You can determine "if you're at risk and take action today:
If you think your Windows computer is safe from prying eyes, think again. A new report reveals that Microsoft has the encryption keys to your hard drive, and it can even give them out to law enforcement, including the FBI. Here's what you need to know and what you can do to stop it from happening to you.
In a stunning breach of personal privacy and security, Microsoft admitted in January that it provided the FBI with the BitLocker recovery keys to three different Windows PCs that were linked to suspected COVID unemployment assistance fraud in Guam. With these keys, the FBI was able to access the files on those devices as part of its investigation.
[...] The Redmond tech giant received its first request from a government official during the Obama administration in 2013. Although the engineer who spoke with the official reportedly declined to build a back door into Windows that would give the government unbridled access to user files, Microsoft still admits to turning over BitLocker recovery keys to law enforcement as recently as 2025. According to the report, Microsoft receives approximately 20 access requests from the FBI per year.
[...] You are not at risk if ...
- You use a Windows PC without a Microsoft account. (You haven't logged into the system with your Outlook email address.)
- You use a Windows PC with a Microsoft account but you chose a local recovery key backup option at activation.
- You disabled BitLocker encryption when you set up your PC.
You are at risk if ...
- You use a Windows PC with a Microsoft Outlook account and you chose to back up your BitLocker recovery key to your account.
- Your PC is a work machine that's managed by your employer.
For those at risk, Microsoft promises that it only gives out encryption keys to lawful requests from the government. That said, if Microsoft can access your encryption keys, what's stopping a hacker from getting them? The problem with storing security keys on cloud servers is that anyone can reach them with the right password, login information, or exploit.
Previously: Microsoft Gave FBI a Set of BitLocker Encryption Keys to Unlock Suspects' Laptops
Related: Over Half a Million Windows Users are Switching to Linux
(Score: 1, Interesting) by Anonymous Coward on Wednesday February 04, @12:24AM (1 child)
> sure, home automation nerds will add these: [remote button pusher]
Cool, had no idea that this existed. Does anyone know if it can pull (lift) as hard as it can push down?
My potential application is for a gas hot water heater. It came with a very wide deadband on the thermostat. Haven't measured it, but perhaps more than 20 deg F (some bureaucrat thought this was a good idea?) The result is I get up and it's been cooling off all night...but not quite enough to trip the burner on. So I get a short shower before the warm water runs out.
Setting the dial any higher gives scalding temps at the top end of the dead band.
I'd attach a small lever somehow to the temp dial and have the button pusher turn it to a hotter setting (which trips the burner on), and then pull the dial back to my desired setting.
(Score: 2) by canopic jug on Wednesday February 04, @11:48AM
I'd attach a small lever somehow to the temp dial and have the button pusher turn it to a hotter setting (which trips the burner on), and then pull the dial back to my desired setting.
You could go as simple as an Arduino for that but escalating to a Raspberry Pi will give you a full, general purpose server with all the flexibility that entails. There are no shortage of servos and stepper motors for either. The Raspberry Pi also supports a variety of cameras and machine learning modules so that is one way of several that you could confirm what the stepper motor has set.
Money is not free speech. Elections should not be auctions.