Back in January Microsoft encrypted all my hard drives without saying anything. I was playing around with a dual boot yesterday and somehow aggravated Secureboot. So my C: panicked and required a 40 character key to unlock.

Your key is backed up to the Microsoft account associated with your install. Which is considerate to the hackers. (and saved me from a re-install) But if you’ve got an unactivated copy, local account, or don’t know your M$ account credentials, your boned.

Control Panel > System Security > Bitlocker Encryption.

BTW, I was aware that M$ was doing this and even made fun of the effected users. Karma.

  • UncleGrandPa@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    20 分钟前

    They desperately wanted to eliminate personal computers and replace them with dumb terminals running over the net.

    When the public rejected this idea

    THIS is their response. They are still insisting on total control of our computers.

  • Mwa@lemm.ee
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 小时前

    Why cant windows copy luks and let you choose your own password

  • Phoenixz@lemmy.ca
    link
    fedilink
    arrow-up
    27
    arrow-down
    1
    ·
    4 小时前

    Meanwhile in Linux with luls, which I’ve had since a pre-pre-pre version somewhere back in the early 2000’s, I can have multiple keys, all works like sunshine, never had problems.

    On windows… So we work with highly sensitive data, and ever since I came in I thought it insane that people working remote don’t have that highly sensitive data encrypted. We can’t switch Linux yet, so okay, we go for BitLocker.

    Boy oh boy oh boy was that a mistake.

    50 remote users, 5 get encrypted devices with BitLocker as a trial and within a month, 3 of them already got locked up permanently because apparently it’ll pwrma lock itself after x amounts of invalid passwords which is just incredibly stupid. But don’t worry, there is a backup key! Yeah, that is lie 48 characters that we’d had to pass by phone and they have to type it flawlessly.

    Suffice to say, the remote users will be running Linux soon, like it or not.

    • starman2112@sh.itjust.works
      link
      fedilink
      arrow-up
      12
      ·
      2 小时前

      Yeah, that is lie 48 characters that we’d had to pass by phone and they have to type it flawlessly.

      Wouldn’t be so bad if everyone knew their Alpha Bravo Charlies

      My one talent: alpha bravo charlie delta echo foxtrot golf hotel India Juliet kilo Lima mike November Oscar papa Quebec Romeo Sierra tango uniform Victor whiskey x-ray Yankee Zulu, typed using voice to text

  • MunkysUnkEnz0@lemmy.world
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    43 分钟前

    This is gonna happen to a lot more people with their password change.

    Why do you have to use there? Nothing a cater. You can’t use Google or open source. I don’t get it. They suck.

    Like I need more spyware on my phone.

    What about people with landlines? Older people.

    So they’re going to lose a huge market share when they force everybody to throw away their computer to run Windows 11.

  • 9point6@lemmy.world
    link
    fedilink
    arrow-up
    82
    arrow-down
    1
    ·
    6 小时前

    Holy shit, they automatically activate it on computers without an account to back the key up to?

    That’s just malicious

    • Godort@lemm.ee
      link
      fedilink
      arrow-up
      51
      ·
      6 小时前

      IIRC, they only do this if you’re logged in with a Microsoft account.

      Bitlocker is disabled by default if you only use local accounts

      • GoodLuckToFriends@lemmy.today
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        edit-2
        3 小时前

        I have (had ;'( ) a local account, and bitlocker was activated. I only found out when my motherboard bit the dust, and that triggered the no-TPM bitlocker thingamajig. Goodbye data.

        Of course it hits right as I needed the data on that laptop. Fucking murphy and his fancy legal words.

        If anyone is in a situation like mine, you might find luck with a little DIY hacking: https://www.techspot.com/news/106166-old-bitlocker-vulnerability-exploited-bypass-encryption-updated-windows.html

      • EpeeGnome@lemm.ee
        link
        fedilink
        English
        arrow-up
        23
        ·
        edit-2
        5 小时前

        I’ve occasionally seen it activate itself on computers with only a local account, though I’ve so far only seen it when upgrading in place to 11 with secure boot enabled in the BIOS, and not every time. Fortunately the one time it locked me out was on a freshly cloned drive, so it only cost me redoing the work.

        Also, the number of people who I’ve seen lose all their data because they don’t even know they created an MS account during OOBE, and later had a boot or BIOS hiccup, is too bamn high!

  • Godort@lemm.ee
    link
    fedilink
    arrow-up
    34
    ·
    edit-2
    6 小时前

    Not that it helps now, but you can also dump your bitlocker recovery key through powershell and save it independently.

    (Get-BitLockerVolume -MountPoint “C”).KeyProtector

    • yesman@lemmy.worldOP
      link
      fedilink
      arrow-up
      16
      arrow-down
      3
      ·
      6 小时前

      The control panel dialogue allows you to do this as well. Control Panel > system security > Bitlocker encryption. But it also has the superior option which is to turn it off.

      I didn’t loose any data BTW. I had my M$ account info, and a backup besides.

      • dan@upvote.au
        link
        fedilink
        arrow-up
        10
        ·
        5 小时前

        But it also has the superior option which is to turn it off.

        Why would you not want to encrypt your files? My Linux systems are encrypted too.

        • kablammy@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          40 分钟前

          Years ago I thought I was being smart encrypting my home dir on my Linux server. I found out the hard way this prevents remote login over ssh using public key encryption, as the .ssh dir is in the home dir, which is encrypted unless you are already logged in at the time! So every time I wanted to ssh in, I had to plug in a monitor and log in on the console first.

          • dan@upvote.au
            link
            fedilink
            arrow-up
            1
            ·
            2 小时前

            I know, I just meant why would someone willingly disable Bitlocker?

        • yesman@lemmy.worldOP
          link
          fedilink
          arrow-up
          4
          arrow-down
          3
          ·
          4 小时前

          Why would you not want to encrypt your files?

          Bitlocker is only as secure as Microsoft is. If someone hacks your account, they’ve got your keys. And Micosoft stores that key in plain text.

          • dan@upvote.au
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            3 小时前

            It sounds like you’re complaining about both approaches.

            If Microsoft doesn’t have the key: You can’t recover your files if you lose it.

            If Microsoft does have the key: An attacker could get in and take it (unlikely if you have two factor auth though).

            And Micosoft stores that key in plain text.

            How do you know this, though? It could be encrypted using your account password as a key or seed.

      • JasonDJ@lemmy.zip
        link
        fedilink
        arrow-up
        4
        arrow-down
        1
        ·
        5 小时前

        Disk encryption should absolutely be used, especially on laptops/portable systems.

        Otherwise someone steals your laptop and swaps the disk into another system and they’ve got all your stuff. Including that folder that nobody knows about.

  • hansolo@lemm.ee
    link
    fedilink
    English
    arrow-up
    5
    ·
    5 小时前

    Holy shit. This happened to me last week.

    Turned off Safe Boot when going back over to Win on a dualboot after 6 months. Wanted to avoid updates nuking by dualboot option.

    …enter Bitlocker recovery for Every. Single. Logon.

    Just need to do one thing that meeds genuine Win11 fingerprint and then I’m doing a 22.1 fresh install.

  • CubitOom@infosec.pub
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    2 小时前

    I thought bitlocker had a maximum of 20 digits for the pin and only numbers were allowed.

    • joveice@lemm.ee
      link
      fedilink
      English
      arrow-up
      4
      ·
      3 小时前

      Don’t know the pin limit/requirements, but the recovery token is a 48 digit token