• empireOfLove2@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    336
    ·
    20 days ago

    So, this means Microsoft has copies of every single bitlocker key, meaning that a bad actor could obtain them… Thereby making bitlocker less than worthless, it’s an active threat.
    MS really speedrunning worst possible software timeline

    • dual_sport_dork 🐧🗡️@lemmy.world
      link
      fedilink
      English
      arrow-up
      167
      ·
      20 days ago

      They don’t have a copy of every single Bitlocker key. They do have a copy of your Bitlocker key if you are dumb enough to allow it to sync with your Microsoft account, you know, “for convenience.”

      Don’t use a Microsoft account with Windows, even if you are forced to use Windows.

      • tabular@lemmy.world
        link
        fedilink
        English
        arrow-up
        103
        ·
        20 days ago

        To use Windows without a Microsoft account requires tech literacy these days, I thought. I would not be suprised if users didn’t choose to sync with a MS account but it’s doing it anyway, if that’s what MS want.

        • dual_sport_dork 🐧🗡️@lemmy.world
          link
          fedilink
          English
          arrow-up
          37
          ·
          20 days ago

          If you sign in with a Microsoft account at all I don’t believe there’s the capability to opt out.

          I only use local accounts. I have never had a Microsoft account. I never will.

          • suicidaleggroll@lemmy.world
            link
            fedilink
            English
            arrow-up
            45
            ·
            20 days ago

            You can’t do that anymore, at least not with a normal Windows installation. All of the tricks of forcing it offline, clicking cancel 10 times and jumping up and down don’t work anymore, they’ve disabled them all, the only way to install Windows 11 now (using the normal Microsoft installer) is by linking it to a Microsoft account.

            • CarbonatedPastaSauce@lemmy.world
              link
              fedilink
              English
              arrow-up
              15
              ·
              20 days ago

              This is not true. There are several tools to create a bootable USB that uses a local account.

              They just made it hard for Joe Schmoe to avoid it.

                • dubyakay@lemmy.ca
                  link
                  fedilink
                  English
                  arrow-up
                  10
                  ·
                  20 days ago

                  Joe Schmoe buys new laptop with Windows preinstalled.

                  Joe Schmoe boots it for the first time.

                  Greeted by first-log-on.

                  Goes through steps and is immediately captured.

            • 9tr6gyp3@lemmy.world
              link
              fedilink
              English
              arrow-up
              14
              ·
              20 days ago

              You can still create a local account by setting the PC up as a “School or Business” PC and then choosing the local account option.

            • cley_faye@lemmy.world
              link
              fedilink
              English
              arrow-up
              4
              ·
              20 days ago

              Just update a W10 local install. It won’t even try to ask you to add a microsoft account.

            • Grandwolf319@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              1
              ·
              19 days ago

              I have a windows 11 installation without an account. You got to get an alternative image (I got LTSC).

              I was really hoping there would be a jailbroken version of windows by now, you know a version that doesn’t update and doesn’t have any bloatware.

              I guess it’s just not worth it given how far Linux has advanced.

        • Feyd@programming.dev
          link
          fedilink
          English
          arrow-up
          13
          ·
          20 days ago

          I’m not even sure if you can install without an MS account if you don’t use Rufus anymore. Rufus requires literacy for sure, and even if you can still do it without it is designed to make it impossible to know you can from within the installer itself.

      • empireOfLove2@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        9
        ·
        20 days ago

        They do have a copy of your Bitlocker key if you are dumb enough to allow it to sync with your Microsoft account, you know, “for convenience.”

        Which I don’t believe is the only way it can leak. It’s well known Microsoft can access anything and everything on an internet connected Windows PC whether there’s a Microsoft account or not. If the nazi’s push for the device of someone on a local account only, you know they’ll magically find a way.

      • iterable@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        7
        ·
        20 days ago

        Save a copy of your bitlocker keys to a Veracrypt drive with a password no shorter then 15 mixed characters. Then upload that encrypted container to any free service. They wont be able to open it and now you have a remote backup copy.

        • dual_sport_dork 🐧🗡️@lemmy.world
          link
          fedilink
          English
          arrow-up
          13
          ·
          20 days ago

          I employed the super secure expedient of never exporting my keys. I have no idea what they are, I never did, and I never will.

          There’s really no irreplaceable data on my Windows machine. If I have to reformat it some day A) that’s no big deal, and B) it’s Windows, what else is new.

        • wischi@programming.dev
          link
          fedilink
          English
          arrow-up
          8
          ·
          20 days ago

          Why not save a step, fuck bitlocker, and use veracrypt to encrypt your drive in the first place?

          • iterable@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            20 days ago

            That is a option but it’s performance is bad and you need at least fifteen mix character password every time you boot. If you game you need to use bitlocker sadly or load times dive hard. Having a second drive in full Veracrypt is fine for things like basic documents but not to game on.

        • Wispy2891@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          20 days ago

          If the password is long 15 characters that means you use a password manager. At that point just put the bitlocker password in the password manager

      • JustEnoughDucks@feddit.nl
        link
        fedilink
        English
        arrow-up
        4
        ·
        19 days ago

        Are you naive enough to believe the surveillance OS that uploads literally all of your activity along with screenshots of your desktop doesn’t automatically upload you keys no matter what little box you tick on the installer?? 😂 there is absolutely not one single 3rd party auditing that they actually follow any of the options at all that they give.

      • Obinice@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        19 days ago

        Why is that dumb?

        I encrypt my drive to protect my data from burglars and thieves who might steal my laptop, how would they obtain the recovery key from Microsoft? O_o

    • bw42@lemmy.world
      link
      fedilink
      English
      arrow-up
      41
      ·
      20 days ago

      No they do not have copies of every Bitlocker key.

      Bitlocker by default creates a 48-bit recovery code that can be used to unlock an encrypted drive. If you run Windows with a personal Microsoft account it offers to backup that code into your Microsoft account in case your system needs recovered. The FBI submitted a supoena to request the code for a person’s encrypted drive. Microsoft provided it, as required by law.

      Bitlocker does not require that key be created, and you don’t have to save it to Microsoft’s cloud.

      This is just a case of people not knowing how things work and getting surprised when the data they save in someone else’s computer is accessed using the legal processes.

      • user28282912@piefed.social
        link
        fedilink
        English
        arrow-up
        39
        ·
        20 days ago

        Except that Microsoft basically puts a gun to every users head to login with a Microsoft account which can/does backup the recovery keys.

    • x0x7@piefed.social
      link
      fedilink
      English
      arrow-up
      10
      ·
      20 days ago

      Microsoft is already a bad actor and they have them. Or a bad actor could threaten microsoft physically and microsoft will hand them over. Wait, that already happened.

    • Kongar@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      6
      ·
      20 days ago

      And people make fun of me for turning off secure boot and tpm. They just cause grief for no benefit.

      • partial_accumen@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        20 days ago

        As long as you’re doing your own whole disk encryption, you have a valid path to still be secure. However, if you’re running an unencrypted disk, you’re much more likely to lose your data to a non-state actor.

      • cley_faye@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        20 days ago

        Both are completely unrelated to the discussion. TPM sometimes have issues regarding their security, but you can certainly use Secure Boot with your own signing keys to ensure the kernel you run is one you installed, which improves security. And you can use TPM to either keep your FDE keys, or only part of them combined with a PIN if you don’t fully trust them to be secure, so you keep strong encryption but with a bit of convenience.

        Without a (properly configured) Secure Boot startup, anyone could just put a malware between the actual boot and your first kernel. If the first thing that happens when you boot is something asking for a password to be able to decrypt your storage, then an attacker can just put something here, grab your password, and let you proceed while storing in a a place it can be retrieved.

        Is this scenario a concern for most people? That’s unlikely. But every computer sold these last five years (at least!) can be setup to reduce this risk, so why not take advantage of it.

    • Kissaki@feddit.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      19 days ago

      So, this means Microsoft has copies of every single bitlocker key

      But, by default, BitLocker recovery keys are uploaded to Microsoft’s cloud

      Not everyone follows the default. So no, it doesn’t mean Microsoft has copies of every single BitLocker key.

    • Appoxo@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      20 days ago

      More likely stupid users storing their bitlocker key in the microsoft account instead of printing it out or storing it somewhere not owned by MS lol

      • pemptago@lemmy.ml
        link
        fedilink
        English
        arrow-up
        8
        ·
        edit-2
        19 days ago

        “Naive” doesn’t sit right with me. Anyone can scrutinize LUKS, or BitLocker for that matter (via cryptsetup). Backdoors aren’t the issue here, even for MS Bitlocker. The issue, as stated in the article, is:

        by default, BitLocker recovery keys are uploaded to Microsoft’s cloud

        No need for a backdoor if you know you can get keys to the front door.

  • socsa@piefed.social
    link
    fedilink
    English
    arrow-up
    43
    ·
    19 days ago

    What does Microsoft think the fucking point of encryption is? Do they think I am encrypting my data to protect it from my dog?

    • Buddahriffic@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      19 days ago

      Why do you think the encryption capabilities on your PC are there for your sake? They might have sold them to you on that, but they are really there to protect copyright data because TPM allows encryption/decryption that is completely hidden from the rest of your system. Like an encrypted handshake that then transfers an encrypted key to decrypt the video stream. But it doesn’t save the decrypted data, it immediately re-encrypts it using your display’s private key (or whatever device is next in the chain, maybe your GPU). They can make it so that the unencrypted stream never touches your RAM or travels on any wire, which means you can’t pirate shows as you watch them unless you point a camera at your screen.

      Obviously if they just said that was one of the main points, no one would want it and media companies couldn’t benefit from it because they’d have to compromise to sell content.

      The other point was so that they could build a system where they hold the encryption keys and get to choose whose data is actually private. Obviously that’s an even harder sell.

      So they did what marketers always do and lied by omission about what it was for and just outright lied if they ever said they’d never give the keys to law enforcement (did they ever even say that?).

      Let go of the idea that someone selling something to you implies any kind of loyalty, especially when either party is a large corporation.

  • moonshadow@slrpnk.net
    link
    fedilink
    English
    arrow-up
    32
    ·
    20 days ago

    A single bitter, crowing “hah!” at whoever thought there wasn’t at least this much overlap between our corporate and government masters. Welcome to hell kid, shoutout to whatever’s being trained on the last ~30 years of everything that touched the internet in the NSA’s Utah data center. Rose coloured PRISM though, I dream of the day when someone makes those search tools public and I can reminisce through my preteen MSN Messenger convos

  • FalschgeldFurkan@lemmy.world
    link
    fedilink
    English
    arrow-up
    30
    ·
    19 days ago

    What a slap to the faces of everyone who had been locked out of their data because they never knew about this crap and thus never saved their keys

  • Wispy2891@lemmy.world
    link
    fedilink
    English
    arrow-up
    24
    ·
    20 days ago

    Wasn’t this by design? Otherwise why keeping the decryption keys on servers located in the united states’?

    • Kissaki@feddit.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      19 days ago

      It’s a consequence of the design.

      I certainly wouldn’t want end users calling me because they lost their recovery keys and consequently all their data. So I can understand offering or even recommending fallbacks.

      The real solution would be clear and obvious documented choice for an informed decision. Online backup for fallback but meaning possibility of court order compromise and other external management risks, or self-managed with no recovery in case of loss.

  • kittenzrulz123@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    21
    ·
    19 days ago

    Daily reminder that verified boot is objectively superior to “secure boot”, once again a common Linux W and another example of Google actually promoting some good security practices

    • tekato@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      20 days ago

      Microsoft only has your key if you give it to them for convenience (by syncing to your Microsoft account), and they’re required by law to give anything stored in their servers if asked. There’s no conspiracy here.

      • RamRabbit@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        20 days ago

        Microsoft railroads you into this. Your Bitlocker key will get exfiltrated unless you do a bunch of bullshit to make sure it isn’t.

        And that’s the thing with Microsoft, they just keep doing this everywhere in Windows. There is and endless torrent of shit to turn off. No reasonable person will keep on top of it. And if you fuck up a singular time, they just vacuum everything.

        • tekato@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          19 days ago

          Well, you obviously have never used BitLocker. The first thing they ask you when you activate BitLocker is to pick one of 3 options:

          1. Link to Microsoft Account.

          2. Save to a File

          3. Print Recovery Key (so you can write it down on a piece of paper or whatever)

          There’s no “railroading”. There’s plenty of real things to not like Microsoft. No need to make them up.

  • brooke592@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    14
    ·
    19 days ago

    Federal investigators in Guam believed the devices held evidence that would help prove individuals handling the island’s Covid unemployment assistance program were part of a plot to steal funds.

    Damn, they weren’t even doing this to go after pedos.

    I’m curious where in the economic ladder this person fell. Rich enough to get a significant amount of money from the system, but still too poor to make the government look the other way.