Skip to content

ABC Tool

  • Home
  • About / Contect
    • PRIVACY POLICY
“TotalRecall Reloaded” tool finds a side entrance to Windows 11’s Recall database

“TotalRecall Reloaded” tool finds a side entrance to Windows 11’s Recall database

Posted on April 16, 2026 By safdargal12 No Comments on “TotalRecall Reloaded” tool finds a side entrance to Windows 11’s Recall database
Blog

The problem, as detailed by Hagenah on the TotalRecall GitHub page, isn’t with the security around the Recall database, which he calls “rock solid.” The problem is that, once the user has authenticated, the system passes Recall data to another system process called AIXHost.exe, and that process doesn’t benefit from the same security protections as the rest of Recall.

“The vault is solid,” Hagenah writes. “The delivery truck is not.”

The TotalRecall Reloaded tool uses an executable file to inject a DLL file into AIXHost.exe, something that can be done without administrator privileges. It then waits in the background for the user to open Recall and authenticate using Windows Hello. Once this is done, the tool can intercept screenshots, OCR’d text, and other metadata that Recall sends to the AIXHost.exe process, which can continue even after the user closes their Recall session.

“The VBS enclave won’t decrypt anything without Windows Hello,” Hagenah writes. “The tool doesn’t bypass that. It makes the user do it, silently rides along when the user does it, or waits for the user to do it.”

A handful of tasks, including grabbing the most recent Recall screenshot, capturing select metadata about the Recall database, and deleting the user’s entire Recall database, can be done with no Windows Hello authentication.

Once authenticated, Hagenah says the TotalRecall Reloaded tool can access both new information recorded to the Recall database as well as data Recall has previously recorded.

Bug or not, Recall is still risky

For its part, Microsoft has said that Hagenah’s discovery isn’t actually a bug and that the company doesn’t plan to fix it. Hagenah originally reported his findings to Microsoft’s Security Response Center on March 6, and Microsoft officially classified it as “not a vulnerability” on April 3.



Source link

Post Views: 2

Post navigation

❮ Previous Post: Fashion retailer Express left customers’ personal data and order details exposed to the internet
Next Post: Motorola Razr Fold Price Revealed Thanks to UK Preorders Going Live ❯

You may also like

DHH’s new way of writing code
Blog
DHH’s new way of writing code
April 10, 2026
The Problem That Built an Industry // a.s
Blog
The Problem That Built an Industry // a.s
April 11, 2026
Here's when the vivo X300 Ultra is launching globally
Blog
Here's when the vivo X300 Ultra is launching globally
April 14, 2026
DeepL, known for text translation, now wants to translate your voice
Blog
DeepL, known for text translation, now wants to translate your voice
April 16, 2026

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • $25,000 buys plenty of used EVs: Here are some options
  • VC Ron Conway says he has a ‘rare form of cancer’
  • One Rumored Color for the iPhone 18 Pro? A Rich Dark Cherry Red
  • Save 27% as the Anker SOLIX F3800 Portable Power Station drops to a 2026 low
  • AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says

Recent Comments

No comments to show.

Archives

  • April 2026

Categories

  • Blog

Copyright © 2026 ABC Tool.

Theme: Oceanly News by ScriptsTown