Comment on Microsoft Gave FBI Keys to Unlock Encrypted Data, Exposing Major Privacy Flaw

FauxLiving@lemmy.world ⁨1⁩ ⁨day⁩ ago

Oh no, who could have possibly seen this coming when Microsoft decided to back up your full-disk encryption key automatically to OneDrive.

Smart of them to deploy automatic full disk encryption just as open source projects like Trucrypt and Veracrypt were starting to become mainstream and wouldn’t you know, they also include many glaring backdoors that completely defeats the encryption that they offer.

In addition to being vulnerable to law enforcement through subpoenas on the stored key. Anytime you run a Windows update and the system has to reboot, it writes a ‘clear key’ to the hard drive which can be easily retrieved if the disk is stolen and also they bypass TPM Validation.

You know, the thing that is so important to have that you were forced to buy an entirely new computer… it is not active during a system update and anybody who has your hard drive.

Well, you would think that this isn’t very useful, after all they would have to have pretty good timing to catch you updating your computer to remove the hard drive, right?

Nope, if they steal your whole computer and plug it into power and a network connection, the next time a Windows update hits the system will automatically apply the update (absent a very specific Group Policy) and write the full-disk encryption key to the hard drive before shutting down.

I’m no expert computerologist, but I think that any system that requires anybody but you to have your key is insecure. If this is the kind of poor design choices that they make in regards to disk encryption then I would personally have no confidence that their proprietary code is not equally porous.

source
Sort:hotnewtop