- cross-posted to:
- privacy@lemmy.ml
- privacy@lemmy.dbzer0.com
- cross-posted to:
- privacy@lemmy.ml
- privacy@lemmy.dbzer0.com
- In December, an investigation by Tom’s Hardware found that Recall frequently captured sensitive information in its screenshots, including credit card numbers and Social Security numbers — even though its “filter sensitive information” setting was supposed to prevent that from happening.
Apple too, right?
Yeah
Do you have a source?
Just read their privacy policy and tos.
For all we know, Linux could be just as compromised…
I mean, but we pretty much do know? The difference between Linux and Windows / MacOS is Linux is open source and can be checked and audited by anyone. If an exploit exists, it will be visible publicly and just needs to be spotted by those knowledgeable enough. Windows and MacOS are more than likely audited too but by private companies under NDA, so then it’s left up to Microsoft or Apple to decide what exploits are fixed.
I agree completely that open source can be audited by anyone, but I did read something tried to be sneaked into an update, and you never really know, software is complicated and maybe some roundabout way to have an exploit using code that looks like it’s intent was something different.
Ah yes, I think that was when a FOSS maintainer had to step down and handed it off to someone else if I remember right? See this XKCD for relevance. It’s pretty ridiculous how much we (and companies with billion dollar revenues) rely on the free work of others for such important systems. But yes, an important distinction to make is that certain Linux distributions may use code by others that is not open source and malicious without them realizing.
Ah yes, to generate profit for the Linux™ shareholders.
I was reading how the us gov tried to plant something in an update.
If only there was a way to review the code…