YellowKey reportedly works in Windows 11, Windows Server 2022 and 2025, but not in Windows 10.

  • Reygle@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 hours ago

    Microslop can’t even claim incompetence. The way this reads, the function is intended as a back door.

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    12 hours ago

    Why do they call it “drive encryption” when it does not need a user-provided password or other key?

    • mlg@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      11 hours ago

      TPM microslop magic.

      What’s even funnier is that we already have TCG, ISE, and SE drives that hardware encrypt AES256 by design, so you still get at least an instant delete option if you never bother to set a key.

      Windows wants to double screw you over by never telling you it added a key, and then leaving you dead in the water if your TPM breaks, and then also failing to maintain their own TPM requirements making it completely useless lol.

  • FlexibleToast@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    17 hours ago

    Anything that isn’t open source can’t be secure. That doesn’t mean that everything open source is secure though.

    • luciferofastora@feddit.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 hour ago

      Anything human made is prone to all the errors humans make. At least with Open Source, there are more eyes that can spot mistakes, potentially even provide a fix.

      Sure, that means bad actors can find them too. But closed source doesn’t prevent that: Raising the hurdles may slow them down, but they if they have a financial incentive to keep trying, it won’t stop them as effectively as it stops the type of people who would do a responsible disclosure instead of selling the information.

  • flop_leash_973@lemmy.world
    link
    fedilink
    English
    arrow-up
    26
    ·
    1 day ago

    Finally, some good news. Now I can stop having to interact with my companies shitty outsourced service desk when I need a Bitlocker key.

  • SleeplessCityLights@programming.dev
    link
    fedilink
    English
    arrow-up
    39
    ·
    1 day ago

    BitLocker is basically malware, so who fucking cares. Far more people have it accidentally on and get locked out than people that have purposefully activated it.

    • Squizzy@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 day ago

      You have just reminded me I could use this on the laptop my mother set up like five years ago and immediately forgot the password for.

      • SleeplessCityLights@programming.dev
        link
        fedilink
        English
        arrow-up
        7
        ·
        1 day ago

        When I worked at an MSP, BitLocker cost companies thousands of dollars when it did something strange. User error has very catastrophic consequences with BitLocker and nobody that actually cares about security uses BitLocker. From my professional experience it is malware. The places where I have seen it used on purpose was because of policy bullshit and everyone agreed that it was a hindrance rather than an advantage.

        • TheEighthDoctor@lemmy.zip
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          24 hours ago

          And from my experience in banking, healthcare and others; every company uses bitlocker on workstations, I saw EncFS once in dozens of companies audited.

          • SleeplessCityLights@programming.dev
            link
            fedilink
            English
            arrow-up
            1
            ·
            20 hours ago

            Using encryption on files systems is fine, but the Microslop Bitlocker implementation is awful. In any ecosystem that is not fully regulated BitLocker is a liability. I have had colleagues that could beat it.

      • freely1333@reddthat.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        24 hours ago

        Companies care that you have access to it. The “companies that care” literally wrote the backdoor.

  • Cornballer@lemmy.zip
    link
    fedilink
    English
    arrow-up
    51
    ·
    1 day ago

    Somebody on twitter “reverse engineered” the exploit. Apparently ms shipped debug code in production. At least it’s not called Backdoor_FBI outright.

    How it works:

    1. Recovery tools look for a config file called RecoverySimulation.ini on the OS drive
    2. If Active=Yes, it enables “test mode” for the recovery tools
    3. Test mode unlocks your BitLocker drive but a flag called FailRelock tells it to skip relocking
    4. cmd.exe spawns with full access to your “encrypted” drive
    • BigDanishGuy@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      19
      ·
      1 day ago

      Does test mode unlock without the key?!? So it’s just “encrypted” with a generic key, and the unlock key is for authentication? That sounds insane, even for microsoft.

      • mavu@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        12
        ·
        1 day ago

        this works because the bitlocker key is stored in the TPM of the mainboard on the computer.
        That is neccessary for the computer to be able to boot without entering your bitlocker password. you can configure it differently, but that is not default or super obvious to do.

        • RamRabbit@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          19 hours ago

          It always struck me as…poor…to not require a password for decryption. If you require zero knowlege from me, that means a stolen has everything inside needed to decrypt all the data.

          And well, lookie there at the article!

    • jabberwock@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      15
      ·
      1 day ago

      “Ah yes, but think about how much faster they shipped that code with Copilot doing all the heavy lifting.”

      • Some Microsoft exec, probably
    • computler@lemdro.idB
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 day ago

      Temu is, as Chinese netizens will tell you, full of items on a lower 4th rung of quality well below what they are used to (at least the urbanites, but I doubt farmers want to buy junk for shit they need to do). That doesn’t mean that a single-board computer you buy off it would be incapable of anything you need to do, just surrounded by stuff advertised in a misleading way to get you to buy more shit.

      Their business itself has customer data well-encrypted, never sends out your email to spammers (I isolate email accounts I would notice). They have never had a single data breach.

        • computler@lemdro.idB
          link
          fedilink
          English
          arrow-up
          1
          ·
          20 hours ago

          I manually post on these as well, they currently have only used post scheduling, haven’t set up feeds. It’s nice to hide my own accounts from each other, and if I don’t, then I’m going to forget and people will get mad that the bots are unmarked. Not your problem.

          So, any comment on me pointing out the obvious racism?

          • 7101334@lemmy.world
            link
            fedilink
            English
            arrow-up
            5
            ·
            20 hours ago

            The post you replied to never said “Chinese”, it said “Temu”. So you saying “Oh yeah Chinese people agree, Temu is garbage” actually proves… that it was a reasonable statement?

            It still could’ve been said from a racist place or with undertones of racism, but it’s not necessarily guaranteed. Temu is garbage. Americans think so. Chinese people apparently think so.

            • computler@lemdro.idB
              link
              fedilink
              English
              arrow-up
              1
              ·
              19 hours ago

              How specious. Yes, Temu is trash mixed with treasure, but it’s the exact same garbage you pay a premium for at online or brick-and-mortar retailers, so I find it quite funny when USonians act above it. You don’t have an option for better quality that isn’t as Chinese as possible without getting ripped off, unless you need cameras or the latest graphics cards. Temu encryption is good. American corporate encryption leans very bad. Just watch some cybersecurity conferences. More than racism I’m irritated by people using terminology wrong.

              • 7101334@lemmy.world
                link
                fedilink
                English
                arrow-up
                3
                ·
                19 hours ago

                Chinese people think Temu is trash and would never use it

                I find it quite funny when USonians act above it

                I’m going to stop talking to you now because wtf are you even on about. No one said anything about not wanting to buy Chinese goods. I specifically buy Chinese goods because at least their billionaires are kept to heel and are doing less to actively fuck over my life than Jeff Bezos.

                Also no one said anything about Temu encryption but you, so again, wtf are you even on about?

                • computler@lemdro.idB
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  19 hours ago

                  Well, I’m happy to stop talking if you’re the type more interested in catfighting than even interpreting the conversation correctly. GreenBottles did in fact start off saying Microsoft is using Temu encryption. If Microsoft was using Temu encryption then their customers would be safe & they would have a record of zero data breaches. I don’t think farmers would buy anything important on Temu, I never said no Chinese person would use it. This is anecdotal from speaking to urbanites who were more interested in high-quality manufacturing for throwing some money around in the markets. Nevermind!

                  I’m glad you buy your Chinese stuff directly instead of through Bezos, but I hope you can see that the kids using Temu synonymously with “dogshit” are being somewhat racist. Since this isn’t based off a comparison with durable good from Amazon or the supermarket. Amazon support just isn’t worth the markup. It’s informed by propaganda spreading through unconventional means such as gore websites plastered with Russian and Chinese industrial accidents or hit-and-runs from the 2000s. Things change, and when that change is accompanied by a meme where a Chinese company is used as an adjective meaning dogshit, I think, well, the advertising firms that these Fortune 500 companies employ would feel quite chickenshit if they got beaten to the punch by natural slang developments. They’d be saying gee, I wish we got them talking like this five years before.

      • northface@lemmy.ml
        link
        fedilink
        English
        arrow-up
        4
        ·
        24 hours ago

        They have never reported a data breach.

        Fixed that for you. Same goes for most companies though - the abscense of a publicly known data breach does not mean it hasn’t happened, with or without said company’s knowledge.

      • BlackLaZoR@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        20 hours ago

        Suddenly dev resigned and posted bizzare post that read like he was at a gunpoint, recommending bitlocker instead of truecrypt

      • massacre@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 day ago

        It was very likely compromised by NSA requiring a backdoor or weakened encryption that could be cracked by the US. There’s a long story that’s pretty interesting if you want to hit the rabbit hole

  • Taleya@aussie.zone
    link
    fedilink
    English
    arrow-up
    29
    ·
    1 day ago

    of course there’s a back door. You motherfuckers think they’ll TPM secure boot lock file manage SECURTYYYY and not let five eyes waltz in whenever they fucking well please?

  • gnufuu@infosec.pub
    link
    fedilink
    English
    arrow-up
    168
    ·
    2 days ago

    From their blog:

    Now regarding YellowKey, lots of you are wondering how does one even find such backdoor ?

    I’ll tell you how, it took me more time trying to get it to work than the amount of sleep I had in two years combined. No AI involved, no help in any shape or form. I could have made some insane cash selling this but no amount of money will stand between me and my determination against Microsoft.

    […]

    I can’t wait when I will be allowed to disclose the full story, I think people will find my crashout very reasonable and it definitely won’t be a good look for Microsoft.

    Looking forward to the full story.

    • Jako302@feddit.org
      link
      fedilink
      English
      arrow-up
      87
      ·
      2 days ago

      I could have made some insane cash selling this but no amount of money will stand between me and my determination against Microsoft.

      There is no better motivator than pure anger and spite.

    • KairuByte@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      2 days ago

      Ngl I feel like it’s just going to be “I thought it was backed up but it wasn’t and M$ wouldn’t write me a back door”

      Which is fine as a back story, but also a dime a dozen really.

      • fosho@lemmy.ca
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 days ago

        Down voted because you rushed this comment and it’s not really clear what you’re trying to say.

  • Optional@lemmy.world
    link
    fedilink
    English
    arrow-up
    189
    ·
    2 days ago

    YellowKey can be triggered simply by merely copying some files to a USB stick and rebooting to the Windows Recovery Environment. We tested this ourselves, and sure enough, not only does it work, it bears all the hallmarks of a backdoor, down to the exploit’s files disappearing from the USB stick after it’s used once.

    • humanspiral@lemmy.ca
      link
      fedilink
      English
      arrow-up
      42
      ·
      2 days ago

      100% certainty of backdoor. Is bitlocker developed outside of MSFT? Would seem to need MSFT cooperation to implement.

      • humanspiral@lemmy.ca
        link
        fedilink
        English
        arrow-up
        19
        ·
        2 days ago

        Bitlocker was developed entirely inside MSFT. Upon further review, there is a chance that this is all somewhat normal behaviour. Part of MSFT safeOS to make it convenient to recover bitlocker access, and update windows.

        • Leon@pawb.social
          link
          fedilink
          English
          arrow-up
          20
          ·
          1 day ago

          And be able to easily comply with law enforcement requests for decryption.

          Ergo, the encryption is actually worthless.

        • Valmond@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          24 hours ago

          Normal behaviour?

          -“Well it turns out we just said your data was protected, for your, ehrm, satisfaction?”

  • Sgt_choke_n_stroke@lemmy.world
    link
    fedilink
    English
    arrow-up
    91
    ·
    2 days ago

    I lost 3 years of work and my research dissertation because of bitlocker. Fuck you microslop, now I do everything on Linux because of your security garbage

    • Thorry@feddit.org
      link
      fedilink
      English
      arrow-up
      89
      ·
      edit-2
      2 days ago

      Not to be that guy, but that’s 100% on you for not having backups of important work. It’s 3 years and your fucking research dissertation, how the fuck do you keep that all in one place?

      This time you got fucked by Microsoft for having shit software. But it could have been your hardware that exploded, your house catching fire, your shit being stolen, you downloading malware from that one site you told your girlfriend you’d never visit again, shitty infrastructure causing power issues or flooding, you yourself having a nervous breakdown and nuking the thing.

      Keep everything important at least in three places, one of which should be in a physically different (remote) place. Backup often, keep to the schedule and test your backups.

      Jeez man, using Microsoft software and not having backups is like walking around with a loaded gun pointed at your dick. It’s all well and good till you get your dick blown off.

      • dual_sport_dork 🐧🗡️@lemmy.world
        link
        fedilink
        English
        arrow-up
        31
        ·
        2 days ago

        In the immortal words of Daniel Rutter (again): If nothing else, backups are necessary because at some point in your life you will confidently instruct your computer to destroy your data.

        • Alberat@lemmy.world
          link
          fedilink
          English
          arrow-up
          25
          ·
          2 days ago

          i just deleted a month of notes by doing:

          find $(pwd) “*.tmp” -delete

          instead of:

          find $(pwd) -iname “*.tmp” -delete

          turns out the former throws an error on “*.tmp” but still deletes everything lol… PSA for everyone

          • Matriks404@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 day ago

            I think it’s your fault if you don’t have backups… but I legitimately think that we should restrict usage of classic Unix tools to scripts, and use safer tools ourselves… but I guess that’s just my opinion.

            • Alberat@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 day ago

              yeah i didnt want to script removing the tmp files bc theyre sometimes useful… usually i do read;find -delete; as like a “confirm” for me…

              also, i do backup, but i guess only once a month… i was in the middle of a backup, the commands were: git add --all; git commit; find -delete; git push; and then confusion when i saw the .git folder was gone

              ive been doing this for over a decade and this is the second (third?) time something like this has happened.

              anyway, not trying to defend myself, maybe i should script the find and delete thing… but i just wanna hopefully prevent someone else’s data deletion.

        • pcouy@lemmy.pierre-couy.fr
          link
          fedilink
          English
          arrow-up
          4
          ·
          2 days ago

          A few years ago I deleted my whole home folder by bind-mounting it inside a chroot. When I was done with the chroot, I rm -rf-ed it without unmounting my home first.

          • northface@lemmy.ml
            link
            fedilink
            English
            arrow-up
            1
            ·
            24 hours ago

            This happened to me, just a few weeks ago. I am glad I had btrfs snapshots…

          • phutatorius@lemmy.zip
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 day ago

            I was lucky last time, was able to reconstruct almost all of it (99.7%) in 3 weeks of after-work messing around. The 0.3% is non-critical.

            Now I do something I wrote myself with cron, rsync, hardlinks and gpg. It’s simple, easy to test and fairly bulletproof. Protip: keep many backups of your keys or you’ll wish you had.

            • anotherandrew@lemmy.mixdown.ca
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 day ago

              Syncthing (distributed folder sharing including “keep x copies of each file”) and duplicity (gpg-encrypted, incremental backup anywhere) are your friends.

              Been using them for a very, very long time. A++ open source, cross-platform solutions.

            • raspberriesareyummy@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 day ago

              Yeah, I was hesitant to encrypt backups for a long time, and now I have the problem that you can’t store backups of encryption headers on the encrypted device(s)

      • Korhaka@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        9
        ·
        2 days ago

        I have a better backup system in place for my factorio saves. Script syncs the live copy to several places on the network along with compressing a timestamped copy to an external HDD which stores a bunch of copies. Then manually I might trim them down every few years or so as I don’t really need 3 different copies from March 2024 still.

      • neclimdul@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        2 days ago

        I to have multi tiered backups for my laptops and do regular restores to validate them. Same for my parents and all my non technical family and friends. Its amazing that big companies mess this up since everyone does it. It’s just so cheap and easy to do. /s

        • FrederikNJS@piefed.zip
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 days ago
          1. Find online backup service
          2. Pay for subscription
          3. Install backup software
          4. Still have your data

          I use Backblaze myself… But there are many other straightforward and easy backup solutions out there.

          • raspberriesareyummy@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            2 days ago

            Storing important data online on someone else’s computer is beyond fucked up levels of stupid: You only need to lose your encryption key once in your lifetime afterwards, and you can consider your backup public for all the world to see. And a single encryption weakness / backdoor will expose data just the same. Not to mention using third party sw to “do the backup” for you and relying on them to encrypt it so that they themselves can’t read it, is very naive.

            Once your data left your home network, it is no longer yours to control.

            • FrederikNJS@piefed.zip
              link
              fedilink
              English
              arrow-up
              3
              ·
              1 day ago

              Well… That depends entirely on your threat model…

              In my setup, the backup is encrypted locally, and then uploaded to Backblaze. If I leak my encryption key, then yes, Backblaze and any state actor that can compel Backblaze, might be able to read my backup (and the same goes for an encryption vulnerability). But since the connection to access the backup is also authenticated, the rest of the public would not be able to read my backup. If I leak my access credentials, then everyone could get my encrypted backup data, but not be able to decrypt it. Of course if I leak both the access credentials and the encryption key, then yes anyone that obtains both can read my backup.

              Many regular people use Microsoft Onedrive or Google Drive, which offers even less protection, but it’s certainly sufficient and well enough protected to keep your dissertation protected.

              In most backup services you have the option to choose what gets backed up, and what does not. But sure, it entirely depends on who you want to protect yourself from.

              If your main concern is state actors, then yeah… You probably shouldn’t use something like Backblaze. You should keep everything on your own hardware. And convince a friend or some family to have a NAS sitting somewhere that can host your backup destination.

              For my case I’m mostly concerned about data continuity (not losing data). But privacy is certainly also a concern, and here I have chosen to believe that the encryption is sound enough, and that my ability to keep my encryption key safe, is sufficient for the data it protects.

              • raspberriesareyummy@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                1 day ago

                My main concern is that all my data is online, potentially forever (I have to assume it will be) and the only thing needed to access it is a comparatively tiny encryption key (we’re talking Megabytes) that I have to keep safe forever (or until I delete it). If I ever mess up, or a computer with the encryption key gets compromised, then there goes my data into the public domain…

      • HeyJoe@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 days ago

        Yeah, I would also like to know more on how bitlocker screwed him. Like was it a legit problem or that the device died and didnt have the keys to decrypt it? If it’s not keeping the keys somewhere safe, which it even makes you do by not allowing you to select the local device, then idk how the blame is microsoft is shitty. Need more info though.

        • Sgt_choke_n_stroke@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 day ago

          IT lapsed and diddnt have keys for the computer. So windows 10 “updated” to windows 11 the computer bricked. IT also blocked us from plugging in usb sticks. Which they then blamed me for not backing everything thing up to one drive. It’s all just left a sour taste in my mouth

    • mic_check_one_two@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      21
      ·
      2 days ago

      I mean, the concept behind BitLocker is fine. Encrypting drives by default should be the norm, the same way we encrypt our web traffic by default with https. The issue is Microsoft’s awful implementation that has led lots of users to accidentally lock themselves out of their own data, without even realizing what they were doing.