muted Windows symbol on a keyboard
News Analysis

Microsoft Updated Its Recall Release Date. Security Experts Remain Concerned

5 minute read
David Barry avatar
By
SAVED
Microsoft will release its controversial Recall tool to its Windows Insider program in October. Here are the security features it needs to add before then.

Microsoft announced updated launch timing for its controversial Recall AI feature, which was originally set to launch in June. It will now be available for Windows Insider users in October.

The initial June rollout was postponed after the feature, which automatically captures screenshots of on-screen activity, resulted in massive backlash from security experts who pointed out its obvious security and privacy issues. The company promised the updated version scheduled for a limited October release will deliver a "trustworthy and secure Recall (preview) experience."

Nevertheless, Microsoft Recall Persisted

Upon release, Recall will now be turned off by default. However, contrary to rumors that circulated earlier this week, it will not be possible to uninstall the feature. In a blog outlining the new changes to the release schedule the company stated:

"With a commitment to delivering a trustworthy and secure Recall (preview) experience on Copilot+ PCs for customers, we’re sharing an update that Recall will be available to Windows Insiders starting in October. As previously shared on June 13, we have adjusted our release approach to leverage the valuable expertise of our Windows Insider community prior to making Recall available for all Copilot+ PCs.“

It is hard to understand why Microsoft is persisting with the release. At the time of the original announcement, security experts demonstrated the ease with which they accessed data captured by the feature. While Microsoft has rolled the release date back twice and introduced three new updates to counter potential security problems including the new default "Off" setting, a requirement to re-enroll with Windows and additional layers of protection, security experts remain skeptical.

When Recall was first introduced, former Microsoft threat analyst Kevin Beaumont wrote on Mastodon: "I’m not being hyperbolic when I say this is the dumbest cybersecurity move in a decade."  

Related Article: Generative AI Is Cool, But It Isn't Corporate (Yet)

Weighing Recall Risks

Beaumont isn't the only one who foresees problems. Adhiran Thirmal of Security Compass pointed to a number of issues that could still be problematic, including:

  • Automatic Data Collection: The primary concern revolves around the automatic nature of data collection, he said. Capturing screenshots without user initiation could inadvertently store sensitive information, such as passwords, financial data, confidential documents or private communications.
  • Data Storage and Access: Even with Recall turned off by default, potential risks remain. He noted that if an attacker gains access to the screenshots, they could exploit the captured data for malicious purposes, including identity theft, corporate espionage or unauthorized surveillance.
  • Malware Exploitation: Finally, Thirmal said, the existence of these screenshots introduces a new attack vector. If a system is compromised by malware, an attacker could search the stored screenshots for valuable information. Even with strong encryption, the mere presence of these images poses an added security risk.

"Microsoft's decision to disable the feature by default is a positive step, but it must be complemented by robust security measures to prevent inadvertent activation or exploitation,” he said. While Microsoft may announce other enhancements before Recall's full release, Thirmal suggested the following additions would be helpful:

  • End-to-End Encryption: Ensuring that all captured screenshots are encrypted both at rest and in transit.
  • Zero-Trust Security Models: Implementing a zero-trust approach, where every access request to the screenshots is thoroughly authenticated and authorized.
  • Anomaly Detection: Integrating AI-driven anomaly detection to monitor for unusual access patterns that might indicate an attack.

“Microsoft should not necessarily scrap the Recall feature outright, as its potential benefits are significant. However, the success of this feature depends on the implementation of comprehensive security measures,” Thirmal added. The security measures must address:

  • User Education: Providing clear communication about the risks and controls available to users.
  • Default Opt-Out: Maintaining the default opt-out with a robust onboarding process for users who choose to enable it.
  • Strict Access Controls: Enforcing stringent access controls and logging to monitor and audit any access to the stored data.
  • Regular Security Audits: Continuously auditing the feature to identify and address any emerging vulnerabilities.

He added: “While the Recall feature has the potential to be a valuable tool for users, it must be approached with caution. The security measures Microsoft has committed to must be robust, transparent and user-friendly.”

Cyber Command's Reade Taylor said the complex issues around Recall can't be reduced to a question of ‘Will we, Won’t we." He acknowledged the useful functionality Recall provides by allowing quick access to information users have seen before. However, its broad data collection raises serious privacy concerns and risks that are difficult to fully mitigate.

While Microsoft's security improvements are a step in the right direction, vulnerabilities are still likely given the massive scale of Windows' user base, he continued. For enterprise environments in particular, Recall could expose sensitive data if compromised, as it provides a single point of access.

“For personal use, users must weigh the convenience of Recall versus its implications on privacy and security. If enabled, strong passwords, multi-factor authentication and caution when sharing personal information can help reduce risks,” he said. "However, no measures are foolproof. The responsibility lies with the individual and what level of risk they deem acceptable for their needs.”

As with any new technology, striking a balance between utility and security is key, he added. Microsoft's decision to start with a limited release will hopefully help it identify and address further issues before a broader deployment.

Related Article: A Zero Trust Security Primer

Further Security Questions  

There is another problem too, Eugene Klimaszewski, head of Mammoth Security, said. Even with local AI processing, collecting and storing sensitive data could be a ticking time bomb if it's not locked down tight. The real worry is that this information could fall into the wrong hands through hacking, system flaws or even trusted insiders.

Microsoft must fortify its defenses to counter these threats, he said, encrypting the data like a digital fortress and watching who gets the keys. Recall users also need clear privacy choices and full disclosure on how their information is handled.

“Giving users the power to say 'no thanks' to data collection lets them steer their own privacy ship,” he said. “From my corner, treating digital data with the same vigilance as physical property is non-negotiable, ensuring we're shielded from the unseen dangers of the digital world.”

Other features could enable Recall's safe use in the enterprise, Pro Business Plans CEO Chase Hughes said. He supported the company's decision to have the feature turned off by default, saying the approach puts the decision in the hands of the users, thus minimizing the chances of data being captured accidentally.

Another helpful measure Hughes notes is that Recall does not collect information from private browsing sessions performed in Chromium-based browsers or DRM content, thus minimizing the possibility of personal information being saved. 

Organizations might hesitate to invest in such technologies unless Microsoft implements rigorous security protocols, Philipp Staiger, co-founder of the Swiss Institute for Data Protection and Data Security, added. This includes local data encryption, robust access controls, and clear data retention policies. Without these protections, the risk of data breaches is substantial.

Learning Opportunities

Microsoft's move suggests a push towards maximizing AI utility, but it underlines the persistent tension between innovation and security, he said. The issue isn't a Microsoft issue alone, he added — other vendors must adhere to stringent security standards with their AI tools as well.

About the Author
David Barry

David is a European-based journalist of 35 years who has spent the last 15 following the development of workplace technologies, from the early days of document management, enterprise content management and content services. Now, with the development of new remote and hybrid work models, he covers the evolution of technologies that enable collaboration, communications and work and has recently spent a great deal of time exploring the far reaches of AI, generative AI and General AI.

Main image: Tadas Sar | unsplash
Featured Research