this post was submitted on 23 Jan 2026
21 points (95.7% liked)
cybersecurity
5935 readers
10 users here now
An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Community Rules
- Be kind
- Limit promotional activities
- Non-cybersecurity posts should be redirected to other communities within infosec.pub.
Enjoy!
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It is (was?) actually worse
https://neodyme.io/en/blog/bitlocker_screwed_without_a_screwdriver/#teaser
That is, only the default "transparent" bitlocker mode. If you have any other additional protection (pin, password) set it doesn't affect you.
Why would anyone use the "transparent" mode? Seems rather pointless.
People who prefer that much convenience vs security.
The TPM takes "measurements" of the system and releases the decryption key only if they're all correct. Files on the disk are encrypted, so booting into another OS with a bootable media doesn't work (measurement picks up the fact that you booted into another OS). When the system does boot properly, the Windows lock screen prevents you from viewing the files.
Thank you for sharing. Very interesting.
We're currently evaluating and rolling out encryption at work, so being informed about the limits of these setups is quite good - even if it's not actually my task to work on those.