Als Antwort auf Natasha Nox 🇺🇦🇵🇸

@Natanox I don't know, I kinda like it

Processing is done locally (if my little ARM laptop could scream from all the ML WorkloadHosts, it would) so the only worrying scenario for me is the device getting stolen which is a bit of an edge case

It's a godsend for someone as scatterbrained as me, being able to look for a past browsing or development activity based on simple keywords sounds nice

Als Antwort auf Albacore

You completely ignore the fact that it's a prime target for literally any virus. They don't even have to do any keylogging anymore since everything already was taken care of, only the sqlite db file has to be transfered.

I know all too well how it feels to be a scatterbrain, but this is both a security AND privacy nightmare. It's only a matter of time Microsoft attempts to use data from it (or the feature itself) for monetization as well.

All in all… please don't get too comfy.

Als Antwort auf Natasha Nox 🇺🇦🇵🇸

@Natanox I mean, yeah

The inclusion of screenshots makes it a great target but it's not like it's difficult to pull someone's super sensitive and relevant data as-is

Dump the Chrome folder from my LocalAppData and either decrypt stuff with DPAPI on the spot or just jack my SAM keys and boom, so much interesting data

I do plan to look into how Recall stores (and protects) all its memories because right now everything online is speculation

Als Antwort auf Albacore

You are in luck, I retooted it earlier. 😉
cyberplace.social/@GossiTheDog…


I got ahold of the Copilot+ software.

Recall uses a bunch of services themed CAP - Core AI Platform. Enabled by default.

It spits constant screenshots (the product brands then “snapshots”, but they’re hooked screenshots) into the current user’s AppData as part of image storage.

The NPU processes them and extracts text, into a database file.

The database is SQLite, and you can access it as the user including programmatically. It 100% does not need physical access and can be stolen.


Als Antwort auf Albacore

probably this: cyberplace.social/@GossiTheDog…


I got ahold of the Copilot+ software.

Recall uses a bunch of services themed CAP - Core AI Platform. Enabled by default.

It spits constant screenshots (the product brands then “snapshots”, but they’re hooked screenshots) into the current user’s AppData as part of image storage.

The NPU processes them and extracts text, into a database file.

The database is SQLite, and you can access it as the user including programmatically. It 100% does not need physical access and can be stolen.


Unbekannter Ursprungsbeitrag

mastodon - Link zum Originalbeitrag

Albacore

@melis @GossiTheDog At the very least the folder where Recall data resides can't be opened by a standard user through File Explorer. The ACLs are set up so only an Administrator can look into it (FE always runs as non-admin), and even then the Core AI Platform should be keeping locks on files in use. You'd need to pull a good few strings to dump Recall data from a running machine where it's being used.
Als Antwort auf Albacore

Can confirm that Recall data is indeed stored in a SQLite3 database. The folder it's in is fully accessible only by SYSTEM and the Administrators group. Attempting to access it as a normal user yields the usual "You don't currently have permission" error. Here's how the database is laid out for those curious, figured you might appreciate a few screenshots.

teilten dies erneut