- cross-posted to:
- technology@lemmit.online
- cross-posted to:
- technology@lemmit.online
Microsoft’s Bitlocker & TPM encryption combo defeated with a $10 Raspberry Pi::The point of Microsoft’s Bitlocker security feature is to protect personal data stored locally on devices and particularly when those devices are lost or otherwise physically compromised. With Bi
deleted by creator
Isn’t the whole point of BitLocker protection from direct access? When a computer is turned off, encryption should keep the data safe. Also when a computer is turned off, basically no remote vector is going to work. AFAIK, when the computer is on, the drive is mounted and BitLocker provides no additional protection over an unencrypted drive.
deleted by creator
Veracrypt drive encryption does not have the same problem, it would be secure even with physical access
deleted by creator
Yeah, it’s safe because of no TPM usage. You can boot from an encrypted drive, it’ll prompt for the key instead of auto loading from vulnerable hardware
Bitlocker supports the same usecase, but everybody wants that automatic boot feature so…
It also lets you store a secondary key on a server and require the computer to be on trusted networks to be able to retrieve it to boot, but I’ve never ever heard of anybody using that
Pretty sure it uploads the key to microsoft servers when you do that
That’s the default, but you can block it in the command line configuration tool
Correct. However, if you have a way to run a PowerShell command as an administrator, you can run a single cmdlet to get access to the bitlocker recovery key.