• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Youtuber cracks BitLocker encryption in minutes with Raspberry Pi Pico

Joined
Jan 5, 2006
Messages
17,965 (2.68/day)
System Name AlderLake / Laptop
Processor Intel i7 12700K P-Cores @ 5Ghz / Intel i3 7100U
Motherboard Gigabyte Z690 Aorus Master / HP 83A3 (U3E1)
Cooling Noctua NH-U12A 2 fans + Thermal Grizzly Kryonaut Extreme + 5 case fans / Fan
Memory 32GB DDR5 Corsair Dominator Platinum RGB 6000MT/s CL36 / 8GB DDR4 HyperX CL13
Video Card(s) MSI RTX 2070 Super Gaming X Trio / Intel HD620
Storage Samsung 980 Pro 1TB + 970 Evo 500GB + 850 Pro 512GB + 860 Evo 1TB x2 / Samsung 256GB M.2 SSD
Display(s) 23.8" Dell S2417DG 165Hz G-Sync 1440p / 14" 1080p IPS Glossy
Case Be quiet! Silent Base 600 - Window / HP Pavilion
Audio Device(s) Panasonic SA-PMX94 / Realtek onboard + B&O speaker system / Harman Kardon Go + Play / Logitech G533
Power Supply Seasonic Focus Plus Gold 750W / Powerbrick
Mouse Logitech MX Anywhere 2 Laser wireless / Logitech M330 wireless
Keyboard RAPOO E9270P Black 5GHz wireless / HP backlit
Software Windows 11 / Windows 10
Benchmark Scores Cinebench R23 (Single Core) 1936 @ stock Cinebench R23 (Multi Core) 23006 @ stock
A security researcher has managed to crack a laptop encrypted with BitLocker in under a minute using a modified Raspberry Pi Pico.
The attack does require physical access to the laptop.


Microsoft's BitLocker tool protects data on hard drives by encrypting them. However, Stacksmashing discovered that the key used for this can easily be intercepted via a 'sniffing attack'. Network traffic is tapped to intercept information.

BitLocker concerns the traffic that is exchanged between a separate Trusted Platform Module, or TPM, and the CPU in a laptop. BitLocker uses the TPM chip in a laptop to store the decryption key. To make the drive accessible when the laptop starts, the key is sent to the CPU. However, the communication between the processor and the TPM is not encrypted, meaning that the key is sent in cleartext. By listening in on this communication, Stacksmashing was able to retrieve the key.

Stacksmashing made a so-called TPM sniffer from a Raspberry Pi Pico. He connected the single-board computer to the LPC Bus in the laptop, allowing him to intercept the traffic. After obtaining the key, the researcher used the open source tool Disclocker to decrypt the drive. He could then view all the data.

Microsoft has been aware of these types of attacks for some time, but emphasizes that attackers need 'sufficient time' to do so. However, Stacksmashing only needed 43 seconds to open the laptop, connect the TPM sniffer to the LPC Bus and steal the key. The hardware needed to make the TPM sniffer cost him just ten dollars.

Stacksmashing used a Lenovo laptop for its attack, but other laptops are also vulnerable. However, the attack only works if a laptop has a separate TPM and CPU. If the two are combined, which is the case on many laptops, the attack does not work. Users who want to protect themselves against such an attack can take mitigating measures by configuring a PIN, according to Microsoft.

 

Solaris17

Super Dainty Moderator
Staff member
Joined
Aug 16, 2005
Messages
25,955 (3.79/day)
Location
Alabama
System Name Rocinante
Processor I9 14900KS
Motherboard MSI MPG Z790I Edge WiFi Gaming
Cooling be quiet! Pure Loop 240mm
Memory 64GB Gskill Trident Z5 DDR5 6000 @6400
Video Card(s) MSI SUPRIM Liquid X 4090
Storage 1x 500GB 980 Pro | 1x 1TB 980 Pro | 1x 8TB Corsair MP400
Display(s) Philips Evnia 49M2C8900
Case LANCOOL 205M MESH Snow
Audio Device(s) Moondrop S8's on Schiit Hel 2e
Power Supply ASUS ROG Loki SFX-L 1000W
Mouse Lamzu Atlantis mini (White)
Keyboard Monsgeek M3 Lavender, Akko Crystal Blues
VR HMD Quest 3
Software Windows 11
Benchmark Scores I dont have time for that.
So I knew this would make it here

Only works because:

- physical access
- TPM is a separate chip
- board literally had contact pads for the traces

Newer CPUs by AMD and Intel (read the past few years) have on die TPM so this won’t work.

no it’s not a flaw communication between CPU and other ICs is not encrypted on pretty much all things. That’s why you could lift the encryption keys from the Xbox using a buss pirate.

this isn’t a bitlocker crack. He literally lifted the keys, he did not break the encryption.
 
Joined
Jan 8, 2017
Messages
9,038 (3.37/day)
System Name Good enough
Processor AMD Ryzen R9 7900 - Alphacool Eisblock XPX Aurora Edge
Motherboard ASRock B650 Pro RS
Cooling 2x 360mm NexXxoS ST30 X-Flow, 1x 360mm NexXxoS ST30, 1x 240mm NexXxoS ST30
Memory 32GB - FURY Beast RGB 5600 Mhz
Video Card(s) Sapphire RX 7900 XT - Alphacool Eisblock Aurora
Storage 1x Kingston KC3000 1TB 1x Kingston A2000 1TB, 1x Samsung 850 EVO 250GB , 1x Samsung 860 EVO 500GB
Display(s) LG UltraGear 32GN650-B + 4K Samsung TV
Case Phanteks NV7
Power Supply GPS-750C
I'd be more concerned about backdoors left by MS themselves rather than this.
 
Joined
Feb 18, 2005
Messages
5,326 (0.76/day)
Location
Ikenai borderline!
System Name Firelance.
Processor Threadripper 3960X
Motherboard ROG Strix TRX40-E Gaming
Cooling IceGem 360 + 6x Arctic Cooling P12
Memory 8x 16GB Patriot Viper DDR4-3200 CL16
Video Card(s) MSI GeForce RTX 4060 Ti Ventus 2X OC
Storage 2TB WD SN850X (boot), 4TB Crucial P3 (data)
Display(s) 3x AOC Q32E2N (32" 2560x1440 75Hz)
Case Enthoo Pro II Server Edition (Closed Panel) + 6 fans
Power Supply Fractal Design Ion+ 2 Platinum 760W
Mouse Logitech G602
Keyboard Logitech G613
Software Windows 10 Professional x64
OH
MY
GOD

A person with PHYSICAL ACCESS to THEIR OWN MACHINE was able to install a hardware device to sniff the BitLocker encryption key off that machine.

OH
MY
GOD

In other news, I just took a bottle of water out of the fridge in my kitchen. Clearly my house has been BURGLED, all the locks that I have on my doors are TOTALLY BROKEN FOREVER, and as such nobody should use door locks EVER AGAIN.

OH
MY
GOD

On a related note, I really wish that the so-called "security researchers" who keep coming up with this stupid bullshit, would all die in the world's slowest fire. These people are the epitome of oxygen thieves.
 
Joined
Jul 25, 2006
Messages
12,224 (1.88/day)
Location
Nebraska, USA
System Name Brightworks Systems BWS-6 E-IV
Processor Intel Core i5-6600 @ 3.9GHz
Motherboard Gigabyte GA-Z170-HD3 Rev 1.0
Cooling Quality case, 2 x Fractal Design 140mm fans, stock CPU HSF
Memory 32GB (4 x 8GB) DDR4 3000 Corsair Vengeance
Video Card(s) EVGA GEForce GTX 1050Ti 4Gb GDDR5
Storage Samsung 850 Pro 256GB SSD, Samsung 860 Evo 500GB SSD
Display(s) Samsung S24E650BW LED x 2
Case Fractal Design Define R4
Power Supply EVGA Supernova 550W G2 Gold
Mouse Logitech M190
Keyboard Microsoft Wireless Comfort 5050
Software W10 Pro 64-bit
He may not have broke the encryption, he did gain access to the encrypted data that appeared in "the clear". That is not good.

HOWEVER, as P4-630, Solaris17 and Assimilator all pointed out, the researcher had physical access to the laptop. This critical point is, sadly, so often overlooked by those who regularly (intentionally or not) spread FUD. We see it all the time with those who insist everyone needs keylogger protection on top of all the other security measures they already have. :(

Yes, if you regularly leave your computer unattended, out of your sight, in the public waiting lounge at the JFK airport in New York City, you might need an anti-keylogger program. :rolleyes:

I note this researcher also needed special additional hardware and pretty extensive knowledge, all in advance of task. So to suggest it was done in less than a minute is quite a stretch.

That said, laptops and other portable devices have been known to grow feet and wander off. So the lesson here is, don't put sensitive information on your portable devices. But if you must, then I recommend you use a separate encryption program to encrypt your sensitive files in addition to the Bitlocker/TPM solution.
 
Joined
Aug 20, 2007
Messages
20,819 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11
So I knew this would make it here

Only works because:

- physical access
- TPM is a separate chip
- board literally had contact pads for the traces

Newer CPUs by AMD and Intel (read the past few years) have on die TPM so this won’t work.

no it’s not a flaw communication between CPU and other ICs is not encrypted on pretty much all things. That’s why you could lift the encryption keys from the Xbox using a buss pirate.

this isn’t a bitlocker crack. He literally lifted the keys, he did not break the encryption.
Yeah. This has been known as a theoretical avenue for an attack for like forever, I don't think this is even the first incident of key-lifting being done in practice for that matter.
That being said, it's one of the reasons my org does not use a TPM in it's encrypted disk setup. But to say this is common or even remotely likely for the average user to encounter is FUD, plain and simple.

Yes, if you regularly leave your computer unattended, out of your sight, in the public waiting lounge at the JFK airport in New York City, you might need an anti-keylogger program.
No, you need a new approach to security. This has become a public PC and will never be trustworthy for anything else. No program can certify what's potentially been physically messed with.
 

bug

Joined
May 22, 2015
Messages
13,265 (4.04/day)
Processor Intel i5-12600k
Motherboard Asus H670 TUF
Cooling Arctic Freezer 34
Memory 2x16GB DDR4 3600 G.Skill Ripjaws V
Video Card(s) EVGA GTX 1060 SC
Storage 500GB Samsung 970 EVO, 500GB Samsung 850 EVO, 1TB Crucial MX300 and 2TB Crucial MX500
Display(s) Dell U3219Q + HP ZR24w
Case Raijintek Thetis
Audio Device(s) Audioquest Dragonfly Red :D
Power Supply Seasonic 620W M12
Mouse Logitech G502 Proteus Core
Keyboard G.Skill KM780R
Software Arch Linux + Win10
He may not have broke the encryption, he did gain access to the encrypted data that appeared in "the clear". That is not good.

HOWEVER, as P4-630, Solaris17 and Assimilator all pointed out, the researcher had physical access to the laptop. This critical point is, sadly, so often overlooked by those who regularly (intentionally or not) spread FUD. We see it all the time with those who insist everyone needs keylogger protection on top of all the other security measures they already have. :(

Yes, if you regularly leave your computer unattended, out of your sight, in the public waiting lounge at the JFK airport in New York City, you might need an anti-keylogger program. :rolleyes:

I note this researcher also needed special additional hardware and pretty extensive knowledge, all in advance of task. So to suggest it was done in less than a minute is quite a stretch.

That said, laptops and other portable devices have been known to grow feet and wander off. So the lesson here is, don't put sensitive information on your portable devices. But if you must, then I recommend you use a separate encryption program to encrypt your sensitive files in addition to the Bitlocker/TPM solution.
How else would you get access to the data on a disk? Ask nicely for the owner to connect their storage to the Internet? That may be a thing for NAS solutions, but getting access to a local disk usually implies physical access.
 
Joined
Jul 13, 2016
Messages
2,883 (1.01/day)
Processor Ryzen 7800X3D
Motherboard ASRock X670E Taichi
Cooling Noctua NH-D15 Chromax
Memory 32GB DDR5 6000 CL30
Video Card(s) MSI RTX 4090 Trio
Storage Too much
Display(s) Acer Predator XB3 27" 240 Hz
Case Thermaltake Core X9
Audio Device(s) Topping DX5, DCA Aeon II
Power Supply Seasonic Prime Titanium 850w
Mouse G305
Keyboard Wooting HE60
VR HMD Valve Index
Software Win 10
Yes, if you regularly leave your computer unattended, out of your sight, in the public waiting lounge at the JFK airport in New York City, you might need an anti-keylogger program. :rolleyes:

Consider that you use electronic devices everyday where it's infeasible and illogical to keep an eye on 24/7. Public and work computers obviously but there's also card readers and registers among other devices. This is precisely why exploits that require physical access are important to patch. Not that it really pertains in this instance given it was a physical design issue at work here.

No, you need a new approach to security. This has become a public PC and will never be trustworthy for anything else. No program can certify what's potentially been physically messed with.

Exactly, having some sort of anti-keylogging is just tricking yourself into thinking the system is secure.

this isn’t a bitlocker crack. He literally lifted the keys, he did not break the encryption.

Yep title is misleading.
 
Joined
Jul 25, 2006
Messages
12,224 (1.88/day)
Location
Nebraska, USA
System Name Brightworks Systems BWS-6 E-IV
Processor Intel Core i5-6600 @ 3.9GHz
Motherboard Gigabyte GA-Z170-HD3 Rev 1.0
Cooling Quality case, 2 x Fractal Design 140mm fans, stock CPU HSF
Memory 32GB (4 x 8GB) DDR4 3000 Corsair Vengeance
Video Card(s) EVGA GEForce GTX 1050Ti 4Gb GDDR5
Storage Samsung 850 Pro 256GB SSD, Samsung 860 Evo 500GB SSD
Display(s) Samsung S24E650BW LED x 2
Case Fractal Design Define R4
Power Supply EVGA Supernova 550W G2 Gold
Mouse Logitech M190
Keyboard Microsoft Wireless Comfort 5050
Software W10 Pro 64-bit
How else would you get access to the data on a disk?
Through the network - then you can do it from the other side of the world. Piece of cake, right? I mean corporate networks seem to be breached every day. (17) Yet another hack/breach | TechPowerUp Forums

No, you need a new approach to security. This has become a public PC and will never be trustworthy for anything else. No program can certify what's potentially been physically messed with.
LOL - I am afraid you took me seriously. I was being fictitious. I mean, seriously? Who would ever "regularly" leave their computer unattended in a public place? Sorry. I thought I was being obvious.

But you are right - one would need a new approach to security. And that I did suggest in all seriousness: encrypt your data with a separate encryption program, in addition to Bitlocker/TPM. I also said not to put anything sensitive on your "portable" devices because they can grow legs (get stolen or accidentally be left behind).

And OF COURSE a computer cannot be watched 24/7/365. Even our home PCs are vulnerable to a thief breaking in and stealing it. So again, if your data is THAT sensitive - use double encryption. And don't forget a good backup plan that includes at least one copy "off-site".
 
Joined
Aug 20, 2007
Messages
20,819 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11
LOL - I am afraid you took me seriously. I was being fictitious. I mean, seriously? Who would ever "regularly" leave their computer unattended in a public place? Sorry. I thought I was being obvious.
Yes but I never assume the reader knows that lol.
 
Joined
Jul 25, 2006
Messages
12,224 (1.88/day)
Location
Nebraska, USA
System Name Brightworks Systems BWS-6 E-IV
Processor Intel Core i5-6600 @ 3.9GHz
Motherboard Gigabyte GA-Z170-HD3 Rev 1.0
Cooling Quality case, 2 x Fractal Design 140mm fans, stock CPU HSF
Memory 32GB (4 x 8GB) DDR4 3000 Corsair Vengeance
Video Card(s) EVGA GEForce GTX 1050Ti 4Gb GDDR5
Storage Samsung 850 Pro 256GB SSD, Samsung 860 Evo 500GB SSD
Display(s) Samsung S24E650BW LED x 2
Case Fractal Design Define R4
Power Supply EVGA Supernova 550W G2 Gold
Mouse Logitech M190
Keyboard Microsoft Wireless Comfort 5050
Software W10 Pro 64-bit
Well, I never say never but do try not to assume as well too - especially when tone of voice cannot be heard and facial expressions and body language cannot be seen. But, like I said, I thought it was obvious this time.
 
Joined
Aug 20, 2007
Messages
20,819 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11
Oh it was to me. No worries either way. I just know the law of the internet is to cover all the bases because if you can possibly be misunderstood, you will be.
 
Joined
May 13, 2010
Messages
5,741 (1.12/day)
System Name RemixedBeast-NX
Processor Intel Xeon E5-2690 @ 2.9Ghz (8C/16T)
Motherboard Dell Inc. 08HPGT (CPU 1)
Cooling Dell Standard
Memory 24GB ECC
Video Card(s) Gigabyte Nvidia RTX2060 6GB
Storage 2TB Samsung 860 EVO SSD//2TB WD Black HDD
Display(s) Samsung SyncMaster P2350 23in @ 1920x1080 + Dell E2013H 20 in @1600x900
Case Dell Precision T3600 Chassis
Audio Device(s) Beyerdynamic DT770 Pro 80 // Fiio E7 Amp/DAC
Power Supply 630w Dell T3600 PSU
Mouse Logitech G700s/G502
Keyboard Logitech K740
Software Linux Mint 20
Benchmark Scores Network: APs: Cisco Meraki MR32, Ubiquiti Unifi AP-AC-LR and Lite Router/Sw:Meraki MX64 MS220-8P
isn't on cpu tpm from 8th gen intel core ix and up?
 
Joined
Jan 5, 2006
Messages
17,965 (2.68/day)
System Name AlderLake / Laptop
Processor Intel i7 12700K P-Cores @ 5Ghz / Intel i3 7100U
Motherboard Gigabyte Z690 Aorus Master / HP 83A3 (U3E1)
Cooling Noctua NH-U12A 2 fans + Thermal Grizzly Kryonaut Extreme + 5 case fans / Fan
Memory 32GB DDR5 Corsair Dominator Platinum RGB 6000MT/s CL36 / 8GB DDR4 HyperX CL13
Video Card(s) MSI RTX 2070 Super Gaming X Trio / Intel HD620
Storage Samsung 980 Pro 1TB + 970 Evo 500GB + 850 Pro 512GB + 860 Evo 1TB x2 / Samsung 256GB M.2 SSD
Display(s) 23.8" Dell S2417DG 165Hz G-Sync 1440p / 14" 1080p IPS Glossy
Case Be quiet! Silent Base 600 - Window / HP Pavilion
Audio Device(s) Panasonic SA-PMX94 / Realtek onboard + B&O speaker system / Harman Kardon Go + Play / Logitech G533
Power Supply Seasonic Focus Plus Gold 750W / Powerbrick
Mouse Logitech MX Anywhere 2 Laser wireless / Logitech M330 wireless
Keyboard RAPOO E9270P Black 5GHz wireless / HP backlit
Software Windows 11 / Windows 10
Benchmark Scores Cinebench R23 (Single Core) 1936 @ stock Cinebench R23 (Multi Core) 23006 @ stock
isn't on cpu tpm from 8th gen intel core ix and up?
Yes.

If your computer is based on the 8th Generation or later Intel® Core™ Processor family,
you can rest assured knowing your system has Intel® Platform Trust Technology (Intel® PTT),
an integrated TPM that adheres to the 2.0 specifications.
 
Last edited:
Joined
Jul 5, 2013
Messages
25,604 (6.45/day)
A security researcher has managed to crack a laptop encrypted with BitLocker in under a minute using a modified Raspberry Pi Pico.
The attack does require physical access to the laptop.


Microsoft's BitLocker tool protects data on hard drives by encrypting them. However, Stacksmashing discovered that the key used for this can easily be intercepted via a 'sniffing attack'. Network traffic is tapped to intercept information.

BitLocker concerns the traffic that is exchanged between a separate Trusted Platform Module, or TPM, and the CPU in a laptop. BitLocker uses the TPM chip in a laptop to store the decryption key. To make the drive accessible when the laptop starts, the key is sent to the CPU. However, the communication between the processor and the TPM is not encrypted, meaning that the key is sent in cleartext. By listening in on this communication, Stacksmashing was able to retrieve the key.

Stacksmashing made a so-called TPM sniffer from a Raspberry Pi Pico. He connected the single-board computer to the LPC Bus in the laptop, allowing him to intercept the traffic. After obtaining the key, the researcher used the open source tool Disclocker to decrypt the drive. He could then view all the data.

Microsoft has been aware of these types of attacks for some time, but emphasizes that attackers need 'sufficient time' to do so. However, Stacksmashing only needed 43 seconds to open the laptop, connect the TPM sniffer to the LPC Bus and steal the key. The hardware needed to make the TPM sniffer cost him just ten dollars.

Stacksmashing used a Lenovo laptop for its attack, but other laptops are also vulnerable. However, the attack only works if a laptop has a separate TPM and CPU. If the two are combined, which is the case on many laptops, the attack does not work. Users who want to protect themselves against such an attack can take mitigating measures by configuring a PIN, according to Microsoft.

What's really funny is that they seem to be taking advantage of holes deliberately left in by microsoft for "backdooring" a system. The statements made by microsoft are nothing but them trying and failing to cover their backsides. Pathetic.

@R-T-B
Who called it a few years ago? Government agencies world-wide have had OFFICIAL tools like this for donkeys-years that work even faster than 43seconds and have had them since the first release of Bitlocker.

Does anyone want to argue that microsoft is not incompetent and incapable of providing true security? The microsoft method is NOT TRUSTWORTHY people! Stop trusting them and start doing your own thing!

Only works because:

- physical access
This is required.
TPM is a separate chip
This is not, at least for the official tools microsoft gives to governments.
board literally had contact pads for the traces
This is not. While the folks doing the above used a hardware solution, a software solution exists that needs none of it. Now that a hardware solution has been discovered, a software version will soon follow.
 
Last edited:
Joined
Aug 20, 2007
Messages
20,819 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11
Who called it a few years ago?
I mean these exploits have been on wikipedia literally for years so...

This is not, at least for the official tools microsoft gives to governments.
There are no government tools that I am aware of (not that I neccesarily would be, but I'd honestly be surprised if our government were that competent).

There is a public bitlocker forensic kit of course. It doesn't do much without the keys sniffed though.

This is not. While the folks doing the above used a hardware solution, a software solution exists that needs none of it. Now that a hardware solution has been discovered, a software version will soon follow.
No offense intended but without a source this is not something I can accept at face value. Its little more than speculation.
 
Joined
Aug 20, 2007
Messages
20,819 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11

Solaris17

Super Dainty Moderator
Staff member
Joined
Aug 16, 2005
Messages
25,955 (3.79/day)
Location
Alabama
System Name Rocinante
Processor I9 14900KS
Motherboard MSI MPG Z790I Edge WiFi Gaming
Cooling be quiet! Pure Loop 240mm
Memory 64GB Gskill Trident Z5 DDR5 6000 @6400
Video Card(s) MSI SUPRIM Liquid X 4090
Storage 1x 500GB 980 Pro | 1x 1TB 980 Pro | 1x 8TB Corsair MP400
Display(s) Philips Evnia 49M2C8900
Case LANCOOL 205M MESH Snow
Audio Device(s) Moondrop S8's on Schiit Hel 2e
Power Supply ASUS ROG Loki SFX-L 1000W
Mouse Lamzu Atlantis mini (White)
Keyboard Monsgeek M3 Lavender, Akko Crystal Blues
VR HMD Quest 3
Software Windows 11
Benchmark Scores I dont have time for that.
Keep watching. I give it 12 weeks, 16 at the most.

uh huh.

12 weeks form when?

4 years ago?

12 weeks from 5 years ago?

12 weeks from 10 years ago?

or 12 weeks from this becoming popular as of 5 days ago because the IT industry has the attention span of a goldfish?

Taking cryptographic keys from the bus isnt new at all. Those 3 examples are for bitlocker specifically.

I think it will rain atleast 6 times probably 7 from now until december. Am I a prophet yet?
 
Joined
Jul 21, 2008
Messages
5,177 (0.90/day)
System Name [Daily Driver]
Processor [Ryzen 7 5800X3D]
Motherboard [Asus TUF GAMING X570-PLUS]
Cooling [be quiet! Dark Rock Slim]
Memory [64GB Corsair Vengeance LPX 3600MHz (16GBx4)]
Video Card(s) [PNY RTX 3070Ti XLR8]
Storage [1TB SN850 NVMe, 4TB 990 Pro NVMe, 2TB 870 EVO SSD, 2TB SA510 SSD]
Display(s) [2x 27" HP X27q at 1440p]
Case [Fractal Meshify-C]
Audio Device(s) [Steelseries Arctis Pro]
Power Supply [CORSAIR RMx 1000]
Mouse [Logitech G Pro Wireless]
Keyboard [Logitech G512 Carbon (GX-Brown)]
Software [Windows 11 64-Bit]
The tinfoil came out quick here.
 
Joined
Feb 18, 2005
Messages
5,326 (0.76/day)
Location
Ikenai borderline!
System Name Firelance.
Processor Threadripper 3960X
Motherboard ROG Strix TRX40-E Gaming
Cooling IceGem 360 + 6x Arctic Cooling P12
Memory 8x 16GB Patriot Viper DDR4-3200 CL16
Video Card(s) MSI GeForce RTX 4060 Ti Ventus 2X OC
Storage 2TB WD SN850X (boot), 4TB Crucial P3 (data)
Display(s) 3x AOC Q32E2N (32" 2560x1440 75Hz)
Case Enthoo Pro II Server Edition (Closed Panel) + 6 fans
Power Supply Fractal Design Ion+ 2 Platinum 760W
Mouse Logitech G602
Keyboard Logitech G613
Software Windows 10 Professional x64
The tinfoil came out quick here.
It comes out quickly whenever Windows is mentioned. It's primarily driven by personality defects, namely the narcissistic belief that they're somehow important enough for Microsoft to want to spy on them.
 
Joined
Nov 27, 2023
Messages
1,146 (6.78/day)
System Name The Workhorse
Processor AMD Ryzen R9 5900X
Motherboard Gigabyte Aorus B550 Pro
Cooling CPU - Noctua NH-D15S Case - 3 Noctua NF-A14 PWM at the bottom, 2 Fractal Design 180mm at the front
Memory GSkill Trident Z 3200CL14
Video Card(s) NVidia GTX 1070 MSI QuickSilver
Storage Adata SX8200Pro
Display(s) LG 32GK850G
Case Fractal Design Torrent
Audio Device(s) FiiO E-10K DAC/Amp, Samson Meteorite USB Microphone
Power Supply Corsair RMx850 (2018)
Mouse Razer Viper (Original)
Keyboard Cooler Master QuickFire Rapid TKL keyboard (Cherry MX Black)
Software Windows 11 Pro (23H2)
If you are absolutely serious about security (like actually working with incredibly sensitive data), then you are not running BitLocker for that. Hell, chances are you aren’t running Windows at all. For anyone for whom BitLocker is a useful feature - just don’t leave your PC unattended in a public place. And no, Microsoft isn’t using deliberate security holes to read your files. Come on.
Every time a big security hole is “exposed” it turns out that direct hardware access is required and instantly this nullifies any potential worries a sane person might have. This is sensationalism of highest order. This doesn’t mean that the findings are not correct, they are. It just doesn’t mean much.
 
Joined
Jan 10, 2011
Messages
1,334 (0.27/day)
Location
[Formerly] Khartoum, Sudan.
System Name 192.168.1.1~192.168.1.100
Processor AMD Ryzen5 5600G.
Motherboard Gigabyte B550m DS3H.
Cooling AMD Wraith Stealth.
Memory 16GB Crucial DDR4.
Video Card(s) Gigabyte GTX 1080 OC (Underclocked, underpowered).
Storage Samsung 980 NVME 500GB && Assortment of SSDs.
Display(s) LG 24MK430 primary && Samsung S24D590 secondary
Case Corsair Graphite 780T.
Audio Device(s) On-Board.
Power Supply SeaSonic CORE GM-650.
Mouse Coolermaster MM530.
Keyboard Kingston HyperX Alloy FPS.
VR HMD A pair of OP spectacles.
Software Ubuntu 22.04 LTS.
Benchmark Scores Me no know English. What bench mean? Bench like one sit on?
Through the network - then you can do it from the other side of the world.
Which is a vector that has its own sets of measures and mitigations to address. Bitlocker et al are meant to protect data in cases of physical access, not network intrusion.
Physical access isn't a limitation, it's the entire scope here.
 
Top