Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 13 submissions in the queue.
posted by janrinok on Tuesday February 03, @04:43AM   Printer-friendly
from the self-extinguished dept.

You can determine "if you're at risk and take action today:

If you think your Windows computer is safe from prying eyes, think again. A new report reveals that Microsoft has the encryption keys to your hard drive, and it can even give them out to law enforcement, including the FBI. Here's what you need to know and what you can do to stop it from happening to you.

In a stunning breach of personal privacy and security, Microsoft admitted in January that it provided the FBI with the BitLocker recovery keys to three different Windows PCs that were linked to suspected COVID unemployment assistance fraud in Guam. With these keys, the FBI was able to access the files on those devices as part of its investigation.

[...] The Redmond tech giant received its first request from a government official during the Obama administration in 2013. Although the engineer who spoke with the official reportedly declined to build a back door into Windows that would give the government unbridled access to user files, Microsoft still admits to turning over BitLocker recovery keys to law enforcement as recently as 2025. According to the report, Microsoft receives approximately 20 access requests from the FBI per year.

[...] You are not at risk if ...

  • You use a Windows PC without a Microsoft account. (You haven't logged into the system with your Outlook email address.)
  • You use a Windows PC with a Microsoft account but you chose a local recovery key backup option at activation.
  • You disabled BitLocker encryption when you set up your PC.

You are at risk if ...

  • You use a Windows PC with a Microsoft Outlook account and you chose to back up your BitLocker recovery key to your account.
  • Your PC is a work machine that's managed by your employer.

For those at risk, Microsoft promises that it only gives out encryption keys to lawful requests from the government. That said, if Microsoft can access your encryption keys, what's stopping a hacker from getting them? The problem with storing security keys on cloud servers is that anyone can reach them with the right password, login information, or exploit.

Previously: Microsoft Gave FBI a Set of BitLocker Encryption Keys to Unlock Suspects' Laptops

Related: Over Half a Million Windows Users are Switching to Linux


Original Submission

 
This discussion was created by janrinok (52) for logged-in users only, but now has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by aafcac on Tuesday February 03, @10:29PM

    by aafcac (17646) on Tuesday February 03, @10:29PM (#1432443)

    I've said it before and I'll say it again, there really should be some chip in a computer where you can store a few files related to verifying the integrity of key installed software that can only be written to if you've pushed a button or temporarily flipped a switch. Even just the kernel and a few other key pieces of software related to the firewall and drivers could make a significant difference in terms of how hard it is to break in and do damage.

    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3