301
submitted 2 weeks ago by [email protected] to c/[email protected]
top 46 comments
sorted by: hot top controversial new old
[-] [email protected] 61 points 2 weeks ago

Remember, always print your recovery code to pdf and save it to the same drive. This way, when it happens, you're forced to only use Linux.

[-] [email protected] 6 points 2 weeks ago

I had this happen to me with a hardware-encrypted bitlocker drive. I was forced to buy a new SSD, actually.

[-] [email protected] 15 points 2 weeks ago
[-] [email protected] 8 points 2 weeks ago* (last edited 2 weeks ago)

When using Opal (hardware encryption), it locks down the drive. Not even a secure erase would wipe/release the damn thing.

[-] [email protected] 3 points 2 weeks ago
[-] [email protected] 2 points 2 weeks ago

It would have if I actually had the PSID 🥲

It was an expensive lesson to take photos of my new drives and store the PSID and serial numbers in KeePass.

[-] [email protected] 3 points 2 weeks ago

I thought Windows wouldn't let you save it to the same drive? Its been a while, granted. But i had to plug in a USB or print it out.

[-] [email protected] 22 points 2 weeks ago

It is clever enough to not let you save the key to the same drive that’s encrypted. If you print to PDF the print dialogue box doesn’t care where you save the PDF.

[-] [email protected] 1 points 2 weeks ago

Ahh, never knew that!

[-] [email protected] 26 points 2 weeks ago* (last edited 2 weeks ago)

So malware wasn't enough, Windows wants to be a ransomware too?

Edit: I can already see it now. "Locked out of your files? For a small fee or our premium subscription, you can restore encrypted files that we lost."

[-] [email protected] 21 points 2 weeks ago

I Always save the bitlocker info on a usb drive, in case of... I had to type the 40 or so digits a couple of time!

[-] [email protected] 20 points 2 weeks ago

My wife asked me to help her with her Windows laptop one day. She was stuck at the bitlocker prompt and of course didn't remember enabling it or being given a password. I was like, WTF, they're just randomly turning this on by surprise now? LOL

Luckily she was able to eventually get it unlocked by calling MS support.

[-] [email protected] 29 points 2 weeks ago

I like the "encryption, but we have the keys" approach. Makes it very secure, especially since MS never had any security breach or leak, ever.

[-] [email protected] 7 points 2 weeks ago

It's obviously mainly supposed to protect against basic thieves in this configuration.

[-] [email protected] 6 points 2 weeks ago

Some some needs to do a "what if Microsoft bought Signal" parody

[-] [email protected] 6 points 2 weeks ago

by calling MS support.

Which hopefully wasn't a 1-800 number flashing obnoxiously on the screen. 😂

[-] [email protected] 17 points 2 weeks ago

The bit locker key is saved to the Microsoft account of the user who set up the computer. I was messing with Linux on my new laptop and learned the hard way when it refused to boot back into Windows.

[-] [email protected] 8 points 2 weeks ago

My favorite was finding out that bit locker was enabled on a forced update. The key was saved to the Microsoft account that was used to set up the lappy. Except, I didn't use a Microsoft account because I'm not some tech marionette lemming who needs Gates hand shoved up my ass to tell me how to use my fucking computer. So I used a local account and disabled bitlocker via bios.

Nothing was lost, but it was still a pain in the dick hole.

[-] [email protected] 2 points 2 weeks ago

If you can access the bios just factory reset it.

[-] [email protected] 6 points 2 weeks ago

I have a feeling this is such an overcomplicated setup

this post was submitted on 17 Jun 2024
301 points (98.1% liked)

linuxmemes

19733 readers
1361 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS