Ok,
to put it quite simply.
the most simple way that we can check, for anything transmitting any data is to actively analyse the netowkr traffic that it's sending.
we'll assume that, (for the purposes if it A, many eyes argument, and B, I suspect given all the micro$haft reference it fits into the ethos anyway. that Linux can be out analysis machine since it won't have been programmed to igore certain things.
we can put network cards into promiscuous modes so that they capture all traffic.
I've never seen data leaking.
I suspect that I won't see data leaking on any OS any time in the future either.
There is a reason that most sensible people refer to people believing conspiracy theories as crazy.
to put it quite simply.
the most simple way that we can check, for anything transmitting any data is to actively analyse the netowkr traffic that it's sending.
we'll assume that, (for the purposes if it A, many eyes argument, and B, I suspect given all the micro$haft reference it fits into the ethos anyway. that Linux can be out analysis machine since it won't have been programmed to igore certain things.
we can put network cards into promiscuous modes so that they capture all traffic.
I've never seen data leaking.
I suspect that I won't see data leaking on any OS any time in the future either.
There is a reason that most sensible people refer to people believing conspiracy theories as crazy.