Any and every screen capture app will show a blank or a replacement screen for the restricted area.
Many people are babies.
This isn't the same as leaving a tool in someone; making and misplacing a screencap take active doing. If your meeting participants actively want to put data where it doesn't belong, the solution isn't accident prevention
It's essentially a guardrail. It can be easily circumvented if someone was being actively malicious.
Despite the intense training and constant warnings, it happens constantly. And that’s just the cases they know about and address.
You have to be able to trust your staff, but you also have to be realistic that any organization at scale will have people who either don’t care or don’t think and it happens frequently.
1) Prevent the patients from suing after a data breach or intentional sale of their medical records, regardless of negligence.
2) Transfer as much money as possible from health care to privately owned businesses in the compliance industry.
Very few computer security lessons from that industry generalize to other parts of the economy.
I suppose if the presenter wants no screenshots they’d also want cameras on and you’d have to be pretty sly about using your phone.
Either way, dumb. The analog hole can’t be closed.
Microsoft doing this is a huge waste of time other than catching the bottom 5% of people doing something like that.
I just want to add that my company has our stuff so locked down, that it’s easier for me to take a phone pic, transcribe the code with ChatGPT, fix the issue on my personal machine, then type it back into the work laptop for some issues. It’s absurd how businesses want to control everything to such a degree that 1) there are now these crazy, leaky workarounds, and 2) it’s to the detriment of people actually getting stuff done for the business.
This is like a watermark on a PDF. Not some impossible to circumvent security protocol.
It’s an option the presenter can turn on when needed.
If you need the data from the presenter to do your job, presumably you’d contact them and ask.
Businesses want to control everything, so this will become a common default for people to use. It’ll be embedded in all sorts of company policies and I wouldn’t be surprised if Teams clients in some corporate domain can set it as a default option to help promote the policy (by default block screenshots on all our presentations to reduce liability risks).
If it’s like a paper, some data advertised, or some significant work that’s when you generally want and need to contact the author.
So it’s something critically important for you to get your job done, but also something that’s not worth writing a couple sentence e-mail about, but also going to block your work while you sit around and wait all day for it?
Communication is the foundation of any office job. If you’re in a meeting with these people, just ask in the meeting? If you can’t, send an email during the meeting and you haven’t lost any time. It’s really not as hard as you’re trying to make it sound.
I generally discourage people from using ChatGPT for office communication, but to be honest if writing a simple e-mail request to get something you need for your job triggers this level of overthinking, you might benefit from letting it at least draft the email to get you started and past the analysis paralysis.
This is not a problem with this feature, this is a problem with your office's expectations surrounding communication.
At my workplace this exchange looks like a slack message along these lines:
> Hey, can I get a copy of the info from side 10? I'll use it for $X.
Hey sorry to interrupt you but you blocked screenshots so please send me this frame. Also don't mind me I'll stop you again in 65 seconds.
This is literally the threat model that this feature is protecting against: it gives presenters a way to say "no really, when I say don't record I mean don't record". If people end up overusing it at your company, that's a problem to address with them, but I can totally imagine use cases where you would want to turn this on just as an added precaution against accidental but well-intentioned misuse of the visual aids in a private presentation.
This isn't to protect against corporate espionage, it's to give presenters the option to be a little bit more clear about their expectations of confidentiality.
It's not that they can't be modified, but it's an indication that you're not supposed to.
Overwhelmingly, people who speak in favor of windows, grew up using it. It's like the indoctrination of any religous cult, it works best when you start young.
One has to wonder when the world will recover from windoze brain damage...
The resultant windoze brain damage is a co-mingling of "you don't know what you don't know", lack of awareness of just how varied computer interfaces could be, with the "child indoctrination" aspect that nothing else seems quite right when it's not what you were raised on.
After my first programming experiences, on a TRS-80 in the mall radio shack in the late '70s, I was exposed to a variety of user interfaces, but eventually became locked into windows myself, mostly from employer enforcement.
The thing that drove me away in the end was the way various settings were moved around with each new release, and the way my workflow had to constantly adapt to arbitrary changes in the user interface with each revision.
After exploring a wide variety of desktop environments, I've been on fluxbox window manager for many years now and I'm still quite satisfied. All of my configuration options are in my home directory, and my user interface experience is recreated without incident when updating, and even when moving to new h/w.
But the monoculture is wide spread, and continues to inhibit computer innovation outside of what will benefit the mothership...
The main vendor locking practice of M$, has been to cut deals w/ h/w makers to preinstall windoze on their new computers.
This caused many many more people to face childhood indoctrination into windoze than into macOS.
Tangentially, over many years apple was a less malicious company than M$, but that advantage has waned in recent years.
Heh; sister in grade school for her computer class was given a pamphlet where she and her classmates could learn how to become web surfers with IE, how to write a blog with WL Writer and how cool is SkyDrive for saving your files.
MS was nowhere near as hostile towards its users in the past than it is now.
No, this isn't a "security" feature and it obviously can be easily circumvented. The reason this is useful is to make it extremely clear to participants that the contents should not be shared by them.
These kinds of measures only stop the good guys from doing their jobs. The bad guys put way too much effort into espionage for this to work.
It exist to make the easiest way impossible and to tell participants that the content should not be shared by them.
For sensitive data on the other hand quality doesn't matter as long as it's readable.
Making something more difficult is okay to claim in my view, but trying to over-state capabilities or security concerns is problematic.
Can you manufacture film yourself? Know anyone who does?
It could start with quietly making the essential chemicals in film production and development "controlled". Then you might need a licence to do analogue photography. Eventually even the last few analogue photographers either die or switch to digital due to the increasing impracticality of analogue. Then the film companies stop making it, then you make it illegal for them to start making it again. You've now killed the analogue hole.
Maybe you're hoping it would be futile like the war on drugs, except there's actually demand for drugs. I can't imagine dealers suddenly stocking up on illegal film for all the people wanting to capture stuff from their Teams calls.
> These kinds of measures only stop the good guys from doing their jobs. The bad guys put way too much effort into espionage for this to work.
This is for preventing casual screenshots and reminding average office workers that meeting content is sensitive. It’s not an iron-clad tool for defeating dedicated espionage involving hidden pinhole cameras.
There have been similar arguments for ages about how if something isn’t iron-clad perfect protection then it’s pointless, but in the real world making something more difficult actually makes people think twice and stops most of the people who would casually do it.
See for example Snapchat’s screenshot notifications. It’s well known that there’s an elaborate way to circumvent it. However the fact that it takes a lot of work and there’s a risk of getting caught trying really hard to deceive the other party is enough to make most people not want to risk it.
Pedantic correction:
'grab a shot of the monitor out of frame of the webcam of the person wanting to take screenshots of the meeting'.
First time I read it I was somehow imagining breaking of laws of physics lmao.
I suppose the biggest irony of this is, most of the shops that might want to enable this are already so sloppy that they half expect folks to screenshot teams presentations for notes later.
Interestingly that can be overcome by moving the video just a little between two screens, which reverts it back to a WDDM surface. =D
Or TWO monitors, with "Duplicate" selected, and a camera recording the second monitor under the desk.
This whole comment sections is honestly ridiculous.
Users have to resort to (exclusively, if possible) open source tools.
I can totally imagine that they will do something similar,so I guess it's pretty simple to implement if done like that
Not surprised at all that MS is doing this.
https://learn.microsoft.com/en-us/windows/win32/api/winuser/...
What a waste of developers resources.
So from a employee POV it has its uses.
But people who will get in the same situation like me could simply use the camera on their phone pointed at the screen and be done with it, I guess.
I payed for my device, it is mine, it is up to me to decide whatever I'll do with it. It is my right under the private ownership definition. The current situation on modern devices, especially smartphones, is ridiculous and a complete distortion of rights that are fundamental even for the roots of capitalism.
Users should organize and, at the least, avoid using such services even if it means to lose some convenience. Losing my freedom is not a fair price to pay for such conveniences.
This is going to block a valid use of screen recording and I wonder if it would violate A.D.A. requirements
* paying for professional human captioning of the meetings you're in (automated captions are not accurate enough to be relied on) * the host using Teams' own recording system and providing only you with the recording, maybe only the audio
i don't see why would you want to enable this, unless you have BYOD allowed
That being said - guessing they are doing this for their enterprise customers mainly, where alot of those other options are locked down. But plenty of people already know to just record their screen from their phone anyway - impossible to block that and much safer way to exfiltrate whatever info/data you need.
Seems like it’s even easier, just join the meeting via browser.
I’m not familiar with a way to enforce this type of restriction in the browser.
Sheesh, we've come to a state where browsers can no longer be referred to as "user agents".
> The company plans to start rolling out this new Teams feature to Android, desktop, iOS, and web users worldwide in July 2025.
OTOH we will see if there's any type of weasel-wording on whether browser is in fact non-supported (i.e. will go to audio-only mode.)
The other possibility, is that every 'supported' platform has some form of DRM that results in the functionality working even on browser (just thinking out loud about DRM functionality possibilities) means Windows/MacOS/Android/iOS all work but everyone else is out of luck.
They will just make photos using their phones.
Maybe you can do it on not-iOS, until your insecure setup will be blocked by the server. Cat and mouse until there's 3 mice in the whole world.
Like Google collecting all of our location history for their own usage, but not allowing us to see it via web anymore (only on mobiles), or having the android dialer not allowing us to record our own phone conversation (easily circumvented), or movie/music/game publishers not allowing us to backup our own media… you get the point.
All these are due to laws and regulations that are there to protect the big companies and don’t take into consideration users and the common sense ;-)
Because if we shut it all down, a huge chunk won’t start up, and humanity gains huge amounts of electricity generation back, but somewhat more importantly: maybe we could stop carrying smartphones!
(This is mostly in jest, here’s a “/s” for those who can’t tell)
This feature is not due to laws and regulations.
The user in this case is the presenter who clicks the button to enable screenshot protection on their meeting. This is Microsoft trying to deliver a feature their users want, not laws and regulations making them do something their users don’t want.
Why do you think they can't prevent on-device screenshots/screen recording can't be prevented when you control the entire stack?
Edit: But yeah, nothing to say why it can't work. So, yeah.
These aren't the use cases that really matters. What matters is the common case, and it's not about deterring honest folks. Honest folks aren't recording.
This is really a lesson in security blind spots. The number of people that are trying to "get around this" assuming that's the issue.
Edit: I'll make it simple. It will work because honest people aren't trying to get around it. But, they could still expose data they shouldn't. This helps prevent that. Again, a camera is enough to prove it doesn't need to be 100% perfect (and probably more honest considering screenshots can be faked).
So, instead of trying to think of how you can exploit, think of all the ways this private information can get out when it shouldn't and the people on the call aren't trying to release it. Work through that, and see where you get.
Honest folks who want to be able to cover their ass later on are.
Honest folks who are working for dishonest people and are planning to be a whistleblower are.
Honest folks who have Recall on are. Possibly against their will if they haven't found out how to turn it off, or it's a work machine where they're not allowed to do so. Maybe they're not if Microsoft actually has enough interdepartmental communication for the "no screenies please" signal to make it all the way to Recall. It'll be hilarious if they don't.
Think about it - if you’re in a life or death situation, you won’t hesitate. Your gun is right there, and it’s there so you can use it. But if the situation doesn’t feel dangerous, the image of having to fill out 3 pages of paperwork justifying your actions is enough to make you hesitate. It’s weaponised bureaucracy. It’s like - there’s an ideal amount of friction for some actions to have. Pulling your gun out should have some friction to it. The choice should have weight.
I see this in just the same way. If the presenter doesn’t want their presentation recorded, there should be some friction to recording it anyway. It shouldn’t be impossible to record. But it shouldn’t be as easy as just taking a screenshot in windows.
Just like that cop with a gun, there should be the right amount of friction for recording a meeting against the wishes of the presenter. How many pages did the cop have to fill out? 3 pages. Not zero. Not 100 pages. How hard is it to record a meeting despite this protection? It’s doable - you need an hdmi capture card, or a camera out of shot, or something else. You probably need to set it all up before the meeting. And so on. It’s not impossible. But it’s not trivial either. That sounds just right to me.
I think this makes the counterargument even stronger.
Let's take for granted that this isn't intended to stop a determined leaker and is just meant to prevent honest, unintentional mistreatment of sensitive data.
The question is whether the false positives outweigh the true positives. This feature will impede people from getting things done in subtle but annoying ways (making it more difficult to take notes, hurting accessibility, etc). It's likely that when this is widely deployed, many big orgs are going to overuse it and enable it as a matter of course to prevent liability. Those scenarios where honest people are blocked from doing honest things for which there's no harm are the false positives in this scenario -- there was no need to prevent those scenarios, but they were prevented anyway.
Now consider the true positives: we've agreed that intentional malice is not covered by this feature, and so the true positives are limited just to the smaller subset of scenarios in which honest people unintentionally mistreat sensitive data, and don't include any scenarios where data is being intentionally leaked.
I suspect the number of scenarios that fall into the false positive category will be much greater than the number of scenarios that fall into the true positive category, especially so after intentional malice is excluded. So is this really a net win for anyone?
Yes, it will not be capturable. If the VM is not secure it will not display it.
>VNC
The VNC server will not be able to capture it.
I just fired up a linux vm, and hit play.
If this thing actually breaks machines that don’t have a properly configured hdcp chain, it’ll create insane “this meeting is broken” debugging scenarios.
Also, hdcp is trivially bypassed these days (if, for some reason a camera phone recording of the damning meeting isn’t enough, and a perfect digital copy is needed…)
Old versions of it.
Yeah, if you've got corporate espionage going on this isn't going to stop someone from lifting your slides and taking them elsewhere. But the most common culprit of corporate information security violations isn't a spy, it's a well-meaning employee who didn't hear, remember, or correctly interpret the request to not record the meeting.
Blocking the most common way in which this kind of well-meaning but ill-informed employee would break the expected security rules does work. It's just getting flak here because people are imagining a much more exciting threat model.
It probably works as well as the company firewall blocking sites or the data exfiltration detection blocking companies from being stolen.
Everyone knows they’re not perfect and can be defeated by a sufficiently motivated attacker, but in practice they stop most casual attempts and discourage others.
Asking participants not to screen record or take screenshot was standard practice at every company I’ve worked at where we discussed anything like financials or sensitive business plans.
That you think the only attack vector here is a 3rd party device means you haven't really considered everything. Consider screenshots that might happen for many reasons, including malicious software, or even normal software someone might be using, and accidental exposure.
Many people still take screenshots of things they think are useful. Things still get shared though emails and occasionally posted on social media.
I have worked with various secure chamber VPN and VNC systems that make it quite difficult to record or screenshot. These are companies where their IP is worth billions of dollars and everyone wants a piece of it. It's difficult enough that it's not worth the effort to try and work around it. The rare time I really need something for debugging, I'll take a photo with my cameraphone, but it rarely comes to that.
Because it's that much harder, I record a lot less of it. Likewise for all the other engineers I work with. Friction won't stop it entirely, but it will make it far less frequent.
It is security theater at its peak.
For every 100 people who might decide to take a screenshot during a teams meeting, I doubt there’s 1 person who has all that equipment set up and ready to go. You don’t need to make something 100% effective to get a benefit from doing so.
If you wanted video just have the device positioned outside the field of view. Laptop cameras fov is very narrow.
:-D
* Naive screencaps are much less traceable to the leaker than a naive photo is. Yes, someone can strip out EXIF data, but we've seen over and over again that they generally don't. And even without EXIF a naive framing on the photo is more likely to expose information about the location or identity of the person who took it.
* A photo of a webinar is going to (barring serious postprocessing) look much less official and be less legible than a screenshot, so the use cases for illicit captures are going to be fewer. Few people are going to try to take a phone photo of the top-secret meeting and use the slide in their next team all-hands, but many might forget the rules and than snap a screenshot really quickly for later use.
* Just having the ability to block the easy method of screen captures helps avoid cases where the person doing the capturing isn't actively malicious, just ill-informed. If a normal employee attempts a screenshot and is reminded they're not supposed to do that, they're not going to pull out their phone to take a photo, they're going to say "oops" and move on.
Yeah, there are threat models that won't be stopped here, but most of corporate InfoSec is wrapped up in protecting against pretty lame threat models that would benefit from this—mostly uninformed/ignorant employees screwing up without intending to be a threat.
Like running windows in a VM or using an HDMI capture card. And are they going to break running teams meetings when using moonlight etc. with this? If you are OBS capturing during the meeting does it get blacked out or just breaks your recording?
This is primarily about blocking accidental leaks by regular employees who were asked to not record but ignored it. This kind of reuse of content happens all the time in companies of any significant size and isn't entirely stopped by simple requests or watermarks. This tool gives companies one more option to protect against this very lame and boring but also very real threat.
I think you're seriously overestimating regular employees. A significant number of people will send you smartphone pictures when you ask for a screenshot - why would they suddenly start looking into on-device screen capture when taking a picture or video of some random presentation?
> A significant number of people will send you smartphone pictures when you ask for a screenshot
n=1 but this is also my experience at $JOB for a majority of times for me as welli think this should not be possible to be asked.
For example, an employee might want to record to cover their own ass (e.g., if being asked to do some morally questional things, which the employee could record then use as protection against the company going back on their word).
Having the ability to _control_ whether an employee can keep records independently of the company only serves to move more control away from the employee.
People know it’s not perfect. However, raising the bar discourages the spontaneous captures that people might try out of habit.
I don't mean to pile on but, you wouldn't use post processing, you would just take the information out of your screenshots and make a new slide deck if you wanted pass it off as official.
Not sure what "support" you expect for unsupported clients.
It's definitely not true that this feature breaks support for devices not owned by the manufacturer. The follow on question about whether all possible web clients / operating systems would be supported, I don't know. The article just says that web is supported.
“Web is supported” in this instance just means “the web, but only when mediated by google, microsoft or apple”, which is not the web as far as I'm concerned.
They also can prevent honest people from gathering proofs to cover or defend themselves: abusive boss, illegal requests, harassment...
for f in `ls -1 /pics/IMG_*.jpg|/usr/bin/xargs basename` ; do /usr/local/bin/magick convert $f -strip -quality 8$rand -shave 1$randx1$rand2 -resize 9$rand2% -attenuate 1.0 +noise Uniform out_$f && /usr/local/bin/exiftool -overwrite_original -all= out_$f && rm -rf $f ; done
So ... not just stripping the exif/meta data but also dropping the quality to 8[0-9]%, shaving a random number of pixels from the border, resizing by 9[0-9]% and adding some noise to the image.Perhaps someone will find this useful ...
This feature would help make that less likely to happen accidentally or “accidentally.” It wouldn’t stop deliberate leaks but that’s a different problem.
When we did his exit interview he admitted he just wasn’t thinking. He did it all in a couple minutes while in the meeting. Something like this would have stopped him in the process and made him remember that the content was sensitive.
Don’t underestimate the diversity of the people watching zoom meetings. It’s not all engineers with elaborate screen capture setups prepared for the express purpose of recording meetings.
If someone was going to do something dumb like that I wouldn't want them to keep their job now instead simply because the software prevented them from doing something so dumb or dangerous.
People do dumb things. The fact that it won't prevent a determined attacker isn't the point.
A big DRAFT watermark tends to clarify that far more easily and obviously.
It’s all about diffusing that responsibility.
I'm an example of that threat. I'm a freelancer who often has video calls with new clients. Sometimes I surreptitiously screen cap demos or presentations. It would be very difficult to use a phone that way without breaking the conversational flow.
Other supposed workarounds would require much more preplanning. Like I'd need to know that there was something worth capturing.
HDMI capture with passthrough is $20.
OP did mot solicit or show that there would be any value in people listing ways that one could circumvent this with preparation.
We all know. You aren’t adding anything to the discussion. Nerds love ignoring the cost of human effort if it gives them an opportunity to show that they know something.
There are lots of arguments I find convincing for this being effective. But not OP's. OP is saying they already do these recordings regularly, but "preplanning" would stop them? No way. They already did all the necessary preplanning by the time they finished typing their comment.
Preplanning could be meaningful for other people, but not for them and people like them.
I only mentioned price to make it clear that the level of effort to make the purchase falls within the level of effort they have already established.
I have a systemd timer that clean files older than 24h at startup because the point is not to archive content without consent.
If I ever can't do that I would just use an usb3 screen capture card and record from a second device.
This feature provides value because it increases friction. It won't stop really determined and motivated users from leaking, but it'll make leaks, especially accidental leaks / those due to hacks, a lot less common.
The same applies to DRM, "security by obscurity", social media post editing / deletion, dark patterns, loss leaders, promotions and coupons, the list is endless.
If your user is a perfectly rational being with infinite time and infinite tech savviness, the proverbial "spherical cow", those features make 0 sense. Just like spherical cows, though, those users don't actually exist, and so friction matters.
That doesn't mean friction is infinite, though. It's too easy to overestimate it and fall into the trap of thinking that "users won't bother doing this, it doesn't matter if this combination of actions loses us money, it's too bothersome", and then get very surprised very quickly.
I don’t underestimate friction, I just know even my grandma would reach for her camera for a picture of her screen and she doesn’t even know what a screen capture is. It’s a stupid feature that doesn’t create friction, it just encourages users to take an untraceable action.
I would FAR prefer recording who took a screenshot than blocking it as a presenter.
The friction pushes the flow into something even worse — while not actually changing the behavior.
Everyone knows this. You don’t need this survey (which surely was a real thing that actually occurred and not something you just conveniently imagined for this argument, right?) to tell you that.
It’s literally written in the linked article.
We know. There are ways around it. But it’s friction, and friction has value. People know it’s not perfect, but it’s another reminder that people aren’t supposed to be doing it.
It’s a solution searching for a problem it can’t solve.
Friction implies you’re stopping a user from taking an action they consider the easiest way to solve the problem. Since you think I “invented” the survey, I invite you to ask all of you non technical friends and family how they would go about capturing an image of their computer screen if they needed to quickly show you a copy of what they’re looking at.
I absolutely guarantee you that taking a picture with their phone will be the winner by an order of magnitude.
Yes, somebody who's clever enough would keep the camera away from view, and maybe would try several times first to hold it in a way that gives a good view of the screen, etc. But this is out of scope, it's a clear malicious intent, when we could expect much more sophisticated means.
It would be surprising if Teams does not already capture that kind of event in its user activity event trail[0].
The amount of privacy-invasive capturing and reporting that Teams does is so staggering that it can probably rival surveillance that of North Korea on its own citizens.
[0] https://learn.microsoft.com/en-us/microsoft-365/admin/activi...
Either the information your are sharing is sensitive, or it is not. Applying friction to your colleges is just making their jobs more difficult.
The friction here is on the "unwanted" path, and in a way provides "lube" (less thinking and care) for the correct security posture.
The people using this feature aren’t going to imagine it as 100% protective against any and all possible methods of exfiltrating data. It’s a feature for discouraging casual data capture and dissemination. It serves to remind people doing spontaneous captures that they aren’t supposed to, but everyone knows a dedicated person could find a way to get that photo if they really, really want.
That doesn’t make it useless. Every time you raise the level of difficulty for accomplishing something, a percentage of attempts are thwarted or discouraged. As it turns out in the real world, raising the bar even a little tiny bit is effective in thwarting or discouraging the majority of attempts across the average user base. You’re not defeating the dedicated attackers, but you’re reducing the overall number of successful attacks and even attempts.
The same is true for things like the office firewall blocking websites: Yes, we all know a dedicated engineer can create a way around it, but it’s going to stop most employees from getting to those sites and serve as a reminder to others that they’re not supposed to access them.
I regularly, as do many of the people here, join meetings from my phone. I often do so so I can squeeze a run in. I especially do so in the types of all hands or large meetings where I’m in listen only mode and things are shared that would be hard to trace back to any individual in the room.
I’m not carrying a second phone to take a picture of a slide - but I regularly take screenshots in those meetings to remind myself of something or to show someone when bitching.
The relevant xkcd here is decryption by wrench (538) - the problem being solved is not battling 1337 hackers, it’s herding normally distributed loan officers at a mid regional bank.
I am not so masochistic.
For the love of God, please show an iota of acknowledgment that this could just be a matter of personal taste, instead of immediately resorting to such absolutist statement. It’s very telling that your portrayal of “I don’t like this” is “this is surely unbearable for anyone that does the sort of work that I do. Anyone that makes this work for them is doing this OTHER class of things”. And I’ve got absolutely zero doubt that you consider the things that you listed as being ‘lesser’ than your ‘real computer work’.
Casual is much easier with a phone. In Windblows to capture the screen you need to press print screen, then go to paint -> paste then save it. Paint cannot have 2 images open at the same time.
Win-Shift-S
My company recently configured Slack for mobile to disallow copying text.
Startup idea: i-Secure. Your camera can only take/show photos of approved targets. All photos will be analyzed for safety. Unapproved/Unlocked camera devices from China are now illegal.
people who used to take screenshots will now resort to taking screen pictures with their phones. this means microsoft teams is incentivizing everyone to 'leak' content outside of corporate networks.
creating a unworkable 'secure' system causes ordinary people to to go around the security to get their job done. which makes everything less secure in the end.
Information hasn't leaked because people didn't bother to leak it, not because of your security measures.
I mean, if HR says they won't make an accommodation because they think you're faking your disability than it's as if it never happened. Less transparency always benefits the immoral.
And this type of stuff does happen. A lot. We don't hear about it because:
1. Companies have gotten really good at just covering their tracks, like this.
2. It's a lot of effort to fight back and it's almost never worth it. You pretty much need baby killing material for someone to whistle blow. Lowly transgressions like discrimination aren't worth the effort.
I thought after Blizzard this would be a sort of wake up call.
Nobody forces them to make a presentation. They can always spend their time doing something else.
Stop making up laws and regulations that dont exist.
Or, you know, just take a picture of the screen with your phone.
Or record the session, or film it, etc etc etc
Well, is there a reliable way to circumvent it without using a separate device? I cannot find anything that would just work on Android and not be paid.
The only real practical gain is that it might prevent malware from being able to capture visible data, but what's funny about that is one of the desktop systems that can prevent unwanted screen capture by design (Wayland) also intentionally doesn't have any support for DRM/HDCP features, so it will likely be stuck on audio-only mode. High five, Microsoft!
* I wanted to go to the source directly to check if maybe they just left it out, but the link that they currently have seems to be non-sense. It seems to point to something about "Co-pilot" audio transcription. In Romanian, for whatever reason.
https://www.microsoft.com/ro-ro/microsoft-365/roadmap?id=490...
I assume there are provisions for the same thing in all the other supported systems. Everyone without such support will get no video on the affected meetings.
My guess comes from the fact that KeepassXC turns black/totally transparent when viewed through a VNC server on windows.
Edit: here it is https://learn.microsoft.com/en-us/windows/win32/api/winuser/...
Ah, basically DRM and Widevine L1 vs L3 for meetings, old story again.
DRM has been able to be hardware level for a very long time.
But if someone wants to take a screenshot, the "take a picture with your smartphone" exploit is already very obvious and commonly used, even by non-technical people. I know that confidential information is shared like this all the time, bypassing all security, and everyone turns a blind eye to it, because that's how they get the job done. I fully expect that if that feature is forcibly turned on, people will do it without giving a second thought.
And if you want to do it discreetly, just turn off your camera or cover it.
There are other ways of working around that, like using a video capture card, but why bother when you have a solution so obvious as taking pictures of the screen, even the article mentions it.
Blocking screen captures is an example of 'Security Theatre'
Is this anti-competitive and anti-open-standards?
At least the article points out the reason that doing this is completely pointless
The worst thing about this feature is that if someone takes a screenshot it will be saved on an IT controlled computer but if users are forced to snap screen caps with their phones the sensitive information ends up on personal devices and probably cloud synced to Google drive etc
* At least for full resolution
And this just goes to show you how easily "Shadow IT" can arise in a place of business.
My previous employer subscribed to Google Workspaces, and we used it for Docs and Sheets and Gmail; standard type uses. We also used Slack a lot. Now there were a lot of areas that were clearly off-limits to me as a user. For example, the Google Play Store was completely empty for my account -- I couldn't install any mobile apps at all. This hindered me from creating a separate user on my smartphone just for work.
Also, entire Google properties were off-limits, such as Maps. We didn't need or use those in our work there. There was a lot locked down, but there were a lot of things left open around the edges.
Now I have a "hacker mindset" where if something isn't working, I'll immediately consider it a glitch or bug, and try to work around it. If I can't sign in to something it's probably a "me" problem and I hammer on the door a bit. Basically the last thing on my mind is security restrictions. And for many of us working with computers, there's just the question of the supervisor asking us to get something done, and we go and try to do it, and that's how rogue WAPs show up in corporate networks; that's how backdoors show up on our desktop PCs, etc.
Indeed, many features on Android or Chrome these days are removed due to security trouble. I often realize this after-the-fact, when I think about the implications of using such a feature. Sure, it's a good thing the product is made more secure, but this feature has vanished, usually without adequate explanation, and so my workflow suffers.
So the next time I am tempted to just do a workaround for some glitch I perceive, I'm going to ponder it a little more deeply and consider whether there are security implications.
That is, I'm genuinely curious. Like is there any protocol or standard to mark a part of a DOM or a canvas as uncapturable? Up though the compositor and pipewire or however it happens these days?
I'm a bit worried Team's solution will use those APIs will be used (ie I'll have a choice: see a Teams meeting video OR be hooked up to all my monitors).
What I think is a related side effect: I also can't watch video (streaming via web browser or via Apple TV app) with this setup either.
I mean, no matter what you do - there will always be a workaround. People could just get their phone out and take a picture of the screen. Sure, the quality is not as good - but I am sure it is good enough.
I am sure there are other variations to workarounds.
Besides, if anyone has a problem being on screen - then dont turn your camera on. However, this is not a solution when working for a company that forces the webcam to be on especially for meetings -- AND THEY CAN RECORD IT!
I am sure recordings, if enabled, can be downloaded. This will likely be in a typical video file. I would not be suprised, if you open it in a video program, you can then take pictures. Maybe I am wrong, there.
bob1029•9mo ago
This stuff looks much more to me like "fuck the user" than anything else. I am 100% convinced there is a cult of evil bastards at Microsoft, et. al. that is hellbent on making everyone's UI/UX as janky as possible.
Xelynega•9mo ago
shim__•9mo ago
throitallaway•9mo ago
raverbashing•9mo ago
constantcrying•9mo ago
It is essentially like a watermark in a PDF. It can be trivially defeated, but that isn't the point.
elmerfud•9mo ago
ale42•9mo ago
acchow•9mo ago
timewizard•9mo ago
I think this because our company recently enforced a 2 year mail deletion policy on all mailboxes for "legal reasons." Which were "we don't want stuff to show up in discovery if we get sued."
maxloh•9mo ago
Streaming services like Netflix and Disney Plus use these APIs to protect their content as well.
flutas•9mo ago
I use a setup like this frequently for work to demo our Android TV based apps with full content even though it all has DRM applied. Always leads to a "how did you get this footage" line of questioning for anyone who knows that we use DRM.
rthnbgrredf•9mo ago
TiredOfLife•9mo ago