I mean it's pretty worrisome that an encryption method has vulnerabilities..While BitLocker is designed to be a secure encryption tool, it's not impervious to all forms of attack. The video you mentioned shows a physical attack method, which requires specific hardware and technical expertise. However, this doesn't necessarily mean there's a backdoor. It's more about exploiting vulnerabilities, which can exist in any software.
Indeed, it can be concerning. However, no encryption method is 100% foolproof. The key is to stay updated with patches and use multiple layers of security to minimize risks.I mean it's pretty worrisome that an encryption method has vulnerabilities..
You mean the exploit is "reserved" for federal agencies like the NSA? Or any nation's equivalent? And not "open to the public"?I am certain it either has a backdoor or a NSA's exploited vulnerability. If you have sensitive information, you should encrypt it first then save it wherever you want. Use a container like Veracrypt's, which at least is open-source.
Lots of encryption algorithms and methods have vulnerabilities. That is why the field of cryptanalysis exists.I mean it's pretty worrisome that an encryption method has vulnerabilities..
If a user has committed a crime then it makes no difference who the software publisher is and what country they are located in - they are going to comply with a lawful order to provide infos.I mean Microsoft assumes that the average Windows user is not smart and doesn't physically backup their encryption key so they keep a copy on OneDrive so that you can at least access your cloud files in the future. I see the goodwill here even though it could be used by law enforcement to access your files in the future. But, if I remember correctly you can set a new key provided you also create a physical backup key and it won't be saved in the cloud.
If nation state agencies are targeting you, then nothing or nobody can help you. Agencies do not have unlimited resources. They are very deliberate in what and whom they target, and there are policies & procedures that must be followed throughout the entire process to ensure compliance with statues and regulations.I am certain it either has a backdoor or a NSA's exploited vulnerability. If you have sensitive information, you should encrypt it first then save it wherever you want. Use a container like Veracrypt's, which at least is open-source.
This is what I've been wondering about. If someone does NOT store their key in OneDrive, MS account etc, doesn't print it out, write it down, saves it to a file, then can law enforcement somehow recover the key without doing what stackingsmashing did?I mean Microsoft assumes that the average Windows user is not smart and doesn't physically backup their encryption key so they keep a copy on OneDrive so that you can at least access your cloud files in the future. I see the goodwill here even though it could be used by law enforcement to access your files in the future. But, if I remember correctly you can set a new key provided you also create a physical backup key and it won't be saved in the cloud.
Who is xeno?Lots of encryption algorithms and methods have vulnerabilities. That is why the field of cryptanalysis exists.
Aren't you xeno?
If a user has committed a crime then it makes no difference who the software publisher is and what country they are located in - they are going to comply with a lawful order to provide infos.
The notion that law enforcement is conducting decryption campaigns willy-nilly and Microsoft is going to assist them is the nonsense that lives on these security forums.
If nation state agencies are targeting you, then nothing or nobody can help you. Agencies do not have unlimited resources. They are very deliberate in what and whom they target, and there are policies & procedures that must be followed throughout the entire process to ensure compliance with statues and regulations.
If bitlocker had a backdoor it would have been found by now. That damn thing is old enough to apply for a driving licenseI am certain it either has a backdoor or a NSA's exploited vulnerability. If you have sensitive information, you should encrypt it first then save it wherever you want. Use a container like Veracrypt's, which at least is open-source.
Yes as @Wrecker4923 already stated.This is what I've been wondering about. If someone does NOT store their key in OneDrive, MS account etc, doesn't print it out, write it down, saves it to a file, then can law enforcement somehow recover the key without doing what stackingsmashing did?
These type videos and discussions that will never die-off until there are no more people in the world. There are similar conspiracy related topics in the mobile phone and even game console spaces.If bitlocker had a backdoor it would have been found by now. That damn thing is old enough to apply for a driving license