Do not store your Bitlocker encryption keys on Microsoft's servers if your threat model includes governments or law enforcement. As this article points out, this is the result of a design choice Microsoft made. It didn't have to be this way.
Do not store your Bitlocker encryption keys on Microsoft's servers if your threat model includes governments or law enforcement. As this article points out, this is the result of a design choice Microsoft made. It didn't have to be this way.
@evacide
Or, because this is Microsoft we are talking about, anyone who shows up virtually with a golden authentication ticket they got through an official API surface because Azure security is a mess...
Having encryption keys stored in plaintext on any cloud service is just a completely irresponsible and bonkers design.

VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files.
@nonlinear They said they recommended BitLocker because they couldn't recommend their own product because they couldn't continue supporting it. I'm not sure it was anything more than "since we cannot support our product any longer, here is a product which at least is supported".
The project itself continued as VeraCrypt.
@jmcrookston @nonlinear VeraCrypt is pretty interesting: It uses mouse movements for randomization. Windows, Mac & Linux available.
more reading here: https://en.wikipedia.org/wiki/VeraCrypt
VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files.
@evacide The Trump era has shown “government or law enforcement” should *always* be in your threat model.
The US is not alone in this. Lots of governments have been pushing boundaries.
@byrnensorg @evacide
Do you think your data is more secure now?
You should encrypt your data, but don't send the keys to Microsoft or any other company.
And if you don't trust Microsoft, then you shouldn't use Windows anymore.
@byrnensorg @evacide
Which operating system? - I don't want to answer that, because it's off-topic.
I recommend encrypting the data without sharing the key. There are several solutions for this. BitLocker or other software, which you can easily find on Wikipedia.
@byrnensorg @evacide
According to the Forbes article, Microsoft can only hand over the key to evil surveillance agencies or criminals if you, as a computer user, have chosen the option to store your secret, private key in the Microsoft Cloud.
So skip this extra step and decide not to save ANYTHING with Microsoft anymore.
This makes it more complicated for you personally, because you have to take care of a different, secure storage method for your keys and data.
manage-bde -protectors -get D: to find the ID of "Numerical Password" (recovery key) and delete it with manage-bde -protectors -delete -id ID D: .@evacide In principle that would also include anyone who knows my email address and can set up a phishing website, right?
Government agencies need whatever a valid warrant is in their jurisdiction, but a user just has to log in to their account and click through the "I forget my Bitlocker password" workflow.
So someone who knows me, or stole my laptop bag with my business cards in it, knows who to phish to get into an account likely to have my recovery key, right?
@evacide Simply deactivate Bitlocker. Bad by design and a gate wide open to lock YOU OUT.
Just use Veracrypt or something like that on a second drive ou usb stick to protect the very sensible data......and at least, deactivate Bitlocker, that force windows recall or whatever is name to deactivate too.
@evacide “#Microsoft says it will provide encryption keys for Windows PC data protected by BitLocker where it has access to them and it's received a valid warrant.”
The word “valid” sure is doing a lot of work there. This is the most corrupt DoJ and FBI in generations. One that ignores court rulings that it disagrees with. So what way is the warrant “valid”? Syntactically? Grammatically? Because if we get any deeper, like morally or ethically, the argument gets harder to make.
@evacide
(If your threat model includes governments, law enforcement or any half-competent attacker)
... you must also add a PIN to your Bitlocker config. Extracting the bitlocker encryption key at boot can be achieved with a 300$ logic analyzer.