• Bitlocker

    From street@street@shellcrash.com to alt.2600 on Sun Jul 27 05:02:43 2025
    From Newsgroup: alt.2600

    The latest version of BitLocker, Microsoft's built-in full-disk encryption
    feature, now comes preinstalled and enabled by default on many new Windows
    devicesrCoespecially those running Windows 11 with modern security hardware
    like TPM 2.0 (Trusted Platform Module). This marks a shift in how Windows
    protects user data, and itrCOs a big win for physical security.

    BitLocker encrypts the entire contents of the drive using strong AES-based
    algorithms. If a hacker tries to remove the hard drive and access it from
    another machine, the data remains locked and unreadable without the proper
    credentials or encryption key. Even if someone steals the computer, they
    canrCOt boot into it, bypass the login, or read any of the datarCobecause
    BitLocker locks it all down at the hardware level.

    This is especially effective against a common type of attack known as "evil
    maid" attacks, where an attacker with physical access (like in a hotel room
    or office) tries to install malicious software or extract sensitive files.
    With BitLocker, even booting from a USB stick or other external device
    wonrCOt help the attackerrCobecause the drive itself is encrypted and wonrCOt
    decrypt without authentication.

    In a world where laptops are stolen, lost, or seized, BitLocker plays a
    crucial role in preventing unauthorized access. It's not just a tool for
    corporations anymorerCohome users benefit too. By turning on BitLocker by
    default, Microsoft is making sure that everyone, not just IT professionals,
    gets a solid layer of protection from physical tampering.

    Ultimately, BitLocker turns the computer itself into a vault, ensuring that
    your files stay your filesrCoeven if your hardware falls into the wrong
    hands.


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Marco Moock@mm@dorfdsl.de to alt.2600 on Mon Jul 28 16:09:44 2025
    From Newsgroup: alt.2600

    On 27.07.2025 05:02 Uhr street wrote:
    This is especially effective against a common type of attack known as
    "evil maid" attacks, where an attacker with physical access (like in
    a hotel room or office) tries to install malicious software or
    extract sensitive files. With BitLocker, even booting from a USB
    stick or other external device wonrCOt help the attackerrCobecause the
    drive itself is encrypted and wonrCOt decrypt without authentication.
    It will be interesting how governments - especially non-western - will
    handle this.
    --
    kind regards
    Marco
    Send spam to 1753585363muell@stinkedores.dorfdsl.de
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Joe Reynolds@thaijoe2050@yahoo.com to alt.2600 on Mon Aug 4 23:12:57 2025
    From Newsgroup: alt.2600

    On 7/28/2025 9:09 PM, Marco Moock wrote:
    On 27.07.2025 05:02 Uhr street wrote:

    This is especially effective against a common type of attack known as
    "evil maid" attacks, where an attacker with physical access (like in
    a hotel room or office) tries to install malicious software or
    extract sensitive files. With BitLocker, even booting from a USB
    stick or other external device wonrCOt help the attackerrCobecause the
    drive itself is encrypted and wonrCOt decrypt without authentication.

    It will be interesting how governments - especially non-western - will
    handle this.




    It's unlikely non-western (or at least non-five eyes) will be competent
    to break this.

    Well, aside from those methods involving pressure exerted in other ways.


    --- Synchronet 3.21a-Linux NewsLink 1.2