1
微软发布首批Copilot+ PC支持本地AI功能
2024年微软推出首批Copilot+ Windows PC,搭载神经处理单元(NPU),支持本地运行AI功能,提升安全性与隐私性。首批功能包括Recall,通过截图记录用户活动以辅助记忆。该功能依赖本地处理,减少对云服务的依赖。
Recall最初版本存在严重隐私漏洞,截图与用户活动数据库未加密存储于本地磁盘,任何具备访问权限者均可轻易获取数周甚至数月的敏感数据。安全研究人员与媒体曝光后,微软推迟发布并全面整改。
整改后Recall采用加密存储,仅可通过Windows Hello验证访问,并优化敏感信息识别与排除机制,默认关闭而非强制启用。尽管安全性提升,大规模记录用户行为仍存潜在风险。
Copilot+ PC支持本地AI处理
Recall初版存在严重隐私漏洞
微软整改后加密并默认关闭
2
安全研究员发布工具暴露Recall新漏洞
安全研究员Alexander Hagenah曾开发“TotalRecall”工具,可轻松提取未加密Recall数据。其新版“TotalRecall Reloaded”揭示Recall仍存在未公开漏洞,可能绕过部分安全机制。
该工具表明,尽管微软加强加密与认证,Recall系统仍可能存在侧信道或权限绕过风险。Hagenah认为,本地行为记录机制本身构成长期隐私威胁,尤其对高敏感用户。
此次发现引发对本地AI功能安全设计的重新审视,强调即使数据加密,系统架构仍需防范高级提取手段。微软尚未回应具体漏洞细节。
TotalRecall Reloaded发现新漏洞
Recall仍存潜在数据提取风险
本地AI记录机制引发安全担忧
1
Microsoft Launches Copilot+ PCs with On-Device AI Features Using NPUs
Two years ago, Microsoft introduced its first Copilot+ Windows PCs, leveraging neural processing units (NPUs) in modern laptop processors to enable AI features that run locally instead of relying on cloud computing. This shift aimed to improve performance, reduce latency, and enhance user privacy by processing data on-device. The initial rollout included exclusive NPU-powered capabilities designed to support machine learning tasks without constant internet connectivity.
One of the flagship features was Recall, which captured screenshots of user activity to help retrieve past actions. However, the original implementation stored data in unencrypted files, exposing sensitive user information to anyone with system access. This flaw raised significant security and privacy concerns, prompting widespread criticism from researchers and journalists.
Key Takeaways:
Microsoft integrates NPUs to enable local AI processing on Copilot+ PCs
Recall feature initially stored unencrypted user activity data posing security risks
Local AI execution aims to improve privacy but early flaws undermined trust
Source: Original Article
2
Microsoft Delays and Overhauls Recall Feature After Security Backlash
Following revelations about Recall’s insecure design, Microsoft postponed its rollout by nearly a year and implemented major security improvements. The updated version encrypts all locally stored data and requires Windows Hello authentication to access it. Additionally, the system now better identifies and excludes sensitive content such as financial information from being recorded.
Recall was also changed from an opt-out to an opt-in feature, meaning it is disabled by default on supported devices. These changes significantly reduced the risk of unauthorized access to user activity logs. The overhaul reflected Microsoft’s response to public and expert criticism regarding user privacy and data protection.
Despite improvements, concerns remain about the fundamental risks of continuous activity tracking. The feature’s broad data collection scope continues to pose potential privacy implications, even with enhanced safeguards.
Key Takeaways:
Microsoft delays Recall rollout and adds encryption and authentication requirements
Recall now excludes sensitive data and is disabled by default on new devices
Security improvements address initial flaws but do not eliminate all privacy concerns
Source: Original Article
3
Security Researcher Exposes New Vulnerabilities in Microsoft’s Recall Feature
Security researcher Alexander Hagenah, who previously created the “TotalRecall” tool to extract unencrypted Recall data, has released an updated version called “TotalRecall Reloaded.” This new tool reveals additional vulnerabilities in the current implementation of Microsoft’s Recall feature, suggesting that despite encryption and access controls, potential side-channel or authentication bypass risks may still exist.
Hagenah’s findings indicate that while Microsoft strengthened data protection, the underlying architecture of continuous screen capture and local storage may still be exploitable under certain conditions. The updated tool demonstrates how attackers could potentially access Recall data through alternative system entry points.
These revelations underscore ongoing challenges in securing always-on monitoring features, even with robust encryption and user authentication in place.
Key Takeaways:
Researcher develops TotalRecall Reloaded to expose new Recall vulnerabilities
Updated tool suggests potential bypass methods despite encryption and authentication
Continuous activity tracking remains inherently risky even with security improvements
Source: Original Article