#KeyEscrow

2026-01-24

The data that I didn’t know I didn’t have to back up to Microsoft’s cloud

I spent more time than I’d planned Friday afternoon poking around the security settings of my Windows laptop, then undoing one setting that I am somewhat embarrassed to admit I had scarcely thought about over the previous two and a half years of using this HP.

The FBI gets some credit for that for making me rethink my own device security after some of its agents raided Washington Post reporter Hannah Natanson’s home two weeks ago and seized several of her devices–an obvious move to intimidate journalists– leaving the storage encryption on that hardware as the last line of defense for her data.

Forbes security writer Thomas Brewster gets the rest of the credit for a strong post Friday morning unpacking how Microsoft’s approach to device encryption via its BitLocker software can leave Windows computers open to law enforcement investigators who bring a valid legal order to the company requesting a particular user’s encryption recovery key.

“It’s possible for users to store those keys on a device they own, but Microsoft also recommends BitLocker users store their keys on its servers for convenience,” Brewster wrote. “While that means someone can access their data if they forget their password, or if repeated failed attempts to login lock the device, it also makes them vulnerable to law enforcement subpoenas and warrants.”

He reported that Microsoft gets about 20 requests a year for BitLocker keys but cannot respond to many of them because the customers involved didn’t back up those keys to its cloud.

Windows 11 Home’s Device Encryption isn’t branded as BitLocker in the Settings app, but it runs on the same framework. And as in the Pro, Enterprise and Education editions of Windows 11, it allows a choice of key-backup locations–which I did not realize until eyeballing Microsoft’s documentation after I’d read Brewster’s post.

I had gone unthinkingly with the default of having the recovery key backed up to my Microsoft 365 cloud storage; I don’t remember even being presented with a choice when I set up the computer in August of 2023. But since the key is only a string of 48 numbers periodically separated by dashes, there was no point in keeping it there.

Instead, I saved it in my end-to-end-encrypted password manager 1Password, where the security design does not expose backdoors that can be opened with a court order. Then I deleted the backed-up recovery key from my M365 storage after clicking a checkbox to confirm that I’d saved the key elsewhere–along with seven older ones I found saved there, going back to a Surface laptop I reviewed a decade or so ago.

(I don’t know how long it will take for this data to be gone from my online storage, although there is the option of decrypting and re-encrypting the laptop to ensure the old key is useless.)

I never should have taken Microsoft up on this offer. But Microsoft should not be leaving users in this position–as Johns Hopkins University cryptography professor Matthew Green told Brewster in that article. Apple’s FileVault device encryption now automatically encrypts recovery keys backed up to the company’s iCloud service (see this explainer from my friend Glenn Fleishman at Six Colors), leaving nothing for a third party to inspect with a warrant.

There are many areas where Microsoft can’t readily catch up with Apple, starting with having a mobile platform to complement its desktop operating system. But this should not be one of them.

#BitLocker #diskEncryption #encryption #FBI #HannahNatanson #keyEscrow #M365 #Microsoft365 #MicrosoftBackup #Windows11Home #WindowsDeviceEncryption

Screenshot of the pane in the Settings app for Windows 11 listing device-encryption options
Alec Muffettalecmuffett
2026-01-23

Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw | Forbes
alecmuffett.com/article/142847

2026-01-23

Microsoft Gave FBI BitLocker Encryption Keys, Exposing Privacy Flaw | Forbes

This is the future of which GCHQ wants for all global encryption:

“Microsoft confirmed to Forbes that it does provide BitLocker recovery keys if it receives a valid legal order. “While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide… how to manage their keys,” said Microsoft spokesperson Charles Chamberlayne.”

https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/

#apple #encryption #endToEndEncryption #gchq #homeOffice #keyEscrow #privacy #surveillance
Alec Muffettalecmuffett
2025-07-07
2025-07-06

The EU wants to decrypt your private data by 2030 | TechRadar

LOL the European Union has discovered FBI plans from 1999 regarding key escrow:

https://www.techradar.com/vpn/vpn-privacy-security/the-eu-wants-to-decrypt-your-private-data-by-2030

#endToEndEncryption #europeanUnion #fbi #keyEscrow #surveillance

Kevin Karhan :verified:kkarhan@infosec.space
2025-03-23

@Catwoman69y2k @dragonfriend most importantly:

Only with #SelfCustody of all the keys, #SelfHosting of the entire infrastructure and everything being #OpenSource, one can assure (and [let it be] audit[ed] independently) that the #advertised #promises are in fact true.

Cuz not expecting @Mer__edith to break is the same level of "#TrustMeBro!" assurances as #ANØM, #EncroChat, #SkyECC, #WhatsApp etc. do in their #advetising #lies!

  • Remember: Corporations/Foundations/non-profits/... don't have a right to be silent , only individuals, and even then there are certain juristictions that have #KeyEscrow laws (i.e. #France, #Russia, #KSA, #China, #India, #UK , ...) in the books!
Alec Muffettalecmuffett
2025-02-03

Former UN Rapporteur David Kaye: “for anyone who ever argued for key escrows, i offer you the example of the muskovites rampaging through USG systems” | Ofcom, please take note…
alecmuffett.com/article/111104

2025-02-03

Former UN Rapporteur David Kaye: “for anyone who ever argued for key escrows, i offer you the example of the muskovites rampaging through USG systems” | Ofcom, please take note…

…but of course I’m certain that it could never happen here.

<cough>Reform Party</cough>

https://bsky.app/profile/davidakaye.bsky.social/post/3lh7qhncccs2u

#backdoors #davidKaye #elonMusk #endToEndEncryption #keyEscrow #privacy

Remember that #story last week, where the #US #FBI came out and actually recommended people switch to using #encrypted #communications, because Chinese government hackers had burrowed deeply into the US phone infrastructure ?

Remember the #cognitive #dissonance that announcement caused, after literally decades of the FBI and other #American #intelligence agencies demanding backdoors and key escrow and deliberately weakened #encryption #algorithms?

Ya, well, apparently part of that announcement was missed. They're still demanding "responsibly managed encryption":

forbes.com/sites/zakdoffman/20

Remember: "responsible encryption" is neither. It's their demand for a back-door. And every back door can be used by the "bad guys" just as easily as it can be used by the "good guys". Anyone who tells you different is #lying to your face; encryption is math, and there is no such thing as math which the "good guys" can do but which the "bad guys" cannot.

The #USA intelligence agencies' demand for backdoors to be built into all parts of the #phone system years ago are exactly what let the #Chinese government #hackers to penetrate and control the phone system now, and which they aren't going to be able to fix for many years, if at all, because it would require replacing a *lot* of equipment with versions that don't have back doors (and which would then not be eavesdrop-able at will).

#CognitiveDissonance #BackDoor #KeyEscrow #ClipperChip #network

2023-09-19

#NSA #Backdoor Key from #Lotus-Notes (1997)

Before the US #crypto export regulations were finally disolved the export version of #Lotus Notes used to include a #keyescrow / backdoor feature called differential #cryptography. The idea was that they got permission to export 64 bit crypto if 24 of those bits were #encrypted for the NSA's public key
#privacy #encryption #publickey

cypherspace.org/adam/hacks/lot

Kevin Karhan :verified:kkarhan@mstdn.social
2023-05-22

@thatguyoverthere based off second sources, they can basically criminalize any services and systems that don't have #Govware #backdoors to allow #wiretapping and #KeyEscrow systems as well as charge people if they don't want to potentially self-inctiminate.

And even if that wasn't the case, the #PocketCrypto would literally fulfill their definition as in correctly setup encryption isn't attackable outside of brute-forcing passwords!

2023-04-26

#Facepalm — what we really don’t need right now is somebody trying to reboot failed 1997 Key Escrow, e.g. like in this letter to the @FT

This is disappointing, misconceived, and woefully repetitious of some nonsense which we last (?) saw back in 1996/ish when secret-sharing was still relatively new, cool & trendy.

In case you’re not familiar: this proposal (a) will not scale to meet demand nor growth (b) is in any case an illiberal imposition, (c) breaks Ranum’s Law by attempting to technically bodge around a social problem, (d) will not be deployable globally because there is no such thing (and likely never will be) as global consensus on how to build a backdoor; not to mention (e) will doubtless be circumvented by motivated actors — because it can be.

This is a distraction at the time we least need one. At least we can be grateful that Andersen didn’t suggest putting the escrow onto the blockchain.

Letter: Here’s the democratic key to the encryption backdoor
From Andersen Cheng, Founder and Executive Chairman, Post-Quantum, London SE1, UK

Several encrypted messaging services, including Signal and WhatsApp, recently signed an open letter criticising UK government plans for an encryption backdoor, a method by which authorised and unauthorised users are able to get around normal security measures. They cited concerns around government surveillance and weakened security.

Separately, the FBI, Interpol and the UK National Crime Agency, in a statement about Meta, argued that encryption allows crimes to occur, such as child sex abuse (Report, April 20).

Clearly, a government backdoor infringes on personal privacy and a backdoor for one is a backdoor for all. This used to summarise our entire position, and that’s why we set up the world’s first quantum-safe encrypted messaging service in 2014. Our app was successful in keeping messages secure, but we soon found out this had made it a recommended tool for Isis. Without hesitation, we shut the otherwise very successful app down.

If a backdoor compromises security, but full end-to-end encryption makes investigations impossible for law enforcement agencies, surely there’s a middle ground?

What law enforcement agencies, the government and platforms all miss is the options that thread this fine needle — encryption key splitting. This allows governments, courts, external watchdog or any combination of actors to have one encryption key split between them so that a specific threshold is required for very restricted access.

Users will still have secure data, but if the government would like to access a message it would have to gain approval, perhaps from “fragment guardians” who hold part of the encryption key such as courts or external privacy watchdogs. Both sides make valid points, but the middle ground and cryptographically provable technology is already available and waiting to help settle the debate.

Andersen Cheng
Founder and Executive Chairman Post-Quantum, London SE1, UK

Share this post:

#back-to-the-future #end-to-end-encryption #key-escrow

https://alecmuffett.com/article/59280

Ludwig W. Miethlwm@social.mieth.net
2021-06-24
RT @harkank@twitter.com

Was da geplant wird setzt #E2E-Verschlüsselung mit Schlüsselhinterlegung auf der Providerseite voraus. Die bösen alten #KeyEscrow-Ideen aus den 90ern sind zurück.
https://fm4.orf.at/stories/3015903/

🐦🔗: https://twitter.com/harkank/status/1406903594985607170
Doc Edward Morbius ⭕​dredmorbius@toot.cat
2020-08-29
chrisiwonder
2019-11-03

Schon wieder ein durchdrehender Minister: Ferdinand Grapperhaus, niederländischer Justizminister, fordert Key Escrow.

nos.nl/nieuwsuur/artikel/23088

Félix Tréguerfelix@mamot.fr
2018-07-03

RT @MM_PolyTIC@twitter.com: Back to 1996;) #KeyEscrow. Le directeur technique de la DGSE peut même réutiliser le texte des loi et décrets d'époque;) cf. cette analyse (d'époque également;)): iris.sgdg.org/axes/crypto/decr cc @reesmarc@twitter.com twitter.com/nextinpact/status/

2018-04-27

"The security of this vault is no laughing matter, because it will ultimately store the master encryption key every single device that manufacturer ever makes. For Apple alone, that’s about a billion… [The] proposal relies fundamentally on the ability of manufacturers to secure massive amounts of extremely valuable key material against the strongest and most resourceful attackers on the planet."

blog.cryptographyengineering.c

A response to the #keyescrow proposal covered in WIRED. #infosec

2018-04-27

That article is a good read on the current thinking regarding #keyescrow, BTW. #infosec #privacy #surveillance

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst