OpenRecall(github.com) |
OpenRecall(github.com) |
Otherwise, you cannot use it like you want to.
Anyone who hacks you computer, is able to access the same data as the end-user.
> Privacy-focused: Your data is stored locally on your device, and you have the option (soon to be implemented) to encrypt it with a password for added security
And password does not matter, since remote attacker can log your keyboard inputs.
If this is not in the first pass when implementing the idea then its a big no for me. Security should have been part of the original design, not shoehorned in after the event.
But there is still small risk that attacker can access it for short time.
Keyloggers have access to the potential future data, while Recall provides guaranteed access to historic data.
CoPilot Recall is a massive target because if you break into a system, there would be a good chance that data is there since it was opt-out by default. open-source recall implementations are not only opt-in, but require additional overhead to install, so the likelihood that one would find this data on the drive is such a low target as to be not worth including in an automated scanner.
Remember that surface-area does matter in things like this. If you believe you're a large enough target for some amount of focus (and you might be if your involved in mid-scale open-source projects, like XZ apparently), then it's good to be cautious. If you're not that kind of target, then just remember you only need to be more complex than the average person, and something like this absolutely qualifies as "more complex".
...encryption coming in a later update
that was disappointing