Security Now 977 Transcript

Please be advised this transcript is AI-generated and may not be word for word. Time codes refer to the approximate times in the ad-supported version of the show.

0:00:00 - Leo Laporte
It's time for security now. Steve Gibson is here. Have you ever been pwned? Well, here's a way to know and whether you should worry about it. What certificate authority just lost their TLS server business? We'll talk about that at the end of ICQ and Microsoft's new recall feature that's coming to all Copilot Plus PCs. Steve explains why it is not as secure as Microsoft has said, why it's in fact a real danger. He also has a theory and I agree with it 100 percent of why Microsoft is doing this. It's a very interesting play for your information. Next, on Security Now Podcasts you love From people you trust. This is twit. This is security now with steve gibson, episode 977, recorded tuesday, june 4th 2024. A large language model in every pot. It's time, time for security now. Yes, adjust your spectacles and put your beanie on straight, because this guy, steve Gibson, is going to challenge you, he's going to excite you, he's going to thrill you, he's going to make you a geek just by. You know proximity. Hello, steve Gibson.

0:01:20 - Steve Gibson
I think if you've survived more than a couple of these, podcasts your geek status has been already established. You're more than qualified. You haven't gone running for the hill. I got a piece of mail from one listener who said okay, so I think I understand about 5% of what you're talking about. You're doing well, but I do come away with something useful every week, so I keep coming back. For more abuse? No, for more edification.

0:01:54 - Leo Laporte
Well, and it's like lifting a heifer, like when a cow, a baby cow, is first born. You can lift it. If you lift it every day, you'll be able to lift a full-grown cow. This is the analogy you've come up with we're lifting cows. Keep listening every week. In a year or two, you'll be able to lift a cow. How about that?

0:02:15 - Steve Gibson
Maybe you'll be able to throw a honeypot.

0:02:17 - Leo Laporte
There you go, that too.

0:02:19 - Steve Gibson
Oh, actually there's a really interesting piece that Microsoft just revealed the details of a honeypot they had been running for a long time. Anyway, I may be talking about that next week if nothing more interesting comes along. But speaking of pots, today's title is A Large Language Model in Every Pot, and we're going to go back and talk about recall again. Well, okay, I'm stepping on my own sequence here. So we got a lot of talk, a lot of things to talk about. When is a simpler application better than something complex?

How did the first week of GRC's new email system turn out? Have you been pwned and, if so, how worried should you be? What's the latest new supply chain attack vector? What certificate authority just lost all their TLS server business Whoops, yikes. And remember that early messaging service, icq. Whatever became of it?

Finally, after I share a tip about what I consider to be a perfect science fiction movie two pieces of listener feedback and one user's happiness over Spinrite we're going to look at what a prominent security researcher learned after using Microsoft's recall for 10 days and why I think Microsoft is willing to bet the farm and risk the dire warnings of the entire security community over this unasked for capability. I think I know where they're headed and it's very exciting, if I'm right, and it's also very troubling, and it's really a shame that they've been screwing around with windows, adding features nobody wanted, instead of making it more secure, because they really can't do what they want to do. Oh, so it's this. We're going to have fun today. Very interesting, unlike unlike all of the other 976 podcasts that came before so boring?

yeah, no we're going to have fun today.

0:04:38 - Leo Laporte
I promise we do have a great picture of the week oh, I haven't read it, I just know the All right Security Now is brought to you by our friends at ACI Learning, the provider behind IT Pro binge-worthy video, on-demand IT and cybersecurity training, and a longtime sponsor of this show. With IT Pro, you'll get certification ready With access to their full video library. It is getting bigger by the day Now more than 7,250 hours of training and more added every week. They've got all their studios running Monday through Friday, nine to five I think there's eight of them, because the tests change, the questions change, the certifications change, the software change. It's a world of change, isn't it in IT? But they will always have the freshest content for you. They also, in their premium training plans, include practice tests, which I absolutely believe is the best way to prepare for an exam. Take the test before you actually pay for it, so you know, you have the confidence you go in saying I know exactly what I'm going to be facing, I am prepared, I know my material. It's just a great way to take an exam. Plus virtual labs, which will facilitate hands-on training. You can set up a Windows server and clients without even having a Windows machine. Msps love it because they can use it to configure and set up software and try before they buy. It's just a great program.

It Pro from ACI Learning. They make training fun. All training videos are produced in an engaging talk show format. You can actually chat along with them if you want, and one of the reasons it works is they pick the best trainers, people who are experts I mean working professionals in the field but who also have a real passion for the subject, and that passion communicates. That's what makes communicates. That's what makes it engaging. That's what makes it easier to learn. Take your IT or cyber career to the next level. Be bold and train smart with ACI Learning. Visit goacilearningcom slash twit. Do use the offer code twit30 at checkout to save 30% on your first month or first year of ITPro training for individuals. Just visit goacilearningcom slash twitindividuals. Use the offer code twit30. Goacilearningcom slash twit Offer code twit30. All right, I am ready for the picture of the week, mr Gibson.

0:07:03 - Steve Gibson
So I gave this picture the title but Officer.

0:07:10 - Leo Laporte
Okay, does it need no explanation? It really doesn't. Alright, once you see the picture, it's going to take me a minute to get it up on this computer. Here it comes. Alright, I'm prepared. Are you ready? I'm going to scroll up. We shall enjoy it together. All right, I'm prepared. Are you ready? I'm going to scroll up. We shall enjoy it together. But, officer, there's a one-way street sign, a stop sign and a right turn sign. What, the what am I supposed to do?

0:07:38 - Steve Gibson
You know, leo, you just have to wonder Like, what the heck I know? Ok, so for people who aren't seeing this, we have a picture where a public street has come up to a T intersection, so you have to turn left or right. Well, there is a stop sign, so you certainly need to consider your options. Thus stopping, the problem is that the street that you are intersecting with has been labeled as one way where all the traffic is moving from left to right, but below the stop sign, it's also very clearly marked that you must not turn right. There's the right turn arrow with a big red slash through it. So I don't know, do you back up?

0:08:34 - Leo Laporte
You know backing up would be the only. Thing you could do. That's all you can do. But notice, there's no outlet. You're in a cul-de-sac, so you're really dead in the water.

0:08:42 - Steve Gibson
So you're right. Is that what the yellow sign?

0:08:45 - Leo Laporte
says, it says no outlet.

0:08:46 - Steve Gibson
I thought yep, I thought so.

0:08:47 - Leo Laporte
So this is the worst.

0:08:55 - Steve Gibson
That's something that would be seen by people going down the street waving at you because you're stuck, you can't go anywhere.

0:08:59 - Leo Laporte
I think this is a prank being played on self-driving cars. A prank being played on self-driving cars. Whoever lives on this street added that sign, knowing that a self-driving vehicle would then be completely stuck. It would just explode, leo, I can't do anything.

0:09:16 - Steve Gibson
It would just it would just say okay, I'm I quit I can't do anything, I'm stuck.

0:09:22 - Leo Laporte
Oh my God, that's hysterical. Welcome to America, okay.

0:09:27 - Steve Gibson
So I wanted to thank all of our listeners who correctly recalled that the Random Notes DOS app we were trying to remember last week was Tornado Notes.

0:09:41 - Leo Laporte
Okay, I don't even remember that one, so I wouldn't have gotten it.

0:09:43 - Steve Gibson
Yeah, it was not. Well, leo, it was DOS, but you used.

0:09:47 - Leo Laporte
DOS back in the day. Oh, I used Sidekick. I used a lot of TSRs on DOS.

0:09:50 - Steve Gibson
So it was not Phil Katz of PK Zip fame. It was a guy named Jim Lewis of Micrologic Corporation. And when I first encountered Tornado Notes from a company named Micrologic Corporation of Hackensack, New Jersey, I wondered why is that name so familiar? And it turned out it was because the same guy had created one of the most useful sets of eight and a half by 11 double-sided plastic sheet processor instruction reference cards the world had ever encountered. I have a picture of them in the show notes. Now, upon the event of my death, my plan is for cremation after first having whatever organs may still be functioning and useful to anyone removed. After first having whatever organs may still be functioning and useful to anyone removed.

0:10:54 - Leo Laporte
But if my plan were burial. I would want these processor instruction reference cards buried alongside me. This is a 6502, a Z80, and an 8086. It's all in there.

0:11:00 - Steve Gibson
And there is a 68000 as well. I cannot begin to express how important they were back when I was writing assembly code, first for Apple's and later Atari's 6502-based machines and, leo, I've got links on the next page to the PDFs of them. I mean, these things were significant to so many people. I ran across someone over on Reddit who commented that it was a good thing these were 100% plastic or he would have worn his out. You know they were indispensable and I, you know I don't know where mine are. I'm sure they're here somewhere because I would have never thrown them out. They were just perfect. Now you're having the screen, now the 6502 card, and notice all the blank boxes. Those are missing opcodes. So that was important. You had to know what was available and what wasn't. And one of the reasons the 6502 microprocessor was so well used Apple chose it, atari chose it, commodore chose it was because it was so inexpensive. And the reason it was inexpensive is it didn't do much Exactly, it transferred all the burden to the programmer and most of those opcodes are empty in there. But it did just enough in order to get the job done. So this guy named Jim Lewis, who later gave us Tornado Notes for DOS, a TSR. The reason I knew his name when Tornado Notes came along is like wait a minute, I've got these instruction reference cards that I've been using forever, I mean anyway. So Tornado Notes for DOS was utterly unique.

When Windows happened, jim tried to recreate the successor Tornado Notes with a product he named InfoSelect. But InfoSelect was the victim of its own featuritis. The sublime beauty of Tornado Notes was that it was so simple. It did exactly and only one thing perfectly, and and this was the other thing instantaneously. It began as a massively overwhelming, disorganized pile of rectangular notes. Didn't matter, you could just put anything that just random text in, didn't matter what shape or size they were. But then as you typed successive characters of a string, all those notes that did not contain the substring that had been entered thus far would instantly disappear. So you got this very satisfying, almost animated, real-time winnowing of your entire pile until you could see the note you knew was there somewhere and notice that you also saw all the notes that contained that same substring, which was often surprisingly useful at times.

Unfortunately, jim, for all his brilliance, did not understand that Tornado Notes succeeded due to the constraints imposed upon it by its DOS environment. So when he created its successor, which was InfoSelect for Windows, he gave it hierarchies and categories and menus and formatted printing and everything else you can imagine that Windows made possible. I think there was even a kitchen sink tucked in there somewhere. And you know, we wanted the same thing for Windows that we had for DOS, but what we got was a monstrosity that required all manner of configuration and thought. You know, yes, it could do so much more than Tornado Notes could, but the very thing that was so beautiful about Tornado Notes was everything it did not do.

So, as it turned out in retrospect, you know, the thing that I mean it being so minimal was what made it so compelling and useful. And I'm mentioning this because there's a larger lesson here. One of the things the original designers of Unix also got exactly right was the idea of creating many simple commands that took some input, did something to it and then produced some output. And then to that you add the simple ability to interconnect these individual small building blocks into a chain by piping the output of one into the input of another, and you're able to interactively create and assemble a much more complex ad hoc function. And, leo, while I'm not a Lisp programmer, I have the sense that the same sort of approach can be used there, where you kind of incrementally build up a much more complex solution that's assembled from many smaller pieces interacting they call it composable because you compose a larger program out of pieces of smaller programs.

0:16:34 - Leo Laporte
To my mind it makes it so much easier because you can bite off a little bite, figure out how it works and because it's basically functional, it's always going to give you the same result with the same input. You could slowly put those together and build something out of it. It feels to me like woodworking, almost like assembling a machine. It's great.

0:16:56 - Steve Gibson
Like crafting a solution.

0:16:57 - Leo Laporte
Exactly yes, yeah.

0:17:00 - Steve Gibson
So, anyway, the point I hope to make here is that more is not always better, and you know, for example, this is a lesson that the people who design the remote controls for AV equipment appear to have never learned. Oh my goodness, I mean, it's a joke that those things are so crazy. And I did notice that, you know, when I, when I was thinking about this, that my freeware all just does one thing. You know, I create a little program, it just does one thing. If you want that one thing, that's the program you use. It's, you know, 23 K. It does its job and then you're done. And actually, through the years people have been asking for many, many more features from Spinrite and I've just said, no, you know, spinrite does what it's supposed to do and that's what it's for.

So anyway, I just I want to thank all of our listeners who said I think you guys were thinking about tornado notes. And you know sure enough, and I'm I wouldn't be surprised, you know. I mean there are DOS boxes around that could run tornado notes. I haven't run across a copy of it, but I probably have one on a hard disk around here somewhere. Anyway, I also wanted to follow up on last week's announcement of GRC's new email system, which has been a resounding success. If you missed last week's episode, that is, if you don't listen to them all and don't know about it yet, you could go to our old GRCcom feedback page, which we've been talking about for 20 years, which explains a bit about the nature of web form spam, which unfortunately is a thing, and it contains a pointer over to our new page, grccom slash mail. Anyway, the only post-announcement glitch we encountered was from users mostly using Gmail, but also a few other ISPs I think Virgin Media was one who use their own domains backed by those services like Gmail. But since the email they send comes from that underlying service like Gmail rather than from their domain alias, and since the incoming filter that's in front of the security now at GRC dot com mailbox looks to see whether the sender is known to us, listers need to register their underlying Gmail account at GRC, not their alias account, which is the one that's you know, shown in the email from header of their email. So some people were going over to the GRCcom slash mail page and putting in their you know their account name and their own domain, even though it's a front for Gmail, it turns out that the mail that they send is actually comes from Gmail. So so that was not an account that we'd ever seen before, and so so their mail was bouncing. As soon as I understood what was going on, I added a little comment on the form, just to say, you know, for Gmail people that was like by far the majority of users who were having a bounce problem. That that was what they had to do and that problem went away. So people are paying attention to that.

Also, anyone using an anonymizing email service will have a problem. I received an email from a listener who was using the simple login email, an email from a listener who was using the Simple Login email anonymizing service by Proton, which, by the way, appears to be a very nice service. When that listener sent email to GRC, the sender's email was this bizarre, long, one-time 54-character random account name in front of the at simple logincom domain name. So again, grc's filter had never seen that before, probably we'll never see it again, and it bounced that mail back. So we're not compatible. Our approach is not compatible with email anonymizing services, and I didn't mention it last week, but I actually have, at the GRCcom slash mail page, what I called the prime directive, which is nobody will ever get mail from us that they don't want. I mean and I'm serious about that we will also never divulge anyone's email address. I, since sending email is a pain, you know, please unsubscribe if you're ever not happy, and so forth. Anyway, to make a long story short, our listeners love this simple solution. You just register one time, you optionally subscribe to whatever announcement lists if any you may wish, and then, from then on, you can simply send email to securitynowatgrccom.

I have been overwhelmed with notes of thanks and congratulations from listeners and people I've never heard from before, who were never going to sign up to Twitter just to maybe send me a note. And, in fairness, twitter is about so much more than that, you know. It's about building a community and a following and and following people and networking. Um, I had been just using it as a point to point instant messaging service, which, after all, is exactly what email is. So, anyway, needless to say, as I said, I will never share anyone's email address.

Oh, and I did want to say if somebody writes to me, I will never share your email address when I share your feedback and anyone requesting anonymity for their name, of course I will honor that. Requesting anonymity for their name. Of course I will honor that. Now I should mention and Leo, I remember you mentioning this too when we first talked about it One of the nice things about GRC's now retired web form was that it solicited our listeners' location and it was nice being able to include that when sharing feedback. Uh, you know, since it, it made it the email feel a bit more personal. So if you happen to think of it, let me know where you're writing from when you send me a note and I'll just sort of toss that in when I, when I share your feedback, I'm wondering.

0:23:40 - Leo Laporte
you said it has to have the same domain as the server, but you're smart, so most email clients will let you choose a personality that says so. For instance, I might be running on Gmail, but my email is. I would like it to be leo at leovillecom. I can choose leo at leovillecom as my personality in Gmail and, even though it's originating from the Gmail server, it should look to you, to your server, like leo at leoville. Um, you don't look at the underlying outbound server, do you? Or maybe you do, yes?

0:24:13 - Steve Gibson
I actually do, instead of just the, the, the email address.

0:24:17 - Leo Laporte
It's the reply to address. In other words yeah, the, the.

0:24:20 - Steve Gibson
The problem is the reply to address is trivially spoofable, of course, and so I wanted something that is a little less spoofable. I have a thread that I've not yet caught up in, over in the news groups to do some brainstorming about whether I ought to change that, because it would be easier if I just used the from address, and I'm not sure that it really matters, because any spammer could certainly be be spoofing the receipt to address as well. So I may rethink that and and and change that, just to make it a little bit easier but that's.

0:24:56 - Leo Laporte
That's a good advisory. You have to use the email address that is. With that, your server provides, as opposed to it, personality, any identity that you use, correct.

0:25:07 - Steve Gibson
And we ran across that with Gmail people and also, as I mentioned, simple login people who it's an anonymizing service from Proton. They also had to do that, but really, after I explained it, we stopped having any more problems with signups. It we stopped having any more problems with signups. So my current work this moment, like this evening, is to finish up automating and catching real-time email bounces so I can immediately inform someone when GRC is able to detect that it was unable to successfully deliver their authentication loop email. Once that's in place, I'll stick my toe in the water to begin actually sending email in. You know today's spam conscious climate, it's you got to be careful, and so we'll ramp up from there. So, anyway, I wanted to thank everybody for their support. You know everyone's interest is the reason I became convinced that we need to keep this going past 999. And you know, here we are already at 977, with our 20th birthday coming up in August.

0:26:18 - Leo Laporte
Yeah, see, yeah, yeah. Old doesn't mean in the way. Yeah, old doesn't mean in the way.

0:26:24 - Steve Gibson
While I was writing the note above, yesterday, I received an email alert from Troy Hunt's have I Been Pwned? Email breach monitoring service. The email subject was 16 emails on GRCcom have been pwned in the Telegram combo lists. Data breach. Okay, the breach occurred one week ago, on May 28th. In the breached data get this Leo 361,468,099 email accounts were found and HIBP you know, have I been pwned sent this email billion rows of data with 361 million unique email addresses, usernames, passwords and, in many cases, the website they were entered into.

0:27:55 - Leo Laporte
Does Troy email every one of those addresses? How did you get that he must right? Or do you sign up for some? No, no.

0:28:04 - Steve Gibson
Yes, so I subscribed to domain wide free. It doesn't cost anybody, so I would recommend this. It's domain wide, so you would, you know, do leovillecom and twittv and and so, and then you have to prove ownership of the domain and once you do, any time Troy gets a hold of any new breach data, he'll scan the email addresses in the breach content and then notify you of any hits, which may be one of your active email addresses having just been disclosed. Okay, so, he said, in this case, the data contained from this telegram combo lists data breach 122 gigabytes across 1,700 files with email addresses, usernames, passwords and, in many cases, the website they were entered into. He said the data appears to have been sourced from a combination of existing combo lists and InfoStealer malware, and we'll be hearing a little bit more about InfoStealer malware, because that comes up when we're talking about recall again. I went over after I received this email from him to see whether any of those 16 addresses which HIBP reported were of concern. Ok, the short version is none were. Were greg at grccom and offices at grccom, neither of which we have used for decades?

I once watched a spammer's server connect to GRC's email server and just run down a list of first names, just you know. You know Abigail at GRCcom, you know Amantha at GRCcom, and so forth, a through Z, hoping to get lucky. Immediately after that we retired our original and you know, oh so very innocent use of our first names for email. That just became impractical. The wonderful open source email server I've been using for years is known as HMailServer. Anyone looking for an utterly solid, feature-packed, no-nonsense, free, windows-hosted email server should look no further. There really is nothing comparable. I know lots of people run, you know, sendmail and PostFix and so forth over on Linux and I get that. Those are certainly mature platforms too. For Windows. Hmailserver HTML server. It's another of those rare software creations that has no bugs. Just like John Dvorak gets no spam, this thing has no bugs.

The only time it's been updated for years is to keep up with improvements in the Open SSL library which it uses to make its TLS client and server connections. And in fact I updated it just last week after many years of trouble-free service, only to obtain support for TLS 1.3, which I did not have in my previous instance, and remember which I did not have in my previous instance, and remember 1.2 appears to be fine. You know that 1.3 exists. It's real. People should support it. But 1.2 ain't going away anytime soon because it's still. What is it? 86% of connections or something like that, percent of connections or something like that?

Anyway, hmail server has a dynamic block list feature that will block, for a configurable period of time, any remote server by IP address that attempts to deliver email to any non-existent address, in my case at GRC. I just checked the server when I was writing this yesterday. I currently have the block list expiration set for two hours and at the moment I checked, 473 individual IP addresses were currently being blocked being blocked. So within the previous two hours, 473 different spamming SMTP servers had connected to GRC and attempted to send spam, not to actually, you know, not even to any valid email address, but just to throw crap at the wall, hoping to get lucky. Now, grc has been around a long time. The domain is well known, but we're certainly not particularly high profile, and it so saddens me, leo, to see sadly, I mean really what a sewer our beloved Internet has become. I'm unsure what it teaches us about humanity, but I'm pretty sure I don't want to know. Yeah.

0:33:32 - Leo Laporte
I think it just reflects humanity. That's the problem.

0:33:35 - Steve Gibson

0:33:35 - Leo Laporte
As we go along, it's more and more like the people who make it.

0:33:38 - Steve Gibson
Yes, the trifecta of the Internet being anonymous, global and free those three things enables every last miscreant on earth to attempt to have their way with everyone else. Fortunately, the rest of us are far from powerless and we have this podcast to help us stay ahead of the tidal wave of incoming crap that's out there pounding on the door trying to get in. You know we're not going to let any of that in. No, Okay, Okay. So I want to talk about a new supply chain attack vector, but let's take a break first, and then we will get into some security news of the week All right, I think you should write a manifesto, Steve.

0:34:31 - Leo Laporte
We're mad as hell and we're not going to take it anymore.

0:34:36 - Steve Gibson
Well, we're going to hide behind our NAT routers and hope that all that junk out there I mean come on 473 servers just hooking up to GRC in the course of two hours.

0:34:50 - Leo Laporte
It's mind-boggling, isn't it?

0:34:53 - Steve Gibson
It's just amazing, it's really sad.

0:34:56 - Leo Laporte
It's the world we live in, I'm sorry to say. Well, you know what One good thing about doing this show is? Because you focus on all this stuff. We have the best sponsors when it comes to security, right? They flock to us. In fact, we talk to people all the time and say, hey, can I be on security now? And most of the time I'm happy to say we have to say no, it's sold out for the next quarter.

This portion of the show brought to you by Collide. Now, if you use Okta and I hope you do, because it's a really good authentication technology you ought to know about Collide. Collide is for companies that use Okta and it does the second half of the authentication process. Okta ensures that the person is who they say they are right. You know your DevOps engineer Collide piggybacks on it and makes sure that that guy or gal's devices and software are secure too right. Just, you know, letting this person in willy-nilly without checking their devices is just heading for trouble.

Maybe you've heard me talk about Collide before. I hope you've thought about it. You might have also heard the latest news that Collide was just acquired by 1Password. Now, that's a good partnership. Both companies are focused on leading the industry in creating security solutions that are user-first. That's really important. For over a year, collide Device Trust has helped companies, with octa, ensure that only known and secure devices can access their data. It has used users as part of your security team to help you make sure that your stuff is safe. They're still doing all of that now. They're just part of one password. That means more resources and an even greater focus on the job at hand.

So if you've got octa and you've been meaning to check out Collide, this would be an excellent time. Don't be put off that. It might be hard to set up. In fact, it's very easy. It comes with a library of pre-built device posture checks all the stuff you're going to want, you know, up-to-date operating system, up-to-date browser, all the obvious things. But then it's very easy for you to write your own custom checks for specifics to your business or to your users Anything you can think of, really. Oh, here's another great thing about Collide it doesn't require MDM, so that means you can use it on your Linux fleet, your contractor devices and just about every BYOD phone and laptop in your company. You don't want to leave any gaps right Now that Collide's part of 1Password.

It's just going to get better. This is the time to check it out. As Steve said, the Internet is full of crap and Collide will keep it off your Internet. Collide K-O-L-I-D-E dot com slash security now Go there, learn more. Watch the demo today. They still call it an intranet. Is that an old-fashioned yeah? I mean you know now a lot of the enterprise stuff I see. They talk about your apps, your data. Because of the cloud, it's not just inside the walls of your business anymore, it's everywhere. You need KOLIDE K-O-D-E dot com slash security now.

0:38:04 - Steve Gibson
Thank you, collide, for being such great supporters of Steve's all this time All right, mr G on, we go with the show and speaking of what a sad mess the greater Internet has become, yes, and of not letting any of that mess into our lives. One of our listeners, terrence Cam, mess into our lives. One of our listeners, terrence Cam, pointed me to a recent piece in Bleeping Computer titled Cybercriminals Pose as Helpful in air quotes Stack Overflow Users to Push Malware. Okay, now for those who have never encountered it. Stack Overflow is a forum community of developers of widely ranging skill. It's essentially a place where coders can help one another. When I've been struggling with a programming problem, such as when I was working to get server-side on-the-fly code signing to work remotely with a certificate stored in an HSM, which, as far as I know, no one has ever done before, the Stack Overflow site would often be listed among Google's search results, and I'm a member there, since I've enjoyed answering questions and giving back when I can. So Bleeping Computer writes Cybercriminals are abusing Stack Overflow in an interesting approach to spreading malware answering users' questions by promoting a malicious PyPy package that installs Windows information-stealing malware.

Sonotype researcher Ax Sharma, who's also a writer at Bleeping Computer, discovered this new PyPy package is part of a previously known cool package campaign named after a string in the package's metadata that targeted Windows users last year. This PyPy package is named PyToiler and was uploaded by threat actors to the PyPy repository over the weekend Claiming to be an API management tool. Malicious packages like this, they write, are usually promoted using names similar to other popular packages, a process we've talked about before, known as typosquatting. However, with this package, the threat actors took a more novel approach by answering questions on Stack Overflow and promoting the package as a solution. As Stack Overflow Bleeping Computer writes is a widely used platform for developers of all skill sets to ask and answer questions. It provides a perfect environment to spread malware disguised as programming interfaces and libraries. Sonotype's Ax Sharma said in their report excuse me quote we further noticed that a Stack Overflow account it had a nonsense name of E-S-T-A-Y-A space G, created roughly two days ago, is now exploiting the platform's community members who are seeking debugging malicious package as a solution again in air quotes to their issue, even though the solution is unrelated to the questions being posed by developers.

In this case, the PyToiler package contains a setuppy you know Python file that pads, a base 64 encoded command which executes with spaces, so that, unless you enable word wrapping in your IDE, you know, your integrated development environment or text file editor this base64 blob will be pushed all the way out past the right margin and off screen so you'll never see it. When that blob of base64 is deobfuscated, the command will download an executable named runtimeexe from a remote site and run it. They write history, credit cards and other data from the user's web browsers. It also appears to search through documents for specific phrases and, if found, steals the data in them as well. All of this information is then sent back to the attacker, who can sell it on the dark web markets or use it to breach further accounts that are owned by the victim, they said.

While malicious PiPi packages and information stealers are nothing new, the cyber criminal strategy, now to pose as helpful contributors on Stack Overflow, is an interesting new approach, as it allows them to exploit the site's trust and authority within the coding community. This approach serves as a reminder of the constantly changing tactics of cybercriminals and, unfortunately, illustrates why you can never blindly trust what someone shares online. Instead, developers must verify the source of all packages they add to their projects and, even if it feels trustworthy, check the code. And they said, with WordWrap enabled for unusual or obfuscated commands which will be executed. I have a picture in the show notes of the window and you can see where there is a Python class named install command and then a definition of run which is going to print something, and then you can see a big bunch of white space. Well, that's all spaces that will push this huge green blob of base 64 encoded code far off to the right, so that if someone did not have WordRap enabled, they'd never see this. They would look at it and go, huh, well, okay, I don't quite get what it's doing, but looks fine, nothing bad there it's doing, but looks fine, nothing bad there when in fact, there is a big blob of badness which the exec function will de-obfuscate and then run. So anyway, I'll just note that before the end of today's podcast, the security researcher Kevin Beaumont is going to show us, despite Microsoft's claims to the contrary, that the database underlying Microsoft's new recall system can in fact, be exfiltrated remotely, does not require system privilege and can be accessed by any other user on the same machine. Can be accessed by any other user on the same machine. That means that recalls SQLite database is 100% vulnerable to exactly this sort of info stealing malware. So it's not, like Microsoft has done, created some miracle that is going to protect this database, and we'll be talking about more of that in a minute.

So in other news, we have another certificate authority in the doghouse. Google has announced that it will be removing its trust of all new TLS certificates issued by the Austrian certificate authority, global Trust. Rather than yanking Global Trust's root certificate, which would invalidate all previously issued Global Trust certs, google will be using a recently added new feature that allows it to manage certificate trust based on certificate issue dates. So Chrome will not be trusting any new certificates issued by Global Trust after the end of this month, june 30th. Now, through the nearly 20 years of this podcast, we have seen and discussed a range of misbehavior on the part of those who have been given the privilege of essentially printing money. Certificate authorities charge their customers hundreds of dollars in return for encrypting a hash of a small block of bits that the customer presents. But in return for this money printing privilege, the CA must abide by a significant code of conduct. When that code is broken, and only after bending over backwards with more than ample warnings, the industry can, and has summarily withdrawn its trust from the signatures of those CAs on the grounds that if the CA cannot be trusted, neither can anything they have signed. In this case, global Trust has established a multi-year well established is an interesting choice of my words a multi-year history of misconduct, and they've lost the trust of the industry. Google will be enforcing a ban retroactively on all Chrome versions down to 124. So lots of previous Chrome versions. I don't know who would not be keeping their version of Chrome up to date, but okay. And the other browser makers have not yet announced a similar decision. Although Mozilla appears to be aware of the problems with global trust and is concerned, on the other hand, since no customer would purchase a certificate for a web server which anyone visiting with Chrome would be unable to connect to securely, this immediately puts Global Trust out of the business of selling web server certificates. In other words, whether or not Apple and Mozilla should choose to follow, whether or not Apple and Mozilla should choose to follow, global trust is done, for now at least, on the TLS web server certificate business. They may be selling lots of certificates for other purposes, but not for any Chrome browsers in the future.

Those of us who have been around since the dawn of the Internet will likely remember the first successful instant messaging app known as ICQ it was meant to be short for I seek you originally developed back in 1996 by an Israeli company named Mirabilis Mirabilis. Yeah, anyway, two years later, mirabilis Okay right, mirabilis Mirabilis. Two years after it was created, it was acquired. Icq was created by AOL in 1998. And then by the Russian Mailru group in 2010. It had a neat kind of funky flower petal logo and I've sort of thought of it like through the years, wondering whatever became of it. At its peak around 2001, it had more than 100 million accounts registered and nine years later, when AOL sold it to Mailru, it had around 42 million daily users, and it has been puttering along in the background ever since. Two years ago it had dropped to around 11 million monthly users. And finally, the reason the subject came up is that a week and a half ago, on May 24th, the website of icqcom announced that the service would be shut down about three weeks from now, on June 26th, 2024. So it had a pretty good 28 year run for an instant messaging service that was largely passed by, you know, when smartphones and other major social media service got into the game, but it was there from the beginning and kind of cool game. But it was there from the beginning and kind of cool.

Okay Now, completely off topic, but this has been something that I've been wanting to just make sure everybody knew about for a while. My wife recently agreed to join me in watching one of my favorite science fiction movies of all time. We know I'm a pushover for science fiction, but unfortunately far more horrible science fiction movies have been made than good ones, and even more rare is the perfect science fiction movie. Even more rare is the perfect science fiction movie. So we settled down to watch Deja Vu which stars Denzel Washington.

0:51:53 - Leo Laporte
I feel like I've seen it before.

0:51:56 - Steve Gibson
You probably have Leo, it's not new and yes, I get your. Okay, just checking. Actually, I don't feel like I've ever seen it.

0:52:06 - Leo Laporte
I don't usually think of Val Kilmer and Denzel Washington as being sci-fi stalwarts.

0:52:11 - Steve Gibson
Oh, leo, okay so, listen, okay so Denzel Washington, val Kilmer and some other recognizable actors from Hollywood's inventory. As I was watching it for maybe the fourth time, I kept thinking over and over, as I was watching this perfectly and often leisurely paced two-hour movie unfold scene by scene, and everything was happening exactly the way it should that I was sitting here watching one of the all too rare perfect movies Perfect script and a plot that's both surprising and where what happens is better than than someone steeped in science could have ever hoped for. The writers enlisted the help of Brian Green, a Cornell and Columbia University physicist, to get the science right, and boy did they. You know, that's part of what's so gratifying about this movie. Now, as I said, it's not a new movie. It was released 18 years ago, back in 2006. But it stands up and it feels 100% contemporary.

I realized that since this podcast is closing in on its 20th birthday. Every time I've seen this movie, I've done this podcast a few days later, yet somehow I have never thought to mention it. I searched our transcripts and there was no mention of it. So you know that's my bad and that's fixed now. I know quite well that not everyone's taste is the same. Not everyone will feel as I do about this, but if you don't already know this movie and leo, I guess you don't lisa says she's seen it, so it'll be deja vu for me.

0:54:21 - Leo Laporte
It is just so good, I can't wait. Oh my goodness, I'm watching it tonight. I need something to watch.

0:54:35 - Steve Gibson
It is wonderful sci-fi. I love Denzel, of course, and yes, I do too, and it will not disappoint you.

0:54:44 - Leo Laporte
Okay, Thank you. Finally something to watch tonight.

0:54:49 - Steve Gibson
And let's take another break, okay, because we've got two left and I want to do one before we start talking about recall first word from our sponsor, the fine folks at z scaler, the leader in cloud security.

0:55:03 - Leo Laporte
You, I'm sure, know the name z scaler the z is for zero trust. It's no surprise that cyber attackers these days are now using AI in creative ways. If you think about that Stack Overflow hack you just talked about, imagine. We know that AI has ingested a bunch of stuff from Stack Overflow, so a lot of people who are using AI to help them code might well get that attack in their AI. Bad guys are using it to compromise users and breach organizations from high-precision phishing emails, and you've also seen this.

This is torn from the headlines, deep fakes of both video and voice. You saw the poor financial guy who thought he was at a Zoom meeting with the CFO and the CEO of his company. Looked and sounded just like them. They said cut us a check for $25 million, send it to this address. He did. It was a deep fake. He was completely fooled.

In a world where employees are working everywhere, where apps are everywhere, data is everywhere, firewalls and VPNs you know the way we used to log into the company network is through the VPN. It's just not working anymore. It's not protecting you, in fact, because they weren't designed for the distributed environments, and these modern AI-powered attacks, firewalls and VPNs have often become the attack surface we talk about on the show right here. In a security landscape where you have to fight fire with fire, fight AI with AI, the best AI protection comes from having the best data. Get this. Zscaler has extended its zero-tr trust architecture with powerful AI engines that are trained and tuned by 500 trillion signals every day. 500 trillion signals every day. That means their finger is on the pulse of what's happening in the world right now, in a security landscape where you are being constantly bombarded by new attacks no one's ever heard of that's vital.

Zscaler and Zero Trust Plus AI helps defeat attacks from AI and others today by enabling you to automatically detect and block advanced threats Even before anybody's ever heard of them. Right. Discover and classify sensitive data your data everywhere. Generate user-to-app segmentation to limit lateral threat movement. Quantify risk, prioritize remediation and it's handy, you need it. Generate board-ready reports so you can explain what's going on. Learn more about Zscaler Zero Trust Plus AI to prevent ransomware and other AI attacks while gaining the agility of the cloud. Experience your world secured. Visit zscalercom slash zero trust AI. That's zscalercom slash zero trust AI. We thank him so much for supporting security now and the good work that Steve is doing right here. Steve on the show. On with the show.

0:58:14 - Steve Gibson
Yes, so our listener, jeff Price. He wrote and said Leo touched on this, but Fastmail allows you to create these unique, random email addresses. What most people forget is Apple lets you create these as well. They call it hide my email. So I just wanted to share Jeff's note, since I have the feeling email aliasing services are going to become increasingly popular as websites turn to collecting and sharing whatever they can about their visitors as a means of increasing their advertising revenue. You know, as third-party cookies and as Google tries to promote their sandbox anti-tracking technologies.

Kirk Sexton wrote Hi Steve, great work on the new email system. I never miss a show. I listen on my morning runs and in the car on my way to work. Sometimes I have to run a little further or sit in my car for a few minutes longer after arriving, so I don't interrupt a point before hitting pause. I may have missed this point, but I don't recall hearing anything about those users who sync their accounts on Microsoft OneDrive or, for that matter, use other cloud-based backup services.

And he's talking about recall. He says backing up files is one thing. It would be expected that anything committed to local storage will be backed up to the subscribed cloud storage, however temporary information that is used just for the moment will now be stored locally Think passwords, credit cards or other sensitive information within the screen grabs. Microsoft has said it will only be stored locally, but what about cloud syncing with OneDrive or other services? I see it as the problem just mushrooming into multiple attack vectors. Am I missing something? And he finished to 999 and beyond all the best, kirk Sexton. So Kirk raised a great point. I think we're about to spend the rest of the podcast looking at what one security researcher found and also about what may be Microsoft's significantly greater plan beyond what they've announced. But everything we now know suggests that the recall data are just SQLite files stored under the user's app data directory in a new folder called Core AI Platform. Microsoft has indicated that BitLocker will be used to encrypt the data at rest, but online backups are made of live, unencrypted data so that they can later be retrieved. So that they can later be retrieved, and there's nothing we know so far that would prevent anything that was backing up a user's machine from also backing up their machine's recall history. So you know, there just seems to be so many things that have not been well thought through here.

Okay, and then just one piece of feedback. I'm way far behind. Just so everybody knows that the first week of listener feedback email was intense, with many listeners, you know, wanting to say hi, to express their happiness. There's now a way to send me thoughts without engaging in social media. So yeah, as I said, I'm way behind, but I figured I'd share one piece of feedback. That's primarily about a Spinrite owner's experience, first with Spinrite 6, or by comparison with Spinrite 6, and then with 6.1.

Our listener, mark Jones, sent email with a subject Wow, spinrite 6.1 is amazing. He wrote Dear Steve, long-time listener, occasional source of feedback. He says I was at MJPhD on Twitter. I'm so happy to be using email. I only kept my ex-account for SecurityNow feedback. He said I've listened to you discuss both the speed of 6.1 and the magic it does on an SSD.

Ever the experimentalist. I thought I would put it through its paces. I have two drives a 1TB spinner and a 250GB SSD that seemed to have slowed, ssd that seemed to have slowed. The results are nothing short of remarkable on both drives, in only four hours the one terabyte was rejuvenated. That would have taken days using Spinrite 6. The boot into Windows 10 is now seconds instead of minutes and the random slowdowns that were plaguing the system are gone. The real miracle was on the SSD. The new drive test showed I was at 19 megabytes at the front and middle and 80 megabytes per second at the end. So 19 front and middle, 80 megabytes at the end. The whole drive is now over 546 megabytes per second after a level three scan. Saying computer performance has returned feels inadequate it's mind-blowingly fast compared to yesterday. Adequate it's mind-blowingly fast compared to yesterday. Truly amazing. Thanks for the great work and I'm happy there will be a future past 999. Regards, mark Jones. Okay, so let's talk about recall again, because we have additional information and, leo, I'll find a point to pause here for our final Okay.

So I think that a data-driven theory about Microsoft's future plans for this technology emerged after I read a recent posting by a well-known and well-informed security researcher named Kevin Beaumont. Since last week's episode, which I titled, as we know, the 50-gigabyte privacy bomb, kevin, whom we often quote and refer to, has again weighed in on Microsoft's new recall facility. His first posting on the subject, which he made on May 21st, immediately following Microsoft's announcement, was titled how the New Microsoft Recall Feature Fundamentally Undermines Windows Security. As a mature, seasoned and experienced security researcher. His immediate what-could-possibly-go-wrong reaction to the idea of having Windows continually recording and storing our PCs' screens echoes my own. It's immediately obvious to anyone who's been around the block a few times that this is indeed a 50-gigabyte privacy bomb. What wasn't clear to me until just yesterday was why Microsoft may be doing this and what they probably have planned for the future. We'll get to that. Ever since his immediate posting in reaction to the announcement of recall, kevin has been playing with it.

After reading what Kevin wrote, a light bulb went off for me. So I'm first going to share Kevin's follow-up piece, which further describes recall in much more detail. Then I'll share what I think it really means. Then I'll share what I think it really means. Kevin titled his follow-up piece, which he posted four days ago after spending a week and a half with Recall quote stealing everything you've ever typed or viewed on your own Windows PC is now possible with two lines of code Inside the Copilot Plus plus recall disaster unquote. Ok now, before switching into Q&A mode, which he, in the words of Microsoft CEO Sachin Nadella, takes screenshots of your PC constantly and makes it into an instantly searchable database of everything you've ever seen. As he says it is a photographic memory of your PC life. I got hold of the Copilot Plus software and got it working on a system without an NPU about a week ago and I've been exploring how this thing works in practice, so we'll have a look into that shortly.

First I want to look at how this feature was received, as I think it is important to understand the context. The overwhelmingly negative reaction has probably taken Microsoft leadership by surprise. For almost everyone else it wouldn't have. This was like watching Microsoft become an Apple Mac marketing department. At a surface level, it is great if you're a manager at a company with much to do and too little time, as you can instantly search what you were doing about a subject a month ago. In practice, that audiences needs are a very small tiny in fact, portion of windows overall user base and, frankly, talking about screenshotting the things people in the real world, not executive, are doing is basically like punching customers in the face. The echo chamber effect inside Microsoft is real here and oh boy, just oh boy.

It's a rare misfire, I think Kevin wrote. He said I think recall is an interesting, entirely optional feature with a niche initial user base that would require incredibly careful communication, cyber security, engineering and implementation. Copilot plus recall does not have any of these. The work has clearly not been done to properly package it together. A lot of Windows users just want their PCs so they can play games, watch porn and live their lives as human beings who make mistakes that they don't always want to remember, and the idea other people with access to the device could see a photographic memory is very scary to a great many people. On a deeply personal level, windows is a personal experience. This shatters that belief. Okay now, I thought Kevin's take on this was interesting His observation that Microsoft appears to be oblivious to the fact that not all users of PCs are even close to being the same, that a manager in a corporate environment might indeed find it useful to be able to look a month back for some specific work subject, but that for the common user, the rest of us, the idea that our machines are watching and recording everything we do, even if it would only be for our own later access, is mostly just creepy.

You know, we don't know the future. We don't know what's going to happen a month or two from now. But recall, we make what's happening on our machines now available to that unknown future. Anyway, kevin finishes his lead in by writing. I think they're probably going to set fire to the entire co-pilot brand due to how poorly this has been implemented and rolled out. It's an act of self-harm at Microsoft in the name of AI and, by proxy, real customer harm. More importantly, as I pointed out at the time, this fundamentally breaks the promise of security in Windows. I'd like to now detail why he said strap in. This is crazy. I'm going to structure this as a Q&A with myself now, sourced from comments I've seen online, as it's really interesting seeing how some people hand-wave the issues away.

Okay, so now Kevin switches into Q&A format. He asks himself a question. So the question is someone's saying well, the data is processed entirely locally on your laptop, right? Answer yes, they made some smart decisions here. There's a whole subsystem of Azure, ai etc. Code that processes on the device. Okay, question cool.

So attackers and malware can't access it? Right? And he says no, they can, but it's encrypted. When you're logged into a PC and run software, things are decrypted for you. Encryption at rest only helps if someone comes to your house and physically steals your laptop. That's not what criminal hackers do, for example, infostealer Trojans which automatically steal usernames and passwords, have been a major problem for well over a decade Now. These can be easily modified to support recall.

But the BBC said data cannot be accessed remotely by hackers. They were quoting Microsoft, but this is wrong. Data can be accessed remotely. This is what the journalist was told for some reason. And then he has a snippet from the journalist that says that is what Microsoft told me, that attackers would have to get physical access to your laptop and sign into it to get hold of the screenshots. Kevin says not true. The questioner says Microsoft say only that user can access the data. Kevin, that is not true. I can demonstrate another user account on the same device accessing the database.

Okay, the question so how does this work? Kevin answers every few seconds screenshots are taken. Kevin answers ever viewed on your PC. In plain text, ocr is a process of looking at an image and extracting the letters. Question what does the database look like? And Kevin shows some screenshots like those that we saw last week, just looking like, you know, a SQLite database with rows and columns, recognizable file names. Question how do you obtain the database files? Answer they're just files in app data in the new core AI platform folder but it's highly encrypted and nobody can access them, right of two Microsoft engineers accessing the folder.

And then Kevin quotes an earlier Mastodon post of his at CyberPlacesocial where he notes that the risky business episode on recall is good, but with one small correction Recall does not need system rights. He notes that since it's just a SQLite database it is trivial to access. And he finishes by saying I'm not being hyperbolic when I say this is the dumbest cybersecurity move in a decade. Good luck to my parents safely using their PC. Questioner but normal users don't run as admins. Answer according to Microsoft's own website, in their recall rollout page they do. And then he has a snippet from Microsoftcom where it says making admin users more secure. Most people says Microsoft run as full admins on their devices, which means dot dot dot. So Kevin says in fact you don't even need to be an admin to read the database. More on that in a later blog Question.

But a UAC prompt appeared in that video. But a UAC prompt appeared in that video. That's a security boundary. Kevin replies according to Microsoft's own website and MSRC, uac is not a security boundary. And he quotes Microsoft saying more important same desktop elevation in UAC is not a security boundary. It can be hijacked by unprivileged software that runs on the same desktop. Same desktop elevation should be considered a convenience feature. So now Microsoft is saying, oh well, you know, that's just for convenience. So the questioner asks so where's the security here? Answer they've tried to do a bunch of things but none of it actually works properly In the real world due to gaps. You can fly a plane through. Question does it automatically not screenshot and OCR things like financial information? No, we know that it does.

How large is the database? Kevin says, and here was one of the first ahas that hit me. Kevin says it compresses well, several days working is around 90 KB. Nine zero kilobytes for several days of work. He said you can exfiltrate several months of documents and key presses in the space of a few seconds with an average broadband connection. Question how fast is search? He says on device is really fast.

Question have you exfiltrated your own recall database? Yes, I have automated exfiltration and made a website where you can upload a database and instantly search it. I am deliberately holding back technical details until Microsoft ship the feature as I want to give them time to do something. He said I actually have a whole bunch of things to show and I think the wider cyber community will have so much fun with this once it's generally available. But I also think that's really sad, as real world harm will ensue.

So question is what kind of things are in the database? Everything a user has ever seen, organized by application, every bit of text the user has seen, with some minor exceptions. He says, for example, microsoft Edge in private mode is excluded, but Google Chrome isn't. He said every user interaction and, for example, minimizing a window. There is an API for user activity and third party apps can plug in to enrich data and also view stored data. Well, that's news and interesting. He says it also stores all websites you visit, even if third party. Question if I delete an email WhatsApp Signal Teams message, is it deleted from recall? Nope, it stays in the database indefinitely.

Question Question Question Question Question Question Question Question Question Question Question Question Question Question Question Question Question Question Question Question Question Question Question Question. Like an info stealer at present, they will automatically scrape things like credential stores At scale. Hackers scrape rather than touch every victim because there are so many and resell them in online marketplaces. Recall enables threat actors to automate scraping everything you've ever looked at within seconds While testing this with an off-the-shelf info stealer. He said I used Microsoft Defender for endpoint, which detected the off-the-shelf info stealer, but by the time the automated remediation kicked in, which took over 10 minutes, he notes my recall data was already long gone. Question does this enable mass data breaches of website? Yes, the next time you see a major data breach where a customer data is clearly visible in the breach, you're going to presume the company who processes the data is at fault. Right, but if people have used a Windows device with recall to access the service app, whatever hackers can see everything that the people offering the service have seen, that the people offering the service have seen, he said, and assemble data dumps without the company who runs the service even being aware. The data is already consistently structured in the recall database for attackers, so prepare for AI-powered super breaches.

Currently, credential marketplaces exist where you can buy stolen passwords. Soon you'll be able to buy stolen customer data from insurance companies, etc. Because all code required to do this has been pre-installed and enabled on Windows by Microsoft Microsoft. So did Microsoft mislead the BBC about the security of Copilot? Yes, have Microsoft misled customers about the security of Copilot? Yes, for example, he says they describe it as an optional experience, but it is enabled by default and people can optionally disable it.

That's, kevin says, wordsmithing. Microsoft CEO referred to screenshots in an interview about the product, but the product itself only refers to snapshots. A snapshot is actually a screenshot. It's again wordsmithing. For whatever reason, microsoft just need to be super clear about what this is so customers can make an informed choice. Of course, I need to note here that the tyranny of the default will be at work. We know that whatever is the default setting is what 99.99% of all Windows users will leave active.

I don't know if any of you have seen people using Windows computers, but for some reason they always leave those stickers all over the keyboard and I just I can't believe it. It's like you realize the computer will still work if you peel those stickers off the keyboard. You don't need to be advertising the crap that came from the manufacturer. But anyway, the tyranny of the default. So question recall only applies to one hardware device. Kevin replies that's not true. There are currently 10 Copilot Plus devices available to order right now from every major manufacturer. Additionally, Microsoft's website says they're working on support for AMD and Intel chipsets. Recall is coming to Windows 11.

How do I disable Recall An initial device setup for compatible CoPilot Plus devices out of the box. You have to click through options to disable recall. In enterprise, you have to turn off recall as it is enabled by default. What are the privacy implications? Isn't this against GDPR? Kevin replies Corporate point of view. Organizations should absolutely consider the risk of processing customer data like this. Microsoft won't be held responsible as the data processor as it is done at the edge on your devices. You are responsible here. The question are Microsoft a big evil company? Kevin?

1:24:47 - Leo Laporte
no, hell. Yes, that's insane.

1:24:51 - Steve Gibson
That's insanely reductive. He says they're super smart people and sometimes super smart people make mistakes. What matters is what they do with knowledge of mistakes. So question aren't you the former employee who hates Microsoft? Kevin says no, I just wrote a blog this month praising them. It was breaking down Microsoft's pivot to placing cybersecurity as a top priority. My thoughts on Microsoft's last chance saloon moment on security. So we have a couple, just two more Question is this really as harmful as you think? Answer go to your parents' house, your grandparents' house, etc. And look at their Windows PC. Look at the installed software in the past year. Try to use their device. Run some AV scans.

There's no way this implementation does not end in tears. There's a reason there's a trillion-dollar security industry and that most problems revolve around malware and endpoints. What should Microsoft do? Answer in my opinion, they should recall, recall and rework it to be the feature it deserves to be delivered at a later date. They also need to review the internal decision-making that led to this situation. This is you know. He says this kind of thing should not happen. Earlier this month, microsoft CEO emailed all their staff saying, quote if you're faced with the tradeoff between security and another priority, your answer is clear Do security? He said we will find out. If he was serious about that email, they need to eat some humble pie and just take the hit now or risk customer trust in their co-pilot and security brands. Frankly, few, if any, customers are going to cry about recall not being immediately available, but they are absolutely going to be seriously concerned if Microsoft's reaction is to do nothing, ship the product slightly, tinker or try to wordsmith around the problem in the media.

1:27:25 - Leo Laporte
Seems like a great piece. I mean, I read it, it and I was very impressed and he makes a strong case. The one thing that's a question mark a lot of the things he describes sounded like you had to be on the physical PC. But he says you don't. So malware would be able to escalate the UAC and do all those things, look across accounts, all of that stuff. Okay, so the real issue is if malware gets in your system they've got access to everything you've done Right.

1:27:54 - Steve Gibson
There is now much more that it has access to. Let's take our final break, and then I'm going to talk about what I think is really going on.

1:28:03 - Leo Laporte
Yeah, why would Microsoft do all this? Yep, what's the plan here? I think there is one. Well, first let's talk about our sponsor, melissa, then we'll get to the plan. The final piece of the puzzle is going to fall into place with Inspector Gibson in just a bit, but first a word from Melissa, the data quality experts. They've been doing this since 1985. That's a long time.

In that time, melissa has helped over 10,000 businesses worldwide harness accurate data with their industry-leading solutions. They've processed over 1 trillion address, email, name and phone records and the chances are you've probably used Melissa as an end user on many sites, and that's a good thing. Melissa eliminates mistakes in email and addresses and phone numbers because of fumble-fingered data entry by the end user or by your customer service rep. They can enhance the data you already have to give you valuable additional information. And now Melissa's introduced the Melissa Marketplace a great place to explore a revolutionary data ecosystem. Everything.

Melissa offers premium tools and services for technology and business users alike. The apps and services include business mailing lists and sales leads, where you can maximize your direct marketing, telemarketing and email outreach efforts with quality business email lists, mailing lists and sales Global address database that contains accurate and detailed information on every address Zipstar data. This saves you time and improves data entry by instantly verifying a five-digit zip code at the point of entry. That's just the beginning. There's many tools in this Melissa marketplace. Their global bureau services are ideal for enterprise businesses looking for a trusted data service provider.

Melissa will help you clean and verify existing customer records. That's a big deal. They go bad rapidly over time. People move, phone numbers change, emails change. Melissa can clean and verify it. They'll eliminate duplicate customer records. That's great for a single customer view, eliminating duplicate mailings, helping you focus on the one and only true customer.

You can run Melissa any way you want it on-prem, in the cloud, as a SaaS app. There's an API you can add to your own apps. They even have that great lookups app on iOS and Android. That's free. That lets you play with Melissa. Well, it's not fully playful. I mean you can actually use it to validate phone numbers and email addresses, and all of that. Melissa's got 99.99% uptime. You can add rooftop geocodes, country codes, demographics really enhance the existing contact point.

Melissa's services, of course, make sure your data is completely safe. They use file secure encryption for all file transfers and an information ecosystem built on the ISO 27001 framework. They also adhere to GDPR policies and they maintain SOC 2 compliances. I mean, I can go on and on. You need this. You got to have it. If you're in business, you've got address records. You've got customer databases, supplier databases you need to make sure they're up to date. With Melissa, you can get started today 1,000 records clean for free. Melissacom slash twit. That's m-e-l-i-s-s-a. Melissacom slash twit. All right, steve, you've set us up well. Obviously this is a bad idea, um, but microsoft's going full speed ahead with it.


1:31:42 - Steve Gibson
okay. So we now know that microsoft currently plans to enable this whole PC history recording by default. They also know that unless Windows ships with it enabled and running, no one will use it. So they want to blow everyone's mind by AI enabling Windows PC somehow, and this is what they've come up with. I doubt there's an informed, security-minded technologist anywhere who doesn't think this is a very bad idea. Yet until we learn otherwise, this is exactly what Microsoft intends to do Now.

I have to say I have some personal experience with endeavoring and failing to get Microsoft to change its plans. Can anybody say raw sockets available to the operating system's client software? They ignored me until the MS Blastworm would have taken them off the Internet had it not been targeted at the wrong domain. After that near-death brush with being attacked by an entirely unnecessary feature of their own operating system, xp's Service Pack 3 removed unprivileged access to raw sockets and no one cared. The fact that no one cared demonstrated that the unnecessary feature should have never been present in a consumer OS. Raw sockets never came back because they just begged to be abused. Okay, now I learned my experience from that, or I learned my lesson from that experience. I have no interest in lobbying Microsoft to change its behavior. You know, microsoft is like Godzilla it does whatever it wants to do. All anyone can do is stay out of its way. But what's so odd about this moment where we find ourselves is that they have just made all this noise about how security is now job number one, and Kevin quoted Satya Nadella saying Except they're not, the entire security industry is jumping up and down, waving their arms, saying don't do it, exactly as I once did before with XP.

Yet Microsoft is certain that they know better that the screen is being OCR'd. I strongly doubt that's actually the case, at least not unless an actual JPEG or PNG-style graphic image is being displayed, in which case OCRing the image would be the only choice. As I noted last week, hooking into the Windows API that paints text onto the screen would be far more efficient. Behind every character glyph, what we see on the screen is a 16-bit Unicode character which was rendered through a chosen font and turned into clear, type colorized pixel text. There's just no reason to look at the pixels of a screen that was just rendered from Unicode and try to determine which characters they are. So my assumption would be that the textual output graphic API is being hooked and intercepted by recall. Api is being hooked and intercepted by recall.

It was also very interesting to learn how economical recalls storage is. This makes sense if it's storing and compressing text, since we know how much redundancy exists in linguistic text. Redundancy exists in linguistic text, but Kevin said that several days' worth of work compresses to around 90 kilobytes of database storage. If we take Kevin's several days to mean two, then that's around 45K of storage required per day. That means that 50 gigabytes of storage allocation consumed at the rate of 45K per day would yield 3,042 years worth of storage.

I'm sure we'll learn more going forward, but I don't think recall will be storing the past 90 days of a PC's use. It appears that it will always be recording the PC's entire life of use. That's why the title of Kevin's second post makes far more sense. Title of Kevin's second post makes far more sense. His title began stealing everything you've ever typed or viewed on your own Windows PC, and I think that's exactly what Microsoft is actually planning to do. If they're able to capture and compress all the text displayed on Windows 11 screens, and given the explosion in local mass storage capacity and the efficiency of text compression, they clearly have the storage capacity to capture everything for all time. And this brings us to the title I gave today's podcast A Large Language Model in Every Pot.

Why would Microsoft want to be capturing every single thing a user types and views on their own PC throughout its entire lifetime of use? I have a theory Microsoft wants to make a big splash in AI. So how about using all of that data to train an entirely personal, local large language model? What if a future local large language model was not just used to index and search your PC's history timeline but was continually being trained across your entire corpus of personal data, so that it would be possible to conversationally interact with your own personal AI that has grown to know you intimately because it's been watching and learning everything you've been doing for years. It would know and I have no in air quotes everything you had ever entered into its keyboard and displayed on its screen. The entire history up that machines use would become an ever-growing corpus. This continually training the model. That would completely and profoundly for ever alter a user's interactive experience with their PC. It would be a true game changer. It would be transformative of the PC experience, and if Microsoft has that up its sleeve, I can see how and why they would be super excited about recall, even though recall would be just the beginning about recall. Even though recall would be just the beginning, even if the local large language model technology is not yet ready for delivery, the time to begin capturing all of a user's use of their machine is as soon as possible. That begins creating the corpus that will be used to train a future personal, local large language model.

If this view of the future is correct, there's one large and glaring problem with this, which Kevin highlights and which Microsoft is conveniently ignoring because they have no choice but to ignore it. What Microsoft must ignore is that the actual security of today's Windows is a catastrophe. Microsoft has not been paying more than begrudging and passing attention to security, while they've been busily adding trivial new feature after new feature and never getting ahead of the game. Last month's Patch Tuesday saw Microsoft patching 61 newly recognized vulnerabilities, 47 of them in Windows and another 25 for anyone paying for extended security updates. 44% of those were remote code execution, 11% were information disclosure and 28% were elevation of privilege that Windows would be a safe place to store the data that will be used to drive an entity that can be queried about nearly any aspect of you and your life, which it has observed throughout the entire history of your use of that machine. If this is indeed what Microsoft is planning and having voiced it now, it's difficult to imagine that it's not exactly what they is planning and having voiced it now, it's difficult to imagine that it's not exactly what they're planning then this really is a double-edged sword.

The world stumbled upon the startling power of large language models, which Microsoft just so happens to own a big chunk of, and someone inside Microsoft realized that, by leveraging the power of next generation neural processing units, it would be possible to train a local model on the user's entire usage history of their computer, and that would create a personal assistant of unprecedented scope and power.

I would wager that today the smarter people within Microsoft are wishing that more than anything else, that, instead of screwing around with endless unnecessary features and new unwanted versions of Windows, they had been taking the security of their existing system seriously, because if they had, they would own a secure foundation and would stand a far greater chance of successfully protecting the crown jewels of a user's computer usage legacy. Instead, what they have today is a Swiss cheese operating system that is secure only so long as no one really cares what its user has stored. Depending upon who the user is, the data that will be accumulated by recall will represent a treasure that is certain to dramatically increase the pressure to penetrate Windows. The entire professional security community understands this, which is why it's going batshit over recall call, while Microsoft has no choice other than to deny the problem because they're desperate to begin the data aggregation of their users so that it can be used to train tomorrow's personal PC assistant, ais. So Microsoft will declare, as they always do, that Windows is more secure than it's ever been, even though history always shows us afterward that's never been true.

Microsoft is going to have Recall installed, running and collecting its users' data in all forthcoming qualifying co-pilot plus Windows 11 PCs. And don't get me wrong the idea of being able to ask a built-in autonomous personal AI assistant about absolutely anything we've ever typed into or seen on our computer is intoxicatingly powerful. For many of us who live much of our lives through our computers, it would be like having a neural link extension of our brain with flawless, perfect recall. But it also represents a security and privacy threat the likes of which has never existed before. When you consider the amount of digital storage that anyone can now easily own, it seems pretty obvious that this is going to happen sooner or later. Unfortunately, microsoft has not proven itself to be a trustworthy caretaker of such information.

1:45:24 - Leo Laporte
Wow, I think you're exactly right. I mean, that's almost what they're proposing anyway is, you can always query the machine about everything you've done.

1:45:31 - Steve Gibson
Well, they're saying timeline.

You can query a timeline, but if this thing, if they're capturing text from the screen and Kevin saw 90 Kbytes was stored after several days of use that means that that 50 gig that they want to set aside this is not a 90 day rolling window, which I thought last week. They're going to store everything you ever do for your entire life of your use of that machine and in fact you're going to want that to be portable to the next machine you move to and so so, so that you're able to take to take that accrued data with you from one from you know at you know three years from now when you need to buy a new windows 13 machine but it could be, secured right you could do, could do this right, couldn't you?

Yes, and what they're doing. I think you could. I think you could, I mean you would need new hardware, because you need some sort of the equivalent of an HSM. Basically, you'd want this super Jeeves to be in its own enclave that could not be exfiltrated from. Yes, that's right, where data goes in and nothing comes out. And then, but imagine that, leo, it would be compelling to be able to ask your computer anything that you ever did with it.

1:47:01 - Leo Laporte
I'm well aware of that. That's to me With perfect recall.

1:47:02 - Steve Gibson
Yeah, the end game for all of this. I'm well aware of that. That's to me With perfect recall.

1:47:04 - Leo Laporte
Yeah, the end game for all of this.

1:47:06 - Steve Gibson
I've even referred back and you've been talking about your own local smaller corpuses or corpi and how useful that is Right.

1:47:15 - Leo Laporte
And I've talked about the founder of Deck, not the founder one of the designers of Deck who just passed away recently, gordon Bell, who had the same idea. He had a camera around his neck. He wanted to record everything he ever did. This is even before we had these powerful llms and the storage capacity to record our life right?

well, the issue always was and with with gordon's databases? Well, okay, I got it. What do I do with it? I can't right in any reasonable way parse it. Well, now we can, yes, and so I'm very interested. I I ordered the limitless pin which records all our conversations, the idea of same thing being to allow you to query that. You know what did I say to steve? Uh, I'm. I think this is the single most useful, persuasive use of AI is as an assistant that knows everything about you. But, boy, that poses some big problems.

1:48:08 - Steve Gibson
It's almost as if we need an initiative to create a way.

1:48:13 - Leo Laporte
It also solves other problems, because data privacy is a huge issue. We need a way to something that you can Stacy Higginbotham used to call it the blob something that you can Stacey Higginbotham used to call it the blob a place where you could securely a secure enclave store all your data for your own personal use, not so that other people could invade your privacy, but for your own personal use, and this is the best possible use. So I think we're on the right track. I think this Microsoft implementation could kill it in its tracks. It could actually have. This is what worries me is people are moving so fast with so little regard for safety that they could have the opposite effect. They could get people so scared about their security and privacy that they give up entirely on ai and well and they are.

1:48:55 - Steve Gibson
They're frankly lying, yeah, about the security representing. Yes, I mean, all this is is some files under the user's app directory, right? This is not some hocus pocus, and so everybody knows how to exfiltrate files. Kevin did it. There's now a GitHub project that is able to display all your recall data.

1:49:19 - Leo Laporte
Well, I'm glad that he published this paper. I'm glad you did this show because up to now, the press not knowing any better, and I include myself, we've parroted Microsoft's assertions that well, it's all on device, it's all local, it's all safe, it's encrypted, it's only available to you. I have pointed out in the past that it's only encrypted as long as you don't log in. This is the second part of that. Once you're logged in, it's decrypted and then available to any malware on your system. Yeah, I think people will. I hope the press will start to come around and say, hey, wait a minute, this isn't as secure as you said it was.

1:49:52 - Steve Gibson
Well, our listeners are preemptively protected, right? I mean, they're going to turn this off like that. Unfortunately, there's no reach. Well, there's minimal reach. But you know there's a bazillion Windows 10 or Windows 11 users and they're going to think, hey, this is cool, I get you know. I can scroll back in history and this is Microsoft getting ready for something that comes next.

1:50:18 - Leo Laporte
Yeah, I agree. You know Apple has a solution called Timeline. It's a backup solution that keeps everything you do in a timeline database, a vault hard links to every version of every document. So they're kind of doing something similar. Nobody's ever questioned the usefulness or the security of it. I don't know how different it is, but you know this is a problem. This really is a problem. Steve's done it again, hasn't he kids? This is why we wait for Tuesday with bated breath. Steve is the man in charge at GRCcom, the Gibson Research Corporationcom, and it is the place you can email him. Now what should they do again?

1:51:02 - Steve Gibson
they email so, uh, first you need to register, otherwise your email will not get through, right? So just go to grccom, slash mail. Okay, there you go, and there's a form there, you, you, you put the email address from which your mail is sent, which you know. For people who are fronted by Gmail, it's actually their, their real Gmail address, even though people see a domain alias. But. But, but, so you, you, you enter that I send you a confirmation link, which you then click on or copy and paste into your browser, and that takes you to a subscription page, and that's all there is to it. You don't even need to subscribe, you can leave everything blank and just say you know, update, and then that email address is registered. So email then written to securitynowatgrccom flows right to me, perfect.

1:52:02 - Leo Laporte
While you're there, you can pick up a copy of Spinrite, the world's best mass storage, performance, maintenance and recovery utility. 6.1 is current. Get it. You need it. If you've got mass storage, whether it's a spinning hard drive or a solid state drive, spinrite's the tool you have been waiting for. You should also go there to get a copy of the podcast.

Steve has two unique versions. He's, of course, got the 64 kilobit audio. We both have that. He has, unique to his version, the 16 kilobit audio for bandwidth impaired folks. He also has transcripts written by Elaine Ferris. They're human written, no AI in this. It's. They're good, they're useful, good for searching, good for reading along as you listen.

Grccom. At twittv slash SN, we have both audio and 64 kilobit audio and video, I should say so you can watch or listen your choice. All the shows are there, going all the way back to 977 episodes. That's twittv slash SN. There's also a YouTube channel with video from all of our more recent shows. I mean and by recent I mean the last 10, 20 years, something like that. Or you can subscribe in your favorite podcast player and start collecting, start adding to your collection today. Just subscribe to Security. Now Every podcast player should have it. We've been around forever. Audio or video, your choice. If you want to watch us, do it live, get the very freshest version you can. We stream it live on YouTube, youtubecom, slash, twit, slash live, and we start it the minute we turn on the show not the cameras, but the show and end it the minute we end the show. If you want to watch what's happening before and after in our little chit-chat and so forth for all the shows, join the club. That's one of the many benefits. Ad-free versions you get the Discord where you can chat with other intelligent, interesting people in the club, 12,000 strong. You can also listen to some shows, watch some shows that you can only listen to in public. Things like Hands on Macintosh, hands on Windows, the Untitled Linux Show, scott Wilkinson's Home Theater Geeks. We have special events.

On June 19th, micah kicks off his crafting corner. Every third Wednesday of the month, he's going to get together and do some crafts and you could talk to him. I'm going to. I'm going to do some stuff. Club only too. We've got the. We've got the book club. We've got a lot of great things going on. Um, the club is a way to keep this on the air, and that's just being frank. Without your support, there is no security. Now there is no twit. Uh, you would have to find something else to listen to on a Tuesday afternoon. So go to twittv slash club twit and join the club. Your support is absolutely vital for us to continue operating. It's as simple as that, steve. Have a great week. We'll see you next time right here on security Now. Have a great week, we'll see you next time right here on Security Now.

1:55:04 - Steve Gibson
Thank you, my friend. Until then, and that'll be Patch Tuesday, so I had a fabulous picture set up for that and I couldn't find it, so I've got to see if I can locate that again. Talk to you next week. All right, take care. 

All Transcripts posts