Breaking Bitlocker - Bypassing the Windows Disk Encryption (www.youtube.com)
from Kissaki@programming.dev to cybersecurity@infosec.pub on 23 Jan 20:58
https://programming.dev/post/44535381

#cybersecurity

threaded - newest

Laser@feddit.org on 23 Jan 21:42 collapse

It is (was?) actually worse

neodyme.io/…/bitlocker_screwed_without_a_screwdri…

frongt@lemmy.zip on 23 Jan 23:22 next collapse

it is pretty much applicable to all devices using the default BitLocker “Device Encryption” setup, as this configuration relies solely on Secure Boot to automatically unseal the disk during boot.

That is, only the default “transparent” bitlocker mode. If you have any other additional protection (pin, password) set it doesn’t affect you.

Onomatopoeia@lemmy.cafe on 24 Jan 04:02 collapse

Why would anyone use the “transparent” mode? Seems rather pointless.

frongt@lemmy.zip on 24 Jan 05:54 next collapse

People who prefer that much convenience vs security.

Object@sh.itjust.works on 24 Jan 06:16 collapse

The TPM takes “measurements” of the system and releases the decryption key only if they’re all correct. Files on the disk are encrypted, so booting into another OS with a bootable media doesn’t work (measurement picks up the fact that you booted into another OS). When the system does boot properly, the Windows lock screen prevents you from viewing the files.

Kissaki@programming.dev on 24 Jan 09:39 collapse

Thank you for sharing. Very interesting.

We’re currently evaluating and rolling out encryption at work, so being informed about the limits of these setups is quite good - even if it’s not actually my task to work on those.