Microsoft has started rolling out a.i. to its Windows Operating System for PCs. This “feature” pretends to make it easier to find documents on a computer.
What they should have done is create a reverse index for document retrieval by contents keyword. That proven technology has been around for decades, and doesn’t use a.i.
Microsoft’s tendency to force a.i. unto users of its Windows operating system poses significant threats to privacy and the safety of corporate secrets.
For those of us who have a business to protect, what operating systems help safeguard privacy?
- Fubarberry ( @Fubarberry@sopuli.xyz ) English62•4 months ago
Ok, so this is a Lemmy post that links a r/ailess post that links a r/privacy post that finally links this Ars Technica article.
Why not just link the Ars Technica article to begin with? I don’t think there’s any good reason to link all these separate chained discussions.
- delirious_owl ( @delirious_owl@discuss.online ) 15•4 months ago
This. Please collectively downvote. This sort of thing is the proper use of the downvote button.
- GolfNovemberUniform ( @GolfNovemberUniform@lemmy.ml ) 3•4 months ago
I personally think that downvoting your comment is a more proper use of the downvote button. But the real purpose is to downvote stuff that violates the rules or is immoral in general (such as promoting terrorism or excessive data collection). And btw I don’t think downvote raids are allowed
- delirious_owl ( @delirious_owl@discuss.online ) 12•4 months ago
Downvotes are not “I disagree with this person”
A downvote used properly is to bury misinformation, low effort posts, off-topic posts, and as you say - violation of rules or attacks on others.
This is an example of a low effort post that can easily be misinformation because it cannot be verified.
- GolfNovemberUniform ( @GolfNovemberUniform@lemmy.ml ) 1•4 months ago
You are right. What I meant by my reply is that the person I replied to forced their opinion. But still downvoting low-effort is not great imo. Not everyone wants to spend an hour finding the source or writing a 10 paragraph explanation
- ZeroHora ( @ZeroHora@lemmy.ml ) English6•4 months ago
But the real purpose is to downvote stuff that violates the rules or is immoral in general
Says who? Since when? wtf
- GolfNovemberUniform ( @GolfNovemberUniform@lemmy.ml ) 1•4 months ago
It’s my personal opinion against their personal opinion. Nothing more. My reply was meant to show that the person aggressively forces their unproved opinion
- Blizzard ( @Blizzard@lemmy.zip ) English2•4 months ago
There’s even the cross-post feature!
- delirious_owl ( @delirious_owl@discuss.online ) 40•4 months ago
You linked to a shitty website that blocks hardened browsers instead of the article on Ars. Downvoted.
Please re-post with a link to the actual article.
- Onno (VK6FLAB) ( @vk6flab@lemmy.radio ) 29•4 months ago
I’ve been using Linux for near enough a quarter of a century as my main desktop and I haven’t regretted it yet.
Linux today is plenty easy to use today for a non-technical audience, runs with less resources, has global communities, comes in your language and it’s free.
- Kit ( @Kit@lemmy.blahaj.zone ) 15•4 months ago
I thought that surely it couldn’t be that bad. But…
“Recall uses Copilot+ PC advanced processing capabilities to take images of your active screen every few seconds,” Microsoft says on its website. “The snapshots are encrypted and saved on your PC’s hard drive. You can use Recall to locate the content you have viewed on your PC using search or on a timeline bar that allows you to scroll through your snapshots.”
- Possibly linux ( @possiblylinux127@lemmy.zip ) English4•4 months ago
“Encrypted”
It must be secure if it is encrypted. The problem with the Microsoft secret storage is that they key is on the disk.
- Kit ( @Kit@lemmy.blahaj.zone ) 4•4 months ago
For individuals, yes. For organizations, no. Orgs who know what they’re doing use a HSM for their data encryption. Thus the title of this post is inaccurate.
But from the consumer side, I am absolutely never going to buy a “Copilot Plus” device, whatever that is.
- Possibly linux ( @possiblylinux127@lemmy.zip ) English1•4 months ago
You may not get much of a choice.
- Kit ( @Kit@lemmy.blahaj.zone ) 1•4 months ago
Your username is becoming more and more relevant daily
- Possibly linux ( @possiblylinux127@lemmy.zip ) English1•4 months ago
Funny how that possibly happens
- qjkxbmwvz ( @qjkxbmwvz@startrek.website ) 4•4 months ago
So it’s a security camera pointing at your screen, but with AI involved.
Honestly though, this sounds like the kind of thing you could hack together with a shell script and OCR on a *NIX system in an afternoon. Cronjob to take screenshots and run them through OCR, keywords to a database. Add hooks to your window manager to take additional screenshots on relevant events (change desktop, application opens/new window on screen, etc.).
- zeluko ( @zeluko@kbin.social ) 2•4 months ago
bUt iTs Ai InTeGrAtEd
- Jeena ( @jeena@jemmy.jeena.net ) 10•4 months ago
Soon it’ll be safer to use a Chinese Linux distribution than Windows.
- Successful_Try543 ( @Successful_Try543@feddit.de ) 3•4 months ago
Red Star OS ftw.
- RiQuY ( @RiQuY@lemm.ee ) 2•4 months ago
That’s northkorean I think.
- Successful_Try543 ( @Successful_Try543@feddit.de ) 1•4 months ago
I know, but NK politically isn’t that far away from PRC.
I recall a statement from an article I’ve read several years ago on the presentation of Will Scott, a professor who has been in NK, at 31C3 2014.
Als sich Scott Root-Zugang verschaffte, fand er ein für Normalnutzer unzugängliches Programm, das die komfortable Einrichtung verschlüsselter Datenträger erlaubte. “Das ist interessant, wenn ihr einen AES-verschlüsselten Datenträger braucht, an dem die NSA garantiert nichts manipuliert hat”, scherzte Scott.
When Scott gained root access, he found a program inaccessible to normal users that allowed the convenient setup of encrypted data carriers. “That’s interesting if you need an AES-encrypted data carrier that the NSA is guaranteed not to have tampered with,” joked Scott.
- Jeena ( @jeena@jemmy.jeena.net ) 1•4 months ago
I know, but NK politically isn’t that far away from PRC.
After the Covid lockdowns there is a saying in China:
We thought that North Korea is our past, but now we know it’s our future.
- jherazob ( @jherazob@beehaw.org ) English9•4 months ago
- katy ✨ ( @cupcakezealot@lemmy.blahaj.zone ) 7•4 months ago
most likely it will be a group policy which most it departments will turn off anyway.
- calm.like.a.bomb ( @clmbmb@lemmy.dbzer0.com ) 2•4 months ago
Don’t be so sure! For a few percents off the price some greedy executives would give anything to Microsoft (and/or others).
- Possibly linux ( @possiblylinux127@lemmy.zip ) English1•4 months ago
Its kind of crazy how that works. Microsoft is blinded my success in many ways.
- ReversalHatchery ( @ReversalHatchery@beehaw.org ) English1•4 months ago
At public services too, like schools and hospitals, where admins mostly couldn’t care less?
- Possibly linux ( @possiblylinux127@lemmy.zip ) English1•4 months ago
For now…
Seriously though why do they do this to us. Before you know it Windows will be tied to Azure with no local AD.
- CCMan1701A ( @CCMan1701A@startrek.website ) 6•4 months ago
Is this windows 11 and up or windows 10 as well?
The Windows 10 equivalent, Timeline, got discontinued in 2021. At this point in time it is unknown whether Microsoft will retrofit Recall into Windows 10. Knowing Microsoft it is safe to assume they’ll try anything for profit.
- Possibly linux ( @possiblylinux127@lemmy.zip ) English5•4 months ago
You can turn off a lot of it with group policy. I would also do testing on the desktop so you can stay ahead of the antifeatures.
Edit:
I like this line:
Recall won’t take snapshots of InPrivate web browsing sessions in Microsoft Edge
- Gerudo ( @Gerudo@lemm.ee ) 4•4 months ago
My problem is, even if it’s encrypted, only local blah blah blah, if your Microsoft account is compromised, what then?
I worked on account services for msft. The amount of people with compromised accounts is astounding.