this post was submitted on 23 Jan 2026
795 points (99.5% liked)

Technology

79236 readers
1763 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] wuffah@lemmy.world 74 points 2 days ago* (last edited 2 days ago) (26 children)

It’s not a security flaw, it’s by design. Microsoft has been building this surveillance apparatus for years, and the purchase of government access to your computer and data using your tax dollars is a lucrative alignment of state and corporate power. Their recent design choices point to a rabid desperation to turn your PC into an Apple-style walled-garden.

It goes like this:

  • Require online Microsoft account creation.

  • Require TPM compliance to run Windows.

  • Forcibly encrypt the user’s data under the guise of “security”, even without permission or even user action. (Encryption is good! Right?)

  • Link your identity, payment information, data, online activity, and encryption keys to your hardware ID.

  • Record everything you do and use that data to train an AI model with onboard tensor hardware.

  • Exfiltrate the entire model, or just query it remotely for “online services.” Or, in this case, just have MS give you the fucking recovery keys. lol

All done “securely” with tamper resistance and mathematical verifiability that whatever is on your device is yours, and that you took that action with limited plausible deniability.

If you think you’ve got nothing to hide, think again about the current activities of ICE, law enforcement investigations based on reproductive health data, the pornography suppression movement, age verification, and the data harvesting of dissenting speech. What’s legal today can quickly become “illegal” tomorrow. The constitution is just a piece of paper in a fancy climate controlled box.

[–] frongt@lemmy.zip 5 points 2 days ago (4 children)

If they were that interested, why would they push encryption at all?

[–] wuffah@lemmy.world 21 points 2 days ago* (last edited 2 days ago) (1 children)

That’s a great question, and it is because it enables a chain of cryptographic controls that enable verification, tamper resistance, and secrecy while selling Bitlocker as computer security. It is technically secure, except that MS has your recovery keys and can just give them to whoever they want, like the FBI!

This way, they can mathematically verify:

  • Who you are and the exact unique machine you use (verification from a unique machine ID associated with your encryption keys and Windows account data)

  • Know that the data has not been altered in transit (tamper resistant hashing of your data)

  • No one else knows except them (secret encryption keys stored in hardware that only Microsoft controls, not you, Microsoft)

This architecture also keeps their data on your machine secure. If someone maintains an encrypted archive on your hard drive that only they control the keys to, say like a movie or a video game, who owns that data really? If it’s decrypted only for authorized use, you’re really only renting that content from the owner. This is called Digital Rights Management, and it’s much easier when this security chain is in place.

Technically they could do this remotely if they really wanted to and your machine were powered. Imagine what you could do with this power for every Windows machine on the planet.

[–] captcha_incorrect@lemmy.world 2 points 7 hours ago

There is also the case when a computer is lost or stolen. With bitlocker on, the content of the computer cannot be accesses without the key, which the new owner will not have.

I always thought that was the main point of using bitlocker.

load more comments (2 replies)
load more comments (23 replies)