×
Facebook

Meta Withheld Information on Instagram, WhatsApp Deals, FTC Says (yahoo.com) 9

Meta Platforms withheld information from federal regulators during their original reviews of the Instagram and WhatsApp acquisitions, the US Federal Trade Commission said in a court filing as part of a lawsuit seeking to break up the social networking giant. From a report: In its filing Tuesday, however, the FTC said the case involves "information Meta had in its files and did not provide" during the original reviews. "At Meta's request the FTC undertook only a limited review" of the deals, the agency said. "The FTC now has available vastly more evidence, including pre-acquisition documents Meta did not provide in 2012 and 2014."

Meta said that it met all of its legal obligations during the Instagram and WhatsApp merger reviews. The FTC has failed to provide evidence to support its claims, a spokesperson said. "The evidence instead shows that Meta faces fierce competition and that Meta's significant investment of time and resources in Instagram and WhatsApp has benefited consumers by making the apps into the services millions of users enjoy today for free," spokesperson Chris Sgro said in a statement. "The FTC has done nothing to build its case over the past four years, while Meta has invested billions to build quality products."

Google

Google Acquires Cameyo (betanews.com) 12

Google has acquired software virtualization company Cameyo to enhance ChromeOS's support for virtualized Windows apps. The acquisition follows a partnership between the two companies last year, which aimed to provide businesses with a seamless virtual application experience on ChromeOS devices. With Cameyo's technology, Google seeks to attract more enterprises to adopt ChromeOS by offering enhanced compatibility with legacy Windows applications while maintaining the simplicity and security of the ChromeOS ecosystem.

The companies didn't reveal the financial terms of the deal.
Software

Popular Mac App Bartender's New Owner Has Burnt Years of Good-Will With a Lack of Transparency 25

An anonymous reader shares a report: Popular app Bartender was quietly bought, and a shady certificate replacement, insertion of invasive telemetry, and a lack of transparent responses by the new owners has shaken confidence in the Mac community. Menu bar organization tool Bartender has been around for a long time. For most of its life, it had an excellent reputation, and a responsive developer who communicated clearly with users. That appears to have changed, recently. It all started with a quiet pair of app certificate shifts which went mostly unnoticed.

That is, until app monitoring service MacUpdater found out, and started asking questions. They posted a warning about the app, saying that "The company and developer behind Bartender was replaced in a silent and dubious matter." But, there's a lot more to the story than just that warning. CoreCode, the developer of MacUpdater, did a great deal of research on the new owners and the app situation prior to posting the warning. They detailed their discoveries in a Reddit thread on the matter. Research performed before the warning pointed out that blog entries on the Bartender website shifted to heavily search engine optimized content. This is in contrast to the prior informational entries previously posted by original developer Ben Surtees.
Microsoft

Microsoft Reopens Windows 10 Beta Testing For 'New Features' and Improvements (theverge.com) 34

Microsoft is ending support for Windows 10 in October 2025, but the company is now taking the unusual step of reopening its beta program for Windows 10 to test new features and improvements. From a report: Windows 10 already got the AI Copilot feature that was originally exclusive to Windows 11, and it may well get other features soon. "To bring new features and more improvements to Windows 10 as needed, we need a place to do active feature development with Windows Insiders," explains Microsoft's Windows Insider team in a blog post. "So today, we are opening the Beta Channel for Windows Insiders who are currently on Windows 10."

Microsoft hasn't revealed what additional Windows 10 features it plans to test next, but Windows Insiders can opt into the beta channel to get them early. Crucially, the Windows 10 end of support date of October 14th, 2025 is still unchanged. "Joining the Beta Channel on your Windows 10 PC does not change that," says Microsoft.

Privacy

Hacker Tool Extracts All the Data Collected By Windows' New Recall AI 145

An anonymous reader quotes a report from Wired: When Microsoft CEO Satya Nadella revealed the new Windows AI tool that can answer questions about your web browsing and laptop use, he said one of the"magical" things about it was that the data doesn't leave your laptop; theWindows Recall system takes screenshots of your activity every five seconds and saves them on the device. But security experts say that data may not stay there for long. Two weeks ahead ofRecall's launch on new Copilot+ PCs on June 18, security researchers have demonstrated how preview versions of the tool store the screenshots in an unencrypted database. The researchers say the data could easily be hoovered up by an attacker. And now, in a warning about how Recall could be abused by criminal hackers, Alex Hagenah, a cybersecurity strategist and ethical hacker, has released a demo tool that can automatically extract and display everything Recall records on a laptop.

Dubbed TotalRecall -- yes, after the 1990 sci-fi film -- the tool can pull all the information that Recall saves into its main database on a Windows laptop. "The database is unencrypted. It's all plain text," Hagenah says. Since Microsoft revealed Recall in mid-May, security researchers have repeatedly compared it to spyware or stalkerware that can track everything you do on your device. "It's a Trojan 2.0 really, built in," Hagenah says, adding that he built TotalRecall -- which he's releasing on GitHub -- in order to show what is possible and to encourage Microsoft to make changes before Recall fully launches. [...] TotalRecall, Hagenah says, can automatically work out where the Recall database is on a laptop and then make a copy of the file, parsing all the data as it does so. While Microsoft's new Copilot+ PCs aren't out yet, it's possible to use Recall by emulating a version of the devices. "It does everything automatically," he says. The system can set a date range for extracting the data -- for instance, pulling information from only one specific week or day. Pulling one day of screenshots from Recall, which stores its information in an SQLite database, took two seconds at most, Hagenah says.

Included in what the database captures are screenshots of whatever is on your desktop -- a potential gold mine for criminal hackers or domestic abusers who may physically access their victim's device. Images include captures of messages sent on encrypted messaging apps Signal and WhatsApp, and remain in the captures regardless of whether disappearing messages are turned on in the apps. There are records of websites visited and every bit of text displayed on the PC. Once TotalRecall has been deployed, it will generate a summary about the data; it is also possible to search for specific terms in the database. Hagenah says an attacker could get a huge amount of information about their target, including insights into their emails, personal conversations, and any sensitive information that's captured by Recall. Hagenah's work builds on findings from cybersecurity researcher Kevin Beaumont, who has detailed how much information Recall captures and how easy it can be to extract it.
Cellphones

Google Can Keep Your Phone If You Send It In For Repair With Non-OEM Parts [UPDATE: Changing Policy] (androidauthority.com) 148

UPDATE 6/4/2024: Google has changed its repair policy in response to the controversial clause that was brought to light. Google says it will not keep phones sent in for repair and that it's changing the wording of its ToS agreement to reflect this. Here's a statement from a Google spokesperson: "If a customer sends their Pixel to Google for repair, we would not keep it regardless of whether it has non-OEM parts or not. In certain situations, we won't be able to complete a repair if there are safety concerns. In that case, we will either send it back to the customer or work with them to determine next steps. Customers are also free to seek the repair options that work best for them. We are updating our Terms and Conditions to clarify this."

An anonymous reader quotes a report from Android Authority: Like many other phone makers, Google has a self-repair program for servicing your damaged or malfunctioning Pixel device. As its support site explains, there are options to get repair tools, manuals, and certified parts so you can fix up your Pixel like new. Owners can also choose to simply send their device in to have it repaired professionally. As replacement parts can be expensive, some DIYers choose to use parts from third-party suppliers. But if you go down this route, you may want to avoid sending your device to Google if there's a problem you don't have the skills to fix on your own.

As YouTuber Louis Rossmann discovered, Google's service and repair terms and conditions contain a concerning stipulation. The document states that Google will keep your device if a non-OEM part is found. Apparently, this rule has been in effect since July 19, 2023, as marked on the page.
Last week, iFixit said they are parting ways with Samsung because the company "does not seem interested in enabling repair at scale."

A separate report from 404 Media found that Samsung requires independent repair shops to give them the name, contact information, phone identifier, and customer complaint details of everyone who gets their phone repaired at these shops. "Stunningly, it also requires these nominally independent shops to 'immediately disassemble' any phones that customers have brought them that have been previously repaired with aftermarket or third-party parts and to 'immediately notify' Samsung that the customer has used third-party parts," reports 404 Media.
The Internet

Internet Addiction Alters Brain Chemistry In Young People, Study Finds (theguardian.com) 60

An anonymous reader quotes a report from The Guardian: Young people with internet addiction experience changes in their brain chemistry which could lead to more addictive behaviors, research suggests. The study, published in PLOS Mental Health, reviewed previous research using functional magnetic resonance imaging (fMRI) to examine how regions of the brain interact in people with internet addiction.

They found that the effects were evident throughout multiple neural networks in the brains of young people, and that there was increased activity in parts of the brain when participants were resting. At the same time, there was an overall decrease in the functional connectivity in parts of the brain involved in active thinking, which is the executive control network of the brain responsible for memory and decision-making. The research found that these changes resulted in addictive behaviors and tendencies in adolescents, as well as behavioral changes linked to mental health, development, intellectual ability and physical coordination.
"Adolescence is a crucial developmental stage during which people go through significant changes in their biology, cognition and personalities," said Max Chang, the study's lead author and an MSc student at the UCL Great Ormond Street Institute of Child Health (GOS ICH). "As a result, the brain is particularly vulnerable to internet addiction-related urges during this time, such as compulsive internet usage, cravings towards usage of the mouse or keyboard and consuming media. The findings from our study show that this can lead to potentially negative behavioral and developmental changes that could impact the lives of adolescents. For example, they may struggle to maintain relationships and social activities, lie about online activity and experience irregular eating and disrupted sleep."

Chang said he hopes the findings allow early signs of internet addiction to be treated effectively. "Clinicians could potentially prescribe treatment to aim at certain brain regions or suggest psychotherapy or family therapy targeting key symptoms of internet addiction," said Chang. "Importantly, parental education on internet addiction is another possible avenue of prevention from a public health standpoint. Parents who are aware of the early signs and onset of internet addiction will more effectively handle screen time, impulsivity, and minimize the risk factors surrounding internet addiction."
United States

A New Google Maps Layer Shows Public Restrooms In NYC (theverge.com) 44

Google Maps has introduced a new layer to help individuals find public restrooms in New York City. The Verge reports: As part of a new program called "Ur in Luck," the city has introduced a Maps view dotted with 1,000 public restrooms across the five boroughs. Users can view the map on their phones and locate the closest restroom that's accessible to the public. "Everyone -- seniors, parents with kids, anyone enjoying the day outdoors, needs access to a public bathroom without having to buy anything or beg for a code," Deputy Mayor for Operations Meera Joshi said in a press release. The city will also build 46 new restrooms and renovate 36 existing locations over the next five years.
Google

Google Contractor Used Admin Access To Leak Info From Private Nintendo YouTube Video (404media.co) 12

A Google contractor used admin privileges to access private information from Nintendo's YouTube account about an upcoming Yoshi game in 2017, which later made its way to Reddit before Nintendo announced the game, according to a copy of an internal Google database detailing potential privacy and security incidents obtained by 404 Media. From the report: The news provides more clarity on how exactly a Redditor, who teased news of the new Yoshi game, which was later released as Yoshi's Crafted World in 2019, originally obtained their information. A screenshot in the Reddit post shows a URL that starts with www.admin.youtube.com, which is a Google corporate login page. "Google employee deliberately leaked private Nintendo information," the entry in the database reads. The database obtained by 404 Media includes privacy and security issues that Google's own employees reported internally.
The Internet

FCC Sued by Broadband Industry Groups Over Net Neutrality Rules (arstechnica.com) 34

Several broadband industry lobby groups have filed lawsuits against the Federal Communications Commission (FCC) in an attempt to overturn the recently approved net neutrality rules. The regulations, which prohibit blocking, throttling, and paid prioritization, are scheduled to take effect on July 22. The lawsuits were filed in various US appeals courts by groups representing cable, telecom, and mobile Internet service providers, including NCTA-The Internet & Television Association, USTelecom, CTIA-The Wireless Association, and several state-level associations. The groups argue that the FCC lacks the authority to reclassify broadband as a telecommunications service under Title II of the Communications Act of 1934 without explicit instructions from Congress.

In addition to the lawsuits, the industry groups have also petitioned the FCC for a stay of the rules, claiming that their members will suffer irreparable harm if the regulations take effect while litigation is pending. The FCC is expected to reject the petition, but the groups can then seek an injunction from appeals court judges to prevent enforcement. The industry's legal challenge is based on the Supreme Court's evolving approach to the "major questions" doctrine, which limits federal agencies' ability to make decisions on significant issues without clear congressional authorization. However, FCC Commissioner Geoffrey Starks maintains that the agency's authority to regulate broadband as a telecommunications service is "clear as day."
China

The Chinese Internet Is Shrinking (nytimes.com) 88

An anonymous reader shares a report: Chinese people know their country's internet is different. There is no Google, YouTube, Facebook or Twitter. They use euphemisms online to communicate the things they are not supposed to mention. When their posts and accounts are censored, they accept it with resignation. They live in a parallel online universe. They know it and even joke about it. Now they are discovering that, beneath a facade bustling with short videos, livestreaming and e-commerce, their internet -- and collective online memory -- is disappearing in chunks.

A post on WeChat on May 22 that was widely shared reported that nearly all information posted on Chinese news portals, blogs, forums, social media sites between 1995 and 2005 was no longer available. "The Chinese internet is collapsing at an accelerating pace," the headline said. Predictably, the post itself was soon censored. It's impossible to determine exactly how much and what content has disappeared. [...] In addition to disappearing content, there's a broader problem: China's internet is shrinking. There were 3.9 million websites in China in 2023, down more than a third from 5.3 million in 2017, according to the country's internet regulator.

Advertising

Qualcomm Spoofs 'I'm a Mac' Ads To Promote Windows On ARM PCs (pcmag.com) 66

An anonymous reader quotes a report from PCMag: Justin Long, the actor known for playing the Mac guy in Apple's mid-2000s ad campaign is once again switching sides -- this time to promote new Windows laptops from Qualcomm. Long appeared in a video that Qualcomm showed during its Computex keynote. To introduce the segment, CEO Cristiano Amon said Qualcomm captured video of a "very special person" preordering a Windows Copilot+ laptop built with a Snapdragon X Elite chip.

In the clip, we see Long typing on an Apple MacBook at home and getting annoyed by all the incoming notifications, which include warnings that his laptop only has a 1% battery life and is running out of disk space. Long types in a search for "Where can I find a Snapdragon-powered PC?" and then stares at the camera, looking a bit ashamed, before saying: "What? Things change." Amon then returned to the stage to tell the Computex audience: "Yes, things change."
In 2021, Long starred in an Intel ad campaign to promote the company's Windows PCs.

Further reading: Arm Targets 50% of Windows PC Market Share in Five Years, CEO Says
Social Networks

New York Set to Restrict Social-Media Algorithms for Teens (cnbc.com) 63

Lawmakers in New York have reached a tentative agreement to "prohibit social-media companies from using algorithms to steer content to children without parental consent (source paywalled; alternative source)," according to the Wall Street Journal. "The legislation is aimed at preventing social-media companies from serving automated feeds to minors. The bill, which is still being completed but expected to be voted on this week, also would prohibit platforms from sending minors notifications during overnight hours without parental consent."

Meanwhile, the results of New York's first mental health report were released today, finding that depression and anxiety are rampant among NYC's teenagers, "with nearly half of them experiencing symptoms from one of both in recent years," reports NBC New York. "In a recent survey conducted last year, 48% of teenagers reported feeling depressive symptoms ranging from mild to severe. The vast majority, however, reported feeling high levels of resilience. Frequent coping mechanisms include listening to music and using social media."
Piracy

Napster Sparked a File-Sharing Revolution 25 Years Ago (torrentfreak.com) 49

TorrentFreak's Ernesto Van der Sar recalls the rise and fall of Napster, the file-sharing empire that kickstarted a global piracy frenzy 25 years ago. Here's an excerpt from his report: At the end of the nineties, technology and the Internet were a playground for young engineers and 'hackers'. Some of them regularly gathered in the w00w00 IRC chatroom on the EFnet network. This tech-think-tank had many notable members, including WhatsApp founder Jan Koum and Shawn Fanning, who logged on with the nickname Napster. In 1998, 17-year-old Fanning shared an idea with the group. 'Napster' wanted to create a network of computers that could share files with each other. More specifically, a central music database that everyone in the world could access.

This idea never left the mind of the young developer. Fanning stopped going to school and flanked by his friend Sean Parker, devoted the following months to making his vision a reality. That moment came on June 1, 1999, when the first public release of Napster was released online. Soon after, the software went viral. Napster was quickly embraced by millions of users, who saw the software as something magical. It was a gateway for musical exploration, one that dwarfed even the largest record stores in town. And all for free. It sounds mundane today, but some equated it to pure technological sorcery. For many top players in the music industry, Napster's sorcery was pure witchcraft. At the time, manufacturing CDs with high profit margins felt like printing money and Napster's appearance threatened to ruin the party. [...]

At the start of 2001, Napster's user base reached a peak of more than 26.4 million worldwide. Yet, despite huge growth and backing from investors, the small file-sharing empire couldn't overcome the legal challenges. The RIAA lawsuit resulted in an injunction from the Ninth Circuit Court, which ordered the network to shut down. This happened during July 2001, little more than two years after Napster launched. By September that year, the case had been settled for millions of dollars. While the Napster craze was over, file-sharing had mesmerized the masses and the genie was out of the bottle. Grokster, KaZaa, Morpheus, LimeWire, and many others popped up and provided sharing alternatives, for as long as they lasted. Meanwhile, BitTorrent was also knocking on the door.
"Napster paved the way for Apple's iTunes store, to serve the demand that was clearly there," notes Ernesto. "This music streaming landscape was largely pioneered by a Napster 'fan' from Sweden, Daniel Ek."

"Like many others, Ek was fascinated by the 'all you can play' experience offered by file-sharing software, and that planted the seeds for the music streaming startup Spotify, where he still serves as CEO today. In fact, Spotify itself used file-sharing technology under the hood to ensure swift playback."
Transportation

Toyota Apologizes For Cheating On Vehicle Testing, Halts Production of 3 Models (apnews.com) 45

An anonymous reader quotes a report from the Associated Press: Toyota Chairman Akio Toyoda apologized Monday for massive cheating on certification tests for seven vehicle models as the automaker suspended production of three of them. The wide-ranging fraudulent testing at Japan's top automaker involved the use of inadequate or outdated data in collision tests, and incorrect testing of airbag inflation and rear-seat damage in crashes. Engine power tests were also found to have been falsified.

Toyota Motor Corp., based in Toyota city, central Japan, suspended production in the country of the Corolla Fielder, Corolla Axio and Yaris Cross. The deceptive tests were also found on discontinued models. The company said the wrongdoing does not affect the safety of the vehicles already on roads, which include the Corolla subcompact and Lexus luxury vehicles. "We sincerely apologize," Toyoda told reporters, bowing deeply and holding the position for several seconds, as is customary in Japan at news conferences where companies apologize for misbehavior. A Japanese government investigation into Toyota began in January. The issue does not affect Toyota's overseas production.
Mazda and Honda also reported cheating on its vehicle testing. Mazda said incorrect engine control software was used in the tests.

Meanwhile, the "improper tests" conducted by Honda included "those on noise levels and torque, on a range of models," according to the Associated Press. "Honda said affected older models -- the Accord, Odyssey and Fit -- are no longer in production. The safety of the vehicles is not affected, it said."
Google

Google Leak Reveals Thousands of Privacy Incidents (404media.co) 20

Google has accidentally collected childrens' voice data, leaked the trips and home addresses of car pool users, and made YouTube recommendations based on users' deleted watch history, among thousands of other employee-reported privacy incidents, according to a copy of an internal Google database which tracks six years worth of potential privacy and security issues obtained by 404 Media. From the report: Individually the incidents, most of which have not been previously publicly reported, may only each impact a relatively small number of people, or were fixed quickly. Taken as a whole, though, the internal database shows how one of the most powerful and important companies in the world manages, and often mismanages, a staggering amount of personal, sensitive data on people's lives.

The data obtained by 404 Media includes privacy and security issues that Google's own employees reported internally. These include issues with Google's own products or data collection practices; vulnerabilities in third party vendors that Google uses; or mistakes made by Google staff, contractors, or other people that have impacted Google systems or data. The incidents include everything from a single errant email containing some PII, through to substantial leaks of data, right up to impending raids on Google offices. When reporting an incident, employees give the incident a priority rating, P0 being the highest, P1 being a step below that. The database contains thousands of reports over the course of six years, from 2013 to 2018. In one 2016 case, a Google employee reported that Google Street View's systems were transcribing and storing license plate numbers from photos. They explained that Google uses an algorithm to detect text in Street View imagery.

AI

CEO of Zoom Wants AI Clones in Meetings (theverge.com) 95

Zoom's CEO Eric Yuan predicts that AI will significantly transform the workplace, potentially ushering in a four-day workweek, he told The Verge in an interview. Yuan said Zoom is transitioning from a videoconferencing platform to a comprehensive collaboration suite called Zoom Workplace. He believes AI will automate routine tasks such as attending meetings, reading emails, and making phone calls, enabling employees to dedicate time to more creative and meaningful work. The Verge adds: The Verge: I'm asking you which meetings do you look at and think you would hand off?
Yuan: I started with the problem first, right? And last but not least, after the meeting is over, let's say I'm very busy and missed the meeting. I really don't understand what happened. That's one thing. Another thing for a very important meeting I missed, given I'm the CEO, they're probably going to postpone the meeting. The reason why is I probably need to make a decision. Given that I'm not there, they cannot move forward, so they have to reschedule. You look at all those problems. Let's assume AI is there. AI can understand my entire calendar, understand the context. Say you and I have a meeting -- just one click, and within five seconds, AI has already scheduled a meeting.

At the same time, every morning I wake up, an AI will tell me, "Eric, you have five meetings scheduled today. You do not need to join four of the five. You only need to join one. You can send a digital version of yourself." For the one meeting I join, after the meeting is over, I can get all the summary and send it to the people who couldn't make it. I can make a better decision. Again, I can leverage the AI as my assistant and give me all kinds of input, just more than myself. That's the vision.

Windows

Arm Targets 50% of Windows PC Market Share in Five Years, CEO Says (reuters.com) 106

British chip designer Arm expects to capture more than half of the Windows PC market within the next five years, CEO Rene Haas said in an interview. The company's optimism comes as Microsoft and its hardware partners gear up to introduce a new generation of AI-powered PCs running on Arm-designed chips, potentially reshaping the Intel-dominated industry. Haas attributed Microsoft's commitment to supporting Arm's technology through enhanced developer tools as a key factor in the anticipated market shift.
Transportation

Amazon's Drones Gets Key Approval, Can Now Fly Farther to More Customers (apnews.com) 19

The Associated Press reports that U.S. federal regulators "have given Amazon key permission that will allow it to expand its drone delivery program, the company announced Thursday." In a blog post published on its website, Seattle-based Amazon said that the Federal Aviation Administration has given its Prime Air delivery service the OK to operate drones "beyond visual line of sight," removing a barrier that has prevented its drones from traveling longer distances. With the approval, Amazon pilots can now operate drones remotely without seeing it with their own eyes.

An FAA spokesperson said the approval applies to College Station, Texas, where the company launched drone deliveries in late 2022. Amazon said its planning to immediately scale its operations in that city in an effort to reach customers in more densely populated areas. It says the approval from regulators also "lays the foundation" to scale its operations to more locations around the country...

Amazon, which has sought this permission for years, said it received approval from regulators after developing a strategy that ensures its drones could detect and avoid obstacles in the air. Furthermore, the company said it submitted other engineering information to the FAA and conducted flight demonstrations in front of federal inspectors. Those demonstrations were also done "in the presence of real planes, helicopters, and a hot air balloon to demonstrate how the drone safely navigated away from each of them," Amazon said.

The article also points out that by the end of the decade, Amazon "has a goal of delivering 500 million packages by drone every year."

To achieve this, Amazon said in its blog post, "we knew we had to design a system capable of serving highly populated areas and that was safer than driving to the store."
Microsoft

Is the New 'Recall' Feature in Windows a Security and Privacy Nightmare? (thecyberexpress.com) 140

Slashdot reader storagedude shares a provocative post from the cybersecurity news blog of Cyble Inc. (a Ycombinator-backed company promising "AI-powered actionable threat intelligence").

The post delves into concerns that the new "Recall" feature planned for Windows (on upcoming Copilot+ PCs) is "a security and privacy nightmare." Copilot Recall will be enabled by default and will capture frequent screenshots, or "snapshots," of a user's activity and store them in a local database tied to the user account. The potential for exposure of personal and sensitive data through the new feature has alarmed security and privacy advocates and even sparked a UK inquiry into the issue. In a long Mastodon thread on the new feature, Windows security researcher Kevin Beaumont wrote, "I'm not being hyperbolic when I say this is the dumbest cybersecurity move in a decade. Good luck to my parents safely using their PC."

In a blog post on Recall security and privacy, Microsoft said that processing and storage are done only on the local device and encrypted, but even Microsoft's own explanations raise concerns: "Note that Recall does not perform content moderation. It will not hide information such as passwords or financial account numbers. That data may be in snapshots that are stored on your device, especially when sites do not follow standard internet protocols like cloaking password entry." Security and privacy advocates take issue with assertions that the data is stored securely on the local device. If someone has a user's password or if a court orders that data be turned over for legal or law enforcement purposes, the amount of data exposed could be much greater with Recall than would otherwise be exposed... And hackers, malware and infostealers will have access to vastly more data than they would without Recall.

Beaumont said the screenshots are stored in a SQLite database, "and you can access it as the user including programmatically. It 100% does not need physical access and can be stolen.... Recall enables threat actors to automate scraping everything you've ever looked at within seconds."

Beaumont's LinkedIn profile and blog say that starting in 2020 he worked at Microsoft for nearly a year as a senior threat intelligence analyst. And now Beaumont's Mastodon post is also raising other concerns (according to Cyble's blog post):
  • "Sensitive data deleted by users will still be saved in Recall screenshots... 'If you or a friend use disappearing messages in WhatsApp, Signal etc, it is recorded regardless.'"
  • "Beaumont also questioned Microsoft's assertion that all this is done locally."

The blog post also notes that Leslie Carhart, Director of Incident Response at Dragos, had this reaction to Beaumont's post. "The outrage and disbelief are warranted."


Slashdot Top Deals