There is nothing innately wrong with keeping a permanent log of your activity on your machine — but there is a lot wrong with making a product based upon that concept as appallingly hacky and insecure as described below.
Apple (to me) seems less prone to making extraordinarily hacky mistakes, but they did make the really huge CSAM-Detection privacy blunder a few years ago, which they walked back.
I wonder how much Apple learnt from that experience?
> On Recall, I had a question about me (and Satya, lol) using the phrase “screenshot” where all of the documentation says snapshot, and MSFT people say it’s just snapshots.
They’re screenshots. They’re just JPEG files, a constant stream of. On a 1tb PC it allocates enough space for about a year’s worth. Anybody or anything can alter them, there’s no audit log.
The encryption is just BitLocker, with has saved 0 companies from ransomware data exfil as, obviously, your disk is decrypted when you’re using your PC.
Internally at MSFT people are saying it’s encrypted per user and per device but that’s not true, you can open the jpegs and database from one user to another if you’re an elite haxxor (browsing in C:\Users).
There’s no protection for software on your machine taking things btw so you need to have 100% faith in 100% of all the software installed on your machines at all time. There’s no audit log of things being accessed so you won’t know if a year of your PC life went walkies. ?
Leave a Reply