this post was submitted on 23 Jan 2026
1284 points (99.6% liked)

Technology

79236 readers
1702 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
(page 2) 50 comments
sorted by: hot top controversial new old
[–] umbrella@lemmy.ml 5 points 1 day ago

all of the disadvantages of FDE with none of the advantages.

not that this wasnt expected, wtf do yall think it was uploaded to onedrive in the first place lol

[–] termaxima@slrpnk.net 12 points 1 day ago

Not your keys ? Not your data !

[–] db2@lemmy.world 91 points 2 days ago
[–] x0x7@piefed.social 61 points 2 days ago

Linux. LUKS it yourself or it isn't really encrypted.

[–] moonshadow@slrpnk.net 34 points 2 days ago

A single bitter, crowing "hah!" at whoever thought there wasn't at least this much overlap between our corporate and government masters. Welcome to hell kid, shoutout to whatever's being trained on the last ~30 years of everything that touched the internet in the NSA's Utah data center. Rose coloured PRISM though, I dream of the day when someone makes those search tools public and I can reminisce through my preteen MSN Messenger convos

[–] blanketswithsmallpox@lemmy.world 6 points 1 day ago (6 children)

Regular old ZIP with AES-256 should do the trick for anything truly important you want to keep locked down.

You could always do sly stuff like Hidden volumes with Veracrypt as well. Leave the crumb trail for the low key shit or old nudes of gfs you have permission to keep.

load more comments (6 replies)
[–] melfie@lemy.lol 27 points 2 days ago* (last edited 2 days ago)

BitLocker? More like ShitLocker.

[–] user28282912@piefed.social 23 points 2 days ago

BitLocker provides for a recovery key. This is to allow someone to regain access to an encrypted device in the event that they lose their PIN, any one of these scenarios happen, OR when suspects do not want to cooperate with LEOs.

Find your BitLocker recovery key

If the target device is part of an enterprise and managed with EntraId/Intune this is the option. Escrowed keys.

load more comments
view more: ‹ prev next ›