Hot Take Microsoft Gave FBI Keys To Unlock Encrypted Data

nicolaasjan

Level 6
Thread author
Verified
Well-known
May 29, 2023
212
1,632
469
The Netherlands
Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw

https://archive.ph/0OaJ9

Early last year, the FBI served Microsoft with a search warrant, asking it to provide recovery keys to unlock encrypted data stored on three laptops. Federal investigators in Guam believed the devices held evidence that would help prove individuals handling the island’s Covid unemployment assistance program were part of a plot to steal funds.
The data was protected with BitLocker, software that’s automatically enabled on many modern Windows PCs to safeguard all the data on the computer’s hard drive. BitLocker scrambles the data so that only those with a key can decode it.
It’s possible for users to store those keys on a device they own, but Microsoft also recommends BitLocker users store their keys on its servers for convenience. While that means someone can access their data if they forget their password, or if repeated failed attempts to login lock the device, it also makes them vulnerable to law enforcement subpoenas and warrants.
In the Guam case, it handed over the encryption keys to investigators.
Microsoft confirmed to Forbes that it does provide BitLocker recovery keys if it receives a valid legal order. “While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide... how to manage their keys,” said Microsoft spokesperson Charles Chamberlayne.
He said the company receives around 20 requests for BitLocker keys per year and in many cases, the user has not stored their key in the cloud making it impossible for Microsoft to assist.
 
Love my Chromebook.

Unlike Windows BitLocker (which often automatically uploads a recovery key to Microsoft servers), ChromeOS device encryption ("Cryptohome") is strictly derived from the user's password and the local Titan-C security chip (Google Support, 2025). Google explicitly states that if a user forgets their password, the local data is irretrievable. The only option is a "Powerwash" (factory reset), which wipes all local data (Google Chrome Enterprise Help, 2025).

Google does not possess a "Master Key" or "Recovery Key" for individual Chromebook hard drives. The decryption key exists only in the device's volatile memory after the user successfully authenticates (Chromium Projects, 2025).

Google can provide data stored in Google Drive, Gmail, or Photos if served with a warrant, as they manage those servers. However, they cannot remotely unlock the physical Chromebook to reveal unsynced local files (e.g., PDFs, offline work, Downloads folder, Android/Linux partitions).
 
A very low number. I'm not to worried about it, but it's good information to know. I wonder if some VPN providers are coughing up more users data annually when cornered?
He said the company receives around 20 requests for BitLocker keys per year and in many cases, the user has not stored their key in the cloud making it impossible for Microsoft to assist.
 
Last edited:
Love my Chromebook.

Unlike Windows BitLocker (which often automatically uploads a recovery key to Microsoft servers), ChromeOS device encryption ("Cryptohome") is strictly derived from the user's password and the local Titan-C security chip (Google Support, 2025). Google explicitly states that if a user forgets their password, the local data is irretrievable. The only option is a "Powerwash" (factory reset), which wipes all local data (Google Chrome Enterprise Help, 2025).

Google does not possess a "Master Key" or "Recovery Key" for individual Chromebook hard drives. The decryption key exists only in the device's volatile memory after the user successfully authenticates (Chromium Projects, 2025).

Google can provide data stored in Google Drive, Gmail, or Photos if served with a warrant, as they manage those servers. However, they cannot remotely unlock the physical Chromebook to reveal unsynced local files (e.g., PDFs, offline work, Downloads folder, Android/Linux partitions).
But I believe there is an option for recovery, but it is not enabled by default
 
Should MS withhold BL keys of suspected criminals drives!
Okay, now this will sound apsurd, but yes.
Don't get me wrong, I'm all for fighting crime, but when company holds your encryption keys, this is where the point and benefits of encrypting data stop. Then it's no different from storing your files publicly without password.

When company has your encryption keys it can access all your data and without your knowledge; all it takes is a rouge employee and/or hacker to expose the data. Of course, this doesn't happen often, but there were cases from various other companies being victims of hacking attacks and rogue employees exposing user data. And remember: the point of encryption is that no one has access to your data except you.

We could easily ban the encryption, but at what cost? Decreased level of security and privacy. I mean, even if Microsoft swears "we will never take a peek at your data", nothing is preventing them from casually looking at user data. There's a reason why encryption exists and why is encouraged to be used.

Microsoft doesn't need to be part of this; they could easily say "we don't have anything" like anonymous VPN services and the authorities will leave them alone. It's nice to help authorities bust the crime, but this also breaks trust people had in you.
 
Okay, now this will sound apsurd, but yes.
Don't get me wrong, I'm all for fighting crime, but when company holds your encryption keys, this is where the point and benefits of encrypting data stop. Then it's no different from storing your files publicly without password.

When company has your encryption keys it can access all your data and without your knowledge; all it takes is a rouge employee and/or hacker to expose the data. Of course, this doesn't happen often, but there were cases from various other companies being victims of hacking attacks and rogue employees exposing user data. And remember: the point of encryption is that no one has access to your data except you.

We could easily ban the encryption, but at what cost? Decreased level of security and privacy. I mean, even if Microsoft swears "we will never take a peek at your data", nothing is preventing them from casually looking at user data. There's a reason why encryption exists and why is encouraged to be used.

Microsoft doesn't need to be part of this; they could easily say "we don't have anything" like anonymous VPN services and the authorities will leave them alone. It's nice to help authorities bust the crime, but this also breaks trust people had in you.
Google will do the same if the authorities have warrant.

Here, even banks expose all personal data for such a warrant.
 
And I guess it's one of those things most people don't realize, that since the keys are backed up to your account, Microsoft could have access if they thought it was "absolutely" needed for an investigation.

So if everyone knew this worldwide, we would print our keys off, or at least copy them as an encrypted .doc for a backup?
 
But I believe there is an option for recovery, but it is not enabled by default
You are correct.

The feature called "Local Data Recovery" was introduced (approx. ChromeOS v118) that allows users to regain access to local files after a password reset.

This feature is OFF by default. Users (or Enterprise Admins) must manually navigate to Settings > Security & Privacy > Local data recovery to enable it.

If enabled, ChromeOS backs up the cryptographic keys (wrapped with your Google Account credentials) to the cloud. This allows you to unlock your local storage by signing in online, even if you forgot the original device password.

Enabling this feature essentially mimics the "BitLocker" scenario mentioned. It creates a recovery path via Google, meaning if law enforcement compels Google to provide access to your account/keys, the device's local storage could potentially be decrypted.

If this setting remains OFF (the standard state), the original rule applies. Forgetting the password results in a "Powerwash" (total data wipe) because the keys are not escrowed with Google.
 
1769190964652.png
 
People just need to assume that everything they do online is being harvested by someone and that any data they have in the cloud can be accessed by someone. The idea that you can stay private while being online is a fallacy.
I believe you can have privacy online, but in order to achieve that you need to use completely open source products and services.
 
Not surprising as others have said because it's MS off course they are going to assist the feds. But mark my words this is just the tip of the iceberg, if people knew how much data the government has access to and how much surveillance is currently going on there would be riots of the streets.

So if everyone knew this worldwide, we would print our keys off, or at least copy them as an encrypted .doc for a backup?

Yes this is what you do print off keys or save encrypted archive file, 7zip or PeaZip even encrypted/password protected .zip fiile is a good way to keep encryption keys safe.

This method is good for anything that you need to keep complex keys/passwords etc..

A very low number. I'm not to worried about it, but it's good information to know. I wonder if some VPN providers are coughing up more users data annually when cornered?

The thing is no VPN provider is going to prison to protect a user for $5 a month, it's just stupid to think otherwise. VPN servers are great honeypots for surveillance!

And I know for a fact some (most actually) governments do full take packet capture of VPN traffic inside their countries and store for decryption later on or even years into the future when it can be broken. TOR is even worse, I would assume all traffic is collected and stored.
 
Just go by the rule of: "If more than one person knows the information then the information is never private" that's it.

Unbreakable crypto of today might be a cake walk X amount of years form now; just look at Enigma.

The AI that broke Enigma wasn't even written to brute force Enigma it was written to know the semantic structure of the German language based off the Grimm's Children Book stories. A Children book story broke enigma.