This Hacker Tool Extracts All the Data Collected by Windows’ New Recall AI (www.wired.com)
from Stopthatgirl7@lemmy.world to technology@lemmy.world on 07 Jun 2024 03:34
https://lemmy.world/post/16264326

When Microsoft CEO Satya Nadella revealed the new Windows AI tool that can answer questions about your web browsing and laptop use, he said one of the “magical” things about it was that the data doesn’t leave your laptop; the Windows Recall system takes screenshots of your activity every five seconds and saves them on the device. But security experts say that data may not stay there for long.

Two weeks ahead of Recall’s launch on new Copilot+ PCs on June 18, security researchers have demonstrated how preview versions of the tool store the screenshots in an unencrypted database. The researchers say the data could easily be hoovered up by an attacker. And now, in a warning about how Recall could be abused by criminal hackers, Alex Hagenah, a cybersecurity strategist and ethical hacker, has released a demo tool that can automatically extract and display everything Recall records on a laptop.

Dubbed TotalRecall—yes, after the 1990 sci-fi film—the tool can pull all the information that Recall saves into its main database on a Windows laptop. “The database is unencrypted. It’s all plain text,” Hagenah says.⁩ Since Microsoft revealed Recall in mid-May, security researchers have repeatedly compared it to spyware or stalkerware that can track everything you do on your device. “It’s a Trojan 2.0 really, built in,” Hagenah says, adding that he built TotalRecall—which he’s releasing on GitHub—in order to show what is possible and to encourage Microsoft to make changes before Recall fully launches.

#technology

threaded - newest

PipedLinkBot@feddit.rocks on 07 Jun 2024 03:35 next collapse

Here is an alternative Piped link(s):

“magical” things

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I’m open-source; check me out at GitHub.

M500@lemmy.ml on 07 Jun 2024 03:57 next collapse

I wouldn’t really call it a hacker tool any more than you would call a hammer a thieves tool.

It just accesses the data that stored in an unencrypted format on the computers hard drive.

If someone had remote access to your computer they could use this, but I imagine they could also use the official tool too.

Since the data is stored in an unencrypted fashion, a hacker who had remote access would be better served running some script that will just transfer all this data to their offsite server and could be accomplished pretty easily.

I guess what I want to really say is that calling it a “hacker tool” is misleading.

mosiacmango@lemm.ee on 07 Jun 2024 04:59 next collapse

Nmap is a “hacker tool” and all it does is ask computers what ports they have open, something they are set to advertise to the world.

This is a “hacker tool” in the sense that it is accessing data in an unintended way, in the same contect as nmap using protocols intended to communicate for a set purpose to built a list of possible attack vectors.

chaosCruiser@futurology.today on 07 Jun 2024 06:28 collapse

So when I walk past some bicycles parked outside of a store, and simply use my eyes to determine if they have locks, I’m essentially a hacker.

lurch@sh.itjust.works on 07 Jun 2024 07:28 next collapse

no, your eyes are hacker tools

prole@sh.itjust.works on 07 Jun 2024 09:49 next collapse

There’s a word for that, it’s called “casing.”

Obviously not “hacking,” unless they’re locked up by a computer or some shit.

A hacker using software like that to test vulnerabilities seems similar to me in some ways.

Restaldt@lemmy.world on 07 Jun 2024 14:34 collapse

A thief to be

Looking for opportunity

MudMan@fedia.io on 07 Jun 2024 05:26 next collapse

You do have a point, but it does highlight why Microsoft's framing is bad.

Microsoft is basing their approach to this on the concept that your MS account-secured local machine is itself secure, so whatever is in it is fine, because hey, your confidential work info is probably also in your hard drive and unencrypted, so if a bad actor can steal the pictures of it, then it can also steal the original document.

Which mostly is true, to be clear, but it fundamentally misunderstands how much juicier and easier of a target is a reliable, searchable database that logs all activity stored in a consistent location, as opposed to potentially having to extract everything up front. Plus, even if there are few guardrails to all data inside your system, there are some, as this will likely include info you may keep hidden, password-protected or encrypted both locally and remotely. There's a reason my password manager asks for my credentials manually once every time I use it.

deranger@sh.itjust.works on 07 Jun 2024 05:27 collapse

I wouldn’t really call it a hacker tool any more than you would call a hammer a thieves tool.

IANAL, but I’m pretty sure a hammer is a thieves tool if used in the commission of a burglary.

Those devices used by employees to remove security locks from CDs/DVDs aren’t “thieves tools” when used as intended, but when my dumb ass got caught with one while stealing from Blockbuster, the judge considered it one.

Morphit@feddit.uk on 07 Jun 2024 13:46 next collapse

Right but if I use a hammer to prove the lock I just bought is useless at protecting my shed, I’m not committing theft. This was a few lines of Python to look at data that is explicitly stored for the user to look at later.

A_Very_Big_Fan@lemmy.world on 08 Jun 2024 00:29 collapse

IANAL

🤤

AceSLS@ani.social on 07 Jun 2024 04:20 next collapse

They store it unencrypted in 2024? This should be illegal. Now every fucking Program you run can basically know everything you ever did since every shit is spyware nowadays to get that sweet data collection going

MrOxiMoron@lemmy.world on 07 Jun 2024 05:29 next collapse

Even if they encrypt it, the computer needs access to the data thus needs the decryption key. So it’s not very secure anyway.

AceSLS@ani.social on 07 Jun 2024 05:46 next collapse

Well yeah, but they should atleast store the key outside of userspace

BeigeAgenda@lemmy.ca on 07 Jun 2024 09:21 collapse

The key is stored in $APPDATA\WelcomeMat

9point6@lemmy.world on 07 Jun 2024 06:10 collapse

I guess the solution would involve keys on the TPM so that they shouldn’t need to be sat on attached storage or in memory. Although I’m not sure I’d trust all TPM implementations to have the performance necessary for the extra load (I believe bitlocker keys get cached in memory once you have unlocked the drive, for example)

lemmyvore@feddit.nl on 07 Jun 2024 06:53 collapse

Even if it were encrypted, if access to it doesn’t involve explicit confirmation and a password then it can be automated.

And if it can be automated then malware that gets on the machine will be able to access it whether it’s encrypted or not.

But let’s be real, the whole reason Microsoft is doing this is so they can parse your data for AI. And storing it unencrypted makes it easier for them.

Also “the data won’t leave your machine” is a red herring. Yeah the data won’t; but the results of AI processing will. They’ll take what they need and transfer that out, and leave you holding the bag.

mryessir@lemmy.sdf.org on 07 Jun 2024 09:24 next collapse

I would be happy to provide my energy to microsoft’s openai /s

barsquid@lemmy.world on 07 Jun 2024 10:50 collapse

They will have your computer calculating hyperspecific queries for ads.

db2@lemmy.world on 07 Jun 2024 04:30 next collapse

HacKeR tOOl

aeronmelon@lemmy.world on 07 Jun 2024 04:47 collapse

<img alt="" src="https://images7.memedroid.com/images/UPLOADED759/5fc7b2bb1aae9.jpeg">

gravitas_deficiency@sh.itjust.works on 07 Jun 2024 05:40 next collapse

<img alt="" src="https://media1.giphy.com/media/RyXVu4ZW454IM/giphy.gif">

Now where did I leave my PowerGlove…

sukhmel@programming.dev on 07 Jun 2024 06:22 next collapse

Skype used to store all history unencrypted for years after MS bought it, this seems to be a tradition of not caring enough

Morphit@feddit.uk on 07 Jun 2024 13:52 collapse

not caring enough

rob200@lemmy.cafe on 07 Jun 2024 06:32 next collapse

What exactly can recall see? Is it just what’s on screen?

Because, if I’m like most people when I type my password, I keep my passwords hashed on the screen as I type it.

lurch@sh.itjust.works on 07 Jun 2024 07:17 next collapse

i don’t need your password if i can read your email from the screenshot it took of it

CatsGoMOW@lemmy.world on 07 Jun 2024 10:49 collapse

Do you do any online banking? Do you ever log into any sort of health provider website? These are just two examples of a nearly infinite list of highly private information you would not want other people seeing.

formergijoe@lemmy.world on 07 Jun 2024 12:52 next collapse

Has your company been involved in some legally dubious activities and you typed up an email concerned about your legally dubious activities before you realize sending an email could be creating a paper trail so you delete the email to talk to someone in person?

rob200@lemmy.cafe on 07 Jun 2024 18:08 collapse

Good points. I can see a few workarounds for this.

Stop using such services on a copmputer and go back to the old way of banking, going there physically.

Most normal people won’t use Linux, where could they go? Besides Windows? Chromeos? Probally not Google may copy and paste the concept of recall there. Mac os is too expensive, and Linix is complex to install. Where do normies go?

NeoNachtwaechter@lemmy.world on 07 Jun 2024 07:10 next collapse

So the next step is: M$ encrypts their local database.

Later they want to upload it to their servers to further exploit your data. But then it is encrypted (and of course only M$ has the key), therefore the upload will be very hard to detect.

Hmpf.

Morphit@feddit.uk on 07 Jun 2024 13:51 collapse

So… how does the user actually ®ecall™ anything? Do they have to ask M$ Co-pilot™ AI to get it from The Azu®e™ Cloud? Because I’m pretty sure a hacker could do that just as easily.

slimarev92@lemmy.world on 07 Jun 2024 08:12 next collapse

Why on earth aren’t they encrypting the database? It could have adressed much of the criticism but they just decided to leave the whole thing completely unprotected.

BaroqueInMind@lemmy.one on 07 Jun 2024 10:11 next collapse

Likely because there was too much CPU overhead decrypting and having the LLM query the Recall image database all dynamically

slimarev92@lemmy.world on 07 Jun 2024 13:12 next collapse

I dunno, they could’ve kept some of it in-memory, it’s just a bunch of plaintext.

catastrophicblues@lemmy.ca on 07 Jun 2024 15:08 collapse

In the grand scheme of things, the LLM is the bottleneck, not the decryption.

esc27@lemmy.world on 07 Jun 2024 10:55 next collapse

They encrypt the damn start menu and they cannot encrypt this?

MonkderDritte@feddit.de on 07 Jun 2024 11:45 next collapse

Seriously??

esc27@lemmy.world on 07 Jun 2024 20:26 collapse

Yep. Trying to maintain a consistent startmenu for computer labs with Windows 11 is annoying.

The layout is stored in an encrypted file that cannot be editted directly. You have to manually setup the start menu on one profile then copy the file to all the others. This works fine for intial deployments, but is a massive pain if you need to add any other apps later.

The old powershell commandlet for importing layouts does not work in Win11. The old group policy settings don’t work either. The actual DLL calls used by the end user to manually configuring the start menu are deliberatly coded to prevent being called from a script.

It is freaky how much work Microsoft has done to prevent scripting changes to the start menu.

The only officially supported method for an IT department to manage the start menu is intune, but microsoft’s device licensing for intune is a mess out folks have yet to figure out.

MonkderDritte@feddit.de on 07 Jun 2024 22:26 collapse

Ah, so user can’t interfere with ads, hm?

slimarev92@lemmy.world on 07 Jun 2024 13:12 collapse

They do?

Katana314@lemmy.world on 07 Jun 2024 13:10 next collapse

It could be that anything you encrypt has to have its encryption key in some place inaccessible to these same hacker tools. If your computer uses Bitlocker, for instance, you need to enter a 6-digit code each time you turn it on.

Best guess, they had such a high expectation of “convenience” for this feature that they couldn’t justify any kind of security key. Which is still a dumb explanation, obviously.

Morphit@feddit.uk on 07 Jun 2024 13:36 collapse

It requires full disk encryption doesn’t it? If someone already has access to your account then they can access this data the same way you can. The new issue here is that this silos a load of private data in one easy to grab location. Users would have to set up the filters perfectly to prevent recall capturing anything more sensitive than what’s already accessible to their account. This is in a world where many users are probably storing their passwords in a Word document on the desktop.

solsangraal@lemmy.zip on 07 Jun 2024 09:12 next collapse

don’t worry they’ll cancel the whole project the instant some idiot crooked corporate executive asshole gets his incriminating data stolen and used for blackmail

formergijoe@lemmy.world on 07 Jun 2024 12:40 collapse

I saw someone on mastodon say something like, “don’t tell your IT department not to use recall to protect employee or customer data. Tell your legal department that all your recall data can be subpoenaed for discovery.”

[deleted] on 07 Jun 2024 09:31 next collapse

.

Morphit@feddit.uk on 07 Jun 2024 13:25 next collapse

Who is this 4chan guy anyway?

Plopp@lemmy.world on 07 Jun 2024 13:33 next collapse

Like you don’t know it’s the hacker in the white mask who created bitcoin.

YoorWeb@lemmy.world on 07 Jun 2024 14:06 collapse

<img alt="" src="https://lemmy.world/pictrs/image/f721abf2-89fd-418d-87bb-61cd869e58fa.gif">

ITGuyLevi@programming.dev on 07 Jun 2024 20:53 collapse

That was my thought when I read the title too.

I’m hoping MS pushes this “feature”; between this and the vulnerability Tenable published a few days ago, maybe some people will actually consider moving away from MS.

LiveLM@lemmy.zip on 07 Jun 2024 10:40 next collapse

The best part of this ‘hacking tool’ is that it’s 5 lines of Python and the rest is just fluff lol

Morphit@feddit.uk on 07 Jun 2024 14:19 collapse

It’s just looking in a sqlite file and listing the jpeg directory. The only extra step is running icacls to let the user read the files.

psycho_driver@lemmy.world on 07 Jun 2024 12:15 next collapse

Cool, now do remotely.

ArtVandelay@lemmy.world on 07 Jun 2024 12:53 collapse

Done cyberplace.social/…/112555262732490331

And since it lives in user space without needing nt/system, it should be as stealable over remote as any other file

Blackmist@feddit.uk on 07 Jun 2024 14:30 collapse

It barely matters if the database is encrypted or not. If the user has access to it, they have the keys to it, and so would anybody else with access.

The real danger is that intruders will have access to your entire history from before they had access to your machine, and it’s all in one place.

VieuxQueb@lemmy.ca on 07 Jun 2024 15:00 collapse

With easily searchable text, search for “bank” and get all accounts login. Yay no need to wait for the hacked user to get on his banking site he’s been there before. Quick in and out without being noticed and you got all you need to empty his account. Thanks Microsoft I knew you where so helpful to hackers while making my life shittier all the while.

Blackmist@feddit.uk on 07 Jun 2024 15:06 collapse

Every banking site I’ve been on jumps through all sorts of hoops to make sure the browser doesn’t save the password, usually with some 2FA thrown into the mix.

But I’d imagine that a lot of older people have a helpful passwords.txt file sat smack bang in the middle of their desktop, or just use the same one for everything. I mean, we’re in an age where you need a username and password to update your graphics drivers for some godforsaken reason. It’s not going to be hard to find that The One True Password with access to this.

Wereduck@lemmy.blahaj.zone on 07 Jun 2024 23:00 collapse

I’ve encountered IT departments with an unencrypted passwords.xlsx file that they store on the network. Not always super small companies too.