Processing is done locally (if my little ARM laptop could scream from all the ML WorkloadHosts, it would) so the only worrying scenario for me is the device getting stolen which is a bit of an edge case
It's a godsend for someone as scatterbrained as me, being able to look for a past browsing or development activity based on simple keywords sounds nice
You completely ignore the fact that it's a prime target for literally any virus. They don't even have to do any keylogging anymore since everything already was taken care of, only the sqlite db file has to be transfered.
I know all too well how it feels to be a scatterbrain, but this is both a security AND privacy nightmare. It's only a matter of time Microsoft attempts to use data from it (or the feature itself) for monetization as well.
The inclusion of screenshots makes it a great target but it's not like it's difficult to pull someone's super sensitive and relevant data as-is
Dump the Chrome folder from my LocalAppData and either decrypt stuff with DPAPI on the spot or just jack my SAM keys and boom, so much interesting data
I do plan to look into how Recall stores (and protects) all its memories because right now everything online is speculation
I've seen someone here talking about it, apparently firsthand (that's why I mentioned sqlite). Apparently it's first saved as screenshots, then those get analyzed by the process meant to run in the NPU for its output to be stored in an sqlite database also located in AppData.
Recall uses a bunch of services themed CAP - Core AI Platform. Enabled by default.
It spits constant screenshots (the product brands then “snapshots”, but they’re hooked screenshots) into the current user’s AppData as part of image storage.
The NPU processes them and extracts text, into a database file.
The database is SQLite, and you can access it as the user including programmatically. It 100% does not need physical access and can be stolen.
Recall uses a bunch of services themed CAP - Core AI Platform. Enabled by default.
It spits constant screenshots (the product brands then “snapshots”, but they’re hooked screenshots) into the current user’s AppData as part of image storage.
The NPU processes them and extracts text, into a database file.
The database is SQLite, and you can access it as the user including programmatically. It 100% does not need physical access and can be stolen.
@Natanox @Rairii Thanks. Gotta say I'm surprised by the default enterprise behavior. On the regular consumer Windows 11 Pro setup I needed to manually enable Recall in Settings for it to start capturing anything.
@melis @GossiTheDog At the very least the folder where Recall data resides can't be opened by a standard user through File Explorer. The ACLs are set up so only an Administrator can look into it (FE always runs as non-admin), and even then the Core AI Platform should be keeping locks on files in use. You'd need to pull a good few strings to dump Recall data from a running machine where it's being used.
Can confirm that Recall data is indeed stored in a SQLite3 database. The folder it's in is fully accessible only by SYSTEM and the Administrators group. Attempting to access it as a normal user yields the usual "You don't currently have permission" error. Here's how the database is laid out for those curious, figured you might appreciate a few screenshots.
Natasha Nox 🇺🇦🇵🇸
Als Antwort auf Albacore • • •Albacore
Als Antwort auf Natasha Nox 🇺🇦🇵🇸 • • •@Natanox I don't know, I kinda like it
Processing is done locally (if my little ARM laptop could scream from all the ML WorkloadHosts, it would) so the only worrying scenario for me is the device getting stolen which is a bit of an edge case
It's a godsend for someone as scatterbrained as me, being able to look for a past browsing or development activity based on simple keywords sounds nice
Natasha Nox 🇺🇦🇵🇸
Als Antwort auf Albacore • • •You completely ignore the fact that it's a prime target for literally any virus. They don't even have to do any keylogging anymore since everything already was taken care of, only the sqlite db file has to be transfered.
I know all too well how it feels to be a scatterbrain, but this is both a security AND privacy nightmare. It's only a matter of time Microsoft attempts to use data from it (or the feature itself) for monetization as well.
All in all… please don't get too comfy.
Albacore
Als Antwort auf Natasha Nox 🇺🇦🇵🇸 • • •@Natanox I mean, yeah
The inclusion of screenshots makes it a great target but it's not like it's difficult to pull someone's super sensitive and relevant data as-is
Dump the Chrome folder from my LocalAppData and either decrypt stuff with DPAPI on the spot or just jack my SAM keys and boom, so much interesting data
I do plan to look into how Recall stores (and protects) all its memories because right now everything online is speculation
Natasha Nox 🇺🇦🇵🇸
Als Antwort auf Albacore • • •Albacore
Als Antwort auf Natasha Nox 🇺🇦🇵🇸 • • •@Natanox In case you find the thread again I'd be interested in reading it
Admittedly I don't spend much time on Mastodon so it could've flown under my radar
Natasha Nox 🇺🇦🇵🇸
Als Antwort auf Albacore • • •You are in luck, I retooted it earlier. 😉
cyberplace.social/@GossiTheDog…
Kevin Beaumont
2024-05-23 21:08:12
Rairii (at emf!)
Als Antwort auf Albacore • • •probably this: cyberplace.social/@GossiTheDog…
Kevin Beaumont
2024-05-23 21:08:12
Natasha Nox 🇺🇦🇵🇸
Als Antwort auf Rairii (at emf!) • • •Albacore
Als Antwort auf Natasha Nox 🇺🇦🇵🇸 • • •Steve Lhomme
Als Antwort auf Natasha Nox 🇺🇦🇵🇸 • • •Albacore
Unbekannter Ursprungsbeitrag • • •Albacore
Als Antwort auf Albacore • • •teilten dies erneut
Maxi 10x 💉 und Newk haben dies geteilt.