What is the point of encryption if Microsoft can unlock any of yourActually.... I always wonder:
computers whenever it feels like it?
On 24/1/2026 10:21 pm, CrudeSausage wrote:And ....
Actually.... I always wonder:
What is the point of encryption if Microsoft can unlock any of your
computers whenever it feels like it?
1. Is Bitlocker just a password prompt? :)
2. Does Bitlocker really enecrypt the whole drive?
3. If (2) is true, is the encryption using user-supplied
passowrd as a mask? Or is it using a standard mask?
If the encryption is using a standard mask, not surprising that FBI can decrypt any Bitlocker drives. :)
On 24/1/2026 10:58 pm, Mr. Man-wai Chang wrote:
On 24/1/2026 10:21 pm, CrudeSausage wrote:And ....
Actually.... I always wonder:
What is the point of encryption if Microsoft can unlock any of your
computers whenever it feels like it?
1. Is Bitlocker just a password prompt? :)
2. Does Bitlocker really enecrypt the whole drive?
3. If (2) is true, is the encryption using user-supplied
passowrd as a mask? Or is it using a standard mask?
If the encryption is using a standard mask, not surprising that FBI can
decrypt any Bitlocker drives. :)
4. Is the Bitlocker password stored in the drive?
And the receovery ley as well?
Both recoverable by Micro$oft? :)
On 1/24/26 10:02 AM, Mr. Man-wai Chang wrote:
On 24/1/2026 10:58 pm, Mr. Man-wai Chang wrote:And ....
On 24/1/2026 10:21 pm, CrudeSausage wrote:And ....
Actually.... I always wonder:
What is the point of encryption if Microsoft can unlock any of your
computers whenever it feels like it?
1. Is Bitlocker just a password prompt? :)
2. Does Bitlocker really enecrypt the whole drive?
3. If (2) is true, is the encryption using user-supplied
passowrd as a mask? Or is it using a standard mask?
If the encryption is using a standard mask, not surprising that FBI can
decrypt any Bitlocker drives. :)
4. Is the Bitlocker password stored in the drive?
And the receovery ley as well?
Both recoverable by Micro$oft? :)
Is there a substitute for Bitlocker? What if I don't want to use it, but still want encryption?
And ....
Is there a substitute for Bitlocker? What if I don't want to use it,
but still want encryption?
4. Is the Bitlocker password stored in the drive?And ....
'''' And the receovery ley as well?
'''' Both recoverable by Micro$oft? :)
Is there a substitute for Bitlocker?'' What if I don't want to use it, but still want encryption?
That would be Veracrypt, the successor to the compromised Truecrypt.
Alan K. wrote:
And ....
Is there a substitute for Bitlocker? What if I don't want to use it,
but still want encryption?
Yes, lots. <https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software>
[Removed 张文尉's crosspost to alt.conspiracy]
Is there a substitute for Bitlocker?
On 1/24/26 10:02 AM, Mr. Man-wai Chang wrote:
On 24/1/2026 10:58 pm, Mr. Man-wai Chang wrote:And ....
On 24/1/2026 10:21 pm, CrudeSausage wrote:And ....
Actually.... I always wonder:
What is the point of encryption if Microsoft can unlock any of your
computers whenever it feels like it?
1. Is Bitlocker just a password prompt? :)
2. Does Bitlocker really enecrypt the whole drive?
3. If (2) is true, is the encryption using user-supplied
passowrd as a mask? Or is it using a standard mask?
If the encryption is using a standard mask, not surprising that FBI can
decrypt any Bitlocker drives. :)
4. Is the Bitlocker password stored in the drive?
And the receovery ley as well?
Both recoverable by Micro$oft? :)
Is there a substitute for Bitlocker? What if I don't want to use it, but still want
encryption?
On Sat, 24 Jan 2026 19:56:25 -0000, Bill Brownley wrote:
Alan K. wrote:
And ....
Is there a substitute for Bitlocker? What if I don't want to use it, >>> but still want encryption?
Yes, lots.
<https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software>
[Removed 张文尉's crosspost to alt.conspiracy]
It seems that just about every solution there would be safer than Microsoft's, but I imagine that VeraCrypt remains the most popular alternative. Does VeraCrypt work if you intend to use a storage device's OPAL hardware encryption?
Note this means that if we're worried about the topic of this thread, and
if we still wish to use bit locker, then we prolly' shouldn't be on Windows Home but on Windows Pro (or, as Paul & Bill suggested, use other tools).
In summary, I think that Windows Home users do not have the same kind of
control over key storage that Windows Pro users have.
At least, you're getting closer to the entire picture(Bitlocker
Encryption is fully supported on Enterprise and Edu editions, too)
On Sat, 1/24/2026 6:39 PM, CrudeSausage wrote:
On Sat, 24 Jan 2026 19:56:25 -0000, Bill Brownley wrote:
Alan K. wrote:
And ....
Is there a substitute for Bitlocker? What if I don't want to use it, >>>> but still want encryption?
Yes, lots.
<https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software>
[Removed 张文尉's crosspost to alt.conspiracy]
It seems that just about every solution there would be safer than
Microsoft's, but I imagine that VeraCrypt remains the most popular
alternative. Does VeraCrypt work if you intend to use a storage device's
OPAL hardware encryption?
There is no mention of that topic here.
https://en.wikipedia.org/wiki/VeraCrypt
You will find in the software world, a general distrust of "punting"
to someone elses implementation :-) "What would Linux Torvalds say?" :-)
https://en.wikipedia.org/wiki/Opal_Storage_Specification
"Radboud University researchers indicated in November 2018 that some
hardware-encrypted SSDs, including some Opal implementations,
had security vulnerabilities.[5]
[5] Meijer, Carlo; van Gastel, Bernard (19–23 May 2019).
Self-Encrypting Deception: Weaknesses in the Encryption of
Solid State Drives. 2019 IEEE Symposium on Security and Privacy (SP).
San Francisco, CA, USA: IEEE. pp. 72–87.
"
The advantage of software based methods, is that, as they are
cracked, you can just toss them out of the crypto-suite. There
is fast turnaround for correcting a situation.
Just as right now, SHA-512 is being popularized, as quantum computer chill appears on the horizon. Like MD5, the warnings appear ahead of the actual attack. And while you sit there sipping a coffee, there are people
beavering away on hardened algorithms to withstand quantum attack.
On Sat, 1/24/2026 6:39 PM, CrudeSausage wrote:
On Sat, 24 Jan 2026 19:56:25 -0000, Bill Brownley wrote:There is no mention of that topic here.
Alan K. wrote:
And ....
Is there a substitute for Bitlocker? What if I don't want to use
it,
but still want encryption?
Yes, lots.
<https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software>
[Removed 张文尉's crosspost to alt.conspiracy]
It seems that just about every solution there would be safer than
Microsoft's, but I imagine that VeraCrypt remains the most popular
alternative. Does VeraCrypt work if you intend to use a storage
device's OPAL hardware encryption?
https://en.wikipedia.org/wiki/VeraCrypt
You will find in the software world, a general distrust of "punting"
to someone elses implementation :-) "What would Linux Torvalds say?" :-)
https://en.wikipedia.org/wiki/Opal_Storage_Specification
"Radboud University researchers indicated in November 2018 that some
hardware-encrypted SSDs, including some Opal implementations,
had security vulnerabilities.[5]
[5] Meijer, Carlo; van Gastel, Bernard (19–23 May 2019).
Self-Encrypting Deception: Weaknesses in the Encryption of Solid
State Drives. 2019 IEEE Symposium on Security and Privacy (SP).
San Francisco, CA, USA: IEEE. pp. 72–87.
"
The advantage of software based methods, is that, as they are cracked,
you can just toss them out of the crypto-suite. There is fast turnaround
for correcting a situation.
Just as right now, SHA-512 is being popularized, as quantum computer
chill appears on the horizon. Like MD5, the warnings appear ahead of the actual attack. And while you sit there sipping a coffee, there are
people beavering away on hardened algorithms to withstand quantum
attack.
The Truecrypt dev signaled that law enforcement had been for
a visit,
and not to use it.
Paul wrote:
The Truecrypt dev signaled that law enforcement had been for
a visit,
Can you post the evidence for the above, or a link to the evidence?
and not to use it.
This much is true, but apparently for other reasons. <https://web.archive.org/web/20140531203620/http://steve.grc.com/2014/05/30/yes-virginia-truecrypt-is-still-safe-to-use/>
Bill Brownley wrote:
Paul wrote:
The Truecrypt dev signaled that law enforcement had been for
a visit,
Can you post the evidence for the above, or a link to the evidence?
and not to use it.
This much is true, but apparently for other reasons.
<https://web.archive.org/web/20140531203620/http://steve.grc.com/2014/05/30/yes-virginia-truecrypt-is-still-safe-to-use/>
I remember when TrueCrypt signalled "something was amiss" way back when,
but none of us actually knew what it was (as I recall) so I hate to contradict Paul who is very knowledgeable and extremely helpful, but I know of no public evidence that the TrueCrypt developers ever said 'law enforcement visited us' or anything close to that.
4. Is the Bitlocker password stored in the drive?
And the receovery ley as well?
Both recoverable by Micro$oft? :)
On 24/1/2026 10:21 pm, CrudeSausage wrote:
Actually.... I always wonder:
What is the point of encryption if Microsoft can unlock any of your
computers whenever it feels like it?
1. Is Bitlocker just a password prompt? :)
2. Does Bitlocker really enecrypt the whole drive?
3. If (2) is true, is the encryption using user-supplied
passowrd as a mask? Or is it using a standard mask?
If the encryption is using a standard mask, not surprising that FBI can decrypt any Bitlocker drives. :)
| Sysop: | Scott |
|---|---|
| Location: | Freeburg, IL, USA, Earth |
| Users: | 4 |
| Nodes: | 16 (0 / 16) |
| Uptime: | 221:15:21 |
| Calls: | 4 |
| Messages: | 15,886 |