Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 12, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 12, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 12, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 12, 2025

      Microsoft aims to be “carbon negative” by 2030, with 3 million carbon removal credits in its backyard of Washington

      May 12, 2025

      Sam Altman doesn’t want his son to have an AI “bestie” — as Microsoft plans to turn Copilot into an AI friend and companion

      May 12, 2025

      ChatGPT downplays AI’s threat to humanity despite an apparent “99.999999% probability” of inevitable doom

      May 12, 2025

      Surface Pro 12-inch vs. iPad Air M3: Which should you choose?

      May 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      A customizable and accessible web component

      May 12, 2025
      Recent

      A customizable and accessible web component

      May 12, 2025

      How Agile Helps You Improve Your Agility

      May 12, 2025

      Laravel Seeder Generator

      May 12, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft aims to be “carbon negative” by 2030, with 3 million carbon removal credits in its backyard of Washington

      May 12, 2025
      Recent

      Microsoft aims to be “carbon negative” by 2030, with 3 million carbon removal credits in its backyard of Washington

      May 12, 2025

      Sam Altman doesn’t want his son to have an AI “bestie” — as Microsoft plans to turn Copilot into an AI friend and companion

      May 12, 2025

      ChatGPT downplays AI’s threat to humanity despite an apparent “99.999999% probability” of inevitable doom

      May 12, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Researcher Develops ‘TotalRecall’ Tool That Can Extract Data From Microsoft Recall

    Researcher Develops ‘TotalRecall’ Tool That Can Extract Data From Microsoft Recall

    June 5, 2024

    While Microsoft’s forthcoming Recall feature has already sparked security and privacy concerns, the tech giant attempted to downplay those reactions by stating that collected data would remain on the user’s device.

    Despite this reassurance, concerns remain, as researchers – including the developer of a new tool dubbed “TotalRecall” – have observed various inherent vulnerabilities in the local database maintained by Recall, lending credibility to critics of Microsoft’s implementation of the AI tool.

    TotalRecall Tool Demonstrates Recall’s Inherent Vulnerabilities

    Recall is a new Windows AI tool planned for Copilot+ PCs that captures screenshots from user devices every five seconds, then storing the data in a local database. The tool’s announcement, however, led many to fear that this process would make sensitive information on devices susceptible to unauthorized access.

    TotalRecall, a new tool developed by Alex Hagenah and named after the 1990 sci-fi film, highlights the potential compromise of this stored information. Hagenah states that the the local database is unencrypted and stores data in plain text format. The researcher likened Recall to spyware, calling it a “Trojan 2.0.”

    TotalRecall was designed to extract and display all the information stored in the Recall database, pulling out screenshots, text data, and other sensitive information, highlighting the potential for abuse by criminal hackers or domestic abusers who may gain physical access to a device. Hagenah’s concerns are echoed by others in the cybersecurity community, who have also compared Recall to spyware or stalkerware.

    Recall captures screenshots of everything displayed on a user’s desktop, including messages from encrypted apps like Signal and WhatsApp, websites visited, and all text shown on the PC. TotalRecall can locate and copy the Recall database, parse its data, and generate summaries of the captured information, with features for date range filtering and term searches.

    Hagenah stated that by releasing the tool on GitHub, he aims to push Microsoft to fully address these security issues before Recall’s launch on June 18.

    Microsoft Recall Privacy and Security Concerns

    Cybersecurity researcher Kevin Beaumont has also developed a website for searching Recall databases, though he has withheld its release to give Microsoft time to make changes.

    Microsoft‘s privacy documentation for Recall mentions the ability to disable screenshot saving, pause Recall on the system, filter out applications, and delete data. Nonetheless, the company acknowledges that Recall does not moderate the captured content, which could include sensitive information like passwords, financial details and more.

    The risks extend beyond individual users, as employees under “bring your own device” policies could leave with significant amounts of company data saved on their laptops. The UK’s data protection regulator has requested more information from Microsoft regarding Recall and its privacy implications.

    Amid criticism over recent hacks affecting US government data, Microsoft CEO Satya Nadella has emphasized its need to prioritize security. However, the issues surrounding Recall demonstrate that security concerns were not given sufficient attention, and necessitate inspection of its data collection practices before its official release.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBuilding Gen AI with MongoDB & AI Partners: May 2024
    Next Article AI Prompt Engineering for Cybersecurity: The Details Matter

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 13, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-26662 – Apache Data Services Management Console Cross-Site Scripting Vulnerability

    May 13, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Acer Nitro Blaze 11 is Godzilla-sized — Here’s how massive it is next to other gaming handhelds

    News & Updates

    Tencent Released PrimitiveAnything: A New AI Framework That Reconstructs 3D Shapes Using Auto-Regressive Primitive Generation

    Machine Learning

    Dark Mode Design: Best Practices and User Preferences

    Web Development

    Civilization VII reviews are live — Let’s see what everyone’s saying about the next 4X epic

    News & Updates
    Hostinger

    Highlights

    Development

    Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads

    June 27, 2024

    The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured Redis servers with…

    Are You Being Hacked Right Now? Take This Cybersecurity Test!

    July 11, 2024

    Microsoft’s disclaimer warns about installing Windows 11 on unsupported devices

    December 2, 2024

    GoldenDict-ng is an advanced dictionary lookup program

    April 18, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.