Do not store your Bitlocker encryption keys on Microsoft's servers if your threat model includes governments or law enforcement. As this article points out, this is the result of a design choice Microsoft made. It didn't have to be this way.

https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/

Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw

The tech giant said providing encryption keys was a standard response to a court order. But companies like Apple and Meta set up their systems so such a privacy violation isn’t possible.

Forbes
Because of limited space, I am using "governments or law enforcement" as shorthand for anyone who can show up at Microsoft with a valid court order for your data. This is not a 1-to-1 mapping. I understand the difference and I don't feel like arguing about it.
@evacide To paraphrase Hank: "Government and government-accessories"

@evacide
Or, because this is Microsoft we are talking about, anyone who shows up virtually with a golden authentication ticket they got through an official API surface because Azure security is a mess...

Having encryption keys stored in plaintext on any cloud service is just a completely irresponsible and bonkers design.

@evacide If you're limited by space, "governments or law enforcement" could be shorthanded into just "they", but then maybe it depends on each person's mental state what "they" would mean.
🤔
@evacide there are more compact shorthands like “cops” and “glowies” 
@evacide I still wonder what happened at the end of TrueCrypt, especially since they recommended using Bitlocker when they shut the project down. I've always had the feeling that govt was involved.
@nonlinear @evacide The project continued as VeraCrypt: https://veracrypt.io/en/Home.html
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid

VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files.

@nonlinear They said they recommended BitLocker because they couldn't recommend their own product because they couldn't continue supporting it. I'm not sure it was anything more than "since we cannot support our product any longer, here is a product which at least is supported".

The project itself continued as VeraCrypt.

@jmcrookston @nonlinear VeraCrypt is pretty interesting: It uses mouse movements for randomization. Windows, Mac & Linux available.

more reading here: https://en.wikipedia.org/wiki/VeraCrypt

VeraCrypt - Wikipedia

@dxzdb As I recall they paid for a security audit as well.
@jmcrookston Nice! Probably another good place to donate to... I bet most corporations using MS stuff just recommend BitLocker as well
@nonlinear @evacide The successor is Veracrypt, a fork from Truecrypt. https://veracrypt.io/en/Home.html
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid

VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files.

@evacide Upgrade to Linux and use LUKS.
@AstaMcCarthy @evacide Fuck yeah. That’s been my setup since forever.

@evacide The Trump era has shown “government or law enforcement” should *always* be in your threat model.

The US is not alone in this. Lots of governments have been pushing boundaries.

@evacide @shufflecake a bit of shameless self-promotion: it looks like we'll be able to launch a prototype for a fully hidden OS using #Shufflecake somewhere this year. And, no, we don't have an option for uploading encryption keys to "the Cloud" 😂 https://shufflecake.net/
Shufflecake

@evacide Not that the law is after me.... yet. I scrubbed bitlocker from my system and deleted the keys from my account, so good luck with that MS.

@byrnensorg @evacide
Do you think your data is more secure now?

You should encrypt your data, but don't send the keys to Microsoft or any other company.

And if you don't trust Microsoft, then you shouldn't use Windows anymore.

@go @evacide I don't trust any company basically, and detest cloud based solutions, my back ups are on external drives. I got rid of one drive on day one. What OS would you suggest for light gaming and graphics works?

@byrnensorg @evacide
Which operating system? - I don't want to answer that, because it's off-topic.

I recommend encrypting the data without sharing the key. There are several solutions for this. BitLocker or other software, which you can easily find on Wikipedia.

@go @evacide Bitlocker? the same bitlocker that sold keys to the FBI and Europol so they could open devices without using pass keys, ok, I thought you knew something about this but you're a doomsayer without solutions. Stay on topic then and cheerio...

@byrnensorg @evacide
According to the Forbes article, Microsoft can only hand over the key to evil surveillance agencies or criminals if you, as a computer user, have chosen the option to store your secret, private key in the Microsoft Cloud.

So skip this extra step and decide not to save ANYTHING with Microsoft anymore.

This makes it more complicated for you personally, because you have to take care of a different, secure storage method for your keys and data.

@evacide My surprise knows no lower bounds.
@evacide do not use M$ Software if your threat model includes governments or law enforcement
@HLunke @evacide Or anyone who might end up hacking M$.
@evacide “While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide... how to manage their keys” If you pay for Windows Pro which is 100$ more compared to Windows Home.
@evacide Simply put, do not use any Microsoft products if real security is your goal. Anything stored outside of your own hardware is not secure. Use strong (and long) passwords and never use biometrics.
@evacide I've read about it earlier today and I'm not surprised 😬 corporations doing corporations' things
@evacide Why encrypt in the first place if you give out your keys. This is the same level of stupid as SSE-S3 in #AWS
@jaj @evacide Because whenever management types get their hands on policy about cryptography, they treat it as a box to be checked off, and they break it. The premise of actual functional cryptography goes against their whole worldview of how hierarchies of control are supposed to work.
@evacide Well, thats easy. Simply, go away from Microsoft and use Linux. I changed all my IT stuff to "Open Source" and I am happy with it since years. No privacy problems, no security problems, no hidden backdoors ...
#FOSS
@evacide
If you (everyone who's reading this) have already uploaded the recovery key, use manage-bde -protectors -get D: to find the ID of "Numerical Password" (recovery key) and delete it with manage-bde -protectors -delete -id ID D: .

Bitlocker would work with no recovery key set, but if you do want to generate a new recovery key, see Microsoft documentation below:
https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/manage-bde
manage-bde

Reference article for the manage-bde command, which turns on or turns off BitLocker, specifies unlock mechanisms, updates recovery methods, and unlocks BitLocker-protected data drives.

@evacide whatsapp tut das gleiche. Da ist auch der private Schlüssel auf deren Servern hinterlegt.

@evacide In principle that would also include anyone who knows my email address and can set up a phishing website, right?

Government agencies need whatever a valid warrant is in their jurisdiction, but a user just has to log in to their account and click through the "I forget my Bitlocker password" workflow.

So someone who knows me, or stole my laptop bag with my business cards in it, knows who to phish to get into an account likely to have my recovery key, right?

@evacide The person at Forbes who described this as a 'flaw' seems like they are deliberately underselling it. At least with tech 'flaw' almost entirely implies 'error' rather than 'decision'. It's a little harsher than some of the euphemisms that vendors prefer for product defects, in order to try to normalize how many they ship; but it's absolutely exonerative of one's intentions; which is wholly undeserved.

@evacide Simply deactivate Bitlocker. Bad by design and a gate wide open to lock YOU OUT.

Just use Veracrypt or something like that on a second drive ou usb stick to protect the very sensible data......and at least, deactivate Bitlocker, that force windows recall or whatever is name to deactivate too.

@evacide#Microsoft says it will provide encryption keys for Windows PC data protected by BitLocker where it has access to them and it's received a valid warrant.”

The word “valid” sure is doing a lot of work there. This is the most corrupt DoJ and FBI in generations. One that ignores court rulings that it disagrees with. So what way is the warrant “valid”? Syntactically? Grammatically? Because if we get any deeper, like morally or ethically, the argument gets harder to make.

@evacide Personally I consider the use of microsoft for any threat model out side of not having one and not caring a bad option unless its your only option say for a service that noone else has that is to high enough standards. Just a personal opinion maybe im wrong.
@evacide
Using other words:
Do not use software from a fascist regime.

@evacide
(If your threat model includes governments, law enforcement or any half-competent attacker)
... you must also add a PIN to your Bitlocker config. Extracting the bitlocker encryption key at boot can be achieved with a 300$ logic analyzer.

https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/configure?tabs=os#require-additional-authentication-at-startup

Configure BitLocker

Learn about the available options to configure BitLocker and how to configure them via Configuration Service Providers (CSP) or group policy (GPO).

@brnrd @evacide I have been lazy and haven't tested it yet but I have bought a £70 Sipeed SLogic16U3 which i believe is fast enough to sniff the TPM so the cost is even lower now https://wiki.sipeed.com/hardware/en/logic_analyzer/slogic16u3/Introduction.html
Introduction - Sipeed Wiki

@evacide interesting. Thanks for sharing. The article refers to it as a “privacy flaw”. I guess it depends on the definition of privacy, though to me, it seems like a security flaw.
@evacide Apart from that, storing the key in the specific provider‘s cloud isn‘t a good idea anyway - the same counts for iCloud as well. There are things that should be separated from each other because of reasons, this one is just another proof for the need to do so.
@evacide
Proprietary Software can't be trusted. It's that simple
don't keep them on your microsoft-controlled, universally-backdoored computer either. microsoft, and thus the government, can get at them from your computer too. why wouldn't it?
@evacide At this point get rid of Windows if you're not running anything that's DRM-locked to that OS.