DiscoverSecurity Now (Audio)SN 977: A Large Language Model in Every Pot - Problems With Recall, End of ICQ, Email @ GRC
SN 977: A Large Language Model in Every Pot - Problems With Recall, End of ICQ, Email @ GRC

SN 977: A Large Language Model in Every Pot - Problems With Recall, End of ICQ, Email @ GRC

Update: 2024-06-052
Share

Digest

This episode of Security Now delves into the controversial topic of Microsoft's new recall feature, which continuously records and stores screenshots of a user's PC activity, creating a searchable database of everything they've ever seen. Steve Gibson and Leo Laporte discuss the potential security risks associated with this feature, highlighting concerns raised by security researcher Kevin Beaumont. Beaumont argues that recall's database is vulnerable to exfiltration by malware, potentially leading to massive data breaches. He also criticizes Microsoft's misleading statements about the feature's security, emphasizing that it is enabled by default and can be accessed by other users on the same machine. Gibson and Laporte share their own insights, speculating on Microsoft's motivations for implementing recall and its potential future implications. They believe that Microsoft is using this data to train a personal AI assistant that would be able to access and analyze a user's entire computer usage history. This raises concerns about data privacy and security, as Microsoft's track record on security is not reassuring. The episode concludes with listener feedback and a discussion of the importance of data quality, highlighting the services offered by Melissa.

Outlines

00:00:00
Introduction

This Chapter introduces the topic of the podcast, which is the dangers of Microsoft's new recall feature and other security news.

00:00:59
Large Language Model in Every Pot

This Chapter discusses the concept of simple applications being better than complex ones, using the example of Tornado Notes for DOS and its successor, InfoSelect for Windows. It highlights the importance of simplicity and composability in software design.

00:01:49
GRC's New Email System

This Chapter discusses the successful implementation of GRC's new email system and the challenges encountered with users using Gmail and anonymizing email services. It emphasizes the importance of user registration and the prime directive of ensuring that no one receives unwanted emails.

00:26:19
Have I Been Poned?

This Chapter discusses a data breach affecting GRC.com and the importance of using email breach monitoring services like Troy Hunt's Have I Been Poned. It also highlights the use of Hmail Server as a secure and reliable email server for Windows.

00:34:14
New Supply Chain Attack Vector

This Chapter discusses a new supply chain attack vector where cybercriminals pose as helpful Stack Overflow users to promote malicious packages that install information-stealing malware. It emphasizes the importance of verifying the source of all packages and checking the code for unusual or obfuscated commands.

00:45:48
Certificate Authority in the Dog House

This Chapter discusses Google's decision to remove its trust of all new TLS certificates issued by the Austrian certificate authority Global Trust. It highlights the importance of certificate authority conduct and the consequences of misconduct.

00:49:00
ICQ Shutting Down

This Chapter discusses the upcoming shutdown of the instant messaging service ICQ, highlighting its history and decline in popularity.

00:51:09
Perfect Science Fiction Movie

This Chapter recommends the science fiction movie Deja Vu, starring Denzel Washington and Val Kilmer, as a perfect example of the genre.

00:54:48
Listener Feedback

This Chapter shares listener feedback on the new email system, the effectiveness of Spin Right 6.1, and concerns about the potential implications of recall for cloud syncing services.

01:03:54
Recall Revisited

This Chapter revisits the discussion of Microsoft's recall feature, sharing insights from security researcher Kevin Beaumont's analysis. Beaumont demonstrates that recall's database is vulnerable to exfiltration and criticizes Microsoft's misleading statements about its security.

01:27:57
Microsoft's Plan

This Chapter explores potential motivations behind Microsoft's decision to implement recall, speculating on their plans to AI-enable Windows PCs. It also draws parallels with the past, referencing the controversy surrounding raw sockets in Windows XP.

01:35:04
Recall's Storage and Microsoft's AI Plans

This Chapter delves into the technical aspects of Microsoft's recall feature, exploring its storage efficiency and potential implications for AI development. It speculates that Microsoft is using recall to collect data for training a personal AI assistant that would be able to access and analyze a user's entire computer usage history. This raises concerns about data privacy and security, as Microsoft's track record on security is not reassuring.

01:50:46
GRC.com and Security Now

This Chapter provides information on how to contact Steve Gibson and access resources related to Security Now, including the podcast, transcripts, and Spinrite. It also highlights the importance of supporting the show through the Twit.tv club.

Keywords

Microsoft Recall


A new feature in Windows 11 that continuously records and stores screenshots of a user's PC activity, creating a searchable database of everything they've ever seen. It has been criticized for its potential security risks and privacy implications.

Kevin Beaumont


A well-known and well-informed security researcher who has extensively analyzed Microsoft's recall feature. He has raised concerns about its vulnerability to exfiltration by malware and criticized Microsoft's misleading statements about its security.

Info-Stealer Trojans


A type of malware that automatically steals usernames and passwords. They can be easily modified to support recall, potentially allowing attackers to exfiltrate sensitive data from a user's PC.

Stack Overflow


A forum community of developers where coders can help one another. Cybercriminals are abusing Stack Overflow by posing as helpful contributors to promote malicious packages that install information-stealing malware.

Global Trust


An Austrian certificate authority that has been revoked of trust by Google due to a multi-year history of misconduct. This decision effectively puts Global Trust out of the business of selling web server certificates.

ICQ


An early instant messaging app that was popular in the late 1990s and early 2000s. It is being shut down in June 2024, marking the end of an era for instant messaging.

Deja Vu


A 2006 science fiction movie starring Denzel Washington and Val Kilmer. Steve Gibson recommends it as a perfect example of the genre, praising its convincing acting, unique concept, and well-written script.

Melissa


A data quality expert company that has been helping businesses worldwide harness accurate data since 1985. They offer a range of tools and services for cleaning, verifying, and enhancing data, including business mailing lists, global address databases, and zip code verification.

Large Language Model


A type of artificial intelligence that can process and generate human-like text. Microsoft is reportedly using recall data to train a personal AI assistant that would be able to access and analyze a user's entire computer usage history.

Personal AI Assistant


An AI-powered software that can assist users with tasks, provide information, and engage in conversations. Microsoft is reportedly developing a personal AI assistant that would be trained on a user's entire computer usage history, raising concerns about data privacy and security.

Q&A

  • What are the potential security risks associated with Microsoft's recall feature?

    Kevin Beaumont, a security researcher, has demonstrated that recall's database is vulnerable to exfiltration by malware, potentially leading to massive data breaches. He also argues that recall's database can be accessed by other users on the same machine, undermining its security claims.

  • How is Microsoft's recall feature being abused by cybercriminals?

    Cybercriminals are posing as helpful contributors on Stack Overflow to promote malicious packages that install information-stealing malware. These packages can then access and exfiltrate data from a user's PC, including their recall history.

  • What is the significance of Google's decision to revoke trust for certificates issued by Global Trust?

    This decision effectively puts Global Trust out of the business of selling web server certificates, as no customer would purchase a certificate that would be untrusted by Chrome browsers. It highlights the importance of certificate authority conduct and the consequences of misconduct.

  • What is the importance of data quality in today's digital world?

    Data quality is crucial for businesses to ensure accurate records, eliminate duplicate entries, and improve customer service. Melissa, a sponsor of Security Now, offers a range of tools and services for cleaning, verifying, and enhancing data, helping businesses maintain accurate and reliable information.

  • What is Microsoft's plan for using the data collected by recall?

    Steve Gibson and Leo Laporte speculate that Microsoft is using recall to collect data for training a personal AI assistant that would be able to access and analyze a user's entire computer usage history. This would create a powerful personal assistant but also raises concerns about data privacy and security.

  • What are some of the key takeaways from this episode of Security Now?

    Microsoft's recall feature poses significant security risks and privacy concerns. It is crucial to be aware of the constantly evolving tactics of cybercriminals and to take steps to protect your data. Data quality is essential for businesses to maintain accurate records and improve customer service. AI is playing an increasingly important role in both cyber attacks and security solutions, highlighting the need for robust security measures.

  • What are some steps that users can take to protect themselves from the risks associated with Microsoft's recall feature?

    Users should disable recall if they are concerned about its security and privacy implications. They should also be cautious about the software they install and ensure that their antivirus software is up to date. It is also important to be aware of the potential risks of using cloud-based backup services, as they may also back up recall data.

  • What are some of the challenges facing the security industry in today's digital world?

    The security industry faces a constant battle against evolving cyber threats, including AI-powered attacks and new supply chain attack vectors. It is also important to address the challenges of data privacy and security in a world where data is increasingly distributed and accessible.

  • What are some of the key trends shaping the future of cybersecurity?

    AI is playing an increasingly important role in both cyber attacks and security solutions. Zero-trust security frameworks are becoming more prevalent, as organizations seek to secure their data and applications in today's distributed and cloud-based environments. The security industry is constantly evolving to address new threats and challenges, requiring ongoing vigilance and innovation.

Show Notes


  • "Tornado Notes"

  • Email @ GRC

  • Have I Been Pwned?

  • A new "supply chain" attack vector

  • Another CA in the DogHouse

  • ICQ to shutter its service

  • Steve reviews "Déjà vu"

  • Hide my email

  • Security in Windows

  • SpinRite update

  • A Large Language Model in Every Pot

Show Notes - https://www.grc.com/sn/SN-977-Notes.pdf


Hosts: Steve Gibson and Leo Laporte


Download or subscribe to this show at https://twit.tv/shows/security-now.


Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit


You can submit a question to Security Now at the GRC Feedback Page.


For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.


Sponsors:

Comments 
In Channel
loading

Table of contents

00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

SN 977: A Large Language Model in Every Pot - Problems With Recall, End of ICQ, Email @ GRC

SN 977: A Large Language Model in Every Pot - Problems With Recall, End of ICQ, Email @ GRC

TWiT