- A tool called TotalRecall Reloaded can extract data from Windows Recall under certain conditions.
- The attack relies on triggering authentication through Windows Hello and accessing decrypted data.
- Microsoft argues that this behavior is within expected security boundaries and not a vulnerability.
On Windows 11, a new controversy is unfolding around Windows Recall after a researcher released a tool that can extract user data from the feature. The tool, called TotalRecall Reloaded, builds on earlier findings that forced Microsoft to delay and redesign Recall amid widespread criticism.
Why Recall security is a real concern for everyday users
Windows Recall is designed to act as a photographic memory for your computer. It captures snapshots of your activity, including apps, documents, messages, and browsing history, and makes them searchable using AI.
However, that convenience comes with risk. The latest findings suggest that even after Microsoft’s redesign, Recall data can still be accessed under certain conditions. While this requires user authentication, the concern is how easily malicious software could trigger that process and extract data afterward.
For everyday users, this highlights a simple but important concern. Recall does not just store passwords or browsing history. It stores a timeline of your digital life, which includes emails, private conversations, and sensitive documents. If compromised, the exposure is far broader than traditional data leaks.
The company argues this behavior aligns with how the operating system is designed to function. However, the gap between intended behavior and real-world abuse is exactly where modern malware operates.
How the TotalRecall Reloaded tool works
The tool available on GitHub (via The Verge) demonstrates a practical attack scenario rather than a theoretical flaw.

First, it runs silently in the background like typical malware. Then it triggers the Recall interface, prompting the user to authenticate through Windows Hello using facial recognition or fingerprint.
Once the user authenticates, the tool accesses the decrypted Recall data and extracts it. According to Hagenah, this effectively allows malicious software to ride along with legitimate user access, which the software giant previously claimed its architecture would prevent.
Microsoft’s response and the security gray area
Microsoft maintains that no vulnerability exists. The company says the behavior shown by the tool operates within expected security boundaries. It also points to protections like authentication timeouts and anti-hammering mechanisms to limit abuse.
In a statement to The Verge, David Weston, corporate vice president of Microsoft Security, said: We appreciate Alexander Hagenah for identifying and responsibly reporting this issue. After careful investigation, we determined that the access patterns demonstrated are consistent with intended protections and existing controls, and do not represent a bypass of a security boundary or unauthorized access to data
.
Hagenah disputes this assessment, arguing that the system’s trust boundary ends too early. In simple terms, the secure vault protects the data at rest, but once decrypted for use, it becomes accessible to other processes.
This highlights a long-standing tradeoff in the operating system. The platform allows flexible interactions between processes, enabling features but also creating opportunities for abuse.
The bigger issue with Recall’s design
Even critics acknowledge that Microsoft’s redesign improved core protections. Recall data is stored inside a secure enclave powered by virtualization-based security, and access requires biometric authentication.
The weakness lies elsewhere. Once data leaves that secure storage for display, it enters a less protected environment. Hagenah describes it bluntly. The vault is strong, but the surrounding structure is not.
This distinction is important to point out because modern attacks rarely break encryption directly. Instead, they wait for legitimate access and exploit what happens next.
What users should take away
Windows Recall remains one of Microsoft’s most ambitious AI features, but it also introduces a new category of risk. It centralizes vast amounts of personal data, making it an attractive target.
For users, the key takeaway is awareness. Features that promise convenience through deep system access often carry hidden security implications.
Microsoft may not classify this as a vulnerability, but the debate underscores a broader truth. In security, what is technically allowed is not always what is safe in practice.
Although the new findings highlight a potential weakness in the feature, the company already has plans to rethink the experience. However, this shift is not driven by security concerns alone. Microsoft has already acknowledged that the current implementation has not landed as intended.
Rather than abandoning the feature, the software giant is exploring ways to reshape it, potentially with a different approach, stronger safeguards, or even a new name, while continuing to push its broader vision of AI-powered memory on Windows 11.
Do you trust Windows Recall with your personal data?
Voting closes: April 22, 2026 1:00 pm
