The data that I didn’t know I didn’t have to back up to Microsoft’s cloud

I spent more time than I’d planned Friday afternoon poking around the security settings of my Windows laptop, then undoing one setting that I am somewhat embarrassed to admit I had scarcely thought about over the previous two and a half years of using this HP.

The FBI gets some credit for that for making me rethink my own device security after some of its agents raided Washington Post reporter Hannah Natanson’s home two weeks ago and seized several of her devices–an obvious move to intimidate journalists– leaving the storage encryption on that hardware as the last line of defense for her data.

Forbes security writer Thomas Brewster gets the rest of the credit for a strong post Friday morning unpacking how Microsoft’s approach to device encryption via its BitLocker software can leave Windows computers open to law enforcement investigators who bring a valid legal order to the company requesting a particular user’s encryption recovery key.

“It’s possible for users to store those keys on a device they own, but Microsoft also recommends BitLocker users store their keys on its servers for convenience,” Brewster wrote. “While that means someone can access their data if they forget their password, or if repeated failed attempts to login lock the device, it also makes them vulnerable to law enforcement subpoenas and warrants.”

He reported that Microsoft gets about 20 requests a year for BitLocker keys but cannot respond to many of them because the customers involved didn’t back up those keys to its cloud.

Windows 11 Home’s Device Encryption isn’t branded as BitLocker in the Settings app, but it runs on the same framework. And as in the Pro, Enterprise and Education editions of Windows 11, it allows a choice of key-backup locations–which I did not realize until eyeballing Microsoft’s documentation after I’d read Brewster’s post.

I had gone unthinkingly with the default of having the recovery key backed up to my Microsoft 365 cloud storage; I don’t remember even being presented with a choice when I set up the computer in August of 2023. But since the key is only a string of 48 numbers periodically separated by dashes, there was no point in keeping it there.

Instead, I saved it in my end-to-end-encrypted password manager 1Password, where the security design does not expose backdoors that can be opened with a court order. Then I deleted the backed-up recovery key from my M365 storage after clicking a checkbox to confirm that I’d saved the key elsewhere–along with seven older ones I found saved there, going back to a Surface laptop I reviewed a decade or so ago.

(I don’t know how long it will take for this data to be gone from my online storage, although there is the option of decrypting and re-encrypting the laptop to ensure the old key is useless.)

I never should have taken Microsoft up on this offer. But Microsoft should not be leaving users in this position–as Johns Hopkins University cryptography professor Matthew Green told Brewster in that article. Apple’s FileVault device encryption now automatically encrypts recovery keys backed up to the company’s iCloud service (see this explainer from my friend Glenn Fleishman at Six Colors), leaving nothing for a third party to inspect with a warrant.

There are many areas where Microsoft can’t readily catch up with Apple, starting with having a mobile platform to complement its desktop operating system. But this should not be one of them.

#BitLocker #diskEncryption #encryption #FBI #HannahNatanson #keyEscrow #M365 #Microsoft365 #MicrosoftBackup #Windows11Home #WindowsDeviceEncryption

Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw | Forbes

This is the future of which GCHQ wants for all global encryption: “Microsoft confirmed to Forbes that it does provide BitLocker recovery keys if it receives a valid legal order. “While key re…

Dropsafe
Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw | Forbes
https://alecmuffett.com/article/142847
#EndToEndEncryption #HomeOffice #KeyEscrow #apple #encryption #gchq #privacy #surveillance
Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw | Forbes

This is the future of which GCHQ wants for all global encryption: “Microsoft confirmed to Forbes that it does provide BitLocker recovery keys if it receives a valid legal order. “While key re…

Dropsafe

Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw | Forbes

This is the future of which GCHQ wants for all global encryption:

“Microsoft confirmed to Forbes that it does provide BitLocker recovery keys if it receives a valid legal order. “While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide… how to manage their keys,” said Microsoft spokesperson Charles Chamberlayne.”

https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/

#apple #encryption #endToEndEncryption #gchq #homeOffice #keyEscrow #privacy #surveillance
Microsoft Gave FBI Keys To Unlock Encrypted Data, Exposing Major Privacy Flaw

The tech giant said providing encryption keys was a standard response to a court order. But companies like Apple and Meta set up their systems so such a privacy violation isn’t possible.

Forbes
The EU wants to decrypt your private data by 2030 | TechRadar

LOL the European Union has discovered FBI plans from 1999 regarding key escrow:

Dropsafe

The EU wants to decrypt your private data by 2030 | TechRadar

LOL the European Union has discovered FBI plans from 1999 regarding key escrow:

https://www.techradar.com/vpn/vpn-privacy-security/the-eu-wants-to-decrypt-your-private-data-by-2030

#endToEndEncryption #europeanUnion #fbi #keyEscrow #surveillance

The EU wants to decrypt your private data by 2030

The EU Commission unveiled the first step in its security strategy to ensure "lawful and effective" law enforcement access to data

TechRadar

@Catwoman69y2k @dragonfriend most importantly:

Only with #SelfCustody of all the keys, #SelfHosting of the entire infrastructure and everything being #OpenSource, one can assure (and [let it be] audit[ed] independently) that the #advertised #promises are in fact true.

Cuz not expecting @Mer__edith to break is the same level of "#TrustMeBro!" assurances as #ANØM, #EncroChat, #SkyECC, #WhatsApp etc. do in their #advetising #lies!

  • Remember: Corporations/Foundations/non-profits/... don't have a right to be silent , only individuals, and even then there are certain juristictions that have #KeyEscrow laws (i.e. #France, #Russia, #KSA, #China, #India, #UK , ...) in the books!
thaddeus e. grugq on Twitter

“I’m gonna tell you a secret about “logless VPNs” — they don’t exist. Noone is going to risk jail for your $5/mo https://t.co/Q2aOQJkG4g”

Twitter
Former UN Rapporteur David Kaye: “for anyone who ever argued for key escrows, i offer you the example of the muskovites rampaging through USG systems” | Ofcom, please take note…
https://alecmuffett.com/article/111104
#DavidKaye #ElonMusk #EndToEndEncryption #KeyEscrow #backdoors #privacy
Former UN Rapporteur David Kaye: “for anyone who ever argued for key escrows, i offer you the example of the muskovites rampaging through USG systems” | Ofcom, please take note…

…but of course I’m certain that it could never happen here. <cough>Reform Party</cough>

Dropsafe

Former UN Rapporteur David Kaye: “for anyone who ever argued for key escrows, i offer you the example of the muskovites rampaging through USG systems” | Ofcom, please take note…

…but of course I’m certain that it could never happen here.

<cough>Reform Party</cough>

https://bsky.app/profile/davidakaye.bsky.social/post/3lh7qhncccs2u

#backdoors #davidKaye #elonMusk #endToEndEncryption #keyEscrow #privacy

David Kaye (@davidakaye.bsky.social)

niche comment: for anyone who ever argued for key escrows, i offer you the example of the muskovites rampaging through USG systems.

Bluesky Social

Remember that #story last week, where the #US #FBI came out and actually recommended people switch to using #encrypted #communications, because Chinese government hackers had burrowed deeply into the US phone infrastructure ?

Remember the #cognitive #dissonance that announcement caused, after literally decades of the FBI and other #American #intelligence agencies demanding backdoors and key escrow and deliberately weakened #encryption #algorithms?

Ya, well, apparently part of that announcement was missed. They're still demanding "responsibly managed encryption":

https://www.forbes.com/sites/zakdoffman/2024/12/11/fbi-warns-iphone-android-users-change-whatsapp-facebook-messenger-signal-apps/

Remember: "responsible encryption" is neither. It's their demand for a back-door. And every back door can be used by the "bad guys" just as easily as it can be used by the "good guys". Anyone who tells you different is #lying to your face; encryption is math, and there is no such thing as math which the "good guys" can do but which the "bad guys" cannot.

The #USA intelligence agencies' demand for backdoors to be built into all parts of the #phone system years ago are exactly what let the #Chinese government #hackers to penetrate and control the phone system now, and which they aren't going to be able to fix for many years, if at all, because it would require replacing a *lot* of equipment with versions that don't have back doors (and which would then not be eavesdrop-able at will).

#CognitiveDissonance #BackDoor #KeyEscrow #ClipperChip #network

FBI Warns iPhone, Android Users—Change WhatsApp, Facebook Messenger, Signal Apps

FBI warns all users to stop texting—but secure messaging apps must also be changed. Here’s what you need to know.

Forbes