Possibly a naive question: Wouldn't hosts entries block this? i.e. informaction.com 127.0.0.1, etc.
If so, then one would only comment out the entries when specifically after updates, otherwise they run as-is, and no phone home problem.
Although this depends on a browser using the host system's specified DNS: I seem to have caught Chrome ignoring my entries in favor of Goggle's DNS (on Linux) whilst doing web design for a client. :(
Thanks for the reference, I had never run into APK as a meme/topic.
As to the HOSTS question, I am currently working through Terpstra's SAMBA-3 By Example, and after spending enough time on small business networks chasing down odd stuff every time a Microsoft Small Business Server goes down (runs its own DNS and DHCP servers for the LANs in question), I am beginning to consider static mapping some of these smaller networks for better resiliency, which seems to be a frequent consideration of that author.
I apologize for the naivete, but I did specifically label my comment as such, and my question was an honest one with a simplistic security model in mind, when it comes to specific outside resources that may be untrustworthy.
edit: And that search for APK derived my answer at pineight.com, so again, thanks.
If so, then one would only comment out the entries when specifically after updates, otherwise they run as-is, and no phone home problem.
Although this depends on a browser using the host system's specified DNS: I seem to have caught Chrome ignoring my entries in favor of Goggle's DNS (on Linux) whilst doing web design for a client. :(