#diskencryption

2026-01-24

The data that I didn’t know I didn’t have to back up to Microsoft’s cloud

I spent more time than I’d planned Friday afternoon poking around the security settings of my Windows laptop, then undoing one setting that I am somewhat embarrassed to admit I had scarcely thought about over the previous two and a half years of using this HP.

The FBI gets some credit for that for making me rethink my own device security after some of its agents raided Washington Post reporter Hannah Natanson’s home two weeks ago and seized several of her devices–an obvious move to intimidate journalists– leaving the storage encryption on that hardware as the last line of defense for her data.

Forbes security writer Thomas Brewster gets the rest of the credit for a strong post Friday morning unpacking how Microsoft’s approach to device encryption via its BitLocker software can leave Windows computers open to law enforcement investigators who bring a valid legal order to the company requesting a particular user’s encryption recovery key.

“It’s possible for users to store those keys on a device they own, but Microsoft also recommends BitLocker users store their keys on its servers for convenience,” Brewster wrote. “While that means someone can access their data if they forget their password, or if repeated failed attempts to login lock the device, it also makes them vulnerable to law enforcement subpoenas and warrants.”

He reported that Microsoft gets about 20 requests a year for BitLocker keys but cannot respond to many of them because the customers involved didn’t back up those keys to its cloud.

Windows 11 Home’s Device Encryption isn’t branded as BitLocker in the Settings app, but it runs on the same framework. And as in the Pro, Enterprise and Education editions of Windows 11, it allows a choice of key-backup locations–which I did not realize until eyeballing Microsoft’s documentation after I’d read Brewster’s post.

I had gone unthinkingly with the default of having the recovery key backed up to my Microsoft 365 cloud storage; I don’t remember even being presented with a choice when I set up the computer in August of 2023. But since the key is only a string of 48 numbers periodically separated by dashes, there was no point in keeping it there.

Instead, I saved it in my end-to-end-encrypted password manager 1Password, where the security design does not expose backdoors that can be opened with a court order. Then I deleted the backed-up recovery key from my M365 storage after clicking a checkbox to confirm that I’d saved the key elsewhere–along with seven older ones I found saved there, going back to a Surface laptop I reviewed a decade or so ago.

(I don’t know how long it will take for this data to be gone from my online storage, although there is the option of decrypting and re-encrypting the laptop to ensure the old key is useless.)

I never should have taken Microsoft up on this offer. But Microsoft should not be leaving users in this position–as Johns Hopkins University cryptography professor Matthew Green told Brewster in that article. Apple’s FileVault device encryption now automatically encrypts recovery keys backed up to the company’s iCloud service (see this explainer from my friend Glenn Fleishman at Six Colors), leaving nothing for a third party to inspect with a warrant.

There are many areas where Microsoft can’t readily catch up with Apple, starting with having a mobile platform to complement its desktop operating system. But this should not be one of them.

#BitLocker #diskEncryption #encryption #FBI #HannahNatanson #keyEscrow #M365 #Microsoft365 #MicrosoftBackup #Windows11Home #WindowsDeviceEncryption

Screenshot of the pane in the Settings app for Windows 11 listing device-encryption options
2025-11-07

I was thinking of encrypting my drive on #Fedora, but I can't without some sort of formatting after installation. I wish I knew I could had set it up during installation.

Now I am too lazy to reinstall, even though I have a backup of my home directory.

#linux #diskencryption

kriware :verified:kriware@infosec.exchange
2025-05-14

Disk Encryption: Wide-Block Modes, Authentication Tags Aren’t Silver Bullets

Analyzes XTS mode's vulnerabilities and discusses IEEE's proposed key scope limits.

dfir.ru/2025/05/08/disk-encryp

#DiskEncryption #XTS

Lucas de Senaseninha@bsd.network
2025-04-27

OpenBSD users, can you tell me your experience of full-disk encryption on a SSD?

Is the encryption overhead noticiable compared to plain SSD? Or is it as slow as HDD?
How often have you lost files due to a poweroff letting your partition on an inconsistent state?

#openbsd #ssd #fde #DiskEncryption

Feikefjelle
2025-02-25

@darkling @nicholasr @nixCraft does indeed support swap files, they problebly work fine, they are just very unorthodox and therefore difficult to setup.

The swap file you would use if you want , in theory at least...
brings mé more issues than what's worth!

Guillaume LouvelGullumLuvl@ecoevo.social
2025-01-06

From #Debian 13, would you use VeraCrypt or ZuluCrypt to create an encrypted disk accessible from any OS ?

Veracrypt hasn't released a .deb yet for Debian 13, so the generic installer must be used. Not sure how well it's supposed to work.

#DiskEncryption #VeraCrypt

Fossery Tech :debian: :gnome:fosserytech@social.linux.pizza
2024-11-24

My new video about VeraCrypt just released on @tilvids
From this video, you can get familiar with VeraCrypt, the encryption technology it uses, and how you can use it to create file containers and encrypted partitions

tilvids.com/w/9dA17zsidWVMU5eH

#VeraCrypt #Encryption #DiskEncryption #Security #TechVideo #OpenSource #OpenSourceSoftware #FOSS #ContentCreator #FosseryTech

2024-11-24

Secure Your Sensitive Files with VeraCrypt

tilvids.com/w/9dA17zsidWVMU5eH

2024-10-28

So. Linux 🐧

My PC runs Linux (Fedora) and with the current gen Hardware in it the ancient old Question pops up again: Full Disk Encryption or not?

At least some ciphers should be HW-accellerated (AES-SNI). But then there is the hassle of entering the password. And the annoyance.

But on the other side...

What do you guys think?

#linux #encrypt #encryption #diskencryption #security #admin

2024-07-05

"A swap file can be used to reserve swap-space within an existing partition & may also be setup inside an encrypted blockdevice's partition."
So all I had to do is make sure swap file is setup in fstab & just point all resume=UUID= to the UUID of primary partition where the #swap file is & that is it. my brain exploded🤯 from how easy it was.
p.s. reminder to anyone doing #LUKS it is only as good as the password you pick so pick something good!
#CryptSetup #Linux #LVM #hibernate #DiskEncryption

2024-07-05

Long ago when I was installing #Kali #Linux on my #Dell Latitude E5570 #Laptop
I went with LVM on LUKS wiki.archlinux.org/title/dm-cr
& at the time I thought I'd go with a swap file on / (I was unaware of Swap crypt🙄)
I was never able to get hibernate to work, until now😀...
Let me say many websites & forums all say if you want hibernate to work on LUKS, you have to go with swap crypt.
Not true, if you read wiki.archlinux.org/title/Dm-cr
#CryptSetup #LVM #LUKS #SWAP #hibernate #DiskEncryption

スパックマン クリスchris_spackman@twit.social
2023-06-21

Thanks for all the suggestions and links.

I will try putting a new / temporary key into the initramfs just for while I am out of town - the chance of power outage is higher than the chance of burglary.

I'll remove the temp key and rebuild the initramfs after I get back home. Normally, I'm in front of the computer when it reboots, so entering the password manually (as I've been doing for a few years) is fine.

#DMCrypt #DiskEncryption #Linux

スパックマン クリスchris_spackman@twit.social
2023-06-20

Is there a good way to have a #Linux server reboot unattended when the root partition is dm_crypt encrypted? I'm not super worried about bad guys being physically present. More just worried that a power outage might initiate a reboot while I am not present.

Is including the key file in the initramfs (correct terminology?) that horrible a thing if physical access to the machine is not a concern?

Thoughts or advice?

#DMCrypt #DiskEncryption

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst