• gravitas_deficiency@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    114
    ·
    edit-2
    22 days ago

    It’s entirely a nonstarter for entire fucking industries. That’s not hyperbole. I work in one of them.

    Edit: scratch that - If any infosec team, anywhere, in any industry, at any corporation or organization, doesn’t categorically refuse to certify for use any system that is running MS Recall, they should be summarily fired and blackballed from the industry. It’s that bad. For real: this is how secrets (as in, cryptographic) get leaked. The exposure and liability inherent to this service is comical in the extreme. This may actually kill the product.

    E2: to the title’s implication that such trust can be earned: it kinda can’t. That’s basically the point of really good passwords and secrets (private keys, basically): nobody else knows them. To try to dance around that is fundamentally futile. Also: who am I kidding, this shit will sell like hotcakes. Everyone’s on fucking Facebook, and look how horrifically they exploit everyone’s data for goddamn everything. This isn’t much worse than that to the average mostly-tech-illiterate consumer.

    • ziviz@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      60
      ·
      22 days ago

      Accounting details, sensitive credentials for sys admin use, HIPAA data, PII etc. there’s just so much crap understood to be temporarily unlocked, viewed, and then immediately deleted or locked again. Even home users shouldn’t turn this thing on, check your bank? Balance and account details now always available. Use a password manager? Whatever you looked at is likely captured.

      • tal@lemmy.today
        link
        fedilink
        English
        arrow-up
        32
        ·
        edit-2
        22 days ago

        Using it may not be legal for videoconferencing in states and countries where recording without notification is illegal.

        Also, legalities aside, if there is any application that might be displaying the contents of one’s laptop webcam onscreen, that turns it into something that logs a series of snapshots of that (and then OCRs any text that the camera can see). I can see potential problems there.

      • NateNate60@lemmy.world
        link
        fedilink
        English
        arrow-up
        17
        ·
        21 days ago

        Microsoft’s solution will be to remove the feature from Enterprise versions of Windows while keeping it around for the plebs using Pro and Home

        • Morphit @feddit.uk
          link
          fedilink
          English
          arrow-up
          10
          ·
          21 days ago

          Their solution is to let users filter out websites in compatible browsers. This lets them blame the user for not marking sensitive websites as such. I don’t know if native applications can also be filtered.

          Of course they also filter out precious DRM protected content. You wouldn’t steal a series of JPEGs.

    • helenslunch@feddit.nl
      link
      fedilink
      English
      arrow-up
      1
      ·
      17 days ago

      to the title’s implication that such trust can be earned: it kinda can’t. That’s basically the point of really good passwords and secrets

      Most people use and recommend encrypted password managers on remote servers. Which is fine, so long as the encryption is open source and audited and the company has a good and long positive reputation.

      MS has none of these things.

  • Juki@lemmy.world
    link
    fedilink
    English
    arrow-up
    66
    ·
    21 days ago

    For all the invasive problems this feature causes, what the fuck does it actually do? The ability to ask an ai what website you were on last Thursday? Who needs this garbage

    • XTL@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      23
      ·
      21 days ago

      The most evil company that ever existed needs it. So you will have it by default.

    • Z4rK@lemmy.world
      link
      fedilink
      English
      arrow-up
      15
      ·
      21 days ago

      The concept is useful. A well known idea capture of it is the famous “As We May Think” article from Vannevar Bush all the way back in 1945, which conceptualized a machine “Memex” that would enhance humans capabilities with for example memory and recall. A lot of humans needs help with this and use devices for this daily, with notes, map lookups of where you parked, find my things for devices, analytics for photo libraries etc etc etc.

      The only issue here is the implementation.

    • Zeppo@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      39
      ·
      21 days ago

      It doesn’t transmit the data; it supposedly stores it locally. The issue is it’s a huge convenient plaintext trove of information if the system is compromised.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      16
      ·
      21 days ago

      Anything that copies, or persist data to a new location should also be a no-fly zone

        • jet@hackertalks.com
          link
          fedilink
          English
          arrow-up
          15
          ·
          21 days ago

          As long as it’s your choice, sure.

          But surprising users and system architects with surprise copies is going to break lots of data security models and behaviors.

  • Dariusmiles2123@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    32
    ·
    21 days ago

    When I read this, I’m glad I ain’t using windows anymore.

    If it was turned off by default, it would be different as people would be consciously choosing. But turned on by default should be illegal.

    As some people are saying, a lot of this isn’t gonna be legal in some countries.

  • MudMan@fedia.io
    link
    fedilink
    arrow-up
    19
    ·
    22 days ago

    In their defense, my mom hasn’t earned that level of trust from me, either.

  • MyOpinion@lemm.ee
    link
    fedilink
    English
    arrow-up
    18
    ·
    21 days ago

    What this opens the door to is MICROSOFT will be able to get your database and be able to ask it questions as if it was talking to you. An AI agent of you that they can do what they like with. This is insanely dangerous.

    • ripcord@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      21 days ago

      Particularly since they’re requiring everyone to log in using credentials via their infrastructure.

      They absolutely have a way in.

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    3
    ·
    22 days ago

    This is the best summary I could come up with:


    This, as many users in infosec communities on social media immediately pointed out, sounds like a potential security nightmare.

    Copilot+ PCs are required to have a fast neural processing unit (NPU) so that processing can be performed locally rather than sending data to the cloud; local snapshots are protected at rest by Windows’ disk encryption technologies, which are generally on by default if you’ve signed into a Microsoft account; neither Microsoft nor other users on the PC are supposed to be able to access any particular user’s Recall snapshots; and users can choose to exclude apps or (in most browsers) individual websites to exclude from Recall’s snapshots.

    This all sounds good in theory, but some users are beginning to use Recall now that the Windows 11 24H2 update is available in preview form, and the actual implementation has serious problems.

    Security researcher Kevin Beaumont, first in a thread on Mastodon and later in a more detailed blog post, has written about some of the potential implementation issues after enabling Recall on an unsupported system (which is currently the only way to try Recall since Copilot+ PCs that officially support the feature won’t ship until later this month).

    The short version is this: In its current form, Recall takes screenshots and uses OCR to grab the information on your screen; it then writes the contents of windows plus records of different user interactions in a locally stored SQLite database to track your activity.

    Data is stored on a per-app basis, presumably to make it easier for Microsoft’s app-exclusion feature to work.


    The original article contains 710 words, the summary contains 260 words. Saved 63%. I’m a bot and I’m open source!