Your laptop probably isn't as secure as you thought.
Microsoft's Bitlocker & TPM encryption combo defeated with a $10 Raspberry Pi::The point of Microsoft's Bitlocker security feature is to protect personal data stored locally on devices and particularly when those devices are lost or otherwise physically compromised. With Bi
Its definitely sort or misleading but MS needs to really have its feet held to the fire when it comes to these things. It sort of pushes the narrative in the correct direction which is towards privacy AND security, not a half-ass balance where one or the other or both is compromised or is an illusion altogether
The Outlook stuff has demonstrated how fundamentally irresponsible and unserious they are about their obligation to secure and regulate their own systems, they need all the bad press they can get so they are compelled to do betwr
I get your joke, but it's even cheaper than a "Raspberry Pi". Pi Pico, one RP2040 chip, that's basically RPi's new version of a Teensy. I just installed one in my GameCube to defeat its "BIOS" and boot from micro SD card :P
There probably will someday be a push to prevent common normal people from having access to computer systems that offer the user root or superuser access. "ThE aVeRaGe PeRsOn DoEsNt NeEd AdMiN pErMiSsIoNs" or "think of the children". Ipads and surface pros will be allowed but something like a socket 1155 motherboard won't.
We're gonna have problems getting enough software engineers in the future. How is anyone supposed to learn when everything is locked away. It's already happening in the repair industry and the trades.
Isn't the whole point of BitLocker protection from direct access? When a computer is turned off, encryption should keep the data safe. Also when a computer is turned off, basically no remote vector is going to work. AFAIK, when the computer is on, the drive is mounted and BitLocker provides no additional protection over an unencrypted drive.
Yes, you're correct. It's just that if somebody is got full access to your hardware, with no time limits and can just poke around your pcb, BitLocker is the least of your concerns. It should still not be flawed - but at that point, even Samsung's Knox, Qualcomm's memory protection and Apple's Secure Enclave have failed in the past, allowing the tinkerer to extract decryption keys.
It's more realistic to expect BitLocker to protect your external hard drive in case I grab it and run away, rather than expecting your computer to be bullet proof in case I aprehend the entire device.
But again, I do agree, this is a vulnerability and it's an issue, though limited to people using an actual TPM module rather than the built in one in the CPU.
Correct. However, if you have a way to run a PowerShell command as an administrator, you can run a single cmdlet to get access to the bitlocker recovery key.
Yeah which is why no one cares about either. The threat vector is usually not discussed and mostly ignored by non state-level actors in practice.
I do agree that it's fascinating. My master's degree thesis was on sourcing trust and eliminating various evil maid type attacks, including supply side targeted poisoned hardware aimed at state level.