- cross-posted to:
- hackernews@lemmy.smeargle.fans
- cybersecurity@sh.itjust.works
- cross-posted to:
- hackernews@lemmy.smeargle.fans
- cybersecurity@sh.itjust.works
this rootless Python script rips Windows Recall’s screenshots and SQLite database of OCRed text and allows you to search them.
I thought that it was encrypted if your home directory was encrypted? The impression that I got was that it was just a SQLite database stored in the clear. The user must certainly be able to make queries of that database in order for it to work, so even if it’s hosted by a non-user service, malware running locally will still be able to exfiltrate the data.
All true, which is what I meant by “not well” encrypted. It’s technically encrypted, but for all practical purposes it might as well not be.