Skip to content

Microsoft's AI Secretly Copying All Your Private Messages

Technology
4 3 33
    • In December, an investigation by Tom's Hardware found that Recall frequently captured sensitive information in its screenshots, including credit card numbers and Social Security numbers — even though its "filter sensitive information" setting was supposed to prevent that from happening.
    • In December, an investigation by Tom's Hardware found that Recall frequently captured sensitive information in its screenshots, including credit card numbers and Social Security numbers — even though its "filter sensitive information" setting was supposed to prevent that from happening.

    Just a tip: if you must use consumer editions of Windows regularly, consider adding an automatic provisioning tool like AME to your workflow.

    The example above uses customizable “playbooks” to provision a system the way docker compose would a container image, so it can fill the role of a VM snapshot or PXE in non-virtualized local-only scenarios.

    The most popular playbooks strip out AI components and services (there are many more than just Recall) but also disable all telemetry and cloud-based features, replace MS bloatware with preferred OSS, curtail a truckload of annoying Windows behaviors, setup more sensible group policies than the defaults, and so forth.

    I have a few custom playbooks for recurring use cases so that, when one presents, I can spin up an instance quickly without the usual hassle and risk.

  • Just a tip: if you must use consumer editions of Windows regularly, consider adding an automatic provisioning tool like AME to your workflow.

    The example above uses customizable “playbooks” to provision a system the way docker compose would a container image, so it can fill the role of a VM snapshot or PXE in non-virtualized local-only scenarios.

    The most popular playbooks strip out AI components and services (there are many more than just Recall) but also disable all telemetry and cloud-based features, replace MS bloatware with preferred OSS, curtail a truckload of annoying Windows behaviors, setup more sensible group policies than the defaults, and so forth.

    I have a few custom playbooks for recurring use cases so that, when one presents, I can spin up an instance quickly without the usual hassle and risk.

    You for sure feels so good being this helpful. But TIN really don't understand SHT if you use so many Technical terms(TT)

    But there's a solution in brackets I just presented, that's commonly accepted in academia if you still want to use TT like that

  • You for sure feels so good being this helpful. But TIN really don't understand SHT if you use so many Technical terms(TT)

    But there's a solution in brackets I just presented, that's commonly accepted in academia if you still want to use TT like that

    Forgive me for not explaining better. Here are the terms potentially needing explanation.

    • Provisioning in this case is initial system setup, the kind of stuff you would do manually after a fresh install, but usually implies a regimented and repeatable process.
    • Virtual Machine (VM) snapshots are like a save state in a game, and are often used to reset a virtual machine to a particular known-working condition.
    • Preboot Execution Environment (PXE, aka ‘network boot’) is a network adapter feature that lets you boot a physical machine from a hosted network image rather than the usual installation on locally attached storage. It’s probably tucked away in your BIOS settings, but many computers have the feature since it’s a common requirement in commercial deployments. As with the VM snapshot described above, a PXE image is typically a known-working state that resets on each boot.
    • Non-virtualized means not using hardware virtualization, and I meant specifically not running inside a virtual machine.
    • Local-only means without a network or just not booting from a network-hosted image.
    • Telemetry refers to data collecting functionality. Most software has it. Windows has a lot. Telemetry isn’t necessarily bad since it can, for example, help reveal and resolve bugs and usability problems, but it is easily (and has often been) abused by data-hungry corporations like MS, so disabling it is an advisable precaution.
    • MS = Microsoft
    • OSS = Open Source Software
    • Group policies are administrative settings in Windows that control standards (for stuff like security, power management, licensing, file system and settings access, etc.) for user groups on a machine or network. Most users stick with the defaults but you can edit these yourself for a greater degree of control.
    • Docker lets you run software inside “containers” to isolate them from the rest of the environment, exposing and/or virtualizing just the resources they need to run, and Compose is a related tool for defining one or more of these containers, how they interact, etc. To my knowledge there is no one-to-one equivalent for Windows.

    Obviously, many of these concepts relate to IT work, as are the use-cases I had in mind, but the software is simple enough for the average user if you just pick one of the premade playbooks. (The Atlas playbook is popular among gamers, for example.)

    Edit: added explanations for docker and telemetry

  • 139 Stimmen
    37 Beiträge
    0 Aufrufe
    fushuan@piefed.blahaj.zoneF
    If you tell that that's a hippie bear in my local metal bar... You might be politely corrected because we are awesome. Also, punks and metalheads get beards and rings too.
  • Oracle, OpenAI Expand Stargate Deal for More US Data Centers

    Technology technology
    4
    18 Stimmen
    4 Beiträge
    37 Aufrufe
    M
    Is the 30B calculated before or after Oracle arbitrarily increases their pricing for no reason?
  • Microsoft axe another 9000 in continued AI push

    Technology technology
    24
    185 Stimmen
    24 Beiträge
    158 Aufrufe
    J
    Yeah my friend is dating a Google recruiter and he overhears some absurd offers. Like, a reasonable person could retire on a few years at that salary. I have a hypothesis that rich people are bad at money
  • Hacker Tactic: ESD Diodes

    Technology technology
    1
    1
    24 Stimmen
    1 Beiträge
    12 Aufrufe
    Niemand hat geantwortet
  • 80 Stimmen
    27 Beiträge
    101 Aufrufe
    lanusensei87@lemmy.worldL
    Consider the possibility that you don't need to be doing anything wrong besides existing to be persecuted by a fascist regime.
  • The Enshitification of Youtube’s Full Album Playlists

    Technology technology
    3
    1
    108 Stimmen
    3 Beiträge
    26 Aufrufe
    dual_sport_dork@lemmy.worldD
    Especially when the poster does not disclose that it's AI. The perpetual Youtube rabbit hole occasionally lands on one of these for me when I leave it unsupervised, and usually you can tell from the "cover" art. But only if you're looking at it. Because if you just leave it going in the background eventually you start to realize, "Wow, this guy really tripped over the fine line between a groove and rut." Then you click on it and look: Curses! Foiled again. And golly gee, I'm sure glad Youtube took away the option to oughtright block channels. I'm sure that's a total coincidence. W/e. I'm a have-it-on-my-hard-drive kind of bird. Yt-dlp is your friend. Just use it to nab whatever it is you actually want and let your own media player decide how to shuffle and present it. This works great for big name commercial music as well, whereupon the record labels are inevitably dumb enough to post songs and albums in their entirety right there you Youtube. Who even needs piracy sites at that rate? Yoink!
  • Short summary of feature phone market in 2025

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • A Novel Approach to Youtube Ads

    Technology technology
    3
    1
    0 Stimmen
    3 Beiträge
    28 Aufrufe
    A
    Part of the reason I am not advocating for or against the extension or the source. People can judge for themselves. I thought it was funny (not a great idea but definitely an interesting implementation). For the record I use both ublock origin and Firefox, and I also run a pihole at home. I'm just putting out there that it exists.