Q. Is this really as harmful as you think?

A. Go to your parents house, your grandparents house etc and look at their Windows PC, look at the installed software in the past year, and try to use the device. Run some antivirus scans. There’s no way this implementation doesn’t end in tears — there’s a reason there’s a trillion dollar security industry, and that most problems revolve around malware and endpoints.

    • mctoasterson@reddthat.com
      link
      fedilink
      English
      arrow-up
      68
      ·
      4 months ago

      No major corp I’m aware of is excited about these changes. Legal especially would like there to be the minimum records retention required by law, and a months long AI searchable database of individual user actions on a PC is a nightmare scenario for them.

      • deltapi@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 months ago

        Forensic data recovery. How many 500GB drives ship to PCs that never use more than 20% of that?

      • hemko@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 months ago

        “By default” meaning it can be changed.

        Then someone in the company gets their device compromised, and security starts looking what happened on the device that time. “We’d have that data, but it was deleted yesterday because of the retention policy on recall” -answer from that new guy in IT dept. Security then reminds that the company policy requires minimum 30 days retention for all logging of security events.

  • simple@lemm.ee
    link
    fedilink
    English
    arrow-up
    127
    arrow-down
    5
    ·
    4 months ago

    They OCR the entire screen and store it in plaintext?! There is no way… I know it’s Microsoft we’re talking about, but are they really this stupid?

    • WhatAmLemmy@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      4 months ago

      They’re a surveillance capitalism corp first and foremost. All other considerations, including security, are secondary.

    • tal@lemmy.today
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      4 months ago

      It’s encrypted; the author is pointing out that it has to be decrypted to be used, and then the data can be obtained.

      Security and privacy concerns aside, I saw someone commenting on the use case, asking who would ever want something like this.

      One problem I hadn’t appreciated for a long time was that some people apparently have real problems with dealing with the Windows UI in terms of file access. They don’t know where their data is being saved. This, in my opinion, is in significant part a Microsoft UI problem induced by various virtual interfaces being slapped on top of the filesystem (“Desktop”, “My Documents”, application save directories, etc) to try to patch over the issue that the filesystem layout was kinda organically-designed in a kind of cryptic way back in the day.

      But if you can remember a snippet of text in what you were working on, you can find that thing again even if you have no idea where you stored it. Like, it’s content-keyed file access.

      That’s not very useful to a techie. They know how to navigate their system’s filesystem, and even if they lose track of a particular thing, they know how to use the system’s filesystem search tools to search for filenames or content. They can search for recently-modified files. They know how to generally get ahold of stuff.

      But for the people who can’t do that, reducing their interface to a single search box might make file access more approachable.

      Now, let me reiterate that I think that a whole lot of this is Microsoft repeatedly patching over UI problems they created in the past rather than fixing them. And they’ve done this before over the decades with stuff other than document access. It’s hard to navigate the filesystem to find an installed program a la the MS-DOS era, so they stick stuff in a Start Menu to make it more accessible. That gets too crowded, installers start slapping shortcuts on the desktop. That gets too crowded, installers start adding system tray icons. That gets too crowded, the Start Menu becomes searchable. Each interface just becomes progressively less-usable and the solution each time is to stick a new interface in on top of the old one, which in turn contributes to the complexity of the system as a whole.

      But that doesn’t mean that they aren’t trying to address a real problem.

      I think that they’d do better with something like having a rapidly-accessible log of recently-accessed files (like, maybe have the filesystem maintain a time-based doubly-linked list of those) and be able to rapidly search the content of documents based on mod time so that recent stuff gets hit quickly, then trying to make their existing search tools more accessible. That doesn’t replicate data across the system and produce some of the problems here. It also permits for fully-searching content, rather than just the stuff that was on a screen when the Recall system grabbed a screenshot and OCRed it. Maybe they’ve done something like that in recent years; I’m many years out-of-date on Windows.

      I’d also add that I think that personal computer systems in general would benefit from giving users better control over where their data is replicated to. It’s kind of confusing…you’ve got swap (well, encrypted swap probably helps somewhat with this). Browser history. Any clipboard manager’s retention. Credentials stores. Application-saved copies of in-progress files. Various caches. If you use some kind of cloud-based storage, you’re pushing data out to other computers. Backups. Just a lot of state that can be replicated all over the place and is hard to go back and track down and remove. That’s even before stuff like issues with doing secure deletion on existing filesystems (which we had a conversation about the other day, everything from log-structured filesystems to wear-leveling on SSDs inducing data replication). If you want something definitely gone, be able to manage your data’s lifetime, something that I think that a lot of people – even non-techies – would like, you really have to have a lot of technical knowledge of the system’s internals as things stand today. This Recall thing is egregious, replicates data all over, but it’s far from the first feature that makes it harder for people to understand and control the lifetime of data on their computer.

      I don’t think that the software world has done a great job of letting people control that data lifetime. And I think that it’s something that a user should reasonably be able to expect out of their computer.

      • jjjalljs@ttrpg.network
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        There was an article going around a while ago that was arguing most users these days, including the youth we often stereotype as “digital natives” who “get computers”, don’t understand file systems. They might not even know they exist as a concept.

        Which makes sense if you’ve only ever really used modern UIs. You don’t have to know anything about files and folders. I bet a lot of people don’t even know they exist in any meaningful way.

        Most users are shockingly ignorant, and a lot of them are not really paying enough attention or interested enough to learn much.

        • Womble@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          I remember reading an article a few years back about physics undergraduates who didnt know how to use a computers file system. They could learn, but these are smart likely at least fairly tech inclined kids and they didnt know how to navigate folders on a computer at 18.

          • The_Terrible_Humbaba@slrpnk.net
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            When I studied Computer Engineering, I met several other students who had a lot of trouble using the Windows file system, and navigating a file system through a terminal was a Herculean task for them.

            Most people growing up now, and since over a decade ago, are only tech savvy in the sense they know how to use smartphones, tablets, and social media; none of those require any understanding of file systems, and even using desktops doesn’t really require it that much for most people.

            • gravitas_deficiency@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              0
              arrow-down
              1
              ·
              4 months ago

              I’m simply baffled that someone going into a computer engineering major at a university doesn’t understand a hierarchical file system as a matter of course. It’s a tree. The file system is a tree. A tree is one of the most basic computer science logical constructs. How exactly is a filesystem confusing? How is navigating directories from a terminal - any terminal, in any OS - a Herculean task?

  • deweydecibel@lemmy.world
    link
    fedilink
    English
    arrow-up
    105
    arrow-down
    2
    ·
    edit-2
    4 months ago

    Are Microsoft a big, evil company?

    A. No, that’s insanely reductive. They’re super smart people, and sometimes super smart people make mistakes. What matters is what they do with knowledge of mistakes.

    I have no doubt there are smart employees, but they don’t call the shots. Case in point.

    The dude set up a strawman argument, then didn’t even bother to burn it down properly.

    • Grangle1@lemm.ee
      link
      fedilink
      English
      arrow-up
      37
      ·
      4 months ago

      Being super smart and super evil are NOT mutually exclusive. Intelligence =|= morality.

        • Hobo@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          ·
          edit-2
          4 months ago

          Why reach for a fictional example when so many real world examples exist? Just curious because I think of Bezos, Musk, and to a lesser degree Gates as examples of smart people doing bad things. I mean there’s several very smart people that have done good things as well but those are harder to come by. Even people like Alfred Nobel created something he thought would save the lives of miners only for his invention to be used for war. Einstein also did a lot for the advancement of theoretical physics and his work was subsequently used as the foundation of the atomic bomb. It’s actually way harder to come up with a Tony Stark type smart “good guy” in the real world for me because reality is often far more grey.

          • AngryCommieKender@lemmy.world
            link
            fedilink
            English
            arrow-up
            7
            arrow-down
            2
            ·
            4 months ago

            I don’t think of Bezos, Musk, or Gates as exceptionally intelligent. They are lucky and influential, sure. Intelligent? Musk is automatically out just because of his Twitter feed. The other two haven’t shown themselves to be particularly intelligent, just ruthless and efficient when it comes to generating profit.

            As far as the other side of that coin, I tend to agree. Most of the really intelligent people that have existed have been pretty grey morally speaking.

            Hence why I went with fictional examples. At least with Lex Luthor, there’s very little grey area in his moral stances.

            • Hobo@lemmy.world
              link
              fedilink
              English
              arrow-up
              10
              arrow-down
              3
              ·
              edit-2
              4 months ago

              Gates is insanely intelligent, like demonstratably so. Musk and Bezos are also very highly intelligent people. Do they have terrible, awful, even downright despicable views? Absolutely. But don’t be fooled, all three of those people are incredibly smart with actual high IQs (not in the braggart, “I have a very high IQ.” sense either).

              Intelligence doesn’t translate to empathy or wisdom. Some of the least book smart people I’ve met have been profoundly wise at times, and some of those same people were incredibly empathetic. Unfortunately, I think all three of those people (Musk, Bezos, and Gates) are lacking in those traits, but saying they aren’t in fact measurably intelligent is only fooling yourself.

              I say this as someone who was raised by a measurably very highly intelligent person who could be, and was, a complete monster at times, and had some really twisted views on the world/other people. Lucky for me I didn’t inherit that innate Intelligence I guess!

              • neclimdul@lemmy.world
                link
                fedilink
                English
                arrow-up
                9
                arrow-down
                1
                ·
                4 months ago

                Is musk really intelligent? He’s not dumb but honestly seems like most of his success is from buying things and or getting smart people under him who are able to succeed despite his medlling. The ideas he forces through tend to be bad. Giga factory was largely a disaster and he had to relearn manufacturing. Giga casting? Dead. A lot of the super heavy stuff he’s directly influenced failed or are drawing out the timeline as the struggle to address. Cybertruck and semi…

                • g_the_b@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  6
                  arrow-down
                  1
                  ·
                  4 months ago

                  Musk and Jobs are/ were highly effective psychopaths. Not geniuses in an academic sense but incredibly shrewd and calculated.

                  Gates, Bezos, Zuck, Page and the likes are very intelligent and very confident. Like I wouldn’t be able to one up any of them in a debate, but I wouldn’t be afraid of them trying to destroy my life out of spite.

                • sugar_in_your_tea@sh.itjust.works
                  link
                  fedilink
                  English
                  arrow-up
                  4
                  ·
                  4 months ago

                  Hiring smart people and seeing market opportunities and executing on those opportunities absolutely are skills. It’s the same sort of skills Hitler had, where most of the genius lies around organising people around a common goal.

                  A lot of companies either get the smart people, time market opportunities perfectly, or execute perfectly on a clear vision, but very few do all three at the same time and tend to fail. The first (lots of smart people) run out of money, the second is the “too early” group and their ideas get taken by someone else, and the third spends their resources going in the wrong direction.

                  Elon Musk wasn’t successful because he knows a lot about electric cars or rockets, he was successful because he saw an opportunity, secured enough funding, hired the right people, and focused those people in the right direction.

                  You can be incredibly smart in one area and incredibly dumb in others. Elon is great at pitching an idea to get funding, and using that funding to hire the right people. He fails when he overrides those smart people.

              • Promethiel@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                2
                ·
                4 months ago

                These totally normal human beings you sound like you deify…are you their psychiatrist, psychologist, therapist, counselor? Short of those professions or a former tutor who happened to treat all three…

                Well, interesting thing to devote anecdotal brain power to, I’ll tell you that.

                • Hobo@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  edit-2
                  4 months ago

                  Yeah totally that’s why I said they were basically morally corrupt and used them as an example of smart people doing bad things… Maybe your judgement is a bit clouded?

        • LordCrom@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          2
          ·
          4 months ago

          As we get older, I tend to agree with the supervillains.

          Lex Luther wants a weapon to counter this insanely strong, invulnerable Superman that can destroy the planet … I’m like: Yes we should

          Magneto considers mutants superior and if humans wage war, then mutants have the right to wage war back, and win. Survival of the fittest. If I was a mutant, I would be on Magnetos team.

          • sugar_in_your_tea@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            5
            ·
            4 months ago

            Magneto wanted supremacy, not equality, and was willing to use genocide of non-mutants to get it. And Lex Luthor was a narcissist who was jealous of Superman’s power and popularity; he wasn’t acting for the benefit of humanity, he was acting in his own interests.

            Every good villain has mostly justifiable motivations, they just take it too far. Magneto would be justified if he sought equality, and Luthor would be justified if he developed but didn’t use the weapon until Superman did something evil.

            The only justifiable amount of force is just enough to neutralize an active threat, and no more.

  • DarkSurferZA@lemmy.world
    link
    fedilink
    English
    arrow-up
    62
    arrow-down
    1
    ·
    4 months ago

    I get the security issues, sure, those are valid, but the privacy ones are even worse. Imagine a teenager trying to search information on being gay, or possible intrusive thoughts on their family computer, only for their super maga right wing parent to find it in the screenshots.

    Or someone being abused at home and searching for support facilities, deleting history and being outed by recall.

    Wait, how about credit card fraud as a result of EVERYONE who has access to this computer can read your cc data?

    Or, my husband was looking at jewelry online yesterday and he hasn’t told me, he must be cheating, right? Oh sorry, I forgot, our anniversary is next week… Hahahaha, don’t be upset babe.

    Best one ever though, imagine your search history, your porn watch history accessible to anyone with access to your computer? The fucking horrific existence of having an employer process this data at scale using fancy staff monitoring program 7, and run stats on the fact that you had a toilet break while working from home, and they want to know if it was a number 1, or a number 2 so they can work a mean time to shit metric into your KPA/scorecard.

    Guys, whatever benefit you think this is. It’s not worth it.

    • uhN0id@programming.dev
      link
      fedilink
      English
      arrow-up
      12
      ·
      4 months ago

      Ultimately privacy is part of security so, if anything, everything you mentioned is just more reinforcements that this is a major security concern.

      As someone that has been obsessed with tech since being a kid in the 90s I think the tech side of this is super cool and very exciting stuff. As a user, though, I only like this if I’m the one implementing and using it. I do not trust a mega corporation (or really any company) to “leave it locally on my computer and totally not use that data for other purposes”. Right now it’s supposed to be (as far as I last heard) only on your machine but we’ve seen EULAs and TOS’ etc change many times over the years but especially over more recent years as data continues to be king and data like this is a literal bottomless diamond mine.

      I know this isn’t your point but it’s just worries I have in addition to your points. And let’s not even start about what this means for law enforcement abuse. No thanks, I’ll wait for a FOSS equivalent that at least gives me and the community the opportunity to evaluate how it works.

    • ArcaneSlime@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      6
      ·
      edit-2
      4 months ago

      Not that it solves the problem, but since I’m not the King of M$ this is about all I can do: you could easily get around all that by turning off secure boot and booting into a persistant live-usb containing a linux distro of your choice (Tails for extra privacy/ease, if you can use Tor) to do all your secret agent computing needs. The host PC can’t see shit of what happens on Tails.

      Edit: lol you downvoted me because I can’t singularly change an entire corporation’s mind and instead offer workable solutions that you could make within the next 30 minutes to mitigate the problem until such time as your plan for Microsoft domination comes to fruition and you can change it back?

      Ok I guess, “chump don’t want no help, chump don’t get no help. Jive ass fools ain’t got no brains, anyhow.”

      -Barbara Billingsly

  • suction@lemmy.world
    link
    fedilink
    English
    arrow-up
    49
    ·
    4 months ago

    Couldn’t you use a separator to make it one line of code? That way it’d be even more dangerous

    • sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      8
      ·
      4 months ago

      I did an interview where the candidate said that if it’s one line, it runs in constant time. And they were completely serious. And this was in the context of Python list comprehensions.

      They claimed this ran in constant time:

      new_list = [value for value in my_list]
      

      Whereas this ran in linear time:

      new_list = []
      for value in my_list:
          new_list.append(value)
      

      We asked clarifying questions, like what happens to the runtime if the list gets really large, and they doubled down.

      And this was for a senior Python dev position… No, they didn’t get the job.

      • suction@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        4 months ago

        Runs in constant time doesn’t ring a bell to be honest…do you mean instantly?

        • sugar_in_your_tea@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          4 months ago

          No, constant time means it’ll take the same amount of time whether you have 10 items or 10,000.

          A list comprehension will take roughly the same amount of time as a for loop, it’s just syntactic sugar.

          • suction@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 months ago

            Thanks!

            Not sure why you needed to downvote my honest question, maybe the candidate dodged a bullet there, he he he.

            • sugar_in_your_tea@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              4 months ago

              I didn’t downvote.

              If this was a junior candidate or something, I may have let it slide. But this was a senior candidate, which means they are supposed to be a technical leader for the team. I can’t have someone in that role with such fundamental misunderstandings. There were more red flags than just that one, I also don’t fail people for one gaff (e.g. I just passed a senior that bombed the coding challenge, but it was obvious they were over-thinking it).

    • Dicska@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      1
      ·
      4 months ago

      Are you… Are you saying EVERYTHING can be hacked with one line of code?

      • suction@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        edit-2
        4 months ago

        Ever since those Aliens brought us their ancient and mysterious line separator tech, we have all we need to do just that!

        • Dicska@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          4 months ago

          Independence day was indeed a great movie. Who would have thought they also use X86 architecture?

  • Churbleyimyam@lemm.ee
    link
    fedilink
    English
    arrow-up
    26
    ·
    4 months ago

    Even supposing I didn’t care about the security implications of this, why on earth would I want this functionality? I can barely keep up with all my activities in the present moment, let alone the past. It’s like a morbid and pathological unification of nostalgia and hoarding.

    • dustyData@lemmy.world
      link
      fedilink
      English
      arrow-up
      29
      arrow-down
      1
      ·
      4 months ago

      Not just enterprise. Some organizations handle extremely sensitive information of victims of crimes, survivors of wars, potential political targets, just to name a few. A feature taking a screenshot and registering all of that data is a nonstarter. MS will have to prove that the feature doesn’t run with certain gov clients, the privacy risk is way too high.

      • deweydecibel@lemmy.world
        link
        fedilink
        English
        arrow-up
        15
        ·
        edit-2
        4 months ago

        On the other end of the spectrum, the vast majority of home users have no idea how to disable this or that it’s even activated. There will be folders of Recall shit filling up everywhere, waiting for someone who knows it’s there to access it.

        If any of them access their work data on the Microsoft 365 web apps, it’s now sitting in that folder, and they will not know.

        This is honestly the biggest evidence yet of a need for some sort of regulation that certain privacy related things should not be allowed to be activated by default. They should always be opt-in, period.

    • jordanlund@lemmy.world
      link
      fedilink
      English
      arrow-up
      25
      ·
      edit-2
      4 months ago

      Enterprise will love it because it will allow them timestamped access to everything their employees are doing during the day.

      They will have it set up to alert on a various things…

      “So, Bob, you were playing Minesweeper from 9:45 to 9:53, was that a scheduled break for you?”

      “Jane, your screen showed no substantive changes from 1:03 to 4:15, you weren’t in a meeting, what were you doing?”

      • Someonelol@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        1
        ·
        4 months ago

        The surveillance would be a double edged sword. If they were to be hacked, all sensitive information that was going through their PCs could be compromised.

        • jordanlund@lemmy.world
          link
          fedilink
          English
          arrow-up
          25
          ·
          4 months ago

          They will convince themselves it can’t be compromised. Never under-estimate the stupidity of middle management.

          • Flying Squid@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            4 months ago

            And no one was able to stop the White Star Line executives by saying, “maybe you shouldn’t be 100% sure the Titanic is unsinkable?”

    • BearOfaTime@lemm.ee
      link
      fedilink
      English
      arrow-up
      13
      arrow-down
      5
      ·
      4 months ago

      It won’t.

      All the crap from MS only affects ignorant home users. (I say that with no criticism - home users often lack significant expertise in this stuff).

      Corporate has an IT team dedicated to image building, based on requirements gathering, which is well documented and well tested before it’s deployed to even a small test group (usually us fellow IT geeks get to be Guinea pigs first).

      Once it’s been certified, then they’ll deploy to a second, larger group, test and verify.

      Wash, rinse, repeat.

      Plus they’ll probably start with new hires and anyone with a machine that is falling off lease/aging out. This gives them a little room, in that new hires don’t have any local data (no one should have much in the first place), and people with aging machines can hold onto the old machine for a couple weeks as a fallback, just in case.

      I’ve seen it several times, been part of deployment and upgrade teams.

      Additionally, they deploy policies to redirect any MS network services to their own internally hosted services - windows is designed to do this, there are specific policies for everything, such us Windows Update services, even the MS App Store. Because no company wants machines pulling random crap from outside the company (they probably even block the access at the network level - I would).

      • TexMexBazooka@lemm.ee
        link
        fedilink
        English
        arrow-up
        14
        ·
        4 months ago

        Everything you’re describing is how it should be done. Realistically it isn’t done properly, all the time, and that’s why breaches happen.

    • ripcord@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 months ago

      This will fly for corporations wanting to use it themselves against their employees.

    • pyrflie@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      4 months ago

      It already exists in the corporate environment. Teams is a keystroke logger, it stores everything you do down to the microsecond in a plain txt on the C drive. This just expands that to everyone that uses Windows.

      Windows is spyware now.

  • A_Random_Idiot@lemmy.world
    link
    fedilink
    English
    arrow-up
    24
    ·
    edit-2
    4 months ago

    I cant believe they are including this in enterprise edition too.

    They usually keep their dirty spyware out of the enterprise editions to avoid losing corporate clients who dont want their secrets easily pluckable.

    • EzTerry@lemmy.zip
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      1
      ·
      edit-2
      4 months ago

      Ask yourself what this feature is actually useful for. Ignore the concerns of privacy just what can this really do.

      Its not really needed for copilot, if it wanted to capture what you were doing it would directly update the internal model, no reason for the slide show of your action.

      No besides wasteing disk space this is for:

      1. Gaming youtubers to get a screen shot of something when they were not recording
      2. Some screen shots of history when searching not better than the file/website preview really
      3. Tracking and logging what the end user is doing so when audited by the manager/it they can use it as proof you are not doing it right/are inefficient /should ve fired

      By all means a company can disable this in policy im sure, but its for the enterprise not the end user. (and yes stored locally, but if you delete the laptop when they want to inspect it that likely is all the excuse they need)

      • tidaL@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        Benefit to my org is getting billers to look for untracked time, which would equate to some percentages of revenue increase in my opinion.

        Just need to balance it with security concerns…

        • EzTerry@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          enable for roles with more locked down PCs and tasks the companies hope to automate, and disable on more core mission critical IT…

    • Cognitive_Dissident@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 months ago

      At least in the Enterprise versions, companies will have the option to exclude it from their installations – if they want.

  • DirkMcCallahan@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    ·
    4 months ago

    The full article is well worth reading. It’s good to find a lucid, logical deconstruction of why, precisely, this will be a complete disaster.

  • TheTimeKnife@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    ·
    edit-2
    4 months ago

    We should have let the government actually break up microsofts monopoly long ago. Now they will abuse it to force millions of Americans to use their spyware.

  • retrospectology@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    2
    ·
    edit-2
    4 months ago

    Does anyone yet know how to break stuff like Copilot?

    I don’t have Win11, but I also never really trust that MS won’t surreptiously push this kind of thing in the background to legacy systems, and I don’t trust UI toggles within Windows to actually do anything.

    Do we know if there are services or files that Co-pilot needs to function?

  • Snot Flickerman@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    4 months ago

    Unpopular Opinion: This is why Microsoft were such assholes about making sure Windows 11 required a modern TPM and this is also why they are forcefully rolling out Bitlocker encryption turned on by default on all Windows 11 PCs.

    Is Recall still a fucking stupid idea? Yes, resoundingly so. But they’ve half-ass considered the risks, it seems. The forceful rollout of Bitlocker is dumb and short-sighted in its own right, and it wouldn’t make a person completely secure from outside attacks rooted in a Recall exposure.

    • 0xD@infosec.pub
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      4 months ago

      That’s not an unpopular opinion, it’s an outrageously stupid and uninformed one and you should keep it to yourself.

  • NoiseColor@startrek.website
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    4 months ago

    This is a feature hundreds of millions of people will use and very likely won’t cause any security issues. These doomsday scenarios every Linux user here is predicting is a bit much, don’t you think so?

    • Adanisi@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      Are you braindead? Yes yes taking regular screenshots of the desktop can’t possibly be a security risk, right?

      • NoiseColor@startrek.website
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        4 months ago

        You can define almost anything as a security risk. But we aren’t children to play such stupid games.

        We are talking about someone gaining that information and the probability of that happening without even knowing what security mesaures will be in place. I think the risk is negligible even today with the limited information about it that we have now. Other People here, presumably you as well are hysterical about it.

        Thats what the discussion is. You actually believe Microsoft will launch this and then everybody will be hacked or something. I think that is… not smart.

        • Adanisi@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          No, I don’t think “everyone will get hacked or something”, don’t put words in my. I mouth for the sake of your argument.

          What it is, and this is undeniable, is a massive fucking privacy and security hole if someone gains control of your computer.

          • NoiseColor@startrek.website
            link
            fedilink
            English
            arrow-up
            0
            arrow-down
            1
            ·
            4 months ago

            I didn’t want to put words in your mouth, but wanted to clear up where each of us stand so there is no missunderstanding.

            If somebody gains control of your computer today, that’s a massive privacy and security hole in itself.

            • starman2112@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              4 months ago

              If you didn’t want to put words in someone’s mouth then you shouldn’t have said something like

              You actually believe Microsoft will launch this and then everybody will be hacked or something.

              • NoiseColor@startrek.website
                link
                fedilink
                English
                arrow-up
                0
                arrow-down
                2
                ·
                4 months ago

                Oh a knight in shining armour trying to defend my dialogue partner?

                Did you ask anyone needed defense? Because I’m pretty sure they don’t.

                If you read carefully I wrote “or something” at the end implying that I don’t know exactly what they believe. It was not that subtle of invitation for them to agree with my first assessment or correct me. I will try to be really blunt in the future, so that you don’t missunderstand again.

                • starman2112@sh.itjust.works
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  edit-2
                  4 months ago

                  ? I’m not defending anyone, I’m calling out bullshit when I see it

                  I don’t really care that you like watching kids through their bedroom windows or whatever

                  If that doesn’t accurately describe your views, no worries—I said “or whatever,” so it’s fine

            • Adanisi@lemmy.zip
              link
              fedilink
              English
              arrow-up
              0
              ·
              4 months ago

              Absolutely, but even with control of your computer, if you’re smart, other accounts etc will still be inaccessible by the attacker.

              Not when they get access to the Windows built in desktop spy saving everything it sees.

              • NoiseColor@startrek.website
                link
                fedilink
                English
                arrow-up
                0
                arrow-down
                1
                ·
                4 months ago

                Not if it’s encrypted and if sensitive information is not saved.

                Main point is still that gaining control of someone’s computer against their will is practically impossible today. If someone manages to do it, they already have your files and all the sensitive information they could want. They won’t even bother with this recall. And if you are worried about it, you will be able to just turn it off.

                Much ado about nothing.

                • Adanisi@lemmy.zip
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  ·
                  4 months ago

                  “If sensitive information is not saved” is doing a lot of heavy lifting for you there. The issue is that it saves everything.

    • higgsboson@dubvee.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      very likely won’t cause any security issues.

      Hahahahaha. Oh wait, you’re serious? Let me laugh even harder. HAHAHA

    • lemmyvore@feddit.nl
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      We’ve seen it before, it’s not idle speculation. Windows machines have been the hosts of the largest botnets in the world. Whenever a company does something stupid like this it invariably gets into the wrong hands. It’s not even a question of if it will happen just when it will happen.

      Oh and it’s not “Linux users” saying it, it’s everybody with an ounce of technical common sense. We’re all here shouting at Microsoft “it’s a bad idea” and they won’t care and it will go exactly as badly as predicted.

      • rottingleaf@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        Oh and it’s not “Linux users” saying it, it’s everybody with an ounce of technical common sense.

        Which kinda correlate with each other. Which allows for a certain bad faith argument to be made.

      • NoiseColor@startrek.website
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        4 months ago

        Yes, we have seen it many times before. Much ado about nothing. New feature that will mean some new security measures. Everybody will move on and in a year nobody will remember how some people in the Linux community were panicking.

        • Flying Squid@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          I will never find out exactly when your bank data is stolen because of this, so I’m just going to laugh about it now.

          • NoiseColor@startrek.website
            link
            fedilink
            English
            arrow-up
            0
            arrow-down
            1
            ·
            4 months ago

            Go ahead laugh. Because you will indeed forget all about it and never remember your doubts and panic laughter as nothing will happen.

    • BrowseMan@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      4 months ago

      Did you read the article?

      This system basically do a character recognition on EVERYTHING the user is displaying and save the results in a very small file not that well protected.

      The data is very small (I guess because it’s basically text?), seems easy to find. That means the history of all you did on your computer (apparently only for the last three feays by default,but well…) can be stolen at once, in a minuscule file.

      I’m not an IT specialist, but I don’t see in which world this can remotely be a good idea…

      • NoiseColor@startrek.website
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        4 months ago

        As I understand not everything will be read and stored, storage will be encrypted. We don’t even know what exactly will be stored and everybody here is losing their mind.

        We already have a lot of sensitive information on our computers and nobody is panicking.

        I guess it’s hard to get used to new stuff. Or maybe Linux users are afraid that their favourite system won’t be able to compete anymore.

        • BrowseMan@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          4 months ago

          Based on what Microsoft themselves said we know: everything will be stored (except edge private session…). They specifically say they don’t do content moderation: they log everything.

          Did you read the article?

          Q. Cool, so hackers and malware can’t access it, right?

          A. No, they can.

          Q. But it’s encrypted.

          A. When you’re logged into a PC and run software, things are decrypted for you. Encryption at rest only helps if somebody comes to your house and physically steals your laptop — that isn’t what criminal hackers do.

          As a windows user I’m not delighted by this.

          Edit: at this point you must be trolling…

        • ocassionallyaduck@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 months ago

          You didn’t read the article.

          We do know the answers to these questions. And if I can use a 2 line script to exfiltrate all your screen data for days/weeks in under a few MB of data.

          So better hope you, never, ever, ever run unauthorized or malicious code, because now it basically has a honeypot of top priority data, always stored in a known location and compressed for easy uploads.

            • ArcaneSlime@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              4 months ago
              Q. The data is processed entirely locally on your laptop, right?
              
              A. Yes! They made some smart decisions here, there’s a whole subsystem of Azure AI etc code that process on the edge.
              
              Q. Cool, so hackers and malware can’t access it, right?
              
              A. No, they can.
              
              Q. But it’s encrypted.
              
              A. When you’re logged into a PC and run software, things are decrypted for you. Encryption at rest only helps if somebody comes to your house and physically steals your laptop — that isn’t what criminal hackers do.
              
              For example, InfoStealer trojans, which automatically steal usernames and passwords, are a major problem for well over a decade — now these can just be easily modified to support Recall.
              
              Q. But the BBC said data cannot be accessed remotely by hackers.
              
              A. They were quoting Microsoft, but this is wrong. Data can be accessed remotely.
              
              Q. Microsoft say only that user can access the data.
              
              A. This isn’t true, I can demonstrate another user account on the same device accessing the database.
              
              Q. So how does it work?
              
              A. Every few seconds, screenshots are taken. These are automatically OCR’d by Azure AI, running on your device, and written into an SQLite database in the user’s folder.
              
              This database file has a record of everything you’ve ever viewed on your PC in plain text. OCR is a process of looking an image, and extracting the letters.
              
              Q. What does the database look like?
              
              A:https://twitter.com/GossiTheDog/status/1796218726808748367?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1796218726808748367%7Ctwgr%5E2eccf634534245a77c4f931d8722f1b8c6f23595%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Ftype%3Dtext2Fhtmlkey%3Da19fcc184b9711e1b4764040d3dc5c07schema%3Dtwitterurl%3Dhttps3A%2F%2Fx.com%2FGossiTheDog%2Fstatus%2F1796218726808748367image%3D
              
              Q. How do you obtain the database files?
              
              A. They’re just files in AppData, in the new CoreAIPlatform folder.
              
              Q. But it’s highly encrypted and nobody can access them, right?!
              
              A. Here’s a few second video of two Microsoft engineers accessing the folder: https://cyberplace.social/system/media_attachments/files/112/535/509/719/447/038/original/7352074f678f6dec.mp4
              
              Q. …But, normal users don’t run as admins!
              
              A. According to Microsoft’s own website, in their Recall rollout page, they do: https://miro.medium.com/v2/resize:fit:1100/format:webp/0*WGE1jcRzhe6WAGQS
              
              In fact, you don’t even need to be an admin to read the database — more on that in a later blog.
              
              Q. But a UAC prompt appeared in that video, that’s a security boundary.
              
              A. According to Microsoft’s own website (and MSRC), UAC is not a security boundary: https://miro.medium.com/v2/resize:fit:1100/format:webp/1*TTjYNH15IoP_d8JhhG3cEA.png
              
              Q. So… where is the security here?
              
              A. They have tried to do a bunch of things but none of it actually works properly in the real world due to gaps you can drive a plane through.
              
              Q. Does it automatically not screenshot and OCR things like financial information?
              
              A. No: https://miro.medium.com/v2/resize:fit:1100/format:webp/1*OZMjujpALL3IfAQYT64x7Q.png
              
              

              Do I have to continue or do you think you could actually read the article for the rest? It’s clearly a bigger deal than “linux users mad because windows better” and your poor excuse for a troll just makes it look like you’re too stupid to read the article laid out in front of you. Well, now you have no excuse so get good.

              • NoiseColor@startrek.website
                link
                fedilink
                English
                arrow-up
                0
                arrow-down
                1
                ·
                edit-2
                4 months ago

                Sorry I don’t take everyones word as truth. This guy is just one guy. One guy against the whole Microsoft corporation whose entire fortune depends on this not to fail in the way he said it certainly will. Absurd.