• wuffah@lemmy.world
    link
    fedilink
    English
    arrow-up
    57
    arrow-down
    5
    ·
    5 days ago

    It’s not a security flaw, it’s by design. Microsoft has been building this surveillance apparatus for years, and the purchase of government access to your computer and data using your tax dollars is a lucrative alignment of state and corporate power. Their recent design choices point to a rabid desperation to turn your PC into an Apple-style walled-garden.

    It goes like this:

    • Require online Microsoft account creation.

    • Require TPM compliance to run Windows.

    • Forcibly encrypt the user’s data under the guise of “security”, even without permission or even user action. (Encryption is good! Right?)

    • Link your identity, payment information, data, online activity, and encryption keys to your hardware ID.

    • Record everything you do and use that data to train an AI model with onboard tensor hardware.

    • Exfiltrate the entire model, or just query it remotely for “online services.” Or, in this case, just have MS give you the fucking recovery keys. lol

    All done “securely” with tamper resistance and mathematical verifiability that whatever is on your device is yours, and that you took that action with limited plausible deniability.

    If you think you’ve got nothing to hide, think again about the current activities of ICE, law enforcement investigations based on reproductive health data, the pornography suppression movement, age verification, and the data harvesting of dissenting speech. What’s legal today can quickly become “illegal” tomorrow. The constitution is just a piece of paper in a fancy climate controlled box.

  • Bakkoda@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    4 days ago

    Regarding this as a flaw is a bit thin right? Massive breach of trust and huge legal issues.

  • Dr. Moose@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    2
    ·
    5 days ago

    This is not directly on Microsoft as you have to be either ignorant or special kind of stupid to upload your encryption keys to US cloud. The government can request access to any data and a company can’t do anything.

    The only way to resist this is to not store anything unencrypted from your customers which is quite doable but clearly microsoft has no interest in this.

  • FauxLiving@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    edit-2
    5 days ago

    Oh no, who could have possibly seen this coming when Microsoft decided to back up your full-disk encryption key automatically to OneDrive.

    Smart of them to deploy automatic full disk encryption just as open source projects like Trucrypt and Veracrypt were starting to become mainstream, capturing their market share (Netscape Navigator-style). Very incompetent of them to include many glaring backdoors that completely defeats the encryption that they offer.

    In addition to being vulnerable to law enforcement through subpoenas on the stored key. Anytime you run a Windows update and the system has to reboot, it writes a ‘clear key’ to the hard drive which can be easily retrieved if the disk is stolen and also they bypass TPM Validation.

    You know, the thing that is so important to have that you were forced to buy an entirely new computer… it is not active during a system update and anybody who had access to your hard drive can write arbitrary code into your system files.

    Well, you would think that this isn’t very useful, after all they would have to have pretty good timing to catch you updating your computer to remove the hard drive, right?

    Nope, if they steal your whole computer and plug it into power and a network connection, the next time a Windows update hits the system will automatically apply the update (absent a very specific Group Policy) and write the full-disk encryption key to the hard drive before shutting down.

    I’m no expert computerologist, but I think that any system that requires anybody but you to have your key is insecure. If this is the kind of poor design choices that they make in regards to disk encryption then I would personally have no confidence that their proprietary code is not equally porous.

    • massacre@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 days ago

      ’m no expert computerologist, but I think that any system that requires anybody but you to have your key is insecure.

      Computerologist here. You are 100% correct. If anyone says otherwise, they are selling you something.

      • FauxLiving@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 days ago

        My pa always told me that if someone says something on the Internet you can take them at their word, so I trust these credentials.

    • Em Adespoton@lemmy.ca
      link
      fedilink
      English
      arrow-up
      3
      ·
      5 days ago

      This is configurable; you can set BitLocker to always require a password on boot. If you do that, the clearkey doesn’t get placed (yet). If you set this mode, the key also doesn’t get uploaded to OneDrive. Of course, there’s a big warning when you set it up, and it recommends you print off and save the one time recovery key list.

      Easier just to use an OS that doesn’t require you to jump through hoops to secure it though.

      • FauxLiving@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        5 days ago

        You can also disable it with a Group Policy too and delete any keys that were uploaded to Microsoft with manage-bde while adding your own keys, but for the average person Bitlocker is going to be how it comes by default.

        Pre-builts are even worse because that’s another party who has had access to your keys and there are not laws that they would violate by keeping copies (for your convenience, of course)

    • otacon239@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 days ago

      TrueCrypt, my beloved. Such an amazing set of features and super easy to use. I so wish there was a modern open-source equivalent with the same intuitive approach. I especially liked the ability to do fancy stuff like disguising data with a false password or using any file as the key.

  • potatopotato@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    12
    ·
    5 days ago

    On Linux, selecting LUKS when you install encrypts the disk without the potential for this problem. So far it’s proven to be very reliable at stopping state level actors, just don’t use a password that you use elsewhere

  • DaddleDew@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    5 days ago

    If you really were still naive enough to think that a public tech company cares about your right to privacy at that point, it’s pretty much on you.

  • nul9o9@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    5 days ago

    Well, if thats not enough of a reason to move off of Microsoft products, then i don’t know what is.