Back in January Microsoft encrypted all my hard drives without saying anything. I was playing around with a dual boot yesterday and somehow aggravated Secureboot. So my C: panicked and required a 40 character key to unlock.

Your key is backed up to the Microsoft account associated with your install. Which is considerate to the hackers. (and saved me from a re-install) But if you’ve got an unactivated copy, local account, or don’t know your M$ account credentials, your boned.

Control Panel > System Security > Bitlocker Encryption.

BTW, I was aware that M$ was doing this and even made fun of the effected users. Karma.

  • Ptsf@lemmy.world
    link
    fedilink
    arrow-up
    5
    ·
    1 hour ago

    I’ve actually had this occur before to a machine I specifically disabled the tpm on so that it wouldn’t happen (it was an account less frozen kiosk). I was fuming the entire time I spent rebuilding it.

  • yaroto98@lemmy.org
    link
    fedilink
    English
    arrow-up
    36
    ·
    5 hours ago

    Just checked my wife’s laptop. Local account, secure boot off, windows 10. It had a message telling me to setup a microsoft account to ‘finish encrypting the device’. I clicked turn off, and it’s currently decrypting the hard drive. Blech.

  • UncleGrandPa@lemmy.world
    link
    fedilink
    English
    arrow-up
    46
    arrow-down
    2
    ·
    6 hours ago

    They desperately wanted to eliminate personal computers and replace them with dumb terminals running over the net.

    When the public rejected this idea

    THIS is their response. They are still insisting on total control of our computers.

    • VitoRobles@lemmy.today
      link
      fedilink
      English
      arrow-up
      22
      ·
      5 hours ago

      They desperately wanted to eliminate personal computers and replace them with dumb terminals running over the net.

      I don’t know about that.

      Dumb terminal concept was more what Chromebook was doing.

      Microsoft is doing something even stupider.

      • CafecitoHippo@lemm.ee
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        4 hours ago

        Dumb terminal concept was more what Chromebook was doing.

        I mean, for a lot of people they’re fine especially if they’re priced appropriately. Especially with a lot more software as a service out there. My problem is that all of them have a built in drop dead date on when they’re going to stop getting updates and there’s not really a great option for the devices post ChromeOS.

        ChromeOS certainly can be a good system. I still have my old CR-48 from when I got selected to test the OS and even when it was in its infancy, it was solid. I used it for a lot of my college career because it was better than my Asus eeePC which had Ubuntu on it.

  • Phoenixz@lemmy.ca
    link
    fedilink
    arrow-up
    42
    arrow-down
    2
    ·
    10 hours ago

    Meanwhile in Linux with luls, which I’ve had since a pre-pre-pre version somewhere back in the early 2000’s, I can have multiple keys, all works like sunshine, never had problems.

    On windows… So we work with highly sensitive data, and ever since I came in I thought it insane that people working remote don’t have that highly sensitive data encrypted. We can’t switch Linux yet, so okay, we go for BitLocker.

    Boy oh boy oh boy was that a mistake.

    50 remote users, 5 get encrypted devices with BitLocker as a trial and within a month, 3 of them already got locked up permanently because apparently it’ll pwrma lock itself after x amounts of invalid passwords which is just incredibly stupid. But don’t worry, there is a backup key! Yeah, that is lie 48 characters that we’d had to pass by phone and they have to type it flawlessly.

    Suffice to say, the remote users will be running Linux soon, like it or not.

    • starman2112@sh.itjust.works
      link
      fedilink
      arrow-up
      19
      arrow-down
      1
      ·
      8 hours ago

      Yeah, that is lie 48 characters that we’d had to pass by phone and they have to type it flawlessly.

      Wouldn’t be so bad if everyone knew their Alpha Bravo Charlies

      My one talent: alpha bravo charlie delta echo foxtrot golf hotel India Juliet kilo Lima mike November Oscar papa Quebec Romeo Sierra tango uniform Victor whiskey x-ray Yankee Zulu, typed using voice to text

      • ferngully@lemmy.world
        link
        fedilink
        arrow-up
        6
        ·
        5 hours ago

        You have a point. But Bitlocker recovery keys are all numeric. Really not all that hard to translate over the phone. Typically a secure email is what we use to deliver since 99% of employees also have email on their mobile devices.

  • 9point6@lemmy.world
    link
    fedilink
    arrow-up
    114
    arrow-down
    1
    ·
    11 hours ago

    Holy shit, they automatically activate it on computers without an account to back the key up to?

    That’s just malicious

    • Godort@lemm.ee
      link
      fedilink
      arrow-up
      64
      arrow-down
      4
      ·
      11 hours ago

      IIRC, they only do this if you’re logged in with a Microsoft account.

      Bitlocker is disabled by default if you only use local accounts

      • GoodLuckToFriends@lemmy.today
        link
        fedilink
        English
        arrow-up
        18
        arrow-down
        1
        ·
        edit-2
        8 hours ago

        I have (had ;'( ) a local account, and bitlocker was activated. I only found out when my motherboard bit the dust, and that triggered the no-TPM bitlocker thingamajig. Goodbye data.

        Of course it hits right as I needed the data on that laptop. Fucking murphy and his fancy legal words.

        If anyone is in a situation like mine, you might find luck with a little DIY hacking: https://www.techspot.com/news/106166-old-bitlocker-vulnerability-exploited-bypass-encryption-updated-windows.html

      • EpeeGnome@lemm.ee
        link
        fedilink
        English
        arrow-up
        34
        arrow-down
        1
        ·
        edit-2
        11 hours ago

        I’ve occasionally seen it activate itself on computers with only a local account, though I’ve so far only seen it when upgrading in place to 11 with secure boot enabled in the BIOS, and not every time. Fortunately the one time it locked me out was on a freshly cloned drive, so it only cost me redoing the work.

        Also, the number of people who I’ve seen lose all their data because they don’t even know they created an MS account during OOBE, and later had a boot or BIOS hiccup, is too bamn high!

        • FartsWithAnAccent@fedia.io
          link
          fedilink
          arrow-up
          30
          ·
          11 hours ago

          It logs literally everything you do with screenshots, then sends it to M$ despite their assurances that it would be local only.

          Super invasive!

          • Ephera@lemmy.ml
            link
            fedilink
            English
            arrow-up
            3
            ·
            10 hours ago

            I’m not aware of them uploading the screenshotted data, not for now anyways.

            • GoodLuckToFriends@lemmy.today
              link
              fedilink
              English
              arrow-up
              9
              ·
              8 hours ago

              The data is indexed and parsed somehow. The last report on it that I saw had a picture of a semi-famous person be properly indexed under the person’s name, despite it being a picture that was taken by the person talking about recall, which means the image was not public. Whatever recall was doing, it analyzed the picture, and that’s probably not a local process.

        • Ephera@lemmy.ml
          link
          fedilink
          English
          arrow-up
          8
          ·
          10 hours ago

          It takes a screenshot every five seconds and runs an LLM over it to extract text. Then there’s a UI where you can query it for what you did in the past.

          It came under fire when they wanted to introduce it last year, because it stored all that data on your disk in unencrypted form. Meaning if anyone manages to run malicious code on your system, they don’t need to do the collecting themselves anymore, but can rather just send off any screenshotted passwords or whatever other secret things you might’ve been doing on your PC at any point in time. In particular, Microsoft had claimed that the data would be encrypted and it wasn’t. Didn’t even need special permissions to access it.

          No idea, if they fixed the encryption now, or if this is just a case of the shitstorm having died down, so they roll it out now. But yeah, even with encryption, the implications aren’t great. If your parents or boss or law enforcement want to know what you were doing on your PC, they now have an exact history. And Microsoft could still change their mind and decide to upload all your data at any point in the future.

            • Ephera@lemmy.ml
              link
              fedilink
              English
              arrow-up
              1
              ·
              20 minutes ago

              Yeah, good question. I imagine the screenshotting itself is largely negligible, although obviously not free either. I don’t know when the LLM gets to do its job. Theoretically, it could be delayed until some point where there’s not much going on on your PC.

              At some point, Microsoft wanted to roll out these AI features only on PCs which have an NPU, which is basically an additional CPU with a different architecture optimized for pattern recognition and such. I don’t know, if they still hold onto that requirement, but it would mean that it wouldn’t hog your CPU at least.

              They have been somewhat desperate to roll out Recall, because it was the only semi-useful out of a handful of features that they came up with to somehow integrate AI into Windows. So, that’s why I’m never quite sure, what requirements they’re still holding onto.

  • Mwa@lemm.ee
    link
    fedilink
    English
    arrow-up
    9
    ·
    8 hours ago

    Why cant windows copy luks and let you choose your own password

  • Godort@lemm.ee
    link
    fedilink
    arrow-up
    44
    ·
    edit-2
    11 hours ago

    Not that it helps now, but you can also dump your bitlocker recovery key through powershell and save it independently.

    (Get-BitLockerVolume -MountPoint “C”).KeyProtector

    • yesman@lemmy.worldOP
      link
      fedilink
      arrow-up
      23
      arrow-down
      4
      ·
      11 hours ago

      The control panel dialogue allows you to do this as well. Control Panel > system security > Bitlocker encryption. But it also has the superior option which is to turn it off.

      I didn’t loose any data BTW. I had my M$ account info, and a backup besides.

      • dan@upvote.au
        link
        fedilink
        arrow-up
        15
        arrow-down
        1
        ·
        11 hours ago

        But it also has the superior option which is to turn it off.

        Why would you not want to encrypt your files? My Linux systems are encrypted too.

          • dan@upvote.au
            link
            fedilink
            arrow-up
            3
            arrow-down
            2
            ·
            7 hours ago

            I know, I just meant why would someone willingly disable Bitlocker?

        • kablammy@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          6 hours ago

          Years ago I thought I was being smart encrypting my home dir on my Linux server. I found out the hard way this prevents remote login over ssh using public key encryption, as the .ssh dir is in the home dir, which is encrypted unless you are already logged in at the time! So every time I wanted to ssh in, I had to plug in a monitor and log in on the console first.

        • yesman@lemmy.worldOP
          link
          fedilink
          arrow-up
          6
          arrow-down
          6
          ·
          10 hours ago

          Why would you not want to encrypt your files?

          Bitlocker is only as secure as Microsoft is. If someone hacks your account, they’ve got your keys. And Micosoft stores that key in plain text.

          • dan@upvote.au
            link
            fedilink
            arrow-up
            4
            arrow-down
            1
            ·
            edit-2
            8 hours ago

            It sounds like you’re complaining about both approaches.

            If Microsoft doesn’t have the key: You can’t recover your files if you lose it.

            If Microsoft does have the key: An attacker could get in and take it (unlikely if you have two factor auth though) and you need to trust Microsoft.

            And Micosoft stores that key in plain text.

            How do you know this, though? It could be encrypted using your account password as a key or seed.

      • JasonDJ@lemmy.zip
        link
        fedilink
        arrow-up
        8
        arrow-down
        1
        ·
        11 hours ago

        Disk encryption should absolutely be used, especially on laptops/portable systems.

        Otherwise someone steals your laptop and swaps the disk into another system and they’ve got all your stuff. Including that folder that nobody knows about.

    • Wrufieotnak@feddit.org
      link
      fedilink
      arrow-up
      1
      ·
      7 minutes ago

      Might be, so better check like this user did:

      Just checked my wife’s laptop. Local account, secure boot off, windows 10. It had a message telling me to setup a microsoft account to ‘finish encrypting the device’. I clicked turn off, and it’s currently decrypting the hard drive. Blech.

  • milicent_bystandr@lemm.ee
    link
    fedilink
    arrow-up
    7
    arrow-down
    7
    ·
    4 hours ago

    You know, this is actually one Windows decision I agree with. Encryption should be default, especially on portable devices like laptops. For an OS aimed at people who want to use their computers, rather than understand them, you have to choose an encryption that works by default for most of your non-tech-savvy users.

    If they want their data truly in their own hands, or full control, use Linux.

    If they want to use Windows, but not rely on a Microsoft account for recovery, get the bitlocker recovery key and write it down (which you can do).

    But I think this looks like a sane default.

    (Full disclosure, I don’t use Windows for anything I care about!)

    • highball@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      3 hours ago

      Would be fine. The problem is, Microsoft is encrypting drives and not telling anybody about it. Average users have no clue what any of this is and are completely unaware they need to create a passphrase for safe keeping.

    • acid_falcon@lemmy.world
      link
      fedilink
      arrow-up
      7
      arrow-down
      1
      ·
      3 hours ago

      Respectfully, hard disagree and terrible take. I work in IT, and your stance only makes sense if people have some tech knowledge. Which is never going to happen for the average person.

      I can’t tell you how many older people I’ve had to tell that I can’t save their grandkids first pics because of bitlocker

      • milicent_bystandr@lemm.ee
        link
        fedilink
        arrow-up
        3
        ·
        50 minutes ago

        That still happens without bitlocker. Computers are dropped. Facebook passwords are forgotten.

        I acknowledge automatic encryption is going to make some more cases of lost data, but, with respect, I think the benefit of making fewer cases of stolen data is worth it. I agree with the other commenter that users should be made aware of it more clearly.

        Also, as much as I hate the push to Microsoft accounts, I have to admit it helps mitigate this problem: if all ordinary users have an account looking after their master keys, then they can turn to that when they forget their login password etc. but the opportunistic thief on the train can’t (as easily). Not every grandma has a Millennial relative at hand to boot Linux to rescue files off her HDD. And for those who don’t like to trust their master keys to Microsoft/Apple/Google? There’s Linux. And external backups. And saving your password somewhere safe.