this post was submitted on 01 Jun 2024
0 points (NaN% liked)

Technology

59672 readers
2914 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Q. Is this really as harmful as you think?

A. Go to your parents house, your grandparents house etc and look at their Windows PC, look at the installed software in the past year, and try to use the device. Run some antivirus scans. There’s no way this implementation doesn’t end in tears — there’s a reason there’s a trillion dollar security industry, and that most problems revolve around malware and endpoints.

top 50 comments
sorted by: hot top controversial new old
[–] TexMexBazooka@lemm.ee 0 points 5 months ago (7 children)

Nah…. Just… just nah. This will never fly in enterprise environments

load more comments (7 replies)
[–] nobleshift@lemmy.world 0 points 5 months ago (13 children)

It's subpoenable information. Absolutely no one is addressing that aspect.

I've done quite a bit of work in IT within the sphere of investigative law enforcement and this sets off major alarm bells to me.

[–] OsrsNeedsF2P@lemmy.ml 0 points 5 months ago (3 children)

The damage is mitigated by the fact it only recalls last 3 days by default

[–] nobleshift@lemmy.world 0 points 5 months ago

Well driven by my 30 years in the industry, 25 of which I've been using Windows/MS software, I'm going to take that with some salt. If my laptop can't avoid having an existential crisis when my default browser is not Edge I'm going to throw shade and cast doubt about a feature no one is asking for being foisted upon us that can have what appears to be very serious repercussions.

load more comments (2 replies)
[–] mctoasterson@reddthat.com 0 points 5 months ago (3 children)

No major corp I'm aware of is excited about these changes. Legal especially would like there to be the minimum records retention required by law, and a months long AI searchable database of individual user actions on a PC is a nightmare scenario for them.

load more comments (3 replies)
load more comments (11 replies)
[–] simple@lemm.ee 0 points 5 months ago (1 children)

They OCR the entire screen and store it in plaintext?! There is no way... I know it's Microsoft we're talking about, but are they really this stupid?

[–] tal@lemmy.today 0 points 5 months ago* (last edited 5 months ago) (18 children)

It's encrypted; the author is pointing out that it has to be decrypted to be used, and then the data can be obtained.

Security and privacy concerns aside, I saw someone commenting on the use case, asking who would ever want something like this.

One problem I hadn't appreciated for a long time was that some people apparently have real problems with dealing with the Windows UI in terms of file access. They don't know where their data is being saved. This, in my opinion, is in significant part a Microsoft UI problem induced by various virtual interfaces being slapped on top of the filesystem ("Desktop", "My Documents", application save directories, etc) to try to patch over the issue that the filesystem layout was kinda organically-designed in a kind of cryptic way back in the day.

But if you can remember a snippet of text in what you were working on, you can find that thing again even if you have no idea where you stored it. Like, it's content-keyed file access.

That's not very useful to a techie. They know how to navigate their system's filesystem, and even if they lose track of a particular thing, they know how to use the system's filesystem search tools to search for filenames or content. They can search for recently-modified files. They know how to generally get ahold of stuff.

But for the people who can't do that, reducing their interface to a single search box might make file access more approachable.

Now, let me reiterate that I think that a whole lot of this is Microsoft repeatedly patching over UI problems they created in the past rather than fixing them. And they've done this before over the decades with stuff other than document access. It's hard to navigate the filesystem to find an installed program a la the MS-DOS era, so they stick stuff in a Start Menu to make it more accessible. That gets too crowded, installers start slapping shortcuts on the desktop. That gets too crowded, installers start adding system tray icons. That gets too crowded, the Start Menu becomes searchable. Each interface just becomes progressively less-usable and the solution each time is to stick a new interface in on top of the old one, which in turn contributes to the complexity of the system as a whole.

But that doesn't mean that they aren't trying to address a real problem.

I think that they'd do better with something like having a rapidly-accessible log of recently-accessed files (like, maybe have the filesystem maintain a time-based doubly-linked list of those) and be able to rapidly search the content of documents based on mod time so that recent stuff gets hit quickly, then trying to make their existing search tools more accessible. That doesn't replicate data across the system and produce some of the problems here. It also permits for fully-searching content, rather than just the stuff that was on a screen when the Recall system grabbed a screenshot and OCRed it. Maybe they've done something like that in recent years; I'm many years out-of-date on Windows.

I'd also add that I think that personal computer systems in general would benefit from giving users better control over where their data is replicated to. It's kind of confusing...you've got swap (well, encrypted swap probably helps somewhat with this). Browser history. Any clipboard manager's retention. Credentials stores. Application-saved copies of in-progress files. Various caches. If you use some kind of cloud-based storage, you're pushing data out to other computers. Backups. Just a lot of state that can be replicated all over the place and is hard to go back and track down and remove. That's even before stuff like issues with doing secure deletion on existing filesystems (which we had a conversation about the other day, everything from log-structured filesystems to wear-leveling on SSDs inducing data replication). If you want something definitely gone, be able to manage your data's lifetime, something that I think that a lot of people -- even non-techies -- would like, you really have to have a lot of technical knowledge of the system's internals as things stand today. This Recall thing is egregious, replicates data all over, but it's far from the first feature that makes it harder for people to understand and control the lifetime of data on their computer.

I don't think that the software world has done a great job of letting people control that data lifetime. And I think that it's something that a user should reasonably be able to expect out of their computer.

load more comments (18 replies)
[–] suction@lemmy.world 0 points 5 months ago (2 children)

Couldn’t you use a separator to make it one line of code? That way it’d be even more dangerous

[–] Dicska@lemmy.world 0 points 5 months ago (2 children)

Are you... Are you saying EVERYTHING can be hacked with one line of code?

load more comments (2 replies)
[–] sugar_in_your_tea@sh.itjust.works 0 points 5 months ago (3 children)

I did an interview where the candidate said that if it's one line, it runs in constant time. And they were completely serious. And this was in the context of Python list comprehensions.

They claimed this ran in constant time:

new_list = [value for value in my_list]

Whereas this ran in linear time:

new_list = []
for value in my_list:
    new_list.append(value)

We asked clarifying questions, like what happens to the runtime if the list gets really large, and they doubled down.

And this was for a senior Python dev position... No, they didn't get the job.

load more comments (3 replies)
[–] deweydecibel@lemmy.world 0 points 5 months ago* (last edited 5 months ago) (2 children)

Are Microsoft a big, evil company?

A. No, that’s insanely reductive. They’re super smart people, and sometimes super smart people make mistakes. What matters is what they do with knowledge of mistakes.

I have no doubt there are smart employees, but they don't call the shots. Case in point.

The dude set up a strawman argument, then didn't even bother to burn it down properly.

[–] Grangle1@lemm.ee 0 points 5 months ago (1 children)

Being super smart and super evil are NOT mutually exclusive. Intelligence =|= morality.

[–] AngryCommieKender@lemmy.world 0 points 5 months ago (2 children)

Wasn't Lex Luthor supposed to be Tony Stark levels of intelligence?

[–] LordCrom@lemmy.world 0 points 5 months ago (1 children)

As we get older, I tend to agree with the supervillains.

Lex Luther wants a weapon to counter this insanely strong, invulnerable Superman that can destroy the planet ..... I'm like: Yes we should

Magneto considers mutants superior and if humans wage war, then mutants have the right to wage war back, and win. Survival of the fittest. If I was a mutant, I would be on Magnetos team.

Magneto wanted supremacy, not equality, and was willing to use genocide of non-mutants to get it. And Lex Luthor was a narcissist who was jealous of Superman's power and popularity; he wasn't acting for the benefit of humanity, he was acting in his own interests.

Every good villain has mostly justifiable motivations, they just take it too far. Magneto would be justified if he sought equality, and Luthor would be justified if he developed but didn't use the weapon until Superman did something evil.

The only justifiable amount of force is just enough to neutralize an active threat, and no more.

[–] Hobo@lemmy.world 0 points 5 months ago* (last edited 5 months ago) (1 children)

Why reach for a fictional example when so many real world examples exist? Just curious because I think of Bezos, Musk, and to a lesser degree Gates as examples of smart people doing bad things. I mean there's several very smart people that have done good things as well but those are harder to come by. Even people like Alfred Nobel created something he thought would save the lives of miners only for his invention to be used for war. Einstein also did a lot for the advancement of theoretical physics and his work was subsequently used as the foundation of the atomic bomb. It's actually way harder to come up with a Tony Stark type smart "good guy" in the real world for me because reality is often far more grey.

[–] AngryCommieKender@lemmy.world 0 points 5 months ago (1 children)

I don't think of Bezos, Musk, or Gates as exceptionally intelligent. They are lucky and influential, sure. Intelligent? Musk is automatically out just because of his Twitter feed. The other two haven't shown themselves to be particularly intelligent, just ruthless and efficient when it comes to generating profit.

As far as the other side of that coin, I tend to agree. Most of the really intelligent people that have existed have been pretty grey morally speaking.

Hence why I went with fictional examples. At least with Lex Luthor, there's very little grey area in his moral stances.

[–] Hobo@lemmy.world 0 points 5 months ago* (last edited 5 months ago) (4 children)

Gates is insanely intelligent, like demonstratably so. Musk and Bezos are also very highly intelligent people. Do they have terrible, awful, even downright despicable views? Absolutely. But don't be fooled, all three of those people are incredibly smart with actual high IQs (not in the braggart, "I have a very high IQ." sense either).

Intelligence doesn't translate to empathy or wisdom. Some of the least book smart people I've met have been profoundly wise at times, and some of those same people were incredibly empathetic. Unfortunately, I think all three of those people (Musk, Bezos, and Gates) are lacking in those traits, but saying they aren't in fact measurably intelligent is only fooling yourself.

I say this as someone who was raised by a measurably very highly intelligent person who could be, and was, a complete monster at times, and had some really twisted views on the world/other people. Lucky for me I didn't inherit that innate Intelligence I guess!

[–] Promethiel@lemmy.world 0 points 5 months ago (1 children)

These totally normal human beings you sound like you deify...are you their psychiatrist, psychologist, therapist, counselor? Short of those professions or a former tutor who happened to treat all three...

Well, interesting thing to devote anecdotal brain power to, I'll tell you that.

load more comments (1 replies)
load more comments (3 replies)
[–] RoyalEngineering@lemmy.world 0 points 5 months ago* (last edited 5 months ago) (1 children)

I keep hearing all the rabble rousing about this from a security perspective, but is there not an incognito mode to the Recall capability?

[–] A_Random_Idiot@lemmy.world 0 points 5 months ago (5 children)

There cant be.

It literally screenshots what you're doing every few seconds, and builds a plain text database of any and all text it captures.

Incognito mode is not having it installed.

load more comments (5 replies)
[–] A_Random_Idiot@lemmy.world 0 points 5 months ago* (last edited 5 months ago) (7 children)

I cant believe they are including this in enterprise edition too.

They usually keep their dirty spyware out of the enterprise editions to avoid losing corporate clients who dont want their secrets easily pluckable.

[–] andrade@infosec.pub 0 points 5 months ago

Maybe in the future it can be used by managers to keep an eye on what their underlings are doing at all times. I suggest calling the manager's remote version Microsoft Panopticon.

load more comments (6 replies)
[–] DarkSurferZA@lemmy.world 0 points 5 months ago (2 children)

I get the security issues, sure, those are valid, but the privacy ones are even worse. Imagine a teenager trying to search information on being gay, or possible intrusive thoughts on their family computer, only for their super maga right wing parent to find it in the screenshots.

Or someone being abused at home and searching for support facilities, deleting history and being outed by recall.

Wait, how about credit card fraud as a result of EVERYONE who has access to this computer can read your cc data?

Or, my husband was looking at jewelry online yesterday and he hasn't told me, he must be cheating, right? Oh sorry, I forgot, our anniversary is next week... Hahahaha, don't be upset babe.

Best one ever though, imagine your search history, your porn watch history accessible to anyone with access to your computer? The fucking horrific existence of having an employer process this data at scale using fancy staff monitoring program 7, and run stats on the fact that you had a toilet break while working from home, and they want to know if it was a number 1, or a number 2 so they can work a mean time to shit metric into your KPA/scorecard.

Guys, whatever benefit you think this is. It's not worth it.

[–] uhN0id@programming.dev 0 points 5 months ago

Ultimately privacy is part of security so, if anything, everything you mentioned is just more reinforcements that this is a major security concern.

As someone that has been obsessed with tech since being a kid in the 90s I think the tech side of this is super cool and very exciting stuff. As a user, though, I only like this if I'm the one implementing and using it. I do not trust a mega corporation (or really any company) to "leave it locally on my computer and totally not use that data for other purposes". Right now it's supposed to be (as far as I last heard) only on your machine but we've seen EULAs and TOS' etc change many times over the years but especially over more recent years as data continues to be king and data like this is a literal bottomless diamond mine.

I know this isn't your point but it's just worries I have in addition to your points. And let's not even start about what this means for law enforcement abuse. No thanks, I'll wait for a FOSS equivalent that at least gives me and the community the opportunity to evaluate how it works.

load more comments (1 replies)
[–] retrospectology@lemmy.world 0 points 5 months ago* (last edited 5 months ago) (1 children)

Does anyone yet know how to break stuff like Copilot?

I don't have Win11, but I also never really trust that MS won't surreptiously push this kind of thing in the background to legacy systems, and I don't trust UI toggles within Windows to actually do anything.

Do we know if there are services or files that Co-pilot needs to function?

load more comments (1 replies)
[–] Opafi@feddit.de 0 points 5 months ago (3 children)

As much as I lean to hate this despite it not even affecting me as a Linux user...

I’m going to structure this as a Q&A with myself now, based on comments online

What is that? "I'm going to pretend to ask questions that I'll then answer myself the way I think it'll outrage that most people do I'll get a lot of clicks on this shitty article"? What crappy excuse for content creation is this? I hate it.

[–] Spuddlesv2@lemmy.ca 0 points 5 months ago (2 children)

I follow Kevin on Mastodon. He’s the real deal and is absolutely not interested in the clicks or outrage. He’s trying to make it accessible.

[–] JackFrostNCola@lemmy.world 0 points 5 months ago

Agreed. The way i took it was "i am going to write 'questions' based on the concerns people are commenting online and give the answers to those things people are interested/worried about"

load more comments (1 replies)
load more comments (2 replies)
[–] NoiseColor@startrek.website 0 points 5 months ago (15 children)

This is a feature hundreds of millions of people will use and very likely won't cause any security issues. These doomsday scenarios every Linux user here is predicting is a bit much, don't you think so?

[–] BrowseMan@sh.itjust.works 0 points 5 months ago* (last edited 5 months ago) (1 children)

Did you read the article?

This system basically do a character recognition on EVERYTHING the user is displaying and save the results in a very small file not that well protected.

The data is very small (I guess because it's basically text?), seems easy to find. That means the history of all you did on your computer (apparently only for the last three feays by default,but well...) can be stolen at once, in a minuscule file.

I'm not an IT specialist, but I don't see in which world this can remotely be a good idea...

[–] NoiseColor@startrek.website 0 points 5 months ago (3 children)

As I understand not everything will be read and stored, storage will be encrypted. We don't even know what exactly will be stored and everybody here is losing their mind.

We already have a lot of sensitive information on our computers and nobody is panicking.

I guess it's hard to get used to new stuff. Or maybe Linux users are afraid that their favourite system won't be able to compete anymore.

[–] ocassionallyaduck@lemmy.world 0 points 5 months ago (1 children)

You didn't read the article.

We do know the answers to these questions. And if I can use a 2 line script to exfiltrate all your screen data for days/weeks in under a few MB of data.

So better hope you, never, ever, ever run unauthorized or malicious code, because now it basically has a honeypot of top priority data, always stored in a known location and compressed for easy uploads.

[–] NoiseColor@startrek.website 0 points 5 months ago (1 children)

What kind of malicious code would be able to do that?

[–] ArcaneSlime@lemmy.dbzer0.com 0 points 5 months ago* (last edited 5 months ago) (1 children)
Q. The data is processed entirely locally on your laptop, right?

A. Yes! They made some smart decisions here, there’s a whole subsystem of Azure AI etc code that process on the edge.

Q. Cool, so hackers and malware can’t access it, right?

A. No, they can.

Q. But it’s encrypted.

A. When you’re logged into a PC and run software, things are decrypted for you. Encryption at rest only helps if somebody comes to your house and physically steals your laptop — that isn’t what criminal hackers do.

For example, InfoStealer trojans, which automatically steal usernames and passwords, are a major problem for well over a decade — now these can just be easily modified to support Recall.

Q. But the BBC said data cannot be accessed remotely by hackers.

A. They were quoting Microsoft, but this is wrong. Data can be accessed remotely.

Q. Microsoft say only that user can access the data.

A. This isn’t true, I can demonstrate another user account on the same device accessing the database.

Q. So how does it work?

A. Every few seconds, screenshots are taken. These are automatically OCR’d by Azure AI, running on your device, and written into an SQLite database in the user’s folder.

This database file has a record of everything you’ve ever viewed on your PC in plain text. OCR is a process of looking an image, and extracting the letters.

Q. What does the database look like?

A:https://twitter.com/GossiTheDog/status/1796218726808748367?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1796218726808748367%7Ctwgr%5E2eccf634534245a77c4f931d8722f1b8c6f23595%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Ftype%3Dtext2Fhtmlkey%3Da19fcc184b9711e1b4764040d3dc5c07schema%3Dtwitterurl%3Dhttps3A%2F%2Fx.com%2FGossiTheDog%2Fstatus%2F1796218726808748367image%3D

Q. How do you obtain the database files?

A. They’re just files in AppData, in the new CoreAIPlatform folder.

Q. But it’s highly encrypted and nobody can access them, right?!

A. Here’s a few second video of two Microsoft engineers accessing the folder: https://cyberplace.social/system/media_attachments/files/112/535/509/719/447/038/original/7352074f678f6dec.mp4

Q. …But, normal users don’t run as admins!

A. According to Microsoft’s own website, in their Recall rollout page, they do: https://miro.medium.com/v2/resize:fit:1100/format:webp/0*WGE1jcRzhe6WAGQS

In fact, you don’t even need to be an admin to read the database — more on that in a later blog.

Q. But a UAC prompt appeared in that video, that’s a security boundary.

A. According to Microsoft’s own website (and MSRC), UAC is not a security boundary: https://miro.medium.com/v2/resize:fit:1100/format:webp/1*TTjYNH15IoP_d8JhhG3cEA.png

Q. So… where is the security here?

A. They have tried to do a bunch of things but none of it actually works properly in the real world due to gaps you can drive a plane through.

Q. Does it automatically not screenshot and OCR things like financial information?

A. No: https://miro.medium.com/v2/resize:fit:1100/format:webp/1*OZMjujpALL3IfAQYT64x7Q.png

Do I have to continue or do you think you could actually read the article for the rest? It's clearly a bigger deal than "linux users mad because windows better" and your poor excuse for a troll just makes it look like you're too stupid to read the article laid out in front of you. Well, now you have no excuse so get good.

[–] NoiseColor@startrek.website 0 points 5 months ago* (last edited 5 months ago) (1 children)

Sorry I don't take everyones word as truth. This guy is just one guy. One guy against the whole Microsoft corporation whose entire fortune depends on this not to fail in the way he said it certainly will. Absurd.

[–] ArcaneSlime@lemmy.dbzer0.com 0 points 5 months ago (8 children)
load more comments (8 replies)
[–] BrowseMan@sh.itjust.works 0 points 5 months ago* (last edited 5 months ago) (1 children)

Based on what Microsoft themselves said we know: everything will be stored (except edge private session...). They specifically say they don't do content moderation: they log everything.

Did you read the article?

Q. Cool, so hackers and malware can’t access it, right?

A. No, they can.

Q. But it’s encrypted.

A. When you’re logged into a PC and run software, things are decrypted for you. Encryption at rest only helps if somebody comes to your house and physically steals your laptop — that isn’t what criminal hackers do.

As a windows user I'm not delighted by this.

Edit: at this point you must be trolling...

load more comments (1 replies)
load more comments (1 replies)
[–] Adanisi@lemmy.zip 0 points 5 months ago (1 children)

Are you braindead? Yes yes taking regular screenshots of the desktop can't possibly be a security risk, right?

[–] NoiseColor@startrek.website 0 points 5 months ago (20 children)

You can define almost anything as a security risk. But we aren't children to play such stupid games.

We are talking about someone gaining that information and the probability of that happening without even knowing what security mesaures will be in place. I think the risk is negligible even today with the limited information about it that we have now. Other People here, presumably you as well are hysterical about it.

Thats what the discussion is. You actually believe Microsoft will launch this and then everybody will be hacked or something. I think that is... not smart.

load more comments (20 replies)
load more comments (13 replies)
load more comments
view more: next ›