They already said it will be off by default for all Enterprise editions of windows. They’re protecting their corporate buddies but normal users get fucked, as always.
One step. The corps know it. It’s been happening for years. One step, then soon after you just accept that’s how it is. Then another step. And another. And another…
I actually really doubt it’d ever go on by default for enterprise installations. One tiny slipup in GPO and IT departments could end up with the most massive explicit data leak in history, many many companies and governments working with very sensitive data would drop all Microsoft products in a heartbeat. Microsoft knows that is an impossible sell and really not worth the squeeze vs just shoving a larger dildo up the private consumer’s ass.
One tiny slipup in GPO and IT departments could end up with the most massive explicit data leak in history,…
I get what you’re saying, but:
Apply this same logic to ‘Considerable and substantial direct access to the kernel for who knows how many third party software engineers, without meaningful or comprehensive review of how they’re using that access.’
Why, one serious, overlooked error on a widely used enterprise software with this kernel access could basically brick millions of business computers and cost god knows how many millions or billions of dollars, they’d never do that!
They already said it will be off by default for all Enterprise editions of windows. They’re protecting their corporate buddies but normal users get fucked, as always.
Off by default. For now…
One step. The corps know it. It’s been happening for years. One step, then soon after you just accept that’s how it is. Then another step. And another. And another…
I actually really doubt it’d ever go on by default for enterprise installations. One tiny slipup in GPO and IT departments could end up with the most massive explicit data leak in history, many many companies and governments working with very sensitive data would drop all Microsoft products in a heartbeat. Microsoft knows that is an impossible sell and really not worth the squeeze vs just shoving a larger dildo up the private consumer’s ass.
I get what you’re saying, but:
Apply this same logic to ‘Considerable and substantial direct access to the kernel for who knows how many third party software engineers, without meaningful or comprehensive review of how they’re using that access.’
Why, one serious, overlooked error on a widely used enterprise software with this kernel access could basically brick millions of business computers and cost god knows how many millions or billions of dollars, they’d never do that!
… cough CrowdStrike cough.
Microsoft Azure already leaks secrets and nobody cares. As long as it has all required certifications it’ll be fine.
Not every business uses enterprise. I suspect quite a few use pro.
Then that will be Microsoft’s captive audience upsell. “Ohhh don’t want us collecting your secrets? Damn better pay up for enterprise licenses…”
Just because you’re running pro doesn’t mean you don’t have domain policies.
Yes and no.
Enterprise has just lesser headaches and no need to customize the installation as much as the adware bloated default iso.
I’m just saying that you can turn recall off in GPO. As long as Windows pro machines are bound to the domain.
I checked my work laptop running W11. Recall was installed and enabled. No copilot+. IT had no idea. Disabled it right away.