• empireOfLove2@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    18 days ago

    So, this means Microsoft has copies of every single bitlocker key, meaning that a bad actor could obtain them… Thereby making bitlocker less than worthless, it’s an active threat.
    MS really speedrunning worst possible software timeline

    • x0x7@piefed.social
      link
      fedilink
      English
      arrow-up
      1
      ·
      18 days ago

      Microsoft is already a bad actor and they have them. Or a bad actor could threaten microsoft physically and microsoft will hand them over. Wait, that already happened.

    • dual_sport_dork 🐧🗡️@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      18 days ago

      They don’t have a copy of every single Bitlocker key. They do have a copy of your Bitlocker key if you are dumb enough to allow it to sync with your Microsoft account, you know, “for convenience.”

      Don’t use a Microsoft account with Windows, even if you are forced to use Windows.

      • tabular@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        18 days ago

        To use Windows without a Microsoft account requires tech literacy these days, I thought. I would not be suprised if users didn’t choose to sync with a MS account but it’s doing it anyway, if that’s what MS want.

    • bw42@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      18 days ago

      No they do not have copies of every Bitlocker key.

      Bitlocker by default creates a 48-bit recovery code that can be used to unlock an encrypted drive. If you run Windows with a personal Microsoft account it offers to backup that code into your Microsoft account in case your system needs recovered. The FBI submitted a supoena to request the code for a person’s encrypted drive. Microsoft provided it, as required by law.

      Bitlocker does not require that key be created, and you don’t have to save it to Microsoft’s cloud.

      This is just a case of people not knowing how things work and getting surprised when the data they save in someone else’s computer is accessed using the legal processes.

      • user28282912@piefed.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        18 days ago

        Except that Microsoft basically puts a gun to every users head to login with a Microsoft account which can/does backup the recovery keys.

  • Buelldozer@lemmy.today
    link
    fedilink
    English
    arrow-up
    1
    ·
    18 days ago

    The word “Gave” is really doing some heavy lifting in that title. Microsoft produced the keys in response to a warrant as required by law.

    If you don’t want a company, any company, to produce your data when given a warrant then you can’t give the company that data. At all. Ever.

    Not fast food joints, not Uber, not YouTube, not even the grocery store.

  • moonshadow@slrpnk.net
    link
    fedilink
    English
    arrow-up
    1
    ·
    18 days ago

    A single bitter, crowing “hah!” at whoever thought there wasn’t at least this much overlap between our corporate and government masters. Welcome to hell kid, shoutout to whatever’s being trained on the last ~30 years of everything that touched the internet in the NSA’s Utah data center. Rose coloured PRISM though, I dream of the day when someone makes those search tools public and I can reminisce through my preteen MSN Messenger convos

  • FalschgeldFurkan@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    17 days ago

    What a slap to the faces of everyone who had been locked out of their data because they never knew about this crap and thus never saved their keys

  • BlanketsWithSmallpox@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    17 days ago

    Regular old ZIP with AES-256 should do the trick for anything truly important you want to keep locked down.

    You could always do sly stuff like Hidden volumes with Veracrypt as well. Leave the crumb trail for the low key shit or old nudes of gfs you have permission to keep.

    • waitmarks@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      17 days ago

      Or don’t use an operating system that uploads your encryption keys to their corporate servers for “backup”.

  • Appoxo@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    18 days ago

    Everyone here (exceptions apply) being soo linux friendly and so tech literate that they don’t know jack shit about both sides and jump to assumptions.

    Microshit has no access to your key unless you upload it.

    Well DUH!