Brian Gregory wrote:
On 20/01/2026 20:43, Maria Sophia wrote:
Brian Gregory wrote:
Unless you're Jeffrey Epstein, they likely want the hardware, not
the data.
Duh! We're dealing entirely with unlikely situations here. My laptop
isn't stolen regularly, say about once every year.
Stolen laptops, from domestic homes are likely to be quickly sold
for drug money in some back alley to someone who will then have a
long time to go through their contents and work out how to use
anything interesting they find.
I'm making a philosophical point, which is who needs marketing gimmicks? >>>
I've never been 'burgled' but if I was, my passwords are in
KeepassXC, and
my financial data is in veracrypt containers, so all they get are my
pics.
Which is the key point, really...
We don't *need* silly marketing security (e.g., biometric gimmicks)
for a
home computer as long as we don't live in the slums... :)
You don't need to leave the blank checks in you checkbook (did I spell
it the correct way for you US types?) unsigned. But I bet you do.
If we live in the slums, then by all means, we need those silly
marketing
gimmicks, and, unfortunately, on iOS devices, the gimmicks are required.
Unlike in the USA, there don't seem to be many slums left in my country.
I have pictures of the children of relatives. They would be unhappy if
I said some random thief had these pictures and I totally understand
why, when you hear what paedophiles have been known to use them for,
or even just what Grok lets you do with them.
Hi Brian,
We can delve deeper into edge cases, but the main question was whether a
home user needs BIOS passwords on a Windows system. My view
is that BIOS passwords may not protect the data that actually matters.
Some important data on a typical Windows laptop that needs protection are passwords and financial or medical records which I focused upon, although pictures and anything else can be added into that category if you like.
Those are likely stored in encrypted containers if you use tools like Veracrypt and KeepassXC (although I'd have to check how to automate that
for photos). While that is partial encryption, not full disk encryption, my observation is that it may be enough for most home users because the sensitive material is isolated without having to enter a password (or biometric marketing gimmicks) constantly, every day of the year.
A BIOS password does not protect any of that (AFAIK). A thief can remove
the drive and read it. Biometrics do not protect it either. They only
unlock the Windows session. Once the drive is out of the laptop, the biometric layer is irrelevant (AFAIK).
So my practical Windows security model for a home environment is this:
1. Encrypt the small amount of data that actually matters, such as
passwords and financial records.
2. Keep that data in Veracrypt containers or a password manager.
3. Do not rely on BIOS passwords or biometrics to protect data on a
stolen device because they do not address that threat.
Biometric marketing gimmicks solve a convenience problem, not a data protection problem. If we have a real fear of the people around us, that is
a different threat model, but most home users do not need that level of control (IMHO) in terms of the frequency of passwords they enter.
On 21/01/2026 18:32, Maria Sophia wrote:
So my practical Windows security model for a home environment is this:
1. Encrypt the small amount of data that actually matters, such as
passwords and financial records.
2. Keep that data in Veracrypt containers or a password manager.
3. Do not rely on BIOS passwords or biometrics to protect data on a
stolen device because they do not address that threat.
Biometric marketing gimmicks solve a convenience problem, not a data
protection problem. If we have a real fear of the people around us, that is >> a different threat model, but most home users do not need that level of
control (IMHO) in terms of the frequency of passwords they enter.
But it's unrealistic to expect anyone but an expert to install and use Veracrypt containers, it's also largely unrealistic to expect them to
keep absolutely everything always in it's designated place, encrypted or unencrypted as appropriate.
I get that BIOS password doesn't add any real protection but why object
to it so much? It's another thing that any hacker will need to get
around before they can run any hacking tool on a PC.
I also do not see why you regard biometric security as a gimmick. It's
dirt cheap now (cost me £12 to add a fingerprint reader to my desktop
PC) and works fairly well, and seems to err firmly towards rejecting
fingers that don't match exactly rather than accepting anything vaguely
like my finger. On cold days I even need to warm my finger before
there's any hope of it matching how it looked to the scanner on a hot day.
What is your recommendation for privacy on a computer, Frank?
Non-response to my arguments, etc. duly noted.
To answer your question: You probably mean measures to limit the consequences of bad actors having physical access to your (Windows)
computer or stealing it, as that's the context of this thread. "privacy
on a computer" is *way* too wide/unspecific/ambiguous/<whatever>.
That said, my - rather obvious - recommendations are: A boot password, sign-in protection (password or/and other) and - if needed/practical - Windows' FDE or similar.
Brian Gregory <void-invalid-dead-dontuse@email.invalid> wrote:
On 21/01/2026 18:32, Maria Sophia wrote:
So my practical Windows security model for a home environment is this:
1. Encrypt the small amount of data that actually matters, such as
passwords and financial records.
2. Keep that data in Veracrypt containers or a password manager.
3. Do not rely on BIOS passwords or biometrics to protect data on a
stolen device because they do not address that threat.
Biometric marketing gimmicks solve a convenience problem, not a data
protection problem. If we have a real fear of the people around us, that is >>> a different threat model, but most home users do not need that level of
control (IMHO) in terms of the frequency of passwords they enter.
But it's unrealistic to expect anyone but an expert to install and use
Veracrypt containers, it's also largely unrealistic to expect them to
keep absolutely everything always in it's designated place, encrypted or
unencrypted as appropriate.
I get that BIOS password doesn't add any real protection but why object
to it so much? It's another thing that any hacker will need to get
around before they can run any hacking tool on a PC.
I also do not see why you regard biometric security as a gimmick. It's
dirt cheap now (cost me £12 to add a fingerprint reader to my desktop
PC) and works fairly well, and seems to err firmly towards rejecting
fingers that don't match exactly rather than accepting anything vaguely
like my finger. On cold days I even need to warm my finger before
there's any hope of it matching how it looked to the scanner on a hot day.
It's simply best to ignore "Maria". He largely makes sense to only himself.
Frank Slootweg wrote:[...]
What is your recommendation for privacy on a computer, Frank?
To answer your question: You probably mean measures to limit the consequences of bad actors having physical access to your (Windows) computer or stealing it, as that's the context of this thread. "privacy
on a computer" is *way* too wide/unspecific/ambiguous/<whatever>.
You are correct. We're assuming a daily boot of a Windows PC with a local account (whether Windows 11 or Windows 10) and people you trust in the home and we're assuming the rare happenstance of a burglar with physical access.
Note: Windows FDE is Bitlocker, so that is the default interpretation.
That said, my - rather obvious - recommendations are: A boot password, sign-in protection (password or/and other) and - if needed/practical - Windows' FDE or similar.
Thank you for outlining your model to contrast with mine, where we each optimized the threat protection in reasonably different manners.
I. Frank's proposed security model is system centric & labor intensive.
II. The model I suggest is data centric & optimized for convenience.
Since the goal is for others to learn from our technical conversation
here is a point-by-point summary of the two threat models we proposed.
A. Threat model
1. FS assumes OS level FDE (Bitlocker) protection is required.
2. MS assume only specific data stores need protection.
B. Boot process
1. FS uses a boot password and sign in protection.
2. MS uses no boot password and no sign in password.
C. Disk protection
1. FS uses Windows FDE so the entire volume is encrypted at rest.
2. MS uses Veracrypt for financial data & KeePassDX for passwords.
D. Forensic residue
1. FS's model encrypts swap, temp files, hibernation files & caches.
2. MS's model protects encrypted containers leaving OS residue readable.
E. Convenience
1. FS accepts daily friction at boot & sign in.
2. MS eliminates friction at boot & sign in by only unlocking
containers when needed (which the user may unlock only occasionally).
F. Cloud identity
1. FS's model can run without a Microsoft account but if Windows FDE
is used then recovery material must be stored offline by the user.
2. MS's model uses no OS level encryption so no recovery keys exist
and no cloud identity is ever needed at any time (by design).
G. Physical theft
1. FS's model forces the attacker to defeat FDE for all access.
2. MS's model exposes OS data but protects financial & passwd data.
H. Family access
1. FS's model blocks family members without credentials.
2. MS's model allows family access but keeps sensitive data encrypted.
Summary
1. FS's model maximizes system level protection & minimizes leakage.
But at the cost of daily convenience.
2. Ms's model maximizes daily convenience by protecting data chosen
to encrypt (which the user may unlock only occasionally).
--
On Usenet, old men discuss topics that they've thought about for decades.
On 22/01/2026 7:10 am, Andy Burns wrote:I can glance at my wrist (cheap blue plastic CASIO - had it for years)
Daniel70 wrote:Who needs a Watch .... when I've got my 'phone'?? ;-P
Chris wrote:A nice watch?
What house in any decent area doesn't have jewellery?
Mine .... but then, I don't have a Misses, either! ;-P
Paul wrote:
[snip]
It's the same with some city employees, you can hear
household noises where they are.By contrast, if you can hear "office" noises then it's a spammer calling
you ...
On 2026/1/22 8:55:19, Daniel70 wrote:
On 22/01/2026 7:10 am, Andy Burns wrote:
Daniel70 wrote:Who needs a Watch .... when I've got my 'phone'?? ;-P
Chris wrote:A nice watch?
What house in any decent area doesn't have jewellery?
Mine .... but then, I don't have a Misses, either! ;-P
I can glance at my wrist (cheap blue plastic CASIO - had it for years)
far more quickly than I could at a 'phone, if I had one (and both my
hands are free, too).
Plus, if I _had_ a smartphone, I'd presumably--
mostly be doing something with it (if not, why have one?), so would have
to change/minimise to see the clock (or peer at tiny digits along the
edge of the display).
Maria Sophia <mariasophia@comprehension.com> wrote:
Frank Slootweg wrote:[...]
What is your recommendation for privacy on a computer, Frank?
To answer your question: You probably mean measures to limit the
consequences of bad actors having physical access to your (Windows)
computer or stealing it, as that's the context of this thread. "privacy
on a computer" is *way* too wide/unspecific/ambiguous/<whatever>.
You are correct. We're assuming a daily boot of a Windows PC with a local
account (whether Windows 11 or Windows 10) and people you trust in the home >> and we're assuming the rare happenstance of a burglar with physical access.
You're making a number of essential mistakes.
For sensible people, there *is* no such thing as "a daily boot". The
system is active or sleeps (Modern Standby) or is hibernated. A 'boot', actually a 'Restart' is only needed once a month at Windows Update time,
if that often.
Note: Windows FDE is Bitlocker, so that is the default interpretation.
No, Windows FDE is only Bitlocker on Windows Professional, etc. On
Windows Home, it's (Settings -> Privacy & Security ->) 'Device
encryption', sort of Bitlocker Lite.
That said, my - rather obvious - recommendations are: A boot password, >>> sign-in protection (password or/and other) and - if needed/practical -
Windows' FDE or similar.
Thank you for outlining your model to contrast with mine, where we each
optimized the threat protection in reasonably different manners.
I. Frank's proposed security model is system centric & labor intensive.
Nope, it's not "labor intensive" at all. Set up once and forget.
II. The model I suggest is data centric & optimized for convenience.
Yes, it's data centric, but anything *but* convenient, for reasons
others have already pointed out. More below.
Since the goal is for others to learn from our technical conversation
here is a point-by-point summary of the two threat models we proposed.
A. Threat model
1. FS assumes OS level FDE (Bitlocker) protection is required.
No, I said as needed/practical and *if* used, it's 'Device encryption'
not full Bitlocker.
2. MS assume only specific data stores need protection.
B. Boot process
1. FS uses a boot password and sign in protection.
2. MS uses no boot password and no sign in password.
C. Disk protection
1. FS uses Windows FDE so the entire volume is encrypted at rest.
2. MS uses Veracrypt for financial data & KeePassDX for passwords.
D. Forensic residue
1. FS's model encrypts swap, temp files, hibernation files & caches.
2. MS's model protects encrypted containers leaving OS residue readable. >>
E. Convenience
1. FS accepts daily friction at boot & sign in.
No, no daily bootup and no, no 'friction'. See what the (Settings -> Accounts ->) 'Sign-in options' *really* offer. It can be as little as absolutely no action, or just one tap.
2. MS eliminates friction at boot & sign in by only unlocking
containers when needed (which the user may unlock only occasionally).
Which is much, much more 'work' than my setup would ever require.
F. Cloud identity
1. FS's model can run without a Microsoft account but if Windows FDE
is used then recovery material must be stored offline by the user.
No, Windows' 'Device encryption' doesn't require the user to keep a recovery key. The user *can* do so, to protect against a computer
hardware failure.
2. MS's model uses no OS level encryption so no recovery keys exist
and no cloud identity is ever needed at any time (by design).
Then where *do* you keep your passwords to unlock your containers?
G. Physical theft
1. FS's model forces the attacker to defeat FDE for all access.
2. MS's model exposes OS data but protects financial & passwd data.
H. Family access
1. FS's model blocks family members without credentials.
True, but, as explained above, those 'credentials' are a non-issue.
2. MS's model allows family access but keeps sensitive data encrypted.
Summary
1. FS's model maximizes system level protection & minimizes leakage.
But at the cost of daily convenience.
No, as explained, when properly set up, there is very little to no inconvience.
2. Ms's model maximizes daily convenience by protecting data chosen
to encrypt (which the user may unlock only occasionally).
My summary: You're of course entitled to use your system as you see
fit and so do I/others. But you methods are not 'better', i.e. have only advantages and not a single disadavantage, nor are mine. They just are different, that's all. 'Better' does not exist, not in this case and not
in any other case.
On 2026/1/22 8:55:19, Daniel70 wrote:
On 22/01/2026 7:10 am, Andy Burns wrote:
Daniel70 wrote:Who needs a Watch .... when I've got my 'phone'?? ;-P
Chris wrote:A nice watch?
What house in any decent area doesn't have jewellery?
Mine .... but then, I don't have a Misses, either! ;-P
I can glance at my wrist (cheap blue plastic CASIO - had it for
years)
far more quickly than I could at a 'phone, if I had one (and both my
hands are free, too).
Plus, if I _had_ a smartphone, I'd presumably mostly be doing
something with it (if not, why have one?),
so would have to change/minimise to see the clock (or peer at tiny
digits along the edge of the display).
Paul wrote:
[snip]
 It's the same with some city employees, you can hear
household noises where they are.By contrast, if you can hear "office" noises then it's a spammer calling
you ...
On 23/01/2026 7:24 am, J. P. Gilliver wrote:
On 2026/1/22 8:55:19, Daniel70 wrote:
On 22/01/2026 7:10 am, Andy Burns wrote:
Daniel70 wrote:Who needs a Watch .... when I've got my 'phone'?? ;-P
Chris wrote:A nice watch?
What house in any decent area doesn't have jewellery?
Mine .... but then, I don't have a Misses, either! ;-P
I can glance at my wrist (cheap blue plastic CASIO - had it for
years)
Almost forty years ago,
my mother gave me a fancy Wristwatch for my 21st Birthday and, about--
a fortnight later, I made the mistake of wearing it during Rifle
Drill (I was in the Army) and scratched the hell out of the glass
face .... so that was the end of wearing my watch, at least for part
of my TIME .... especially as I worked in an Army Communications
Station .... so there were clocks all over the place.
far more quickly than I could at a 'phone, if I had one (and both
my hands are free, too).
About fifteen years later (early 90's, I think), I was travelling
down Major Highway to see Family .... and my Car broke down .... so
it was a couple of kilometres (each way) walk to the "Roadside
Assistance" phone.
Soon after, I brought my first Mobile Phone.
Plus, if I _had_ a smartphone, I'd presumably mostly be doing
something with it (if not, why have one?),
For EMERGENCIES!! RE-read my last para!! ;-)
so would have to change/minimise to see the clock (or peer at tiny
digits along the edge of the display).
Having been in the Army, where you could get into trouble for not
being where you are supposed to be WHEN you are supposed to be there
.... so I usually have my Car clock set three to five minutes fast
.... you know. just in case!! (even having been out of the Army over
thirty years)
Hi Frank,[...]
This discussion is welcome because it compares very different use models.
My usage pattern is different from yours perhaps because my hardware is
from 2009 and does not wake reliably from sleep or hibernation, so daily shutdown is normal for me.
About recovery keys, AFAIK, Device Encryption may not require the user to store one manually, but it still ties recovery to Microsoft infrastructure unless the user intervenes by taking deliberate steps to prevent the
default behavior. My approach avoids that by not using OS level encryption.
AFAIK, Windows Device Encryption on Home automatically backs up the
recovery key to the user's Microsoft account unless the user actively stops it. That default behavior is what ties recovery to Microsoft
infrastructure.
The passwords for my encrypted containers are stored in KeePassDX inside
an encrypted database that is backed up offline. So the container keys
are not tied to a cloud identity. The only passwd I need to know is that to the KeepassDX database, but in general, I remember my encrypted volume passwords so I don't need to access the backup inside the keepass db.
Given what we've compared I agree that neither model is universally better since mine is designed for minimum friction and yours is designed for a far greater threat model than I feel at my home in the Santa Cruz Mountains.
I'm sure a burglary happens where I live, but I have no experience with it and I don't need to add a dozen locks to my doors that have to be opened
all day, every day. I prefer simply to lock the shed where I keep my tools, and then, once a week or so, I can go to the trouble to unlock it then.
Both approaches are valid depending on hardware age, habits and
tolerance for friction. I have no tolerance for extra steps.
--
If it takes two steps to do something on a computer, cut it in half.
On 23/01/2026 8:17 pm, Daniel70 wrote:
On 23/01/2026 7:24 am, J. P. Gilliver wrote:
On 2026/1/22 8:55:19, Daniel70 wrote:
Who needs a Watch .... when I've got my 'phone'?? ;-P
I can glance at my wrist (cheap blue plastic CASIO - had it for
years)
Almost forty years ago,
Opps!! S/forty years ago/fifty years ago
my mother gave me a fancy Wristwatch for my 21st Birthday and, about
a fortnight later, I made the mistake of wearing it during Rifle
Drill (I was in the Army) and scratched the hell out of the glass
face .... so that was the end of wearing my watch, at least for part
of my TIME .... especially as I worked in an Army Communications
Station .... so there were clocks all over the place.
far more quickly than I could at a 'phone, if I had one (and both
my hands are free, too).
About fifteen years later (early 90's, I think), I was travelling
down Major Highway to see Family .... and my Car broke down .... so
it was a couple of kilometres (each way) walk to the "Roadside
Assistance" phone.
Soon after, I brought my first Mobile Phone.
Plus, if I _had_ a smartphone, I'd presumably mostly be doing
something with it (if not, why have one?),
For EMERGENCIES!! RE-read my last para!! ;-)
so would have to change/minimise to see the clock (or peer at tiny
digits along the edge of the display).
Having been in the Army, where you could get into trouble for not
being where you are supposed to be WHEN you are supposed to be there
.... so I usually have my Car clock set three to five minutes fast
.... you know. just in case!! (even having been out of the Army over
thirty years)
I moved into this house about Ten years ago and, for some reason or
other, the Phone Landline socket is positioned on the far wall of the
main bedroom.
I don't know about you but I don't spend much time in my Bedroom ....
except when I'm sleeping .... so, after rushing from the Loungeroom to
the Bedroom when the phone rang .... only to find it was a Spammer
calling, I brought myself a Cordless phone with Answer machine built
into the Base station .... so, if the phone rings, I let the Answer
machine do its job .... and, usually, by the time the Answer machines Welcome message has finished, the caller has hung up.
Job Done!! ;-P
Maria Sophia <mariasophia@comprehension.com> wrote:
AFAIK, Windows Device Encryption on Home automatically backs up the
recovery key to the user's Microsoft account unless the user actively stops >> it. That default behavior is what ties recovery to Microsoft
infrastructure.
Windows Device Encryption also works with a local account. I only have
a local account and don't have a Microsoft Account. I believe the key is stored in the machine's BIOS or similar, hence my comment on saving the
key somewhere locally in case the machine has a fatal hardware failure.
On biometrics, a key point is that they do not protect data at rest.
A fingerprint or face scan unlocks the Windows session, but once the
drive is removed from the laptop the biometric layer is irrelevant. The
data on the drive is readable unless it is encrypted. Biometrics solve a convenience problem for sign in, not a data protection problem for a
stolen device. That is why I treat them more as a marketing gimmick rather than a security control for data at rest.
My model is simple and well thought out to be optimized for convenience.
1. Encrypt the small amount of data that matters.
2. Keep it in Veracrypt containers or a password manager.
3. Do not rely on BIOS passwords or biometrics for data at rest.
4. Optimize for convenience during daily use.
On 22/01/2026 15:59, Maria Sophia wrote:[...]
My model is simple and well thought out to be optimized for convenience.
1. Encrypt the small amount of data that matters.
2. Keep it in Veracrypt containers or a password manager.
3. Do not rely on BIOS passwords or biometrics for data at rest.
4. Optimize for convenience during daily use.
My BIOS password is just another small obstacle in the path of a bad actor.
Having been in the Army, where you could get into trouble for not being
where you are supposed to be WHEN you are supposed to be there .... so I usually have my Car clock set three to five minutes fast .... you know.
just in case!! (even having been out of the Army over thirty years)
I have a (corded, as it happens) 'phone at my elbow, so answer almost immediately (startles some callers!); however, especially around 10:30am which seems to be peak phishtime, I don't actually _say_ anything for a
few seconds; the same applies - the autodialler (or whatever) gives up.
(A real caller will usually say something in that time.)
On Fri, 23 Jan 2026 20:17:11 +1100, Daniel70 wrote:
[snip]
Having been in the Army, where you could get into trouble for not being
where you are supposed to be WHEN you are supposed to be there .... so I
usually have my Car clock set three to five minutes fast .... you know.
just in case!! (even having been out of the Army over thirty years)
I used to know someone who did that. I'd rather set my watch RIGHT and do
my own thinking, and leave on time.
BTW, I get tired of hearing "fast" and "slow" used improperly, when the problem has nothing to do with speed.
On Fri, 23 Jan 2026 20:17:11 +1100, Daniel70 wrote:
[snip]
Having been in the Army, where you could get into trouble for not being
where you are supposed to be WHEN you are supposed to be there .... so I
usually have my Car clock set three to five minutes fast .... you know.
just in case!! (even having been out of the Army over thirty years)
I used to know someone who did that. I'd rather set my watch RIGHT and do
my own thinking, and leave on time.
BTW, I get tired of hearing "fast" and "slow" used improperly, when the problem has nothing to do with speed.
On Fri, 23 Jan 2026 16:09:08 +0000, J. P. Gilliver wrote:
[snip]
I have a (corded, as it happens) 'phone at my elbow, so answer almost
immediately (startles some callers!); however, especially around 10:30am
which seems to be peak phishtime, I don't actually _say_ anything for a
few seconds; the same applies - the autodialler (or whatever) gives up.
(A real caller will usually say something in that time.)
I often hang up after saying "hello" twice with no response, unless it's someone I know who often does that.
I got a call this morning that I didn't answer because of multiple signs
of it being a machine.
1. The NAME* appearing on caller ID was identical to the number.
2. The caller did leave a message, but it was "beginning truncated" (the first few seconds of the message were missing, like the machine was too stupid to WAIT FOR THE BEEP). What I heard first was "(half a word) in
your area".
3. The call ended with a few seconds of busy signal, which I hear
indicates the call was not disconnected properly (it doesn't happen on legitimate calls).
* - a feature that I really wish that mobile phones would have. It can be used to detect and ignore most junk calls.
On 2026/1/23 11:19:59, Daniel70 wrote:
On 23/01/2026 8:17 pm, Daniel70 wrote:
On 23/01/2026 7:24 am, J. P. Gilliver wrote:
Plus, if I _had_ a smartphone, I'd presumably mostly be doing
something with it (if not, why have one?),
For EMERGENCIES!! RE-read my last para!! ;-)
Yes, I have a mobile 'phone, for exactly that - in case of car
breakdown. But it truly _is_ for emergencies: I have a PAYG contract, or
more or less as near as I could get - the words "per month" are _not_ involved.
Actually what I've got is better suited for that use: rather
than several tens of pence per minute, it costs me 2 pounds _if_ I use
it, but I then get unlimited calls for the rest of that day, which would probably be useful for a remote breakdown. [Hasn't happened since I
preloaded it.])
But now _you_ re-read what I said: SMARTphone. The one I have - I think
it's Nokia; was the only one I could find without a camera, which was a requirement at the time I bought it.
I charge it once a week, though the
little symbol implies it's only a third discharged (I do leave it on).
[Don't most smartphones last 2-3 days at most?] If I _had_ a smartphone,
then presumably most of the time I would be doing something with it,
else why have one?
so would have to change/minimise to see the clock (or peer at tiny
digits along the edge of the display).
Having been in the Army, where you could get into trouble for not
being where you are supposed to be WHEN you are supposed to be there
(I have suffered slightly career-wise from _not_ being punctual - and
mine _wasn't_ in the services!)
.... so I usually have my Car clock set three to five minutes fast
.... you know. just in case!! (even having been out of the Army over
thirty years)
Doesn't setting it fast cease to work after a short time, though,
because you _know_ it's set fast?
On 2026/1/23 9:26:42, Daniel70 wrote:
[]
I moved into this house about Ten years ago and, for some reason or
other, the Phone Landline socket is positioned on the far wall of the
main bedroom.
I don't know about you but I don't spend much time in my Bedroom ....
except when I'm sleeping .... so, after rushing from the Loungeroom to
the Bedroom when the phone rang .... only to find it was a Spammer
calling, I brought myself a Cordless phone with Answer machine built
into the Base station .... so, if the phone rings, I let the Answer
machine do its job .... and, usually, by the time the Answer machines
Welcome message has finished, the caller has hung up.
Job Done!! ;-P
I have a (corded, as it happens) 'phone at my elbow, so answer almost immediately (startles some callers!); however, especially around 10:30am which seems to be peak phishtime, I don't actually _say_ anything for a
few seconds; the same applies - the autodialler (or whatever) gives up.
(A real caller will usually say something in that time.)
On Fri, 23 Jan 2026 16:09:08 +0000, J. P. Gilliver wrote:
[snip]
I have a (corded, as it happens) 'phone at my elbow, so answer almost
immediately (startles some callers!); however, especially around 10:30am
which seems to be peak phishtime, I don't actually _say_ anything for a
few seconds; the same applies - the autodialler (or whatever) gives up.
(A real caller will usually say something in that time.)
I often hang up after saying "hello" twice with no response, unless it's someone I know who often does that.
I got a call this morning that I didn't answer because of multiple signs
of it being a machine.
1. The NAME* appearing on caller ID was identical to the number.
2. The caller did leave a message, but it was "beginning truncated" (the first few seconds of the message were missing, like the machine was too stupid to WAIT FOR THE BEEP). What I heard first was "(half a word) in
your area".
3. The call ended with a few seconds of busy signal, which I hear
indicates the call was not disconnected properly (it doesn't happen on legitimate calls).
* - a feature that I really wish that mobile phones would have. It can be used to detect and ignore most junk calls.
On 22/01/2026 15:59, Maria Sophia wrote:
On biometrics, a key point is that they do not protect data at rest.
A fingerprint or face scan unlocks the Windows session, but once the
drive is removed from the laptop the biometric layer is irrelevant. The
data on the drive is readable unless it is encrypted. Biometrics solve a
convenience problem for sign in, not a data protection problem for a
stolen device. That is why I treat them more as a marketing gimmick rather >> than a security control for data at rest.
Obviously biometrics are not something you add to add protection.
They simply avoid you having to type a password or PIN.
There is the frequency adjustment of the reference oscillator,
to avoid first order drift. On typical time pieces, this runs at
32768.0000 Hz (above human hearing).
A watchmaker may have a suitable
instrument while working to correct the value.
A trimmer capacitor is inside the watch, to make tweaks.
The RTC in a personal computer is missing this adjustment.
And there is the purposeful register offset, to arrive at destinations
ahead of an appointment. The register could be adjusted ahead, behind,
or nominal.
"I set my watch ahead, so I will always be on time for
appointments"
[well, not absolutely always, depends on paragraph 1]
Good time pieces are temperature compensated, as the ambient temperature changes, the tempco of some of the elements are made to cancel, and it
gives the impression the device is temperature invariant (which it is
not). Scientific American used to have articles about this, in the
Amateur Scientist section.
Some cars have had excellent temperature compensated time clock pieces.
On 2026/1/23 19:19:40, Mark Lloyd wrote:
On Fri, 23 Jan 2026 16:09:08 +0000, J. P. Gilliver wrote:I've never seen a landline 'phone that displays a NAME - other than ones where YOU can program in (to the handset or the basestation) names that
[snip]
I have a (corded, as it happens) 'phone at my elbow, so answer almost
immediately (startles some callers!); however, especially around
10:30am which seems to be peak phishtime, I don't actually _say_
anything for a few seconds; the same applies - the autodialler (or
whatever) gives up. (A real caller will usually say something in that
time.)
I often hang up after saying "hello" twice with no response, unless
it's someone I know who often does that.
I got a call this morning that I didn't answer because of multiple
signs of it being a machine.
1. The NAME* appearing on caller ID was identical to the number.
2. The caller did leave a message, but it was "beginning truncated"
(the first few seconds of the message were missing, like the machine
was too stupid to WAIT FOR THE BEEP). What I heard first was "(half a
word) in your area".
3. The call ended with a few seconds of busy signal, which I hear
indicates the call was not disconnected properly (it doesn't happen on
legitimate calls).
* - a feature that I really wish that mobile phones would have. It can
be used to detect and ignore most junk calls.
YOU associate with certain numbers.
On Sat, 24 Jan 2026 00:16:33 +0000, J. P. Gilliver wrote:
I've never seen a landline 'phone that displays a NAME - other than ones
where YOU can program in (to the handset or the basestation) names that
YOU associate with certain numbers.
AFAIK, all landline systems have it now (although I don't know about wireless home phone service from a cell company). Older phones will
require a separate display device. For a long time I've used cordless
phones with the CID display (both name and number) built-in.
BTW, most of the ones (separate CID displays) I had used a reflective LCD display with no backlight. These were hard to read unless you get the
angle just right.
For junk calls, many show 1 of these 2 patterns in the name display:
1. CITY ST (like TELEPHONE TX). I hear that that's what happens when the number is not registered, and it's trying to tell you where the call is coming from. This is most likely useless when you're dealing with spoofed numbers, but the pattern usually does identify a robocall.
2. The NAME field has just a number in it, often the same as the number field.
BTW, there really is a TELEPHONE TX. It's a little town which probably has nothing to do with the spammer.
OT: We had a little snow last night.
Frank Slootweg wrote on 1/23/2026 8:18 AM:
Maria Sophia <mariasophia@comprehension.com> wrote:
AFAIK, Windows Device Encryption on Home automatically backs up the
recovery key to the user's Microsoft account unless the user actively stops >>> it. That default behavior is what ties recovery to Microsoft
infrastructure.
Windows Device Encryption also works with a local account. I only have
a local account and don't have a Microsoft Account. I believe the key is
stored in the machine's BIOS or similar, hence my comment on saving the
key somewhere locally in case the machine has a fatal hardware failure.
Windows Home Device Encryption when enabled
- first looks to store the key in the MSFT account that was initially
used to setup(first use) the device even if that MSFT account was
switched to a local logon. If not setup with a MSFT account or MSFT
account no longer present on device, the only options for the user to
obtain the key are - Save to USB, copy to paper, copy and save to text file.
- the key itself for validation purposes is stored on the device, but
not in readable or accessible form.
Windows Device Encryption also works with a local account. I only have
a local account and don't have a Microsoft Account. I believe the key is stored in the machine's BIOS or similar, hence my comment on saving the
key somewhere locally in case the machine has a fatal hardware failure.
On Sat, 24 Jan 2026 00:16:33 +0000, J. P. Gilliver wrote:
I've never seen a landline 'phone that displays a NAME - other than ones
where YOU can program in (to the handset or the basestation) names that
YOU associate with certain numbers.
AFAIK, all landline systems have it now (although I don't know about
wireless home phone service from a cell company). Older phones will
require a separate display device. For a long time I've used cordless
phones with the CID display (both name and number) built-in.
BTW, most of the ones (separate CID displays) I had used a reflective LCD display with no backlight. These were hard to read unless you get the
angle just right.
Windows Home Device Encryption when enabled
 - first looks to store the key in the MSFT account that was initially
used to setup(first use) the device even if that MSFT account was
switched to a local logon. If not setup with a MSFT account or MSFT
account no longer present on device, the only options for the user to
obtain the key are - Save to USB, copy to paper, copy and save to text
file.
 - the key itself for validation purposes is stored on the device, but
not in readable or accessible form.
Thanks for the clarification. I was researching this in a response for Paul just now in the bitlocker thread (where MS handed the keys to LE), where we need to pin down the distinction between Device Encryption on Home and full BitLocker on Pro with respect to where we "can" store the encryption keys.
AFAIK...
i. Windows Home does not include full BitLocker. It includes Device
 Encryption, which is a limited version with almost no user control.
v. The recent reports about Microsoft providing recovery keys to law
 enforcement involved keys stored in Microsoft accounts. That perhaps
 most applies to default Device Encryption on Home, and maybe not  so much to BitLocker on Pro when configured with local-only protectors.
In summary, I think that Windows Home users do not have the same kind of control over key storage that Windows Pro users have.
That is why the default workflow on Home ends up with theIt does not(for Windows Home)
recovery key in a Microsoft account in most cases.
Brian Gregory <void-invalid-dead-dontuse@email.invalid> wrote:
On 22/01/2026 15:59, Maria Sophia wrote:
On biometrics, a key point is that they do not protect data at rest.
A fingerprint or face scan unlocks the Windows session, but once the
drive is removed from the laptop the biometric layer is irrelevant. The
data on the drive is readable unless it is encrypted. Biometrics solve a >>> convenience problem for sign in, not a data protection problem for a
stolen device. That is why I treat them more as a marketing gimmick rather >>> than a security control for data at rest.
Obviously biometrics are not something you add to add protection.
They simply avoid you having to type a password or PIN.
Disagree. You can't guess a biometric like you can a PIN. You can't
shoulder surf someone's biometric like a PIN code.
Biometrics are more secure. If implemented properly, obviously. Some early mobile phone implementations were terrible.
Brian Gregory <void-invalid-dead-dontuse@email.invalid> wrote:
On 22/01/2026 15:59, Maria Sophia wrote:[...]
My model is simple and well thought out to be optimized for convenience. >>> 1. Encrypt the small amount of data that matters.
2. Keep it in Veracrypt containers or a password manager.
3. Do not rely on BIOS passwords or biometrics for data at rest.
4. Optimize for convenience during daily use.
My BIOS password is just another small obstacle in the path of a bad actor.
A *BIOS* password indeed a - IMO not so - 'small' obstacle, but, as I mentioned, it's the *boot* password which adds essential protection.
So the BIOS password prevents booting from for example a Linux USB
stick (and accessing the disk that way) and the boot password prevents booting Windows. After that, sign-in protection prevents signing in and encryption (full or partial) prevents access to essential private data
(in case the 'drive' is removed from the system).
In summary, I think that Windows Home users do not have the same kind of
control over key storage that Windows Pro users have.
At least, you're getting closer to the entire picture(Bitlocker
Encryption is fully supported on Enterprise and Edu editions, too)
...w�񧱤� wrote:You'll have to get the choir to discuss that..it's not a popular tool in
In summary, I think that Windows Home users do not have the same kind of >>> control over key storage that Windows Pro users have.
At least, you're getting closer to the entire picture(Bitlocker
Encryption is fully supported on Enterprise and Edu editions, too)
Thanks for the clarification, where I just opened a separate thread on why, in my case of an older machine, and for consistency & greater protection
even on current Windows 11 Home versus Pro machines, Veracrypt has some decisive FDE advantages over anything Microsoft marketing has provided us.
Subject: PSA: Veracrypt has pre boot authentication (& why it's better
Maria Sophia wrote on 1/24/2026 8:17 PM:
...w�񧱤� wrote:You'll have to get the choir to discuss that..it's not a popular tool in the Enterprise/Edu/Gov community where encryption has wider use and preference. Some might even consider it(Veracrypt) old, unreliable and late to the party on updating, no official tech support, and UI design-wise inadequate/cumbersome/dysfunctional.
In summary, I think that Windows Home users do not have the same kind of >>>> control over key storage that Windows Pro users have.
At least, you're getting closer to the entire picture(Bitlocker Encryption is fully supported on Enterprise and Edu editions, too)
Thanks for the clarification, where I just opened a separate thread on why, >> in my case of an older machine, and for consistency & greater protection
even on current Windows 11 Home versus Pro machines, Veracrypt has some
decisive FDE advantages over anything Microsoft marketing has provided us. >>
Subject: PSA: Veracrypt has pre boot authentication (& why it's better
...w¡ñ§±¤ñ
Subject: PSA: Veracrypt has pre boot authentication (& why it's betterYou'll have to get the choir to discuss that..it's not a popular tool
in the Enterprise/Edu/Gov community where encryption has wider use and
preference. Some might even consider it(Veracrypt) old, unreliable and
late to the party on updating, no official tech support, and UI
design-wise inadequate/cumbersome/dysfunctional.
I think we'd want a cryptographer of some note, to
do the analysis.
Maria Sophia wrote on 1/24/2026 8:17 PM:
...w�񧱤� wrote:You'll have to get the choir to discuss that..it's not a popular tool in
In summary, I think that Windows Home users do not have the same kind of >>>> control over key storage that Windows Pro users have.
At least, you're getting closer to the entire picture(Bitlocker
Encryption is fully supported on Enterprise and Edu editions, too)
Thanks for the clarification, where I just opened a separate thread on why, >> in my case of an older machine, and for consistency & greater protection
even on current Windows 11 Home versus Pro machines, Veracrypt has some
decisive FDE advantages over anything Microsoft marketing has provided us. >>
Subject: PSA: Veracrypt has pre boot authentication (& why it's better
the Enterprise/Edu/Gov community where encryption has wider use and preference. Some might even consider it(Veracrypt) old, unreliable and
late to the party on updating, no official tech support, and UI
design-wise inadequate/cumbersome/dysfunctional.
| Sysop: | Scott |
|---|---|
| Location: | Freeburg, IL, USA, Earth |
| Users: | 4 |
| Nodes: | 16 (0 / 16) |
| Uptime: | 219:50:14 |
| Calls: | 4 |
| Messages: | 15,844 |