Please provide comments and solutions that are helpful to the author of this topic.
Note the law talk, they do not provide the direct access, but they can, if asked for it, whether it is related to Patriot Act or hate speech is up for the interpretation by lawyers.
- Microsoft does not provide any government with direct and unfettered access to our customers’ data, and we do not provide any government with our encryption keys or the ability to break our encryption.
If the system didn't reboot it will probably be easy to dump memory with some kind of an attack without a need to request access although they probably have other methods too and if everything fails they can just request legal access from Microsoft or if they are lazy And if Microsoft would have refused some departments have Israeli software that's built for iOS , android , windows etcWhat backdoor, Bitlocker keys are generally stored in MSA, MS proudly admits that it is helping police as per law to access onedrive, outlook and such to help to fight the "crime".
Always encrypt files and file names before uploading them online, that should help you to avoid AI's private files detection, banning the account or facing criminal charges.
An update on our approach to tackling intimate image abuse - Microsoft On the Issues
Since 2015, Microsoft has recognized the very real reputational, emotional, and other devastating impacts that arise when intimate imagery of a person is shared online without their consent. However, this challenge has only become more serious and more complex over time, as technology has...blogs.microsoft.com
About our practices and your data - Microsoft & Data Law
At Microsoft, we believe customers deserve to understand our policies for responding to government requests for their data. This transparency also helps inform policymakers as they work to modernize laws that impact our customers. In addition to the detailed frequently asked questions (FAQs)...blogs.microsoft.com
Note the law talk, they do not provide the direct access, but they can, if asked for it, whether it is related to Patriot Act or hate speech is up for the interpretation by lawyers.
Yes, several options are available, pagefile being the main one, removing it at shutdown works till the PC is reset, then it is pointless.If the system didn't reboot it will probably be easy to dump memory with some kind of an attack without a need to request access
rem Encrypt the Pagefile
fsutil behavior set EncryptPagingFile 1
rem 1 - The device does not store the user's credentials for automatic sign-in after a Windows Update restart. The users' lock screen apps are not restarted after the system restarts.
reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableAutomaticRestartSignOn" /t REG_DWORD /d "1" /f
rem Determines how many user account entries Windows saves in the logon cache on the local computer.
reg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "CachedLogonsCount" /t REG_DWORD /d "0" /f
rem 1 - Do not allow storage of passwords and credentials for network authentication in the Credential Manager
reg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "DisableDomainCreds" /t REG_DWORD /d "1" /f
rem Digest Security Provider is disabled by default, but malware can enable it to recover the plain text passwords from the system’s memory (+CachedLogonsCount/+DisableDomainCreds/+DisableAutomaticRestartSignOn)
reg add "HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest" /v "Negotiate" /t REG_DWORD /d "0" /f
reg add "HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest" /v "UseLogonCredential" /t REG_DWORD /d "0" /f
rem Restrict Delegation of Credentials
rem https://medium.com/blue-team/preventing-mimikatz-attacks-ed283e7ebdd5
reg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "DisableRestrictedAdmin" /t REG_DWORD /d "0" /f
reg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "DisableRestrictedAdminOutboundCreds" /t REG_DWORD /d "1" /f
rem https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection
reg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "RunAsPPL" /t REG_DWORD /d "1" /f
reg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "RunAsPPLBoot" /t REG_DWORD /d "2" /f
They can just implement malware in some controller firmware and give the PC back to y XDYes, several options are available, pagefile being the main one, removing it at shutdown works till the PC is reset, then it is pointless.
Code:rem Encrypt the Pagefile fsutil behavior set EncryptPagingFile 1 rem 1 - The device does not store the user's credentials for automatic sign-in after a Windows Update restart. The users' lock screen apps are not restarted after the system restarts. reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableAutomaticRestartSignOn" /t REG_DWORD /d "1" /f rem Determines how many user account entries Windows saves in the logon cache on the local computer. reg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "CachedLogonsCount" /t REG_DWORD /d "0" /f rem 1 - Do not allow storage of passwords and credentials for network authentication in the Credential Manager reg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "DisableDomainCreds" /t REG_DWORD /d "1" /f rem Digest Security Provider is disabled by default, but malware can enable it to recover the plain text passwords from the system’s memory (+CachedLogonsCount/+DisableDomainCreds/+DisableAutomaticRestartSignOn) reg add "HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest" /v "Negotiate" /t REG_DWORD /d "0" /f reg add "HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest" /v "UseLogonCredential" /t REG_DWORD /d "0" /f rem Restrict Delegation of Credentials rem https://medium.com/blue-team/preventing-mimikatz-attacks-ed283e7ebdd5 reg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "DisableRestrictedAdmin" /t REG_DWORD /d "0" /f reg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "DisableRestrictedAdminOutboundCreds" /t REG_DWORD /d "1" /f rem https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection reg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "RunAsPPL" /t REG_DWORD /d "1" /f reg add "HKLM\System\CurrentControlSet\Control\Lsa" /v "RunAsPPLBoot" /t REG_DWORD /d "2" /f
Wait, are you saying hibernating the PC with BitLocker enabled won't work, and they can still bypass the need for the BitLocker PIN?If the system didn't reboot it will probably be easy to dump memory with some kind of an attack without a need to request access although they probably have other methods too and if everything fails they can just request legal access from Microsoft or if they are lazy And if Microsoft would have refused some departments have Israeli software that's built for iOS , android , windows etc
With all kinds of methods to crack , bypass etc
Ot will have to go through a whole cold boot and that will fully stop only that specific methodWait, are you saying hibernating the PC with BitLocker enabled won't work, and they can still bypass the need for the BitLocker PIN?
Israel has extraction tools for Linux too and they are easier then iphones to work withMicroSoft is the US Governments lapdog, when the government tels them to bark they will obey.
That means shutting it down, or does it mean shutting it down and then turning off the PSU (there's a switch in the back of the PC)?Ot will have to go through a whole cold boot and that will fully stop only that specific method
The solutions above will partially protect against it
Governments and organized cyber criminals have all kinds of methods. They are on a continuous development cycle of probing any aspect of any software and hardware for ways to exploit it. They literally have hundreds of tricks in their rabbit hat.And even if that's true, you're saying that there's many other methods we don't know, that agencies like the NSA or police do know about?
(Microsoft is no different than any other software publishers. Ideological people who contributed to FOSS projects meant to be anti-establishment have cooperated with many governments when those governments showed them who is boss. So much for those projects statement of "We will never cooperate! Never!")MicroSoft is the US Governments lapdog, when the government tells them to bark they will obey.