Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      From Data To Decisions: UX Strategies For Real-Time Dashboards

      September 13, 2025

      Honeycomb launches AI observability suite for developers

      September 13, 2025

      Low-Code vs No-Code Platforms for Node.js: What CTOs Must Know Before Investing

      September 12, 2025

      ServiceNow unveils Zurich AI platform

      September 12, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Distribution Release: Q4OS 6.1

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Optimizely Mission Control – Part III

      September 14, 2025
      Recent

      Optimizely Mission Control – Part III

      September 14, 2025

      Learning from PHP Log to File Example

      September 13, 2025

      Online EMI Calculator using PHP – Calculate Loan EMI, Interest, and Amortization Schedule

      September 13, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      sudo vs sudo-rs: What You Need to Know About the Rust Takeover of Classic Sudo Command

      September 14, 2025
      Recent

      sudo vs sudo-rs: What You Need to Know About the Rust Takeover of Classic Sudo Command

      September 14, 2025

      Dmitry — The Deep Magic

      September 13, 2025

      Right way to record and share our Terminal sessions

      September 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Microsoft Recall Returns: Security Improves but Issues Remain

    Microsoft Recall Returns: Security Improves but Issues Remain

    April 28, 2025

    Microsoft Recall rollout

    Nearly a year after its troubled initial rollout, Microsoft Recall is back.

    Microsoft announced in an April 25 blog post that it will begin rolling out the Windows Recall feature on Copilot+ PCs, claiming much-improved security for the screen recording tool.

    Security and privacy issues do seem to have improved markedly over early versions of Recall, which had resulted in a backlash that caused Microsoft to delay the product for further testing and development.

    Despite the improvements, some significant security issues remain, particularly involving biometrics and sensitive data recording, which should prompt users with sensitive data use cases to proceed with caution.

    Recall is now available for Copilot+ PCs via the April 2025 Windows non-security preview update, and Microsoft will roll out Recall and other new features via controlled feature rollout (CFR) over the next month.

    Microsoft Recall Security Issues Remain

    Independent security researcher (and former Microsoft employee) Kevin Beaumont started the initial Recall concerns in early June 2024, when his work was first reported by The Cyber Express.

    In a blog post last week just before Microsoft’s Recall rollout announcement, Beaumont gave Microsoft credit for improving Recall even as he noted that some concerns remain.

    “Microsoft has made serious efforts to try to secure Recall,” Beaumont said. Recall is now opt-in rather than enabled by default, the SQLite database at the heart of Recall is now encrypted (image below), and by default Recall attempts to filter and exclude sensitive information like credit cards.

    Microsoft Recall SQLite database
    Microsoft Recall’s SQLite database is now encrypted (source: Kevin Beaumont)

    However, Beaumont noted that a few significant security and privacy issues remain. For one, biometrics is used only to set up Recall; after that, just knowing (or guessing) the user’s PIN would be enough to access it.

    “The biometrics is just the initial onboarding,” Beaumont wrote. “It doesn’t apply afterwards. I think this is a big miss by Microsoft — biometrics should be required every time Recall is accessed, I think, as otherwise people will have a false sense of security.”

    The sensitive data filter doesn’t work reliably, he said, noting that it recorded a fake credit card number he typed in while using the Vivaldi browser.

    “You basically need to be careful to review what Recall is recording, which is difficult when it records everything you do,” he said. “The best advice I can give is pause Recall before shopping online to ensure it isn’t recording, then reenable it afterwards.”

    Beaumont raised one issue that many probably haven’t considered – if you’re communicating with a Copilot+ user over a private messaging app, it’s possible that conversations you think disappeared or were deleted on apps like Signal, WhatsApp or Teams have been captured by Recall. Video conferencing and even remote desktop sessions are captured by Recall, he said.

    “I would recommend that if you’re talking to somebody about something sensitive who is using a Windows PC, that in the future you check if they have Recall enabled first,” Beaumont said.

    He also noted that it remains to be seen how secure the encrypted database is.

    Who Shouldn’t Use Microsoft Recall?

    Beaumont said people in certain circumstances or professions shouldn’t use Recall. Those include:

    • People in domestic violence situations or those with issues with a personal relationship
    • Journalists and their confidential sources
    • Minority at-risk groups
    • Politically exposed people
    • Companies that haven’t properly assessed Recall’s privacy and security risks
    • People crossing borders “into countries hostile to civil liberties.”

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleVPBank Builds OpenAPI Platform With MongoDB
    Next Article Trojanized Text Editor Software Used in Targeted Uyghur Spy Campaign

    Related Posts

    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    September 14, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    September 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-48417 – Fortinet SSL Hard-Coded Private Key Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Avast Antivirus Vulnerability Let Attackers Escalate Privileges

    Security

    Salesforce Lead-to-Revenue Management

    Development

    CVE-2025-48870 – Apache HTTP Server Remote Code Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Development

    Perficient’s “What If? So What?” Podcast Wins Gold at the 2025 Hermes Creative Awards

    May 14, 2025

    We’re thrilled to announce that Perficient’s “What If? So What?” podcast, hosted by Jim Hertzfeld,…

    Case Studies: Real-World Applications of Context Engineering

    August 12, 2025

    Coded Smorgasbord: Basically, a Smorgasbord

    September 4, 2025

    Xbox Game Pass gets Retro Classics, a collaboration between Xbox and Antstream Arcade bringing over 50 older Activision titles

    May 21, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.