t follow Microsoft announcements or have an interest in updates most of the time, unless they go wrong.

Users and admins interested in new features and when these features are introduced on their devices are, however. Many want to play around with features early or know exactly when something becomes available.

Microsoft’s recent approach to staged rollouts of features makes this nearly impossible.

Now You: what is your take on this development?

Windows 11’s Archive extraction and creation feature is useful, but slow

Posted on November 14, 2023November 14, 2023 by Martin Brinkmann

Microsoft added support for creating and extracting ZIP archives into its Windows operating system. The Moment 4 update and the Windows 11 version 23H2 update introduced support for extracting additional formats, including RAR, TAR and 7Z.

The archive functionality is certainly a useful feature. Right-click on an archive and select the extract option to decompress it right away. Third-party tools are no longer required.

You may also right-click on files to create ZIP archives out of the selection. It is a handy feature, especially for users who encounter ZIP only occasionally.

Experienced users may have noticed that the implementation is basic. It lacks support for advanced features, especially on the creation side. You can’t create password protected archives, change the compression level or add comments to archives. All of this continues to require dedicated archive apps such as WinRAR, 7-Zip or PeaZip.

A comparison of the time that it takes to extract archives shows, furthermore, that the built-in feature is slower in most cases.

Windows 11: native archive extraction tests

I ran several benchmarking tests to find out if Windows 11’s native archive extraction feature is slower than that of third-party apps.

I ran all extraction jobs 5 times and used the average for the comparison. The first file was an 18.6 gigabyte ZIP archive with 1205 files.

It took Windows 11’s native feature an average of 6.28 minutes to extract the contents of the file on a 2019 idle PC.

WinRAR, which focuses primarily on its own format RAR, extracted the archive on average in 3.51 minutes, which is is more than a third faster.

The open source tool 7-Zip extracted the archive’s content on average in 3.15 minutes, which is almost half the time it took Windows 11’s native implementation to extract the archive.

What about the extraction of RAR archives? I used WinRAR to create a RAR archive out of the extracted ZIP archive and ran the same test again to see how the performance is. The RAR archive had a size of 18.8 GB and the same number of included files.

It took Windows 11’s native RAR extraction feature an average of 5.39 minutes to extract the archive to the system.

WinRAR extracted the same RAR archive in 2.54 minutes on average. 7-Zip was just a few seconds slower, as it took an average of 3.05 minutes to decompress the RAR archive.

Windows 11: compressing ZIP archives comparison

Current stable versions of Windows 11 support the creation of ZIP archives only. This changes in the future.

This time, I picked a a folder with 5307 files and a total size of 2.41 gigabytes . The native ZIP creation feature of Windows 11 created the ZIP archive in 2.29 minutes on average. WinRAR managed to create the archive in 1.28 minutes. 7-Zip flew through the creation of the archive. It took an average of 45 seconds to create it. Both apps have a different native format.

Closing Words

The native integration of support for extracting archive formats and creating some archives is a useful addition to Windows. While that is the case, it is clear that the implementation is not up-to-par with dedicated software.

Users who extract or create archives regularly may want to use third-party solutions for that. It is likely that most of them are faster than the native implementation.

Now You: do you use third-party software to create and extract archives?

Don’t worry too much about Google deleting inactive accounts

Posted on November 13, 2023November 13, 2023 by Martin Brinkmann

Google announced an update to storage policies in November 2020. Back then, the company informed users that it changed which files count against a user’s storage quota.

The change affects high quality photos uploaded to Google Photos and also new Google Docs, Sheets, Slides, Drawings, Forms or Jamboard files. One of these services, Jamboard, a whiteboarding app, has been shut down in the meantime.

A help page on Google’s support website lists data that counts against a user’s quota. Apart from what is listed above, this also includes the following:

  • Meet call recordings.
  • Files in Google Drive.
  • Gmail messages and attachments.
  • Original quality photos and videos backed up to Google Photos.

Users may experience issues when they are over quota. Broken down, it limits the ability to save new files to the cloud storage in many Google products.

Inactive Google accounts

In the same update, Google announced new policies for inactive accounts and accounts that are over the limit.

Accounts inactive for 24 months may have content deleted in the aforementioned services. Google explicitly refers to “product(s) in which you’re inactive”.

The wording is confusing, as users may interpret it as having to use all of these services at least once in a 2 year period to avoid having their data deleted.

This appears to not be the case. Google suggests to “periodically visit Gmail, Drive or Photos on the web or mobile, while signed in and connected to the internet” to avoid the banhammer.

Google reassures users that it will notify users multiple times by email and notifications prior to deleting content or deleting the entire account.

Accounts that exceed their storage quota for a 2 year period also risk deletion, according to Google.

Most accounts are safe

Some news outlet painted the new policy in dramatic terms. While it is true that Google may delete inactive accounts, it is relatively easy to do something about it.

One could argue that users who have not used their account for 2 years may not hold it in high value and that most may not mind the deletion.

In any event, here is what I recommend:

  • If you store valuable files or emails in your Google account, create a backup.-You can use Google’s Takeout service to export the data. Another option is to save files locally or use a local email client, e.g., Thunderbird, to synchronize the emails.
  • To make sure the account is not deleted, sign-in to one of the supported Google products at least once every 24 months.

Closing Words

Google is not the only company that threatens to delete inactive accounts. Microsoft, for example, has similar policies in place. Microsoft users who have not signed-in to their account in a 2 year period may have their accounts deleted as well.

  • Previous
  • 1
  • …
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • …
  • 71
  • Next

Support This Site

If you like what I do please support me!

Any tip is appreciated. Thanks!
  • March 5, 2026 by Martin Brinkmann KeePass 2.61 is out: here is what is new
  • March 4, 2026 by Martin Brinkmann The March 2026 Android Security update is here and you should install it asap (if you can)
  • March 3, 2026 by Martin Brinkmann Google to release two Chrome Stable releases per month
  • March 2, 2026 by Martin Brinkmann Don't Bother with Windows 11's new Speedtest feature
  • February 27, 2026 by Martin Brinkmann Warning! That laptop on Amazon? It comes with temporary storage

About

We talk, write and dream about Technology 24/7 here at Chipp.in. The site, created by Martin Brinkmann in 2023, focuses on well-researched tech news, reviews, guides, help and more.

Legal Notice

Our commitment

Many websites write about tech, but chipp.in is special in several ways. All of our guides are unique, and we will never just rehash news that you find elsewhere.

Read the About page for additional information on the site and its founder and author.

Support Us

We don't run advertisement on this site that tracks users. If you see ads, they are static links. Ads, including affiliate links, never affect our writing on this site.

Here is a link to our privacy policy

©2026 Chipp.in Tech News and Reviews