Perfect, this will finally lock out all the old people of their devices because they forget their bitlocker password :D
I guess they’ll use TPM. I’m so excited to tell half of my “clients” (all seniors in the village) that they are fucked because their Laptop died.
Yeah, this makes sense for corporate environments with keys backed up to a centralized location like Active Directory. Not for consumers with no reasonable way to keep some key like this in a safe place as a “break glass in case of emergency” option.
It backs up to the Microsoft Account
Still, some people create an @outlook.com email, set up no recovery options, forget the password, and find themselves locked out.
How do you get to your Microsoft account when your computer is locked?
If you’re doing things properly, you’ll know your Microsoft account password or have it in a password manager (and maybe have other account recovery options available like getting a password reset email etc.), and have a separate password for the PC you’re locked out of, which would be the thing you’d forgotten. If someone isn’t computer-literate, it’s totally plausible that they’d forget both passwords, have no password manager, and not have set up a recovery email address, and they’d lose all their data if they couldn’t get into their machine.
Even if you have your Microsoft account password, it doesn’t help when you can’t even boot into Windows.
Most people have smartphones these days where they would be able to log into their account and grab the recovery key if it’s backed up. If they don’t have a phone, they will know someone that does, or a library with a computer.
Bear in mind that non-techy users don’t get the option to opt out of a Microsoft account in the OOBE now, so most should have their key backed up without thinking about it
Many people will have access to a secondary device, not all of course.
Almost everyone has access to a phone. Most governments, including the US provide free or low cost smartphones to those who can’t afford it. There are entire MVNO carriers based around this, like Assurance wireless.
A phone or another computer?
Microsoft fucked that up in the Home edition, where the key in your account won’t work.
Timestamp 8:48 in this video
https://youtu.be/pIRNpDvGF4w
Oh, I can just imagine. Customers getting angry that their tech support cannot “just simply” recover their files like they used to and accuse them of scamming. Fucking thanks, Microsoft.
Keys are backed up to their MS account by default.
local accounts only
It’s hard for the average windows user to make a local account
Unless you don’t have an MS account or only set up a dummy account just to get the stupid OS to activate and have never used once since.
Wel then, either get a Microsoft account that you remember the password to or don’t use Windows since they are pushing hard for this type of security. Linux is completely free for people who don’t like the way Windows is heading towards.
Then somebody can sell new devices to them and M$ can sell new windows with it.
Win-win-win-win…
It’s good, for privacy and all of course, but I remember here a Dell BIOS upgrade that basically wiped the TPM2.0 and so windows was asking for the recovery bitlocker key at boot. I have them on a encrypted USB key and anyway I can access my MS account from another device to find the key and type it.
But I’m sure a lot of people will basically say “well, fuck, I don’t have the key”, guaranteed.
I always worry the the backup USB drive would be dead.
I guess I’m one minority but kind of like an ability to fetch the key from the web. Doing that securely of course can be tough.
Web. USB. Printout in a safe. On my phone. In Keypass. Etc, etc.
I’m not relying on a single copy.
Where’s your encrypted USB recovery key stored?! Is it encrypted USBs all the way down?
volume encrypted with veracrypt, it asks for a password to be mounted
This one is especially fun on windows 11 home. At least it was some time ago on some machine i worked on. Since home doesn’t have the bitlocker settings fully you cannot disable bitlocker encryption. It would also auto enable sometimes even if you don’t have a microsoft account, which means it doesn’t back the key up anywhere. Not sure it does that anymore, i hope not, but i expect a lot of people to lose their data to this crap in the future.
In either case at least i find that full disk encryption on most machines is just overkill as it only really protects in the scenario the device is stolen and someone tries to pull data off of it that way. But in the vast majority of cases when people get their data stolen its done with malware, which disk encryption does /nothing/ to prevent.
In the scenario in which your computer is forgotten or stolen, it would offer some comfort knowing that the data on the computer is not accessible.
We have a “policy” in our household that everything that has personal data should be encrypted. That is just for cases in which we lose the device or it gets stolen. That makes it a purely financial loss, and not as invasive / uncomfortable.
But on the other hand my household are not average users. So it might not work well for other people.
when it automatically enables on win11 home, it doesn’t actually “enable” until you do sign-in to windows with a microsoft account so it has a place to stash the recovery key.
and, i have not had any difficulty turning the encryption off on win11 home systems.
[…] device encryption will be enabled by default when you first sign in or set up a device with a Microsoft account or work / school account.
For devices with a TPM, this has literally been the case since Windows 10 1803 back in 2018.
But that’s not the case for Windows Home, is it? The FDE setting just takes me to a page to upgrade to Pro. My laptop does have TPM.
It is, Secure boot and the TPM must both be enabled.
If you check Msinfo32 / “System Information” with admin rights, there is a “device encryption” listing that maybhave additional information.
There are rare instances where a device won’t support automatic encryption due to “Un-allowed DMA capable bus/device(s) detected” which requires a registry tweak to work around
Un-allowed DMA capable bus/device(s)
And there it is in msinfo!
Thanks very much. I’ve been using veracrypt for years, it’s good to know that I have another option (especially to simplify things for family members).
Tom’s Hardware tested this software version of BitLocker last year and found it could slow drives by up to 45 percent.
WTF‽ In Linux full disk encryption overhead is minimal:
While in pure I/O benchmarks like FIO there is an obvious impact to full disk encryption and other synthetic workloads, across the real-world benchmarks the performance impact of running under full disk encryption tended to be minimal
https://www.phoronix.com/review/hp-devone-encrypt/5
There’s like five million ways you can use disk encryption on Linux though and not all of them are very performant. So keep that in mind if you see other benchmarks showing awful performance (use the settings Phoronox used).
I suspect Microsoft made some poor decisions in regards to disk encryption (probably because of bullshit/insecure-by-design FIPS compliance) and now they’re stuck with them.
This has been happening for a lot longer than just Windows 11.
Several people I’ve spoken to, who have purchased OEM computers from the likes of Dell, HP, Lenovo and others, did not know that bitlocker FDE was enabled, and they were not aware that they needed to back up their recovery key.
On at least one occasion, this caused someone to lose the contents of their laptop when Windows failed to finish booting into the OS. The drive was fine as far as I could tell, but the content on the drive would not complete the boot up sequence and would bsod/boot loop the system, so data retrieval was not possible without the recovery key, which they did not have. That was a Windows 10 Dell system from 2020 or so.
My opinion is that FDE is a good thing.
My advice is if you have FDE enabled, backup your recovery keys. It’s easy, but it won’t directly save to a file on the filesystem that’s locked by the key to which the recovery key applies. The easiest workaround is to “print” it, then use the built in Microsoft print to PDF, then dump it wherever you want. Afterwards, put it somewhere safe. Doesn’t matter where, but anywhere that isn’t the encrypted drive. Maybe Google drive, maybe a USB flash drive, maybe email it to yourself. I dunno, just somewhere you can retrieve if that system isn’t working.
When you’re done doing that, go check the same on your parents computers, friends, brothers and sisters… If they’re someone you care about, and they have a windows computer, check. Get those recovery keys backed up somewhere.
I think this is a step in the right direction. Everyone can lose a portable device or it can get stolen, so protecting the potentially sensitive data is important.
I think what people are complaining about is not full-disk encryption itself, but the fact that people are not used to being responsible for their cryptographic keys.
I think we should educate people regarding this responsibility. We did it with regular keys we use to unlock our homes.
Are they even saved by default in an MS account? Because if I’d link one, I would expect them to at least prompt me
I believe you can find them in the first Microsoft account that you registered to that windows install.
happened to my ma’s computer, her microsoft account+key was not saved in there so she just. lost all her important work documents. also, what of the people who don’t have another device to look up the website where the key is stored?
Well, most people do have a secondary device, and of those that don’t, in most cases they can just use someone else’s.
This will make people angry in waves as updates break bitlocker and cohorts don’t have their key, a new one each time
It still uses the TPM by default, instead of requireing a passphrase to be typed in on boot to unlock the keys. This still makes it an insecure mess.
https://yewtu.be/watch?v=wTl4vEednkQ
https://github.com/stacksmashing/pico-tpmsniffer
https://github.com/stacksmashing/LPCClocklessAnalyzer
Microsoft NEVER cares about your security. They just do the absolute bare minimum for compliance with stupid standards, and then advertise it as some crazy security improvement. Corporations lie to you all the time. If you want some actual security, you need to start using FOSS software. Most importantly a FOSS, Linux-based OS, and set it up with LUKS passphrase-based encryption.
This is good but they need better guidance to nontechnical users how to backup their keys. Cloud backup now that they are trying to make local accounts illegal I suppose.
Can’t wait to get a million tickets about this. -_-
If you’re getting tickets, I assume you mean at work? What’s a business doing running Home and no Domain? This isn’t an issue on machines joined to a domain.
I work at an MSP, so we have clients who refuse to pay money to have good tech. Plenty of them have no domain, use Home, and just cheap out and then get mad when they have constant issues. We try to tell them to buy better shit, but they don’t wanna hear it. 🤷♀️
Rofl.
The vast majority of small business do run on Home have no clue wtf a domain is. Probably share files via google drive rather than a file server.
yeah, no kidding, a real bitch if you want to back up your systems, and the hit to processing speed is significant, though with it enabled, the days of popping out a hard drive, and grabbing whatever the hell’s on there with a usb connection are over
AES-NI has been standard for over a decade. There shouldn’t be a significant hit to processing speed.
and i work with dozens of disparate windows systems on multiple hardware platforms on the regular, the speed degradation with bitlocker encryption still exists, and is noticeable
You’ve benchmarked this? Using what encryption algorithm, what processors, what benchmark?
More to the point, I think, is are there even any systems that will run Windows 11 that don’t have AES-NI?
Performance without it is kinda irrelevant because there’s no situation where you’d have Windows 11 and bitlocker and NOT AES-NI.
deleted by creator
the days of popping out a hard drive, and grabbing whatever the hell’s on there with a usb connection are over
Independent repair shops are going to suffer big time from this.
well, if the customer provides them the bitlocker key, then they can access and manipulate the data on the drive, if not, they’re fucked
I’ve supported bitlocker in corporate deployments. I have also spent some time in independent repair shops. I have little confidence in users to supply a bitlocker key, let alone even know what one is. I anticipate a lot of “what? I already gave you my password.”
lol yes
Obviously, Microsoft will happily sell you one drive cloud backup to solve the problem they are creating.
You can still mount it to another machine if you have the key. It’s an extra layer of pain in the ass, though.
I don’t use an M$ account so if your key is backed up to the cloud (aside: can’t wait to read the headline about when that gets breached) I don’t personally know offhand how difficult it is to extricate your BitLocker keys from Microsoft.
Source?
Clownstrike taught them nothing…
What does Crowdstrike have to do with Bitlocker?
Clearly you didn’t do any machine recovery during that fiasco or you wouldn’t ask. When the machines crashed the only fix was to get in and delete the offending file, but as Windows wouldn’t load up you had to unlock the drive to get in with a working OS.
Ok, but what lesson was Microsoft supposed to learn from the Crowdstrike fiasco that have to do with the implementation of Bitlocker in personal devices?
Are you suggesting that OS drive encryption should never be implemented due to the fact that computers might sometimes need to be accessed without the OS booting up? That doesn’t really make sense. That’s what Bitlocker keys are for, to unlock the drive if needed.
OK buddy, you can be right if it’s that important to you.
I don’t know everything about what happened during the Crowdstrike fiasco since it didn’t directly affect my company, so I’m asking questions. I don’t really care about being right. If you were talking about something I don’t know, I’m glad to learn new things about that incident. Why get defensive on something like this instead of just clarifying your point?
OK, I may have misread the intent. Sorry.
Basically for any machine with bitlocker on it we had to unlock the drive before getting the ability to load an external OS to go on to that drive and remove the problem file. The built in Windows was completely borked. For a home user that’s generally quick and easy to do, in any corporate environment it will take hours if not days to get that unlock code and meanwhile nothing can get done meaning business grinds to a halt and waits.
As for what happened in the first place, Crowdstrike updated a file for their nanny app which has kernel (lowest OS level) access so when their app choked on the bad update it crashed the kernel which meant Windows couldn’t even load much less run.
The two aren’t directly related but one made the other significantly harder to fix with any speed.
deleted by creator
Do the average Windows user really need BitLocker device encryption? They don’t. The only users who need BitLocker are business’ and government workers.
Also 99% of Windows users are going to get locked out of their computers.
Everyone needs drive encryption.
And no, 99% of Windows users aren’t going to get locked out.
99% of Windows boxes are business boxes, which already are encrypted (and if they aren’t, that’s some bad IT).
This really only affects Home users, who don’t enable encryption because they don’t know any better. I have no doubt we’ll see quite a few people have issues because they lose their key and can’t recover their data. This is why MS should provide clear directions during setup about storing the key. Instead they’re going to keep it in people’s OneDrive/365 account. Such a bad idea. Now I’ve gotta write documentation for friends and family about what NOT to do during setup.
This is why MS should provide clear directions during setup about storing the key.
Now I’ve gotta write documentation for friends and family about what NOT to do during setup.
Okay. You need to write documentation for your friends and family, but Microsoft have clear directions.