shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

271
active users

#BitLocker

0 posts0 participants0 posts today
jesterchen42<p><span class="h-card" translate="no"><a href="https://mstdn.social/@hkrn" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hkrn</span></a></span> Wait, what?</p><p>"You can retrieve the BitLocker recovery key by logging into the BitLocker recovery screen portal with your Microsoft account"</p><p>So you're telling me, the bitlocker recovery key is uploaded to Microsoft without consent or knowledge?! (I don't use Windows, so I cannot check this.)</p><p>That'd be a huge risk - both for companies and individuals: compromised cryptographic keys.</p><p><a href="https://social.tchncs.de/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://social.tchncs.de/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://social.tchncs.de/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://social.tchncs.de/tags/bitlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitlocker</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> confirms May <a href="https://mastodon.thenewoil.org/tags/Windows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows10</span></a> updates trigger <a href="https://mastodon.thenewoil.org/tags/BitLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitLocker</span></a> recovery</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-may-windows-10-updates-trigger-bitlocker-recovery/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-confirms-may-windows-10-updates-trigger-bitlocker-recovery/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> 10 KB5058379 update triggers <a href="https://mastodon.thenewoil.org/tags/BitLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitLocker</span></a> recovery on some devices</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/windows-10-kb5058379-update-triggering-bitlocker-recovery-after-install/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/windows-10-kb5058379-update-triggering-bitlocker-recovery-after-install/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability</p><p>A critical vulnerability in Microsoft’s BitLocker full disk encryption, demonstrating that it can be bypassed in under five minutes using a software-only attack dubbed “Bitpixie” </p><p>🤷 <a href="https://cybersecuritynews.com/bitlocker-encryption-bypassed/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/bitlocke</span><span class="invisible">r-encryption-bypassed/</span></a></p><p><a href="https://chaos.social/tags/bitlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitlocker</span></a> <a href="https://chaos.social/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://chaos.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://chaos.social/tags/itsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsec</span></a> <a href="https://chaos.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://chaos.social/tags/bitpixie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitpixie</span></a> <a href="https://chaos.social/tags/bypass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bypass</span></a> <a href="https://chaos.social/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a></p>
All Things Open<p>🚀 NEW on We ❤️ Open Source 🚀</p><p>HP Pavilion locked by BitLocker? <span class="h-card" translate="no"><a href="https://mastodon.social/@linuxnerd" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>linuxnerd</span></a></span> tackled it with open source tools, wiped the encrypted NVME with dd, and installed Fedora 41 KDE.</p><p>Read the full breakdown of this Linux rescue: <a href="https://allthingsopen.org/articles/how-to-install-linux-remove-bitlocker-encryption" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">allthingsopen.org/articles/how</span><span class="invisible">-to-install-linux-remove-bitlocker-encryption</span></a></p><p><a href="https://mastodon.social/tags/WeLoveOpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WeLoveOpenSource</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/BitLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitLocker</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/Fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fedora</span></a></p>
IrishMASMS<p>Talking with the folks in the local <a href="https://defcon.social/tags/vintage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintage</span></a> / <a href="https://defcon.social/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a> community, they clued me in that the <a href="https://defcon.social/tags/ThinkPad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThinkPad</span></a> <a href="https://defcon.social/tags/RAID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAID</span></a> is a steaming pile of 💩 and not worth the trouble. </p><p>🤷 Oh well. Thanks for cluing me in</p><p>So I swapped out the two testing <a href="https://defcon.social/tags/NVMe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NVMe</span></a> drives I was using and reinstalled the original sticks - to have <a href="https://defcon.social/tags/windoz10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windoz10</span></a> demanding for the <a href="https://defcon.social/tags/bitlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitlocker</span></a> recovery key. 🤦‍♂️ </p><p>Well, time to wipe &amp; install <a href="https://defcon.social/tags/windoz11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windoz11</span></a> then. </p><p>Install went fine, only 4 rando <a href="https://defcon.social/tags/drivers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>drivers</span></a> to find for all <a href="https://defcon.social/tags/devices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devices</span></a> to be recognized and working. </p><p>Using my <a href="https://defcon.social/tags/CTT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTT</span></a> scripts to install the majority of applications, then to remove the <a href="https://defcon.social/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> <a href="https://defcon.social/tags/bloatware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bloatware</span></a> and other garbage <a href="https://defcon.social/tags/micro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>micro</span></a>$oft added to <a href="https://defcon.social/tags/windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows11</span></a> </p><p>Then migrate my <a href="https://defcon.social/tags/data" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>data</span></a> from my other ThinkPad. Welcome to my <a href="https://defcon.social/tags/sunday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sunday</span></a> <a href="https://defcon.social/tags/funday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>funday</span></a> </p><p> <a href="https://defcon.social/tags/siliconValley" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>siliconValley</span></a> <a href="https://defcon.social/tags/SillyValley" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SillyValley</span></a> <a href="https://defcon.social/tags/sanfrancisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sanfrancisco</span></a> <a href="https://defcon.social/tags/sanfran" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sanfran</span></a> <a href="https://defcon.social/tags/sanfranciscocomputers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sanfranciscocomputers</span></a> <a href="https://defcon.social/tags/sanfrancomputers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sanfrancomputers</span></a> <a href="https://defcon.social/tags/sanfranciscovintagecomputers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sanfranciscovintagecomputers</span></a> <a href="https://defcon.social/tags/sanfranvintagecomputers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sanfranvintagecomputers</span></a> <a href="https://defcon.social/tags/sanfranciscovintagehardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sanfranciscovintagehardware</span></a> <a href="https://defcon.social/tags/sanfranvin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sanfranvin</span></a>-tagehardware <br><a href="https://defcon.social/tags/vintagecomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintagecomputing</span></a> <a href="https://defcon.social/tags/vintagecomputint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintagecomputint</span></a> <a href="https://defcon.social/tags/vintagecomputer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintagecomputer</span></a> <a href="https://defcon.social/tags/vintagecomputers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintagecomputers</span></a> <a href="https://defcon.social/tags/vintagecomputalk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintagecomputalk</span></a><br><a href="https://defcon.social/tags/vintagehardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintagehardware</span></a> <a href="https://defcon.social/tags/computerHistory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computerHistory</span></a> <a href="https://defcon.social/tags/retro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retro</span></a> <a href="https://defcon.social/tags/VCF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VCF</span></a> <a href="https://defcon.social/tags/vintageComputerFestival" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vintageComputerFestival</span></a> <br><a href="https://defcon.social/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a> <a href="https://defcon.social/tags/retroComputers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retroComputers</span></a> <a href="https://defcon.social/tags/WallOfRetro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WallOfRetro</span></a> <a href="https://defcon.social/tags/retroTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retroTech</span></a> <a href="https://defcon.social/tags/retroTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retroTechnology</span></a><br><a href="https://defcon.social/tags/nerdsOfVintage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nerdsOfVintage</span></a> <a href="https://defcon.social/tags/happyNerding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>happyNerding</span></a> <br><a href="https://defcon.social/tags/computer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computer</span></a> <a href="https://defcon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://defcon.social/tags/computerHardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computerHardware</span></a> <a href="https://defcon.social/tags/laptop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>laptop</span></a> <a href="https://defcon.social/tags/laptops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>laptops</span></a> <br><a href="https://defcon.social/tags/IBM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IBM</span></a> <a href="https://defcon.social/tags/thinkpad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thinkpad</span></a> <a href="https://defcon.social/tags/thinkpads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thinkpads</span></a> <a href="https://defcon.social/tags/VintageThinkPad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VintageThinkPad</span></a> <a href="https://defcon.social/tags/X86" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>X86</span></a> <a href="https://defcon.social/tags/WindowsVista" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsVista</span></a> <a href="https://defcon.social/tags/IBMhardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IBMhardware</span></a> <a href="https://defcon.social/tags/lenovoHard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lenovoHard</span></a>-ware <a href="https://defcon.social/tags/Thinkpadnium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Thinkpadnium</span></a><br><a href="https://defcon.social/tags/upcycle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>upcycle</span></a> <a href="https://defcon.social/tags/restore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>restore</span></a> <a href="https://defcon.social/tags/TechnologyRepair" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechnologyRepair</span></a> <a href="https://defcon.social/tags/ThinkPadRepair" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThinkPadRepair</span></a> <a href="https://defcon.social/tags/WasteNotWantNot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WasteNotWantNot</span></a> <a href="https://defcon.social/tags/Thinkpadnium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Thinkpadnium</span></a><br><a href="https://defcon.social/tags/makeShitMonday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>makeShitMonday</span></a> <a href="https://defcon.social/tags/showmewhatyougot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>showmewhatyougot</span></a></p>
openSUSE Linux<p>As a follow-up to Full Disk Encryption for those moving from <a href="https://fosstodon.org/tags/Windows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows10</span></a>, <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> offers <a href="https://fosstodon.org/tags/FDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FDE</span></a> secured by TPM2 or FIDO2 for <a href="https://fosstodon.org/tags/BitLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitLocker</span></a>-like security. 🔐🛡️ <a href="https://fosstodon.org/tags/10isEnough" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>10isEnough</span></a> <a href="https://fosstodon.org/tags/EndofWindows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndofWindows10</span></a> <a href="https://fosstodon.org/tags/UpgradetoFreedom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UpgradetoFreedom</span></a> today! <a href="https://news.opensuse.org/2024/09/20/quickstart-fde-yast2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.opensuse.org/2024/09/20/q</span><span class="invisible">uickstart-fde-yast2/</span></a></p>
Rairii :win3_progman: :win3: <p>I’ve updated my bitlocker attacks list <a href="https://github.com/Wack0/bitlocker-attacks" rel="nofollow noopener" target="_blank">https://github.com/Wack0/bitlocker-attacks</a></p><p>The main addition here is documentation of “break out in hives” (CVE-2024-20666, nice) and its variant (CVE-2025-21213).</p><p>The most interesting thing here is that it’s <em>technically</em> <strong>still not fixed</strong> - the fix was only applied to the PCA2023-signed <code>bootmgr_ex</code>, so <strong>without the KB5025885 mitigations applied (and other default settings which nobody ever changes), you’re still vulnerable</strong> without even needing a downgrade attack for <code>bootmgr</code>.</p><p>(If you’re using TPM-only bitlocker, you really should be using legacy integrity validation - that is, <a href="https://admx.help/?Category=Windows_10_2016&amp;Policy=Microsoft.Policies.VolumeEncryption::AllowSecureBootForIntegrity_Name" rel="nofollow noopener" target="_blank">Allow Secure Boot for integrity validation policy DISABLED</a> with <a href="https://admx.help/?Category=Windows_10_2016&amp;Policy=Microsoft.Policies.VolumeEncryption::PlatformValidation_UEFI_Name" rel="nofollow noopener" target="_blank">PCRs 0,2,4,7,11 set</a> - legacy integrity validation was never vulnerable to these issues in the first place! This would imply bitlocker potentially going into recovery more often with windows updates, but it’s a choice between that and currently broken bitlocker vulnerable to various boot-time <em>software</em> issues combined with downgrade attacks)</p><p>The main issue here is that starting from Windows 10 (th1), the <code>systemdatadevice</code> element was added to winload; if present the SYSTEM hive is loaded from this block device instead of the (bitlocker encrypted) OS partition.</p><p>Therefore, the first (easiest) exploitation method was to pull a SYSTEM hive from <code>boot.wim</code>, modify it to set <code>SYSTEM\Setup!CmdLine</code> to <code>cmd.exe</code>, and set up the WinRE boot entry to use it; booting WinRE would then pop a SYSTEM shell with bitlocker keys derived and in memory.</p><p>The original fix just removed the <code>systemdatadevice</code> support from winload, but (at least in some cases) the older revisions of winload (for the same major Windows version) would still boot Windows successfully; thus the second exploitation method: configure BCD to load winload from somewhere else (downgrade attack), booting the bitlocker-encrypted OS with custom SYSTEM hive taken from <code>install.wim</code> - it turned out that without <code>winpe</code> also set, this corrupted the SYSTEM hive on the bitlocker-encrypted OS partition; also the Win32 subsystem would fail to load, but native code execution would still work when setting <code>SYSTEM\ControlSet001\Control\Session Manager!SetupExecute</code>. Therefore, I took the old <a href="https://github.com/amdf/NativeShell" rel="nofollow noopener" target="_blank">Native Shell</a> codebase, ported it to AMD64, and modified it to acquire <code>SeRestorePrivilege</code> and open files with <code>FILE_OPEN_FOR_BACKUP_INTENT</code> (so permission checks would be ignored, so it’s possible to do the sethc trick at this point).</p><p><a class="hashtag" href="https://labyrinth.zone/tag/windows" rel="nofollow noopener" target="_blank">#Windows</a> <a class="hashtag" href="https://labyrinth.zone/tag/bitlocker" rel="nofollow noopener" target="_blank">#BitLocker</a> <a class="hashtag" href="https://labyrinth.zone/tag/cve_2024_20666" rel="nofollow noopener" target="_blank">#CVE_2024_20666</a> <a class="hashtag" href="https://labyrinth.zone/tag/cve_2025_21213" rel="nofollow noopener" target="_blank">#CVE_2025_21213</a></p>
IT News<p>This Week in Security: IOCONTROL, (Location) Leaking Cars, and Passkeys - Claroty’s TEAM82 has a report on a new malware strain, what they’re calling IOCONT... - <a href="https://hackaday.com/2025/01/03/this-week-in-security-iocontrol-location-leaking-cars-and-passkeys/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/01/03/this-w</span><span class="invisible">eek-in-security-iocontrol-location-leaking-cars-and-passkeys/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/doubleclickjack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doubleclickjack</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/bitlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitlocker</span></a> <a href="https://schleuss.online/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://transfem.social/@puppygirlhornypost2" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>puppygirlhornypost2</span></a></span> <span class="h-card" translate="no"><a href="https://social.vlhl.dev/users/navi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>navi</span></a></span> yeah, but that's a common problem based off <a href="https://infosec.space/tags/TechIlliteracy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechIlliteracy</span></a> and lack of proper explaination!</p><ul><li>Given the <a href="https://infosec.space/tags/CryptoAPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CryptoAPI</span></a> of <a href="https://infosec.space/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> is <a href="https://infosec.space/tags/backdoored" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoored</span></a> for <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> [<a href="https://infosec.space/tags/NSAKEY_" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSAKEY_</span></a> &amp; <a href="https://infosec.space/tags/SSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSL</span></a>-<a href="https://github.com/kkarhan/windows-ca-backdoor-fix" rel="nofollow noopener" target="_blank">Updates</a> I'd consider <a href="https://infosec.space/tags/BitLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitLocker</span></a> insecure and the least of it's problems!</li></ul><p>Bonus points if <a href="https://infosec.space/tags/TPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPM</span></a> bs prevents <a href="https://infosec.space/tags/DataRecovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataRecovery</span></a>.</p><ul><li>My biggest problem with <a href="https://infosec.space/tags/FDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FDE</span></a>/ <a href="https://infosec.space/tags/FullDiskEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FullDiskEncryption</span></a> is that is mandates direct access to a system to authenticate, thus one needs to manually mount stuff on servers post-boot instead.</li></ul>
War on the Castle, Peace in the Valley🛡️🍉🇵🇸 🏳️‍🌈Just nuked one of my windows laptops and installed Kubuntu with fulldiskencryption. We are in for hard times and bitlocker is known to be backdoored for the 3-letter agencies. Of course, Canonical is likely also to "have a relationship" but the LEO documentation readily available online seems focused on Windows. FreeBSD is likely more secure, and it would be worthwhile researching which Linux kernels and distros are more likely to withstand a MAGA 2.0 DOJ probe. #kubuntu #linux #ubuntu #canonical #bitlocker #microsoft #backdoors #encryption #fulldiskencryption #OS #windows
Kevin Karhan :verified:<p>Reason #9001 why <a href="https://infosec.space/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> is <a href="https://infosec.space/tags/unfixable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unfixable</span></a>, broken <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> and <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> is blatantly evil:</p><p>Instead of actually fixing their shitty <a href="https://infosec.space/tags/BitLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitLocker</span></a> <a href="https://infosec.space/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> [which has <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> <a href="https://infosec.space/tags/Backdoors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoors</span></a> BTW!] they pushed a broken update and instead of fixing that they told users nonchalantly to <em>'go fuck yourself'</em> and instead expected them to run some shitty <a href="https://infosec.space/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a>, which then allowed <a href="https://infosec.space/tags/CyberCriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCriminals</span></a> to prey upon <a href="https://infosec.space/tags/TechIlliterates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechIlliterates</span></a> by <a href="https://www.youtube.com/watch?v=9NvoLy5_v4c&amp;t=381s" rel="nofollow noopener" target="_blank">shoving malicious stuff at them</a>...</p><ul><li>And since <a href="https://infosec.space/tags/YouTube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YouTube</span></a> hides <a href="https://infosec.space/tags/dislikes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dislikes</span></a>, a shitload of <a href="https://infosec.space/tags/bots" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bots</span></a> just upvoted and commented those malicious scripts.</li></ul> <p>Case in point: This is just inexcuseable espechally for a <a href="https://infosec.space/tags/CCSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CCSS</span></a> that costs hundreds of dollars retail [ <a href="https://infosec.space/tags/OEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OEM</span></a>-Keys don't count! ]...</p>
Marcus "MajorLinux" Summers<p>Bitlocker will even be available on Windows 11 Home!</p><p>Microsoft is enabling BitLocker device encryption by default on Windows 11 </p><p><a href="https://www.theverge.com/2024/8/14/24220138/microsoft-bitlocker-device-encryption-windows-11-default" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theverge.com/2024/8/14/2422013</span><span class="invisible">8/microsoft-bitlocker-device-encryption-windows-11-default</span></a></p><p><a href="https://toot.majorshouse.com/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://toot.majorshouse.com/tags/BitLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitLocker</span></a> <a href="https://toot.majorshouse.com/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a> <a href="https://toot.majorshouse.com/tags/Windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows11</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a></p>
Sass, David<p>Any <a href="https://infosec.exchange/tags/bitlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitlocker</span></a> bypass out there for Windows Server 2008 R2? <a href="https://infosec.exchange/tags/WS2K8R2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WS2K8R2</span></a> </p><p>Asking for a friend</p>
skry<p>"It felt like a bad idea to read a 48-character key to people who were already stressed out," Woltz told The Register.</p><p><a href="https://www.theregister.com/2024/07/25/crowdstrike_remediation_with_barcode_scanner/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2024/07/25/cro</span><span class="invisible">wdstrike_remediation_with_barcode_scanner/</span></a></p><p><a href="https://mastodon.social/tags/crowdstrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crowdstrike</span></a> <a href="https://mastodon.social/tags/bitlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitlocker</span></a> <a href="https://mastodon.social/tags/barcodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>barcodes</span></a> <a href="https://mastodon.social/tags/ux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ux</span></a></p>
Marcus "MajorLinux" Summers<p>Microsoft can't seem to catch a break!</p><p>July Windows update is sending PCs into recovery </p><p><a href="https://www.pcworld.com/article/2407581/july-windows-update-sending-pcs-into-bitlocker-recovery.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pcworld.com/article/2407581/ju</span><span class="invisible">ly-windows-update-sending-pcs-into-bitlocker-recovery.html</span></a></p><p><a href="https://toot.majorshouse.com/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://toot.majorshouse.com/tags/Update" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Update</span></a> <a href="https://toot.majorshouse.com/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://toot.majorshouse.com/tags/PC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PC</span></a> <a href="https://toot.majorshouse.com/tags/Bitlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bitlocker</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a></p>
Ian Brown :verified:<p>Tune in tomorrow (Sunday) at 11AM ET/8AM PT for the latest episode of <a href="https://mastodon.hccp.org/tags/IanAndJaySpaceOut" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IanAndJaySpaceOut</span></a> and you can spend an hour watching <span class="h-card" translate="no"><a href="https://macaw.social/@jay" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jay</span></a></span> and I try to guess the <a href="https://mastodon.hccp.org/tags/BitLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitLocker</span></a> key for our <a href="https://mastodon.hccp.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> laptop. </p><p><a href="https://mastodon.hccp.org/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdStrike</span></a> <a href="https://mastodon.hccp.org/tags/a16z" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>a16z</span></a> <a href="https://mastodon.hccp.org/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://mastodon.hccp.org/tags/bitcoin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitcoin</span></a> </p><p><a href="https://live.ianandjayspaceout.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">live.ianandjayspaceout.com</span><span class="invisible"></span></a></p>
🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸<p>I think today is the day that I install the new CPU/RAM in my gaming PC. I've been sitting on a new 5900X and 64GB of DDR4 for a couple months because I'm always nervous about spreading new thermal paste. The specter of losing the 72TB of pirated videogames due to some weird bitlocker problem always looms.</p><p><a href="https://mastodon.social/tags/pcBuilding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcBuilding</span></a> <a href="https://mastodon.social/tags/computer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computer</span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/ryzen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ryzen</span></a> <a href="https://mastodon.social/tags/bitlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitlocker</span></a> <a href="https://mastodon.social/tags/ddr4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddr4</span></a> <a href="https://mastodon.social/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a></p>
IT News<p>Raspberry Pi Bitlocker hack is a new spin on a years-old, well-documented exploit - Enlarge / A $10 Raspberry Pi Pico-based TPM sniffing tool, designed to ... - <a href="https://arstechnica.com/?p=2002304" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2002304</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/bitlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitlocker</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://schleuss.online/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://schleuss.online/tags/tpm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tpm</span></a></p>
NO NAME<p>This just in...</p><p>Bad news for <a href="https://soapbox.hackdefendr.com/tags/BitLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitLocker</span></a> users — its encryption can be cracked remarkable easily it seems.</p><p><a href="https://youtu.be/wTl4vEednkQ" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/wTl4vEednkQ</span><span class="invisible"></span></a></p>