this rootless Python script rips Windows Recall’s screenshots and SQLite database of OCRed text and allows you to search them.

  • a1studmuffin@aussie.zone
    link
    fedilink
    English
    arrow-up
    65
    arrow-down
    1
    ·
    5 months ago

    Wow, it’s pretty wild they didn’t even attempt to encrypt or protect this data, even if it is local to your machine. What a treasure trove for malware to sift through.

    • salarua@sopuli.xyzOP
      link
      fedilink
      English
      arrow-up
      20
      ·
      5 months ago

      the screenshots and text are just sitting in the appdata folder, which requires no special permission to access

      • Petter1@lemm.ee
        link
        fedilink
        English
        arrow-up
        6
        ·
        5 months ago

        Nice 😂 having extra pw manager n stuff in secret encrypted file only temporary handle decrypted PWs in RAM etc. But then, if you accidentally click on the eye, boom screenShot PW saved as pic of clear Text, nice. Also all personal eBanking stuff etc. And of Course, if you stream Netflix, tons of copyright protected material, lol.

        • Spotlight7573@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          5 months ago

          And of Course, if you stream Netflix, tons of copyright protected material, lol.

          Nope, DRM protected content like Netflix is one of the few things it doesn’t capture, it’s even mentioned in Recall’s privacy section. I’ll admit that that’s likely due to technical reasons with how the video stream is decrypted and decoded on the GPU and is never actually accessible to the user, not necessarily because they wouldn’t want to save that as well.

    • Spotlight7573@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      5 months ago

      Malware won’t even need to wait for the user to access something sensitive, they can just go back through the user’s Recall history and get the data for immediate exfiltration. No chance for anti-malware software to update and catch it before it does anything truly bad, it will just always be too late if given even a minute.

  • qjkxbmwvz@startrek.website
    link
    fedilink
    English
    arrow-up
    43
    arrow-down
    3
    ·
    5 months ago

    Hilarious to me that it OCRs the text. The text is generated by the computer. It’s almost like when Lt. Cmdr. Data wants to get information from the computer database, so he tells the computer to display it and just keeps increasing the speed — there are way more efficient means of getting information from A to B than displaying it, imaging it, and running it though image processing!

    I totally get that this is what makes sense, and it’s independent of the method/library used for generating text, but still…the computer “knows” what it’s displaying (except for images of text), and yet it has to screenshot and read it back.

    • 4am@lemm.ee
      link
      fedilink
      English
      arrow-up
      17
      ·
      edit-2
      5 months ago

      Hey, yeah… why aren’t they just tapping the font rendering DLL?

      are they tapping the front rendering dll??

    • catloaf@lemm.ee
      link
      fedilink
      English
      arrow-up
      13
      ·
      5 months ago

      That’s the thing, it doesn’t really know what it’s displaying. I can send a bunch of textboxes, but if they’re hidden, or drawn off-screen, or underneath another element, then they’re not actually displayed.

    • Wispy2891@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      5 months ago

      It happens the same on android for some reason

      Like 5-8 years ago the google assistant app was able to select and copy text from any app when invoked, I think it was called “now on tap”. Then because they’re google and they’re contractually obligated to remove features after some time, they removed this from the google app and integrated it in the pixel app switcher (and who cares if 99% of android users aren’t using a pixel, they say). The new implementation sucks, as it does ocr instead of just accessing the raw text…

      It only works fine with us English and not with other languages. But maybe it’s ok as it seems that google’s development style is us-centric

      • nawa@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        5 months ago

        Now on Tap also used OCR. Both Google Lens and Now on Tap get the same bullshit results on any languages that are not Latin. Literally, Ж gets read as >|< by both exactly the same.

    • Eager Eagle@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      5 months ago

      Text from OCR is one kind of match. Recall also runs visual comparisons with the image tokens stored.

    • space@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 months ago

      Having worked on a product that actually did this, it’s not as easy as it seems. There are many ways of drawing text on the screen.

      GDI is the most common, which is part of the windows API. But some applications do their own rendering (including browsers).

      Another difficulty, even if you could tap into every draw call, you would also need a way to determine what is visible on the screen and what is covered by something else.

  • xavier666@lemm.ee
    link
    fedilink
    English
    arrow-up
    33
    ·
    5 months ago

    Please go through the FAQ section of the git project. It’s an eye-opener.

    Q. Does this enable mass data breaches of website?

    A. Yes. The next time you see a major data breach where customer data is clearly visible in the breach, you’re going to presume company who processes the data are at fault, right? But if people have used a Windows device with Recall to access the service/app/whatever, hackers can see everything and assemble data dumps without the company who runs the service even being aware. The data is already consistently structured in the Recall database for attackers. So prepare for AI powered super breaches. Currently credential marketplaces exist where you can buy stolen passwords — soon, you will be able to buy stolen customer data from insurance companies etc as the entire code to do this has been preinstalled and enabled on Windows by Microsoft.

  • Wispy2891@lemmy.world
    link
    fedilink
    English
    arrow-up
    27
    ·
    5 months ago

    Imagine how easy is the life of law enforcement now.

    Before if they seized a laptop encrypted with bit locker they could not do anything.

    Now they just need to ask Microsoft the encryption password, which is automatically and silently saved in the Microsoft account (now mandatory) and they can have all the history of what the subject of the investigation did in the past years

    • umami_wasabi@lemmy.ml
      link
      fedilink
      English
      arrow-up
      13
      ·
      5 months ago

      What? Bitlocker key tied to MS account and mandatory? What’s the point of encryption if the key isn’t secret any more?

      • Spotlight7573@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        edit-2
        5 months ago

        To protect against casual theft of a device causing the data to be in the thief’s hands in addition to the actual device.

        The average person unfortunately is not likely to properly backup their encryption keys so if they forget their password (or don’t use one and rely on the default of just TPM), they’ll complain about losing their data. Having the key backed up gives them a way to get their data back in non-theft situations.

  • cm0002@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    1
    ·
    5 months ago

    I was gonna make a joke on how there’s no root on windows, but then I remembered sudo for windows is now a thing so…