Software Development Process

How to Protect Your BitLocker-Encrypted Files From Attackers

 tháng 3 23, 2019     No comments   

BitLocker, the encryption technology built into Windows, has taken some hits lately. A recent exploit demonstrated removing a computer's TPM chip to extract its encryption keys, and many hard drives are breaking BitLocker. Here's a guide to avoiding BitLocker's pitfalls.
Note that these attacks all require physical access to your computer. That's the whole point of encryption—to stop a thief who stole your laptop or someone from gaining access to your desktop PC from viewing your files without your permission.

Standard BitLocker Isn't Available on Windows Home

While nearly all modern consumer operating systems ship with encryption by default, Windows 10 still doesn't provide encryption on all PCs. Macs, Chromebooks, iPads, iPhones, and even Linux distributions offer encryption to all their users. But Microsoft still doesn't bundle BitLocker with Windows 10 Home.
Some PCs may come with similar encryption technology, which Microsoft originally called "device encryption" and now sometimes calls "BitLocker device encryption." We'll cover that in the next section. However, this device encryption technology is more limited than full BitLocker.
How an Attacker Can Exploit This: There's no need for exploits! If your Windows Home PC just isn't encrypted, an attacker can remove the hard drive or boot another operating system on your PC to access your files.
The Solution: Pay $99 for an upgrade to Windows 10 Professional and enable BitLocker. You could also consider trying another encryption solution like VeraCrypt, the successor of TrueCrypt, which is free.

BitLocker Sometimes Uploads Your Key to Microsoft

Many modern Windows 10 PCs come with a type of encryption named "device encryption." If your PC supports this, it will be automatically encrypted after you sign into your PC with your Microsoft account (or a domain account on a corporate network). The recovery key is then automatically uploaded to Microsoft's servers (or your organization's servers on a domain).
This protects you from losing your files—even if you forget your Microsoft account password and can't sign in, you can use the account recovery process and regain access to your encryption key.
How an Attacker Can Exploit This: This is better than no encryption. However, this means that Microsoft could be forced to disclose your encryption key to the government with a warrant. Or, even worse, an attacker could theoretically abuse a Microsoft account's recovery process to gain access to your account and access your encryption key. If the attacker had physical access to your PC or its hard drive, they could then use that recovery key to decrypt your files—without needing your password.
The Solution: Pay $99 for an upgrade to Windows 10 Professional, enable BitLocker via the Control Panel, and choose not to upload a recovery key to Microsoft's servers when prompted.

Many Solid State Drives Break BitLocker Encryption

Some solid-state drives advertise support for "hardware encryption." If you're using such a drive in your system and enable BitLocker, Windows will trust your drive to do the job and not perform its usual encryption techniques. After all, if the drive can do the work in hardware, that should be faster.
There's just one problem: Researchers have discovered that many SSDs don't implement this properly. For example, the Crucial MX300 protects your encryption key with an empty password by default. Windows may say BitLocker is enabled, but it may not actually be doing much in the background. That's scary: BitLocker shouldn't be silently trusting SSDs to do the work. This is a newer feature, so this problem only affects Windows 10 and not Windows 7.
How an Attacker Could Exploit This: Windows may say BitLocker is enabled, but BitLocker may be sitting idly by and letting your SSD fail at securely encrypting your data. An attacker could potentially bypass the badly implemented encryption in your solid-state drive to access your files.
The Solution: Change the "Configure use of hardware-based encryption for fixed data drives" option in Windows group policy to "Disabled." You must unencrypt and re-encrypt the drive afterward for this change to take effect. BitLocker will stop trusting drives and will do all the work in software instead of hardware.

TPM Chips Can Be Removed

A security researcher recently demonstrated another attack. BitLocker stores your encryption key in your computer's Trusted Platform Module (TPM,) which is a special piece of hardware that's supposed to be tamper-resistant. Unfortunately, an attacker could use a $27 FPGA board and some open-source code to extract it from the TPM. This would destroy the hardware, but would allow extracting the key and bypassing the encryption.
How an Attacker Can Exploit This: If an attacker has your PC, they can theoretically bypass all those fancy TPM protections by tampering with the hardware and extracting the key, which isn't supposed to be possible.
The Solution: Configure BitLocker to require a pre-boot PIN in group policy. The "Require startup PIN with TPM" option will force Windows to use a PIN to unlock the TPM at startup. You will have to type a PIN when your PC boots before Windows starts up. However, this will lock the TPM with additional protection, and an attacker won't be able to extract the key from the TPM without knowing your PIN. The TPM protects against brute force attacks so attackers won't just be able to guess every PIN one by one.

Sleeping PCs Are More Vulnerable


Microsoft recommends disabling sleep mode when using BitLocker for maximum security. Hibernate mode is fine—you can have BitLocker require a PIN when you wake your PC from hibernate or when you boot it normally. But, in sleep mode, the PC remains powered on with its encryption key stored in RAM.
How an Attacker Can Exploit This: If an attacker has your PC, they can wake it and sign in. On Windows 10, they may have to enter a numeric PIN. With physical access to your PC, an attacker may also be able to use direct memory access (DMA) to grab the contents of your system's RAM and get the  BitLocker key. An attacker could also execute a cold boot attack—reboot the running PC and grab the keys from RAM before they vanish. This may even involve the use of a freezer to lower the temperature and slow that process down.
The Solution: Hibernate or shut down your PC rather than leaving it asleep. Use a pre-boot PIN to make the boot process more secure and block cold boot attacks—BitLocker will also require a PIN when resuming from hibernation if it's set to require a PIN at boot. Windows also lets you "disable new DMA devices when this computer is locked" through a group policy setting, too—that provides some protection even if an attacker gets your PC while it's running.
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Gửi email bài đăng nàyBlogThis!Chia sẻ lên XChia sẻ lên Facebook

Related Posts:

  • How to Get Bing’s Daily Photos as Your Wallpaper on Windows 10 Microsoft now offers an official way to set Bing's beautiful homepage photos as your desktop background. Every single day, the tool will automat… Read More
  • How to Embed Someone’s Twitter Video Without Retweeting Them Justin Duino Sharing a video you saw on Twitter doesn't require you to retweet the original tweet's message or replies. Instead, you can embed the v… Read More
  • Instant MS Visio 2019 Pro Professional (32/64 Bit) Activation Product [Key] 1 PC Instant MS Visio 2019 Pro Professional (32/64 Bit) Activation Product [Key] 1 PC Price : 4.83 Ends on : 3 weeks View on eBay … Read More
  • How to Install Plasma Desktop 5.17.5 in (K)Ubuntu 19.10 The latest KDE Plasma Desktop 5.17.5 was released a few days ago. Here's how to install it in KUbuntu 19.10. Plasma 5.17.5 a bug-fix update … Read More
  • 8 Ways to Secure Your Next Zoom Video Call Almost every video conferencing program available has some sort of vulnerability, and Zoom is undoubtedly no exception. However,  Zoom users can… Read More
Bài đăng Mới hơn Bài đăng Cũ hơn Trang chủ

0 nhận xét:

Đăng nhận xét

  • Gun Digest Book of the .22 Rifle
  • The Secret Relationship Between Blacks and Jews Volume 1 /2 /3 Physical Books!
  • The Little Book of Hygge: Danish Secrets to Happy Living [The Happiness Institut
  • Adult Color By Numbers Coloring Book: Easy Large Print Mega Jumbo Coloring ...
  • Herbs - A Concise Guide In Colour by Jirasek, Vaclay Hardback Book The Fast Free

Popular Posts

  • Smartphone Using At The Supermarket Can Add 41% To Your Shopping Bill
    It is safe to say that you are always looking at your telephone when you're and about? Do you experience difficulty opposing the bait of...
  • Windows 7 All in One ISO 32-64 Bit Free Download
    Windows 7 all in one ISO 32-64 bit genuine free is now available to download from the secure links provided below. The download comes w...
  • Forgot to post
    sorry travel day.  My bad! 
  • November Technology Updates
    So far, November has been a busy month of technology integration in all grade levels.  Teachers and students use a wide variety of devices i...
  • Morning Charts 04/30/2019 SPX
    Early post
  • Check Out The Science Behind Finding North Korea's Nuclear Weapons
    Arrangements over denuclearization of North Korea fallen at the beginning of today after North Korean despot Kim Jong Un demanded the United...
  • Morning Charts 04/10/2019 SPX
    Cause censorship is real. Our Orwellian really coming to life -  https://www.zerohedge.com/news/2019-04-09/leaked-google-docs-reveals-aggres...
  • Should You Use Hubitat to Automate Your Smarthome?
    The first step in building a smarthome is often choosing a hub, and there are many options. Hubitat is a unique cloud-independent hub. It...
  • Microsoft Staff Don't Use HoloLens For War
    Somewhere around 50 Microsoft representatives have requested the organization pull out of an arrangement with the US military to give expand...
  • Morning Charts 03/19/2019 SPX
    RC wants me to bring back the STB bracket challenge so look for a link to that later today and again tomorrow morning. If you’ve never heard...

Bài đăng nổi bật

How To Swim and Dive in ‘Animal Crossing: New Horizons’

Nintendo Animal Crossing: New Horizons has received a free update that allows players to swim and dive for sea creatures for the firs...



Work freely with Fiverr

Work freely with Fiverr

Money with Adfly

Money with Adfly
Được tạo bởi Blogger.

Make Money MyLead

Make Money MyLead

TẢI PHIM 18+ VỀ ĐIỆN THOẠI Ở ĐÂY >>

Copyright © 2025 Software Development Process | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates