All of these programs are hacks. They delete/rename/move the executables that have been identified by system monitoring to be the source of such data collection.
The problem is using any such tool will put you into the world of unsupported modification.
The problem is using any such tool will put you into the world of unsupported modification.