• Took them long enough. Most Linux distros have a simple toggle for Disk encryption for years. And as far as i am aware Apple has it too. And basically every mobile OS is encrypted by default as well. iOS and Android

    •  dvdnet62   ( @dvdnet62@feddit.nl ) OP
      link
      fedilink
      English
      34
      edit-2
      2 months ago

      the thing is: it means that your hard drive gets encrypted. However, when that gets encrypted, besides creating a key to decrypt it, everything works perfectly. You then use that computer for 5 years and again, works great. But then the fan on the CPU gets clogged with dust and the CPU overheats and dies. No big deal, you just grab the hard drive and move it into your new computer, or you hook it up with USB to copy everything over to the new one. And that is the moment you find out it was encrypted 5 years ago. You didn’t store the key anywhere but on that disk. You can only read it with that original computer hardware because the key was made to lock that drive to that exact computer that died. And you slowly figure out that every photo, every document, everything critical to you is now protected from you and you can’t get it back.

      Just as fun is making configuration changes just to upgrade your PC. Because Bitlocker uses the hardware in your computer to generate that key, some hardware changes will trigger it to need that key. Same situation where you need to revert the change to get your data.

      Finally, now we need to actually bring home the issue. Drop that change into the lap of someone you know that uses a computer, but doesn’t understand the inner working of them. Maybe that’s your grandma, parent, or siblings. All of a sudden they upgrade and now have a Windows 11 time-bomb that could randomly lock them out of every file on their computer… that’s the real issue here.

      Also a headache for the repair industry. If during repair the bios gets reset or the motherboard swapped, you’ll need the key to be able to boot in to windows again. And your customer is probably NOT aware.

      Bitlocker is important for companies. They can have hundreds or thousands of laptops that contain files with intellectual property that could really damage the company. Laptops get stolen all the time and should be protected at the highest levels. But for normal people’s computers, the higher risk for losing data will be Bitlocker. That’s what makes this such a bad idea.

      • Hi, repair shop owner here.

        Automatic Bitlocker encryption has been a thing since TPM 2.0 devices hit the market in 2018.

        If a device is UEFI, Secure Boot is enabled, TPM 2.0 is present, and the user signs in with a Microsoft Account , then the disk is encrypted and the recovery key is saved to that Microsoft Account.

        If those conditions aren’t met, automatic encryption doesn’t happen.

        As long as they know their Microsoft Account Identifier, users can easily get to that key through the first search engine result for “bitlocker recovery key”: https://support.microsoft.com/en-us/windows/finding-your-bitlocker-recovery-key-in-windows-6b71ad27-0b89-ea08-f143-056f5ab347d6

        We don’t really have a hard time with it - if a user provides their login PIN, a short terminal command will let us grab a copy of their key before BIOS updates or battery disconnects.

        I have had very few cases where folks suffered data loss because of Bitlocker. Most of them were HP Laptops that used Intel Optane accelerated SSDs - encrypting what is effectively a software RAID0 is a recipe for disaster.

        The other few had an unhealthy paranoia where they were reluctant to share anything about themselves with Microsoft, yet still decided to use a Microsoft operating system. While setting up the computer, they created a new Outlook.com email (instead of using their primary email), made up a random birthday, and did not fill in any recovery options like a phone number or secondary email. With the password (and sometimes even email) forgotten, they created a situation where they could not prove the online account was theirs and therefore could not get to the recovery key that had been backed up.

        I do think that Microsoft should have this as an opt-in feature during the out of box experience, which is how Apple has it set up for Filevault and how most Linux distributions are set up. Ultimately, most users will still mash “next’ through the process and later blame the computer.

        I have had quite a few clients have their laptops stolen after car breakins. Their biggest stressor was the possibility of thieves having access to the data on those machines, and the fact that we knew their systems were encrypted with Bitlocker brought them a lot of relief.

          • Then don’t?

            If you still want to use Windows and use their encryption solution, manually enable Bitlocker and store the recovery key yourself.

            There are also third party encryption options.

            • Or if you don’t trust Microsoft to begin with, just use Veracrypt, it won’t upload your recovery key anywhere, but will help to make a recovery usb stick.

              Additionally, the problem above was not some kind of “unhealthy paranoia”, but disliking Microsoft and then still creating an account for some reason, one that they deemed to be a throwaway account. Question is why did they do that (oh, because Microsoft made it hard* to skip registering an account? That can’t be! Microsoft is trustworthy and anyone thinking else is just unhealthily paranoid, right?), but also how should have the user known that this was a dangerous thing to do? Don’t tell me they should have read the dozens of pages of dry legal text.

              *Yes, it’s hard if it’s not an option in the installer. How the fuck you look it up when you don’t have your computer?

              • If you’re at that point of not trusting a company, the best practice would be to avoid using their devices or connecting them to your network.

                There are plenty of other ways to track and identify users, a company could conceivably bake whatever the hell they want into the operating system and doesn’t need to rely on you creating an account with them to achieve that objective.

                I used the term “unhealthy paranoia” due to the logical fallacy that is at play.

                • If you’re at that point of not trusting a company, the best practice would be to avoid using their devices or connecting them to your network.

                  Yes, that would be the best practice. However there are a lot of best practices that cannot be followed for one reason or another.

      • You didn’t store the key anywhere but on that disk.

        Windows does not let you store the recovery key on an encrypted drive.

        The rest only means, we need to deal better with our data. All the above basically also applies when you HDD or SSD dies, which can happen any time.

        Backups is what you need, not an unencrypted drive.

      • I wouldn’t fault a casual user for not backing up their encryption key because they wouldn’t be swapping hard drives in the first place. And the tech savvy people already know to backup keys.

      • And you slowly figure out that every photo, every document, everything critical to you is now protected from you and you can’t get it back.

        How fortunate that onedrive auto uploads those to Microsoft. That is, until you run out of your quota…

      • You can not find that Option via the default Settings menu, you have to search for it or use the outdated control panel.

        Also Windows Home edition does not have this option.

        Edit: you can find it actually under Windows security.

        Still, it never pops up during installation.

  • It’s not a completely bad thing but ehh there are serious disadvantages, especially for gamers. I’m just glad I use Linux and will keep the change in mind in case I need to reinstall Windows on my gaming rig.

    Btw TL;DR of the article is:

    Windows 11 will automatically enable BitLocker on clean installs and re-installs.

    OEMs will be able to enable it even on Windows 11 Home with a special UEFI flag (whatever that means).

    BitLocker is a full-disk encryption technology by Microsoft. It provides better security since the data on the drive cannot be read without decrypting it (especially useful if someone steals the device) but the data cannot be recovered in case of forgetting the password or system malfunctions. Also it greatly decreases performance of the drive (by up to 45% on SSDs). This makes it unsuitable for many computer users.

    The feature cannot be disabled by native means. If you want to disable it, use Rufus and select the appropriate flag when creating the bootable USB.

  • I can vouch for the performance hit - I used to have a Surfacebook 2 and with Bitlocker enabled the machine was unusable. I’d say the performance hit was significantly higher than 45%. Turning it off at least allowed me to have a functioning laptop.

    The same hardware then ran Linux with full disk encryption enabled and performance was night and day.

  • What about for users who only have local accounts? How would they provide the bit locker code? Its normally linked to your Microsoft account no? Maybe there is a local place to find it and its up to you to back it up just in case.

    Me personally I have my 2TB ssd split into two partitions with windows on one and all my steam and bnet games on the other. If I ever lose my bit-locker code or it locks up I guess I can just reinstall.

    I use my laptop with Linux on it for any personal data, my desktop is exclusively for gaming.

  • My Windows laptop today asked me if I wanted to upgrade to Windows 11 after I’ve already told it No, several times. So I whipped out my dick and slapped it against the screen until I blew all over it, and Bill Gates could do nothing to stop me, the little bitch