• Dr. Moose@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    3 hours ago

    This is not directly on Microsoft as you have to be either ignorant or special kind of stupid to upload your encryption keys to US cloud. The government can request access to any data and a company can’t do anything.

    The only way to resist this is to not store anything unencrypted from your customers which is quite doable but clearly microsoft has no interest in this.

  • kn0wmad1c@programming.dev
    link
    fedilink
    English
    arrow-up
    28
    arrow-down
    1
    ·
    8 hours ago

    If they’re selling bitlocker as “full-disk encryption”, doesn’t that open them up to a class action since encryption with a backdoor isn’t encryption?

    • rumba@lemmy.zip
      link
      fedilink
      English
      arrow-up
      9
      ·
      8 hours ago

      Grey area, user chose to store the private bitlocker key to their online Microsoft acct, it’s optional. It’s still a dirtbag move, but probably less illegal.

      • TWeaK@lemmy.today
        link
        fedilink
        English
        arrow-up
        5
        ·
        6 hours ago

        They’re selling Windows and one of the selling points is that it includes full disk encryption. Thus they are selling full disk encryption.

          • TWeaK@lemmy.today
            link
            fedilink
            English
            arrow-up
            3
            ·
            6 hours ago

            What if you downloaded an iso from Microsoft and typed a simple command into powershell to activate it? 🏴‍☠️

            But yeah all I’m saying is Microsoft are definitely on shaky ground with their sales claim here. However it’s no less shaky than things they were already convicted of years ago yet seem to be doing yet again, eg bundling Internet Explorer/Edge as the default browser - which has now expanded into occassionally resetting your default apps to Microsoft ones with system updates.

            • What if you downloaded an iso from Microsoft and typed a simple command into powershell to activate it? 🏴‍☠️

              I mean you’re gonna have to prove in court how you’ve been “harmed” and if you don’t have a sales receipt from microsoft, then I don’t see how a court is gonna side with you.

              Pretty sure some lawyer that works for Microsoft is gonna try to counterclaim and say you committed copyright infringement by bypassing the normal activation method.

              And can you even afford lawyers lol? Most of us cannot afford constantly paying for laywers that cost $200/hour on the cheaper end, and suing a massive corporation is an uphill battle.

              • TWeaK@lemmy.today
                link
                fedilink
                English
                arrow-up
                1
                ·
                5 hours ago

                Lol setting aside the joke, and of course if you don’t pay you won’t have a case, but if you had paid I think there would be some statutory rights that would make a claim straightforward and wouldn’t require a lawyer. Small claims is a pretty universal concept regardless of jurisdiction, the limit varies but everywhere has some similar avenue. Filing fees are small and lawyers are not usually involved, just two parties and a judge, and these days it can be done remotely.

  • halcyoncmdr@piefed.social
    link
    fedilink
    English
    arrow-up
    30
    arrow-down
    1
    ·
    10 hours ago

    Exposing? Microsoft has made it very clear for a while that your Bitlocker keys are synced to your Microsoft account.

    Hell, they even have a support page for it. Most of their support pages are nearly useless, but this one is even readable by a normal person.

    And before someone mentions the part about Microsoft Support not having access to keys (because some smart ass always does for this stuff)… Just think for a second. Of course customer support doesn’t have access to the keys. What Support can do is not a limit for legal disclosure. A legal warrant (like used here) means they’ll give any info they have in a heartbeat.

    • SkyeStarfall@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      10
      ·
      10 hours ago

      Because if a company gives up profits to be nice, another company will swoop in and get inherently rewarded by doing the profitable thing instead

    • Zephorah@discuss.online
      link
      fedilink
      English
      arrow-up
      15
      ·
      edit-2
      13 hours ago

      It’s all being dumped into data centers now. Google and Meta don’t need your face to prove who you are to create a new login, they need it to link data. What’s awful is the need to log in is so intense, it worked. Apparently YouTube aspirations are worth it. And shopping Facebook marketplace.

      Now, Amazon isn’t allowing returns for many an individual without a pic or upload of government issued ID. Amazon allowed you to both pay and have an item shipped without this ID. But for a return, they now need it. I’m not saying this ask isn’t multipurpose, but it also links your data together and is probably being dumped into data centers with everything else.

      My point is, it’s not just Microsoft’s choices.

    • evol@lemmy.today
      link
      fedilink
      English
      arrow-up
      11
      ·
      13 hours ago

      Why would a company not be, not like people are going to stop using Windows

      • FauxLiving@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        1
        ·
        edit-2
        12 hours ago

        If only there were another operating system that people could use rather than have their privacy and security raked over the coals by poor design fueled by next quarter’s profits.

        It’s a shame that, according to a recent study of social media respondents, 98% of the Internet are Professional Valorant streamers, who play League of Legends and side hustle as a Mechanical Engineer and Digital Artist or they could browse around the world of alternative operating system and mayhaps find some other Operating System which fits their needs (TempleOS).

        • evol@lemmy.today
          link
          fedilink
          English
          arrow-up
          7
          ·
          12 hours ago

          Lol yeah we have literal death squads using data from data brokers to identify where to raid, yet asking one to not use Google Chrome is simply too much.

          • FauxLiving@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            12 hours ago

            Yeah, but giving up my Apex Legends career and most significant life investment is a lot harder than tolerating a little fascism, what with me being a white person and all.

            (/s because there are Apex Legends players scrolling by between rounds)

  • wuffah@lemmy.world
    link
    fedilink
    English
    arrow-up
    56
    arrow-down
    5
    ·
    edit-2
    14 hours ago

    It’s not a security flaw, it’s by design. Microsoft has been building this surveillance apparatus for years, and the purchase of government access to your computer and data using your tax dollars is a lucrative alignment of state and corporate power. Their recent design choices point to a rabid desperation to turn your PC into an Apple-style walled-garden.

    It goes like this:

    • Require online Microsoft account creation.

    • Require TPM compliance to run Windows.

    • Forcibly encrypt the user’s data under the guise of “security”, even without permission or even user action. (Encryption is good! Right?)

    • Link your identity, payment information, data, online activity, and encryption keys to your hardware ID.

    • Record everything you do and use that data to train an AI model with onboard tensor hardware.

    • Exfiltrate the entire model, or just query it remotely for “online services.” Or, in this case, just have MS give you the fucking recovery keys. lol

    All done “securely” with tamper resistance and mathematical verifiability that whatever is on your device is yours, and that you took that action with limited plausible deniability.

    If you think you’ve got nothing to hide, think again about the current activities of ICE, law enforcement investigations based on reproductive health data, the pornography suppression movement, age verification, and the data harvesting of dissenting speech. What’s legal today can quickly become “illegal” tomorrow. The constitution is just a piece of paper in a fancy climate controlled box.

        • Zephorah@discuss.online
          link
          fedilink
          English
          arrow-up
          5
          ·
          7 hours ago

          I realize Linux distros inspire arguments on the level of which rule set is the best rule set for D&D. As such, everyone is right, and no one can really prove anyone else wrong no matter how long they choose to argue. Unless we’re discussing the awfulness of 4.0 of course.

          • Rothe@piefed.social
            link
            fedilink
            English
            arrow-up
            2
            ·
            3 hours ago

            Indeed. I think the inevitable discussion about best distro, which always comes up in this context, is more hurtful than constructive, since it may end up confusing and scaring away potential Windows-defectors.

            The point is to get them to try out linux and get a taste for it, and only when they have become comfortable with the concept and realised it is not so scary of a change that some people claim, should they begin to consider which distro is right for them.

          • Goodlucksil@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            3 hours ago

            I haven’t seen anyone argue on the ruleset of DnD, so I’m disregarding that, but I agree with your point. Remember: Switcning distros is easy.

      • tomalley8342@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        11 hours ago

        Don’t most Linux distributions not enable full disk encryption by default? How would that have improved the situation in this case?

        • bryndos@fedia.io
          link
          fedilink
          arrow-up
          1
          ·
          60 minutes ago

          It’s worse than that, lots of these linuxes actually have this builtin virus called wine, which means they are really just windows in disguise.

          It also makes them look like a hacker to the FBI, that’s why TYOTLD has never come. Most linusers are getting dissapeared to guano bay.

          Far safer to stay on windows, linus is only suitable for real hackers who can grep their way into cia mainframe to expunge their records.

        • Midnight Wolf@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          11 hours ago

          While it’s rarely by default (I actually don’t know any that do by default but), it is usually a simple checkbox during the installation. And a provided password, of course.

    • evol@lemmy.today
      link
      fedilink
      English
      arrow-up
      4
      ·
      12 hours ago

      You make Microsoft act like some mastermind genius carefully planning to take away everyone’s rights instead of a bunch of clueless DIrectors who are chasing KPI’s. Just happens more people relying on their technology means when the Government comes knocking they can give them all the data they want.

      • wuffah@lemmy.world
        link
        fedilink
        English
        arrow-up
        17
        arrow-down
        1
        ·
        edit-2
        13 hours ago

        That’s a great question, and it is because it enables a chain of cryptographic controls that enable verification, tamper resistance, and secrecy while selling Bitlocker as computer security. It is technically secure, except that MS has your recovery keys and can just give them to whoever they want, like the FBI!

        This way, they can mathematically verify:

        • Who you are and the exact unique machine you use (verification from a unique machine ID associated with your encryption keys and Windows account data)

        • Know that the data has not been altered in transit (tamper resistant hashing of your data)

        • No one else knows except them (secret encryption keys stored in hardware that only Microsoft controls, not you, Microsoft)

        This architecture also keeps their data on your machine secure. If someone maintains an encrypted archive on your hard drive that only they control the keys to, say like a movie or a video game, who owns that data really? If it’s decrypted only for authorized use, you’re really only renting that content from the owner. This is called Digital Rights Management, and it’s much easier when this security chain is in place.

        Technically they could do this remotely if they really wanted to and your machine were powered. Imagine what you could do with this power for every Windows machine on the planet.

    • JasonDJ@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      edit-2
      12 hours ago

      Yeah but as long as you download CSAM you’re on this governments “nice” list. Use that to throw them off your scent.

      Oh they like cheese pizza? Must be a god-fearing republican like us. Move along.

  • FauxLiving@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    ·
    edit-2
    11 hours ago

    Oh no, who could have possibly seen this coming when Microsoft decided to back up your full-disk encryption key automatically to OneDrive.

    Smart of them to deploy automatic full disk encryption just as open source projects like Trucrypt and Veracrypt were starting to become mainstream, capturing their market share (Netscape Navigator-style). Very incompetent of them to include many glaring backdoors that completely defeats the encryption that they offer.

    In addition to being vulnerable to law enforcement through subpoenas on the stored key. Anytime you run a Windows update and the system has to reboot, it writes a ‘clear key’ to the hard drive which can be easily retrieved if the disk is stolen and also they bypass TPM Validation.

    You know, the thing that is so important to have that you were forced to buy an entirely new computer… it is not active during a system update and anybody who had access to your hard drive can write arbitrary code into your system files.

    Well, you would think that this isn’t very useful, after all they would have to have pretty good timing to catch you updating your computer to remove the hard drive, right?

    Nope, if they steal your whole computer and plug it into power and a network connection, the next time a Windows update hits the system will automatically apply the update (absent a very specific Group Policy) and write the full-disk encryption key to the hard drive before shutting down.

    I’m no expert computerologist, but I think that any system that requires anybody but you to have your key is insecure. If this is the kind of poor design choices that they make in regards to disk encryption then I would personally have no confidence that their proprietary code is not equally porous.

    • massacre@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      9 hours ago

      ’m no expert computerologist, but I think that any system that requires anybody but you to have your key is insecure.

      Computerologist here. You are 100% correct. If anyone says otherwise, they are selling you something.

    • Em Adespoton@lemmy.ca
      link
      fedilink
      English
      arrow-up
      3
      ·
      11 hours ago

      This is configurable; you can set BitLocker to always require a password on boot. If you do that, the clearkey doesn’t get placed (yet). If you set this mode, the key also doesn’t get uploaded to OneDrive. Of course, there’s a big warning when you set it up, and it recommends you print off and save the one time recovery key list.

      Easier just to use an OS that doesn’t require you to jump through hoops to secure it though.

      • FauxLiving@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        11 hours ago

        You can also disable it with a Group Policy too and delete any keys that were uploaded to Microsoft with manage-bde while adding your own keys, but for the average person Bitlocker is going to be how it comes by default.

        Pre-builts are even worse because that’s another party who has had access to your keys and there are not laws that they would violate by keeping copies (for your convenience, of course)

    • otacon239@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      11 hours ago

      TrueCrypt, my beloved. Such an amazing set of features and super easy to use. I so wish there was a modern open-source equivalent with the same intuitive approach. I especially liked the ability to do fancy stuff like disguising data with a false password or using any file as the key.

  • potatopotato@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    16
    ·
    13 hours ago

    On Linux, selecting LUKS when you install encrypts the disk without the potential for this problem. So far it’s proven to be very reliable at stopping state level actors, just don’t use a password that you use elsewhere

  • buttmasterflex@piefed.social
    link
    fedilink
    English
    arrow-up
    13
    ·
    13 hours ago

    I’m not surprised. The standard Microsoft disclosure on my work laptop at the login screen states any use ofbthw computer may be monitored and/ or recovered by Microsoft and law enforcement. That’s why Microsoft products are not present in my home.

  • DaddleDew@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    14 hours ago

    If you really were still naive enough to think that a public tech company cares about your right to privacy at that point, it’s pretty much on you.

  • nul9o9@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    13 hours ago

    Well, if thats not enough of a reason to move off of Microsoft products, then i don’t know what is.

  • doug@lemmy.today
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    edit-2
    14 hours ago

    Didn’t this happen with an iPhone a few years back? FBI couldn’t get into a suspect’s phone, Apple stood firm publicly, but then somehow the FBI got in anyway? Maybe I’m misremembering.