Civilloquy
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
commander@lemmy.world to Technology@lemmy.worldEnglish · 2 days ago

Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunch

techcrunch.com

external-link
message-square
154
fedilink
  • cross-posted to:
  • technology@beehaw.org
1.09K
external-link

Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunch

techcrunch.com

commander@lemmy.world to Technology@lemmy.worldEnglish · 2 days ago
message-square
154
fedilink
  • cross-posted to:
  • technology@beehaw.org
The FBI served Microsoft a warrant requesting encryption recovery keys to decrypt the hard drives of people involved in an alleged fraud case in Guam.
  • kittenzrulz123@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    26
    ·
    1 day ago

    Daily reminder that verified boot is objectively superior to “secure boot”, once again a common Linux W and another example of Google actually promoting some good security practices

    • 「黃家駒 Wong Ka Kui」 | (aka: 鳳凰院 凶真 Hououin Kyouma)@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      4
      ·
      1 day ago

      Same thing?

      You can add custom keys to secure boot.

      • kittenzrulz123@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 day ago

        That doesn’t make it the same thing

        • 「黃家駒 Wong Ka Kui」 | (aka: 鳳凰院 凶真 Hououin Kyouma)@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          18 hours ago

          Both are different names for a process that ensures the boot process is loading the correct non-malicious code.

          • kittenzrulz123@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            2
            ·
            16 hours ago

            Secure boot verifies the system is booting correct code, verified boot can ensure total system integrity and can protect against tampering. Furthermore the Linux implementation of secure boot is very often in the least secure method.

Technology@lemmy.world

technology@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !technology@lemmy.world

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


  • @L4s@lemmy.world
  • @autotldr@lemmings.world
  • @PipedLinkBot@feddit.rocks
  • @wikibot@lemmy.world
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 3.58K users / day
  • 6.85K users / week
  • 12.6K users / month
  • 24.2K users / 6 months
  • 1 local subscriber
  • 79.2K subscribers
  • 16K Posts
  • 507K Comments
  • Modlog
  • mods:
  • L3s@lemmy.world
  • enu@lemmy.world
  • Technopagan@lemmy.world
  • L4sBot@lemmy.world
  • BE: 0.19.5
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org