git [he/him, comrade/them]@hexbear.net to technology@hexbear.netEnglish · 3 months agoMicrosoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reportstechcrunch.comexternal-linkmessage-square6linkfedilinkarrow-up162arrow-down10cross-posted to: politics@lemmy.worldprivacy@lemmy.caprivacy@lemmy.mltechnology@beehaw.orgtechnology@lemmy.worldhackernews@lemmy.bestiver.se
arrow-up162arrow-down1external-linkMicrosoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reportstechcrunch.comgit [he/him, comrade/them]@hexbear.net to technology@hexbear.netEnglish · 3 months agomessage-square6linkfedilinkcross-posted to: politics@lemmy.worldprivacy@lemmy.caprivacy@lemmy.mltechnology@beehaw.orgtechnology@lemmy.worldhackernews@lemmy.bestiver.se
minus-squarewizardbeard@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up18·3 months agoIf it’s standard home users with their bitlocker key automatically backed up to onedrive via their microsoft account, big whoop. Should be expected. If it’s people who have no microsoft account and the key was backed up elsewhere, then it gets juicy. Almost guaranteed you’re better off using full disk encryption through something like veracrypt.
minus-squaredastanktal [comrade/them]@hexbear.netlinkfedilinkEnglisharrow-up4·3 months agoI remember reading somewhere at some point that all the BitLocker keys are sent to Microsoft. It’s a perfectly fine tool to use for commercial settings, but for personal privacy settings, it should be considered compromised.
If it’s standard home users with their bitlocker key automatically backed up to onedrive via their microsoft account, big whoop. Should be expected.
If it’s people who have no microsoft account and the key was backed up elsewhere, then it gets juicy.
Almost guaranteed you’re better off using full disk encryption through something like veracrypt.
And linux
I remember reading somewhere at some point that all the BitLocker keys are sent to Microsoft. It’s a perfectly fine tool to use for commercial settings, but for personal privacy settings, it should be considered compromised.