← Home ← Back to /g/

Thread 105750772

33 posts 14 images /g/
Anonymous No.105750772 [Report] >>105750819 >>105750826 >>105750829 >>105750843 >>105752636 >>105752662 >>105752812 >>105752890 >>105753008 >>105754596
.
Anonymous No.105750796 [Report] >>105754565
oralcumshot
Anonymous No.105750798 [Report]
Womp Womp
Anonymous No.105750819 [Report]
>>105750772 (OP)
Give it back, Jamal.
Anonymous No.105750826 [Report] >>105752427
>>105750772 (OP)
>on today's episode of "i used a memescript to disable recovery key backup"
Just as niggers are the reason why knives, guns and sewing machines are now banned, idiots like this are the reason why Microsoft wants you to use their online accounts, and back up your BitLocker key to it.
Anonymous No.105750829 [Report]
>>105750772 (OP)
>has physical access to the machine
>still can't get into it
lmfao
Anonymous No.105750843 [Report] >>105753008
>>105750772 (OP)
And this is why you never store anything important on the boot drive.
Anonymous No.105752427 [Report] >>105752521
>>105750826
classic creating a problem (automatic device encryption) and making a solution for that problem
people that don't know the key are the people that DIDN'T encrypt their drives themselves
you are retarded
Anonymous No.105752521 [Report] >>105752625 >>105753342
>>105752427
Fair point, howthoughever you can disable it with rufus (even though it shouldn't be enabled by default).
Anonymous No.105752625 [Report] >>105754523
>>105752521
Stop shilling gayfus
Anonymous No.105752632 [Report]
You can access your bitlocker key from your ms account.
Anonymous No.105752636 [Report] >>105752679 >>105752844 >>105752867 >>105753008 >>105753201
>>105750772 (OP)
can glowies bypass this?
Anonymous No.105752662 [Report]
>>105750772 (OP)
It doesn't actually look that sharp on my screen because the gpu stuff can't load or whatever? It looks like the BIOS booting so you only have very basic display sharpness.
Anonymous No.105752679 [Report]
>>105752636
Key Vulnerabilities Against State Actors
Physical Access Exploits:

The Bitpixie vulnerability (CVE-2023-21563) allows attackers with brief physical access to extract BitLocker keys in minutes via DMA attacks.

Cold boot attacks can bypass encryption by freezing RAM to recover keys, especially if Memory Overwrite Request (MOR Bit) isn't enabled.

Configuration Weaknesses:

TPM-only mode (without pre-boot PIN) is highly vulnerable to bus sniffing or firmware attacks.

Outdated firmware/TPM chips lack protections against hardware-level exploits.

Backdoor and Supply Chain Risks:

Microsoft's confirmed cooperation with the NSA raises concerns about intentional backdoors.

Closed-source code prevents independent audits, making undetected compromises likely.

State-Sponsored Weaponization:

Iranian group DEV-0270 (Nemesis Kitten) abuses BitLocker to encrypt systems in ransomware operations, typically within 48 hours of infiltration.

Mitigation Strategies
Pre-Boot Authentication: Always combine TPM with a strong PIN to block physical attacks.

Secure Boot: Enable and validate to prevent bootkit compromises.

Firmware Hardening: Update BIOS/UEFI and enable MOR Bit to counter cold boot/RAM extraction.

Air-Gapping: For extreme threats, isolate sensitive systems from networks.
Anonymous No.105752812 [Report] >>105753331
>>105750772 (OP)
I really don't understand the need for a whole disk encryption for not enterprise usecases, having a separate partition or, even less, a dedicated directory for encrypting your sensitive data is more than enough.
>inb4 to avoid tyrone from using it
Implying tyrone doesn't just go to chang to have the hd formatted and a fresh reinstallation regardless.
Anonymous No.105752844 [Report]
>>105752636
Yes. Your key is stored with Microsoft, a glowie company
Anonymous No.105752867 [Report]
>>105752636
Can the powers that be,( who have access to secret undocumented instruction sets on your CPU, who created the very global network you are addicted to, and who catalog all your data both locally and on the global network ) bypass the very software they put in place?
No, absolutely not. You are free to do whatever you want.
Anonymous No.105752890 [Report] >>105752900
>>105750772 (OP)
123456
Anonymous No.105752900 [Report]
>>105752890
That's amazing! I got the same combination on my luggage!
Anonymous No.105753008 [Report] >>105753264 >>105753562
>>105750772 (OP)
>>105750843
>>105752636
Here is how to break every encryption on Windows in under a minute. This shit was found out over a year ago and people still act like anything on Windows is safe lmao
https://www.youtube.com/watch?v=wTl4vEednkQ
Anonymous No.105753201 [Report]
>>105752636
Do you really need to ask this?
Anonymous No.105753264 [Report] >>105753307
>>105753008
>that bullshit video again
Skipping the parts where he:
A) spent about 8 months designing the attachment,
B) it only works on that exact model of laptop,
C) the reason he chose that exact model of laptop was its easily-accessed signal lines for its discrete TPM,
D) Windows 11 only supports systems with fTPMs for this very reason,
E) it doesn't break "every encryption", all it does is sniff the SRK off the LPC bus - used by exactly one encryption subsystem in Windows: BitLocker - and only in its default config.
F) That faggot bans/deletes anyone who points any of this out.
If you want me to laugh at your retardation some more, keep posting.
Anonymous No.105753307 [Report] >>105753382
>>105753264
Yeah keep defending your flawed encryption wincuck
Anonymous No.105753331 [Report]
>>105752812
if you live in a shithole this stops thiefs from easily copying your data
Anonymous No.105753342 [Report] >>105754523
>>105752521
>even though it shouldn't be enabled by default
It should be at least on laptops or any other portable devices
Anonymous No.105753382 [Report] >>105753465
>>105753307
Sorry, but lying freetards always get caught.
The sooner you learn this lesson, the better.
Anonymous No.105753465 [Report] >>105754583
>>105753382
How is it lying when you can literally crack the encryption of a trillion dollar company with 10 dollar tools and open source software?
Anonymous No.105753562 [Report]
>>105753008
That only works if your bitlocker is configured to use TPM and not a password
Anonymous No.105754523 [Report]
>>105752625
Rufus is keyed though.
>>105753342
No. It should be user's choice whether to enable muh security feature or not. Security nowadays is mostly an excuse to justify making things worse and taking the power from the user. It already started back in the Windows 7 era, when they started requiring devs to sign their drivers.
Anonymous No.105754565 [Report]
>>105750796
Yeah, that fits.
Anonymous No.105754583 [Report] >>105755530
>>105753465
>"h-he did it in under a minute"
>actually took him eight months
>with a 12yo laptop he specifically chose because it was easy to attack
PS: still laughing at your retardation.
Anonymous No.105754596 [Report]
>>105750772 (OP)
just kill yourself already nigger
free your mom from the burden of caring for a worthless piece of shit like you
Anonymous No.105755530 [Report]
>>105754583
It's not the fact that he did it in 8 months or 1 minute it's the fact that it's possible in the first place you fucking retard