Remix.run Logo
MS confirms it will give the FBI your Windows PC data encryption key if asked(windowscentral.com)
241 points by blacktulip 6 hours ago | 182 comments
Zak 2 hours ago | parent | next [-]

The headline is misleading. It says that Microsoft will provide the key if asked, but the linked statement to Forbes says Microsoft will provide the key if it receives a valid legal order.

These have different meanings. Microsoft is legally entitled to refuse a request from law enforcement, and subject to criminal penalties if it refuses a valid legal order.

It does illustrate a significant vulnerability in that Microsoft has access to user keys by default. The public cannot be sure that Microsoft employees or criminals are unable to access those keys.

Spooky23 an hour ago | parent | next [-]

Nah, you’re just not reading carefully. You must parse everything about this stuff carefully as the words are always crafted. It’s usually more productive to read with a goal to understand what isn’t said as opposed to what is said.

They said “legal order”, which includes a variety of things ranging from administrative subpoenas to judicial warrants. Generally they say warrant if that was used.

A “request” is “Hi Microsoft man, would you please bypass your process and give me customer data?” That doesn’t happen unless it’s for performative purposes. (Like when the FBI was crying about the San Bernardino shooter’s iPhone) Casual asks are problematic for police because it’s difficult to use that information in court.

What exactly was requested sounds fishy as the article states that Microsoft only gets 20 a year, and is responsive to 9 or fewer requests. Apple seems to get more and typically is more responsive. (https://www.apple.com/legal/transparency/us.html)

The other weird thing is that the Microsoft spokesman named in the Forbes article is an external crisis communications consultant. Why an use external guy firewalled from the business for what is a normal business process?

b00ty4breakfast 17 minutes ago | parent [-]

Hans George Gadamer over here with the advanced hermeneutic

stabbles an hour ago | parent | prev | next [-]

Exactly. The discussion should center on the fact that Microsoft's shift was a contingency, not a technical necessity. It cannot have escaped them that their design choices create a legal point of entry for data requests that they are then obligated to fulfill, which would not have been the case with proper end-to-end encryption; in that case they would have told authorities that they simply cannot fulfill these requests.

mossTechnician 42 minutes ago | parent | prev | next [-]

Crucially, the headline says Microsoft will provide the key if asked by the FBI, which implies a state entity with legal power that extends beyond a typical person's assumptions of "rule of law" and "due process," let alone ethics.

Forgeties79 3 minutes ago | parent | prev | next [-]

> The headline is misleading. It says that Microsoft will provide the key if asked, but the linked statement to Forbes says Microsoft will provide the key if it receives a valid legal order.

This is an odd thing to split hairs over IMO. Warrants or subpoenas or just asking nicely, whatever bar you want to set, is a secondary concern. The main issue is they can and will hand the keys to LEO’s at all.

bdangubic 2 minutes ago | parent [-]

The even-more-main-issue is that there is > 0 number of people who thought they wouldn’t

DmitryO an hour ago | parent | prev | next [-]

The same way you cannot be sure that FBI is not criminals

0x262d an hour ago | parent | prev [-]

Is it meaningfully misleading? How often is this an obstacle for the FBI?

runjake an hour ago | parent | next [-]

Yes, "asked" versus "ordered" is meaningfully misleading, especially in this context.

There is reasonable suspicion, some might argue evidence, that Microsoft voluntarily cooperated with U.S. Intelligence Community without being compelled by a court order, the most famous instances being leaked in the Snowden disclosures.

To be fair to Microsoft, here's their updated statement (emphasis mine):

"Microsoft confirmed to Forbes that it does provide BitLocker recovery keys if it receives a valid legal order. “While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide... how to manage their keys,” said Microsoft spokesperson Charles Chamberlayne."

Zak 33 minutes ago | parent | prev | next [-]

I would guess that the FBI never asks Microsoft for encryption keys without a valid legal order because it knows Microsoft will demand one, and because the FBI rarely has possession of suspect devices without a warrant to search for them and obtain their contents.

It could be a bigger obstacle for other agencies. CBP can hold a device carried by someone crossing the border without judicial oversight. ICE is in the midst of a hiring surge and from what I've read lately, has an abbreviated screening and training process likely not matching the rigor of the FBI. Local law enforcement agencies vary greatly.

bnjms an hour ago | parent | prev | next [-]

It’s immensely misleading. At least with a valid legal order we are still living by rule of law. With the recent actions I can’t say ICE is acting by rule of law.

Having said that I won’t go back to Windows.

cyanydeez an hour ago | parent | prev [-]

Broader context isWindows defaults to making their access to your data legally accessible. Their entire windows platform and one drive defaults to this insecurity

Inlight of fascism coming to Democratic cities and anyone documenting it being a registered domestic terrorist...well thats pretty f'n insecure by default.

cornholio 3 hours ago | parent | prev | next [-]

Beyond the crypto architecture debate, I don't really understand how could anyone imagine a world where MS could just refuse such a request. How exactly would we draft laws to this effect, "the authorities can subpoena for any piece of evidence, except when complying to such a request might break the contractual obligations of a third party towards the suspect"?

Do we really, really, fully understand the implications of allowing for private contracts that can trump criminal law?

hermanzegerman 3 hours ago | parent | next [-]

They could just ask before uploading your encryption key to the cloud. Instead they force people to use a Microsoft Account to set up their windows and store the key without explicit consent

cornholio 3 hours ago | parent | next [-]

That's a crypto architecture design choice, MS opted for the user-friendly key escrow option instead of the more secure strong local key - that requires a competent user setting a strong password and saving recovery codes, understanding the disastrous implication of a key loss etc.

Given the abilities of the median MS client, the better choice is not obvious at all, while "protecting from a nation-state adversary" was definitely not one of the goals.

wobfan 3 hours ago | parent | next [-]

While you're right, they also went out of their way to prevent competent users from using local accounts and/or not upload their BitLocker keys.

I could understand if the default is an online account + automatic key upload, but only if you add an opt-out option to it. It might not even be visible by default, like, idk, hide it somewhere so that you can be sure that the median MS user won't see it and won't think about it. But just fully refusing to allow your users to decide against uploading the encryption key to your servers is evil, straight up.

xp84 2 hours ago | parent | next [-]

I really doubt those motives are "evil." They're in the business of selling and supporting an OS. Most people couldn't safeguard a 10-byte password on their own, they're not going to have a solution for saving their encryption key that keeps it safer than it'd be with Microsoft, and that goes for both criminals (or people otherwise facing law enforcement scrutiny) and normal grandmas who just want to not have all their pictures and recipes lost.

Before recently, normal people who get arrested and have their computer seized were 100% guaranteed that the cops could read their hard drive and society didn't fall apart. Today, the chances the cops can figure out how to read a given hard drive is probably a bit less. If someone needs better security against the actual government (and I'm hoping that person is a super cool brave journalist and not a terrorist), they should be handling their own encryption at the application layer and keeping their keys safe on their own, and probably using Linux.

bri3d an hour ago | parent | prev | next [-]

The OOBE (out of box experience) uploads the key by default (it tells you it’s doing it, but it’s a bit challenging to figure out how to avoid it) but any other setup method specifically asks where to back up your key, and you can choose not to. The way to avoid enrollment is to enable Bitlocker later than OOBE.

I really think that enabling BitLocker with an escrowed key during OOBE is the right choice, the protection to risk balance for a “normal” user is good. Power users who are worried about government compulsion can still set up their system to be more hardened.

JasonADrury 3 hours ago | parent | prev | next [-]

You can just ... not select the option to upload your keys to MS? During the setup you get to choose where to store your bitlocker recovery key.

jcovik 2 hours ago | parent [-]

The last time I've installed windows, bitlocker was enabled automatically and the key was uploaded without my consent.

Yes, you can opt out of it while manually activating bitlocker, but I find it infuriating that there's no such choice at the system installation process. It's stupid that after system installation a user supposed to renecrypt their system drive if they don't want this.

vel0city 27 minutes ago | parent | prev | next [-]

It's a few clicks to choose to re-key and not have the key saved to your Microsoft account.

varispeed 2 hours ago | parent | prev [-]

Maybe three letter agencies prevented them from giving that option.

cylemons 2 hours ago | parent [-]

Surely that's not legal is it? Can the government force companies to include spyware?

Jigsy an hour ago | parent | next [-]

That's one of the ideas the British government had a few months back...

dexterdog 2 hours ago | parent | prev [-]

No, but they can tie it to the consideration of software and services contracts which has the same effect.

aprentic 2 hours ago | parent | prev | next [-]

Yes and they had to lie to sell that option.

If they honestly informed customers about the tradeoff between security and convenience they'd certainly have far fewer customers. Instead they lead people to believe that they can get that convenience for free.

The obvious better choice is transparancy.

xp84 an hour ago | parent [-]

> tradeoff between security and convenience they'd certainly have far fewer customers

What? Most people, thinking through the tradeoff, would 100% not choose to be in charge of safeguarding their own key, because they're more worried about losing everything on their PC, than they are about going to jail. Because most people aren't planning on doing crime. Yes, I know people can be wrongly accused and stuff, but overall most people aren't thinking of that as their main worry.

dmurray 2 hours ago | parent | prev | next [-]

Protecting from a nation state adversary should probably be a goal for the kind of enterprise software MS sells.

Protecting from specifically the nation state that hosts and regulates Microsoft and its biggest clients, probably not.

tucnak 2 hours ago | parent | prev [-]

This is a consent issue, and visibility thereof, not "crypto architecture"

shevy-java 2 hours ago | parent | prev | next [-]

It makes sense if you consider the possibility of a secret deal between the government and a giant corporation. The deal is that people's data is never secure.

It's a nightmare actually.

JasonADrury 3 hours ago | parent | prev | next [-]

The alternative is just not having FDE on by default, it really isn't "require utterly clueless non-technical users to go through complicated opt-in procedure for backups to avoid losing all their data when they forget their password".

And AFAICT, they do ask, even if the flow is clearly designed to get the user to back up their keys online.

xp84 an hour ago | parent | next [-]

> The alternative is just not having FDE on by default

yes, it would be. So, the current way, 99% of people are benefitting from knowing their data is secure when very common thefts occur, and 1% of people have the same outcome as if their disk was unencrypted: When they're arrested and their computers seized, the cops have their crime secrets. What's wrong?

antiframe 2 hours ago | parent | prev [-]

No, encryption keys should never be uploaded to someone else's computer unencrypted. The OOBE should give users a choice between no FDE or FDE with a warning that they should not forget their password or FDE and Microsoft has their key and will be able to recover their disk and would be compelled to share the key with law enforcement. By giving the user the three options with consequences you empower the user to address their threat model how they see fit. There is no good default choice here. The trade offs are too varied.

JasonADrury an hour ago | parent [-]

Always on FDE with online backups is a perfectly reasonable default. The OOBE does offer the users the choice to not back up their key online, even if it's displayed less prominently.

>By giving the user the three options with consequences you empower the user to address their threat model how they see fit.

Making it too easy for uneducated users to make poor choices is terrible software design.

p_ing 3 hours ago | parent | prev [-]

Forcing implies there are zero ways to begin with a local only account (or other non-Microsoft Account). That's simply not true.

bdavbdav 3 hours ago | parent [-]

Disagree. If the path is shrouded behind key presses and commands which are unpublished by MS (and in some instances routes that have been closed), it may as well be.

p_ing 3 hours ago | parent [-]

> it may as well be.

That defies the definition of "forced". Forced means no option. You can disagree all you want -- but at a technical level, you're incorrect.

bad_haircut72 2 hours ago | parent | next [-]

Im going to shoot you unless you say the magic word - and technically Im not even forcing you into it, you could have said the magic word and got out of it!! Whats the magic word? not telling!

selfhoster11 3 hours ago | parent | prev [-]

Try doing this as a normies without technical guidance. Technically correct, this time, is not the benchmark.

rvnx 2 hours ago | parent [-]

Anyway Microsoft and any software developer can be compelled to practically do anything, you don't want to be blocked in some jurisdictions (even less the US) and the managers do not want to go to jail to protect a terrorist, especially if nobody is going to know that they helped.

Some even go that far that they push an update that exfiltrates data from a device (and some even do on their own initiative).

And even if you are not legally compelled. Money or influence can go a long way. For example, the fact that HTTPS communications were decipherable by the NSA for almost 20 years, or, whoops, no contract with DoD ("not safe enough"...)

Once the data is in the hands of the intelligence services, from a procedure perspective they can choose what to do next (e.g. to officialize this data collection through physical collection of the device, or do nothing and try to find a more juicy target).

It's not in the interest of anyone to prevent such collection agreement with governments. It's just Prism v2.

So seems normal that Microsoft gives the keys, the same that Cloudflare may give information about you and the others. They don't want to have their lives ruined for you.

AnthonyMouse 2 hours ago | parent | prev | next [-]

> How exactly would we draft laws to this effect, "the authorities can subpoena for any piece of evidence, except when complying to such a request might break the contractual obligations of a third party towards the suspect"?

Perhaps in this case they should be required to get a warrant rather than a subpoena?

ExoticPearTree 3 hours ago | parent | prev | next [-]

Encrypt the BL key with the user's password? I mean there are a lot of technical solutions besides "we're gonna keep the BL keys in the clear and readily available for anyone".

raincole 3 hours ago | parent | next [-]

For something as widely adopted as Windows, the only sensible alternative is to not encrypt the disk by default.

The default behavior will never ever be to "encrypt the disk by a key and encrypt the key with the user's password." It just doesn't work in real life. You'll have thousands of users who lost access to their disks every week.

mjevans an hour ago | parent [-]

While this is true, why even bother turning on encryption and making it harder on disk data recovery services in that case?

Inform, and Empower with real choices. Make it easy for end users to select an alternate key backup method. Some potential alternatives: Allow their bank to offer such a service. Allow friends and family to self host such a service. Etc.

Intermernet 2 hours ago | parent | prev | next [-]

This is a bit tricky as it couples the user's password with the disk encryption key. If a user changes the password they would then need to change the encryption key, or remember the previous (possibly compromised) password. A better option is to force the user to record a complex hash, but that's never going to be user friendly when it comes to the average computer user.

Basically, we need better education about the issue, but as this is the case with almost every contentious issue in the world right now, I can't imagine this particular issue will bubble to the top of the awareness heap.

bdavbdav 3 hours ago | parent | prev | next [-]

I thought this was what happened. Clearly not :( That’s the idea with services like 1Password (which I suppose is ultimately doing the same thing) - you need both the key held on the device and the password.

I suppose this all falls apart when the PC unlock password is your MS account password, the MS account can reset the local password. In Mac OS / Linux, you reset the login password, you loose the keychain.

narmiouh 3 hours ago | parent [-]

In case of 1password, I would think it would be challenging to do what you are saying, at least for shared password vaults.

arielcostas 3 hours ago | parent | prev [-]

At this point, end-to-end encryption is a solved problems when password managers exist. Not doing it means either Microsoft doesn't care enough, or is actually interested on keeping it this way

B1FIDO 2 hours ago | parent [-]

I wouldn't call the problem "solved" just because of password managers.

Password managers shift the paradigm and the risk factors. In terms of MFA, a password in your manager is now "something you have" rather than "something you know". The only password I know nowadays is my sign-in password that unlocks the password manager's vault. So the passwords to my bank, my health care, my video games are no longer "in my fingers" or in my head anymore, they're unknown to me!

So vault management becomes the issue rather than password management. If passwords are now "something you have" then it becomes possible to lose them. For example, if my home burns down and I show up in a public library with nothing but the clothes on my back, how do I sign into my online accounts? If the passwords were in my fingers, I could do this. But if they require my smartphone to be operational and charged and having network access, and also require passwords I don't know anymore, I'm really screwed at that library. It'd be nearly impossible for me to sign back in.

So in the days of MFA and password managers, now we need to manage the vaults, whether they're in the cloud or in local storage, and we also need to print out recovery codes on paper and store them securely somewhere physical that we can access them after a catastrophe. This is an increase in complexity.

So I contend that password managers, and their cousins the nearly-ubiquitous passkeys, are the main driving factor in people's forgetting their passwords and forgetting how to sign-in now, without relying on an app to do it for them. And that is a decrease in opsec for consumers.

Saris an hour ago | parent | prev | next [-]

Sure that's valid, they do need to conply with legal orders. But they don't need to store bitlocker keys in the first place, they only need to turn over data they actually have.

b65e8bee43c2ed0 3 hours ago | parent | prev | next [-]

I don't think that many people here are naive enough to believe that any business would fight the government for the sake of its customers. I think most of us are simply appalled by this blatantly malicious behavior. I'm not buying all these "but what if the user is an illiterate, senile 90-year-old with ADHD, huh?" attempts to rationalize it away. it's the equivalent of the guy who installed your door keeping a copy of your keys by unspoken default - "what if your toddler locks himself out, huh?"

I know the police can just break down my door, but that doesn't mean I should be ok with some random asshole having my keys.

blargthorwars 3 hours ago | parent [-]

Assume good intent. If Microsoft didn't escrow the keys, the next HN post would be "mIcR0SofT Ate mY chILDhooD pHOTos!!"

j45 2 hours ago | parent | prev | next [-]

This make little to no sense.

This is being reported on because it seems newsworthy and a departure from the norm.

Apple also categorically says they refuse such requests.

It's a private device. With private data. Device and data owned by the owner.

Using sleight of hand and words to coax a password into a shared cloud and beyond just seems to indicate the cloud is someone else's computer, and you are putting the keys to your world and your data insecurely in someone else's computer.

Should windows users assume their computer is now a hostile and hacked device, or one that can be easily hacked and backdoored without their knowledge to their data?

cornholio 16 minutes ago | parent | next [-]

The Bernardino incident is a very different issue where Apple refused to use its own private key to sign a tool that would have unlocked any iPhone. There is absolutely no comparison between Apple's and MS conduct here because the architectures of the respective systems are so different (but of course, that's a choice each company made).

Should Apple find itself with a comparable decryption key in its possession, it would have little options but to comply and hand it over.

blackcatsec an hour ago | parent | prev [-]

Firstly, Apple does not refuse such requests. In fact, it was very widely publicized in the past couple of weeks that Apple has removed Advanced Data Protection for users in the UK. So while US users still enjoy Advanced Data Protection from Apple, UK users do not.

It is entirely possible that Apple's Advanced Data Protection feature is removed legally by the US as well, if the regime decides they want to target it. I suspect there are either two reasons why they do not: Either the US has an additional agreement with Apple behind the scenes somewhere, OR the US regime has not yet felt that this was an important enough thing to go after.

There is precedent in the removal, Apple has shown they'll do the removal if asked/forced. What makes you think they wouldn't do the same thing in the US if Trump threatened to ban iPhone shipments from China until Apple complied?

The options for people to manage this stuff themselves are extremely painful for the average user for many reasons laid out in this thread. But the same goes for things like PGP keys. Managing PGP keys, uploading to key servers, using specialized mail clients, plugging in and unplugging the physical key, managing key rotation, key escrow, and key revocation. And understanding the deep logic behind it actually requires a person with technical expertise in this particular solution to guide people. It's far beyond what the average end user is ever going to do.

ViktorRay 44 minutes ago | parent [-]

You seem to be forgetting the time the Obama administration asked Apple to unlock a suspect’s iPhone and Apple refused.

constantcrying 2 hours ago | parent | prev | next [-]

> don't really understand how could anyone imagine a world where MS could just refuse such a request

By simply not having the ability to do so.

Of course Microsoft should comply with the law, expecting anything else is ridiculous. But they themselves made sure that they had the ability to produce the requested information.

mrweasel 26 minutes ago | parent [-]

Right, Microsoft have the ability to recover the key, because average people lose their encryption keys and will blame Microsoft if they can't unlock their computer and gain access to their files. BitLocker protects you from someone stealing your computer to gain access to your files, that's it. It's no good in a corporate setting or if you're worried about governments spying on you.

I'm honestly not entirely convinced that disk encryption be enabled by default. How much of a problem was stolen personal laptops really? Corporate machine, sure, but leave the master key with the IT department.

jMyles 3 hours ago | parent | prev [-]

> Do we really, really, fully understand the implication of allowing private contracts that trump criminal law?

...it's not that at all. We don't want private contracts to enshrine the same imbalances of power; we want those imbalances rendered irrelevant.

We hope against hope that people who have strength, money, reputation, legal teams, etc., will be as steadfast in asserting basic rights as people who have none of those things.

We don't regard the FBI as a legitimate institution of the rule of law, but a criminal enterprise and decades-long experiment in concentration of power. The constitution does not suppose an FBI, but it does suppose that 'no warrant shall issue but upon probable cause... particularly describing the place to be searched, and the persons or things to be seized' (emphasis mine). Obviously a search of the complete digital footprint and history of a person is not 'particular' in any plain meaning of that word.

...and we just don't regard the state as having an important function in the internet age. So all of its whining and tantrums and pepper spray and prison cells are just childish clinging to a power structure that is no longer desirable.

cornholio 3 hours ago | parent [-]

I think legally the issue was adjudicated by analogy to a closed safe: while the exact contents of the safe is unknown beforehand, it is reasonable it will contain evidence, documents, money, weapons etc. that are relevant, so if a warrant can be issued in that case compelling a locksmith to open it, then by analogy it can be issued against an encrypted device.

Without doubt, this analogy surely breaks down as society changes to become more digital - what about a Google Glass type of device that records my entire life, or the glasses of all people detected around me? what about the device where I uploaded my conscience, can law enforcement simply probe around my mind and find direct evidence of my guilt? Any written constitution is just a snapshot of a social contract at a particular historical time and technological development point, so it cannot serve as the ultimate source of truth regarding individual rights - the contract is renegotiated constantly through political means.

My question was more general: how could we draft that new social contract to the current age, how could we maintain the balance where the encrypted device of a suspected child predator and murderer is left encrypted, despite the fact that some 3rd party has the key, because we agreed that is the correct way to balance freedoms and law enforcement? It just doesn't sound stable in a democracy, where the rules of that social contract can change, it would contradict the moral intuitions of the vast majority.

AnthonyMouse 2 hours ago | parent [-]

> so if a warrant can be issued in that case compelling a locksmith to open it, then by analogy it can be issued against an encrypted device.

But it isn't a warrant, it's a subpoena. Also, the locksmith isn't the one compelled to open it; if the government wants someone to do that they have to pay them.

> Any written constitution is just a snapshot of a social contract at a particular historical time and technological development point, so it cannot serve as the ultimate source of truth regarding individual rights - the contract is renegotiated constantly through political means.

The Fourth Amendment was enacted in 1791. A process to change it exists, implying that the people could change it if they wanted to, but sometimes they get it pretty right to begin with. And then who are these asshats craving access to everyone's "papers and effects" without a warrant?

jmward01 an hour ago | parent | prev | next [-]

Actual freedom starts with freedom of thought which requires spaces that you can truly believe are safe. The push for the surveillance world is rapidly eroding the places someone can not only be safe to think but feel safe to think in. The 'feel safe' is deeply important here. The arguments of 'if you have nothing to hide' do not make anyone feel safe, they do the opposite and they chill free thought.

The second, very clear, argument is that the state can't be trusted in the long run. Period. Maybe you love your elected officials today but tomorrow they could be actively out to harm you. Every tool we allow the state to use needs to be viewed with this level of extreme skepticism and even very clear benefits need to be debated vigorously.

Encryption, and technologies like it, may allow hiding criminal activity but they also provide people a sense of security to think freely and stave off political power grabs. We recognize the fundamental right to free speech and give great latitude to it even when it is harmful and hateful, we need to recognize the fundamental right to free thought and recognize that encryption and similar tools are critical to it.

notepad0x90 an hour ago | parent | prev | next [-]

I don't understand this, it's actually baffling. Why was the question being asked to begin with let along a whole post being made about this? If they have a legal request from a law enforcement agency of any country they operate in, they either comply or see executives in prison.

Is how bitlocker works not well known perhaps? I don't think it's a secret. The whole schtick is that you get to manage windows computers in a corporate fleet remotely, that includes being able to lock-out or unlock volumes. The only other way to do that would be for the person using the device to store the keys somewhere locally, but the whole point is you don't trust the people using the computers, they're employees. If they get fired, or if they lose the laptop, them being the only people who can unlock the bitlocker volume is a very bad situation. Even that aside, the logistics of people switching laptops, help desk getting a laptop and needing to access the volume and similar scenarios have to be addressed. Nothing about this and how bitlocker works is new.

Even in the safer political climates of pre-2025, you're still looking at prosecution if you resist a lawful order. You can fight gag-orders, or the legality of a request, but without a court order to countermand the feds request, you have to comply.

Microsoft would do the same in China, Europe, middle east,etc.. the FBI isn't special.

maxglute an hour ago | parent [-]

>Microsoft would do the same in China, Europe, middle east,etc.. the FBI isn't special.

One would presume US agencies has leverage to access global data.

upofadown 35 minutes ago | parent | prev | next [-]

If you are not typing in a passphrase or plugging in a device containing a key to unlock your disk then the secret exists somewhere else. Chances are that secret is available to others. The root issue here is that the user is not being made clearly aware of where the secret is stored and what third party(s) have access to it or reasonably might be able to get access to it.

These sorts of things should be very unsurprising to the people who depend on them...

sokoloff 3 hours ago | parent | prev | next [-]

Headline says “…if asked”

Article and facts are “…if served with a valid legal order compelling it”

∴ Headline is clickbait.

lifetimerubyist 2 hours ago | parent | next [-]

I would prefer “it is impossible for Microsoft to give the keys because that’s not how their encryption works”.

mattmaroon 14 minutes ago | parent [-]

That’s the case if you change a setting.

The default setting is a good mix of protecting people from the trouble they’re far more likely to run into (someone steals their laptop) while still allowing them back in if they forget their password. The previous default setting was no encryption at all which is worse in every case.

iammjm 3 hours ago | parent | prev | next [-]

You are arguing semantics, whereas the point is that A) they have your keys, and B) they will give them away if they will have to

mattmaroon 3 hours ago | parent | next [-]

No, that’s binary thinking. The degree to which they will resist giving them away matters.

I’d much rather they require a warrant than just give it to any enforcement agency that sends them an email asking. The former is what I expect.

kenjackson 3 hours ago | parent | prev [-]

It’s really just A. Point B is pretty much just derived from there.

guerrilla 2 hours ago | parent | prev | next [-]

No, that's how I interpreted the headline.

a3w 3 hours ago | parent | prev [-]

asked, not ordered. Seems fine.

caseysoftware 3 hours ago | parent | prev | next [-]

Due to Third Party Doctrine, Microsoft doesn't even NEED a "legal order." It's merely a courtesy which they could change at any time.

Based on the sheer number of third parties we're required to use for our day to day lives, that is ridiculous and Third Party Doctrine should be eliminated.

Ref: https://en.wikipedia.org/wiki/Third-party_doctrine

orbital-decay 3 hours ago | parent [-]

>people who voluntarily give information to third parties

Is it the case with BitLocker? The voluntary part.

nickevante an hour ago | parent | prev | next [-]

The headline is slightly misleading. Microsoft can only provide the key if you are using a Microsoft Account which automatically escrows the BitLocker recovery key to OneDrive.

If you use a Local Account (which requires bypassing the OOBE internet check during setup) or explicitly disable key backup, the key never leaves the TPM. The issue isn't the encryption algorithm its the convenience selection.

shoknawe 4 hours ago | parent | prev | next [-]

Veracrypt https://veracrypt.io/en/Home.html

sandworm101 4 hours ago | parent [-]

https://linuxmint.com/

https://ubuntu.com/download/desktop

https://archlinux.org/

https://www.kali.org/get-kali/#kali-platforms

https://fedoraproject.org/

Every bad day for microsoft is yet another glorious day for linux.

smartmic 3 hours ago | parent | next [-]

> Every bad day for microsoft is yet another glorious day for linux.

Nah. If that were the case, Linux would dominate personal computer statistics. The reality is that most mainstream users just don't care. But, of course, that won't stop us.

hunter-gatherer 3 hours ago | parent | next [-]

I would also argue that _what_ personal computing means to most people has also evolved, even with younger generations. My gen Z nephew the other day was faberglasted when he learned I use my Documents, Videos, Desktop folders, ect. He literally asked "What is the Documents folder even for?". To most people, stuff is just magically somewhere (the cloud) and when they get a new machine tbey just expect it all to be there and work. I feel like these cryptography and legality discussions here on HackerNews always miss the mark because we overestimate hiw much most people care. Speaking of younger generations, I also get the feeling that there isn't such a thing as "digital sovereignty" or "ownership", at least not by the same definitions we gen x and older millennials internalize those definitions.

Across the generations, there are always a few groups to where cryptographic ownership really matter, such as journalists, protesters, and so on. Here on HN I feel like we tend to over-geeneralize these use cases to everybody, and then we are surprised when most people don't actually care.

guerrilla 3 hours ago | parent | prev | next [-]

It's just a matter of time. It's obvious the tides are turning.

tuwtuwtuwtuw 2 hours ago | parent | prev [-]

I bet most mainstream users thinks it good that FBI can access suspects data.

bdavbdav 3 hours ago | parent | prev | next [-]

And MacOS, which I suspect may be the more obvious choice for many users.

JasonADrury 3 hours ago | parent [-]

MacOS has basically the exactly same problem, ADP isn't enabled by default and your data gets backed up to iCloud unencrypted.

dmichulke 3 hours ago | parent | prev | next [-]

One could almost say "Embrace the penguin"

Vaslo 2 hours ago | parent | prev | next [-]

To people on HN considering the switch, maybe. My family has zero interest or intention of trying any of these. It stops with me.

sandworm101 3 minutes ago | parent [-]

As my family's tech support department, i switched them over to linux long ago. For the last decade, my elderly parents used linux laptops and much prefered the stability.

jmclnx 3 hours ago | parent | prev [-]

You forgot to list Slackware :)

http://www.slackware.com/

http://slackware.osuosl.org/slackware64-current/ChangeLog.tx...

ntoskrnl_exe 4 hours ago | parent | prev | next [-]

Pretty sure the same applies to all the passwords/passkeys/2FA codes stored in the Authenticator app with cloud backup on.

bdavbdav 3 hours ago | parent | next [-]

Use 1Password or similar instead. They’re keyed against a key they don’t have access to.

morshu9001 2 hours ago | parent [-]

How do you avoid losing that key?

mrweasel an hour ago | parent [-]

They have a recovery sheet you can print. If you lose your key, you can use the recovery information on that piece of paper to regain access. You put the recovery information in a safe place.

That is also exactly why people like myself are so against passkeys, there are no offline recovery.

zekica 3 hours ago | parent | prev [-]

Only if that authenticator/password manager app is not end-to-end encrypted.

mcsniff 3 hours ago | parent | next [-]

No, not "only". E2EE is now used as a dog whistle.

Who holds/controls the keys on both ends?

arielcostas 3 hours ago | parent [-]

End-to-end usually means only the data's owner (aka the customer) holds the keys needed. The term most used across password managers and similar tools is "zero knowledge encryption", where only you know the password to a vault, needed to decrypt it.

There's a "data encryption key", encrypted with a hash derived of your username+master password, and that data encryption key is used locally to decrypt the items of your vault. Even if everything is stored remotely, unless the provider got your raw master password (usually, a hash of that is used as the "password" for authentication), your information is totally safe.

A whole other topic is communications, but we're talking decryption keys here

ntoskrnl_exe an hour ago | parent | prev [-]

That's right, and Microsoft Authenticator isn't.

djoldman an hour ago | parent | prev | next [-]

> ... if asked

This is blurring of fact drives click bait.

The origin of this is a Forbes article[0] where the quote is: "Microsoft confirmed to Forbes that it does provide BitLocker recovery keys if it receives a valid legal order."

[0] https://www.forbes.com/sites/thomasbrewster/2026/01/22/micro...

uberman an hour ago | parent | prev | next [-]

This issue aside, if anyone has the keys what value are they in the end? Has Microsoft ever refused to unlock someone's pc stating that they could not technically do that? Isn't storing keys like this akin to storing passwords in clear text?

davidguetta 4 hours ago | parent | prev | next [-]

Lol it's been 20 years now that the whole world should stop to be all surprised pikachu about that.

michaelt 4 hours ago | parent | next [-]

For a long time, if you used full disk encryption, the encryption key never left your machine. If you forgot your password, the data was gone - tough luck, should have made a backup. That's still how it works on Linux.

Pretty surprising they'd back up the disk encryption secrets to the cloud at all, IMHO, let alone that they'd back it up in plaintext.

TeMPOraL 4 hours ago | parent | next [-]

That's why full disk encryption was always a no-go for approximately all computer users, and recommending it to someone not highly versed in technology was borderline malicious.

"Tough luck, should have made a backup" is higher responsibility than securing anything in meatspace, including your passport or government ID. In the real world, there is always a recovery path. Security aficionados pushing non-recoverable traps on people are plain disconnected from reality.

Microsoft has the right approach here with Bitlocker defaults. It's not merely about UX - it's about not setting up traps and footguns that could easily cause harm to people.

morshu9001 an hour ago | parent | next [-]

Google Authenticator used to be disconnected from reality like this. Users were asking how to copy the codes to another phone, and they said "you can't, WAI, should add the other phone as a second auth method on every site." Like how people say you shouldn't copy SSH privkeys. I figured out an undocumented way to do it on iPhone by taking an encrypted iTunes backup though.

Eventually they yielded on this, but their later updates had other usability traps. Because Google Auth was the household name for TOTP apps, this ruined TOTP's entire reputation.

Zak an hour ago | parent | prev | next [-]

I had hoped the average person would have a baseline understanding of how computers work by now. Baseline includes things like the difference between a web browser and a search engine, "the cloud" is someone else's computer, and encrypted means gone if you lose the password/key.

I am sad that this now appears unlikely. I suspect it may even be lower for people in their 20s today than a decade ago.

fc417fc802 2 hours ago | parent | prev | next [-]

> Security aficionados pushing non-recoverable traps on people are plain disconnected from reality.

To be fair, if you inadvertently get locked out of your Google account "tough luck, should have used a different provider" and Gmail is a household name so ...

Less snarky, I think that there's absolutely nothing wrong with key escrow (either as a recovery avenue or otherwise) so long as it's opt in and the tradeoffs are made abundantly clear up front. Unfortunately that doesn't seem to be the route MS went.

morshu9001 an hour ago | parent [-]

Google has a pretty robust recovery process. Of course if you've given them absolutely nothing about them then forgotten your password, it's tough.

fc417fc802 an hour ago | parent [-]

As long as the automated flow works everything is great. But if the music stops can you get in touch with a human to fix it? That applies not just to auth but pretty much all of their stuff. Plenty of horror stories have made it to the HN front page over the years.

Citizen8396 2 hours ago | parent | prev [-]

"Disconnected from reality" ... tell that to the people who have had a lost or stolen device without encryotion. You'd need a backup and then some!

Apple manages a recovery path for users without storing the key in plain text. Must have something to do with those "security aficionados."

B1FIDO 4 hours ago | parent | prev [-]

Well, for a consumer notebook or mobile device, the threat model typically envisions a thief grabbing it from a coffeehouse or hotel room. So your key needs to be safeguarded from the opportunist who possesses your hardware illegally.

Linux can be fairly well-secured against state-level threat actors, but honestly, if your adversary is your own nation-state, then no amount of security is going to protect you!

For Microsoft and the other consumer-OS vendors, it is typically a bad user-experience for any user, particularly a paying subscriber, to lose access to their account and their cloud apps. There are many ways to try and cajole the naïve user into storing their recovery key somewhere safe, but the best way is to just do it for them.

A recovery key stored in the user's own cloud account is going to be secure from the typical threats that consumers will face. I, for one, am thankful that there is peace of mind both from the on-device encryption, as well as the straightforward disaster recovery methods.

jordanb 4 hours ago | parent | next [-]

The problem is mass-surveillance and dragnets. Obviously if the state wants to go after you no laws will protect you. As we've seen they can even illegally collect evidence and then do a parallel construction to "launder" the evidence.

But One-drive is essentially a mass-surveillance tool. It's a way to load the contents of every single person's computer into Palentir or similar tools and, say, for instance, "give me a list of everyone who harbors anti-ICE sentiments."

By the way my windows computer nags me incessantly about "setting up backups" with no obvious way to turn off the nags, only a "remind me later" button. I assume at some point the option to not have backups will go away.

vladms 2 hours ago | parent | next [-]

> But One-drive is essentially a mass-surveillance tool.

There are plenty of people that post clear positions on multiple social networks. I personally doubt that One-drive files will provide much more information for most of the people compared to what's already out there (including mobile phone location, credit card transactions, streaming services logs, etc.).

What I think the danger is for individual abuse. Someone "in power" wants one guy to have issues, they could check his One-drive for something.

Best is to make people aware of how it works and let them figure it out. There are so many options (local only, encrypted cloud storage, etc.) I doubt there is an ideal solution for everything.

B1FIDO 3 hours ago | parent | prev [-]

I agree that "cloud storage" paradigms are a sea change from the status quo of the old days. My father has a file cabinet at home and keys on his keychain, wherein he stores all his important paperwork. There is no way anyone's getting in there except by entering his home and physically intruding on those drawers. Dad would at least notice the search and seizure, right?

What is just as crazy as cloud storage, is how you "go paperless" with all your service providers. Such as health care, utility bills, banks, etc. They don't print a paper statement and send it to your snail mail box anymore. They produce a PDF and store it in their cloud storage and then you need to go get it when you want/need it.

The typical consumer may never go get their paperwork from the provider's cloud. It is as if they said "Hey this document's in our warehouse! You need to drive across town, prove your identity, and look at it while you're here! ...You may not be permitted to take it with you, either!"

So I've been rather diligent and proactive about going to get my "paperless documents" from the various providers, and storing them in my own cloud storage, because, well, at least it's somewhere I can access it. I care a lot more about paying my medical bills, and accounting for my annual taxes, than someone noticing that I harbor anti-jew sentiment. I mean, I think they already figured that part out.

michaelt 3 hours ago | parent | prev [-]

> Well, for a consumer notebook or mobile device, the threat model typically envisions a thief grabbing it from a coffeehouse or hotel room.

...in which case having a cloud backup of the full disk encryption key is pointless, because you don't have access to the disk any more.

B1FIDO 3 hours ago | parent [-]

> pointless

Full-disk encryption is the opposite of pointless, my dude! The notebook-thief cannot access my data! That is the entire point!

No, I cannot recover the data from an HDD or SSD that I don't possess. But neither can the thief. The thief cannot access the keys in my cloud. Isn't that the point?

If a thief steals a notebook that isn't encrypted at all, then they can go into the storage, even forensically, and extract all my data! Nobody needs a "key" or credentials to do that! That was the status quo for decades in personal computing--and even enterprise computing. I've had "friends" give me "decommissioned" computers that still had data on their HDD from some corporation. And it would've been readable if I had tried.

The thief may have stolen a valuable piece of kit, but now all she has is hardware. Not my data. Not to mention, if your key was in a cloud backup, isn't most of your important data in the cloud, as well? Hopefully the only thing you lost with your device are the OS system files, and your documents are safely synced??

hsuduebc2 4 hours ago | parent | prev [-]

Exactly. Being again and again surprised that corporations will defend you for literally no reason is kinda delusional.

cromka 4 hours ago | parent | next [-]

That's a reductionist view. Apple, at least, based a big portion of their image on privacy and encryption. If a company does that and is then proven otherwise, it does a tremendous damage to the brand and stock value and is something shareholders would absolutely sue the board and CEO for. Things like these happened many times in the past.

This isn't that simple.

_blk 4 hours ago | parent | prev [-]

A Proton model makes this very simple: full cooperation and handover and virtually nothing to be extracted from the data. Size is somewhat of a metadata, ip connection points and maybe date of first use and when data changes occurred... I'm all for law enforcement, but that job has to be old-school Proof of Work bound and not using blanket data collection and automated speeding ticket mailer.

But I guess it's not done more because the free data can't be analyzed and sold.

takoid 3 hours ago | parent | prev | next [-]

Related discussion from yesterday: https://news.ycombinator.com/item?id=46735545

shevy-java 2 hours ago | parent | prev | next [-]

Not surprising. The whole Win11 feels like a spy-tool for the government. Just that "recall" anti-feature nobody needs - except for those who want to sniff and spy after people.

Jigsy an hour ago | parent | prev | next [-]

I do find it quite interesting how people support this idea (because they got a warrant), but are vehemently against the idea of backdooring encryption.

How is this any different?

jxdxbx 3 hours ago | parent | prev | next [-]

If tech companies implemented real, e2e encryption for all user data, there would be a huge outcry, as the most notable effect would be lots of people losing access to their data irrevocably.

I'm all for criticizing tech companies but it's pointless to demand the impossible.

rocqua 3 hours ago | parent | next [-]

Just say "we are storing your keys on our servers so you won't lose them" and follow that with either "do you trust us" or even "we will share this key with law enforcement if compelled". Would be fine. Let people make these decisions.

Besides, bit ocker keys are really quite hard to lose.

zzzeek 3 hours ago | parent | prev [-]

is it just me or would "Microsoft refuses to comply with a legal search warrant" be an actual, surprising news story? like of course MSFT is going to hand over to authorities whatever they ask for if there's a warrant, imagine if they didn't (hint: not good for business. their customers are governments and large institutions, a reputation for "going rogue" would damage their brand quite a bit)

cromka 4 hours ago | parent | prev | next [-]

Any reason to believe Apple won't do the same with whatever we backup in iCloud?

nickmccann 4 hours ago | parent | next [-]

If you have advanced data protection enabled, Apple claims: “No one else can access your end-to-end encrypted data — not even Apple — and this data remains secure even in the case of a data breach in the cloud.”

https://support.apple.com/en-us/102651

Noaidi 4 hours ago | parent | next [-]

Please read this section of Apple's own document before you talk about their "advanced data protection".

The following information may be available from iCloud if a user has enabled Advanced Data Protection for iCloud:

https://www.apple.com/legal/privacy/law-enforcement-guidelin...

Do you think Tim Cook gave that gold bar to Trump for nothing?

sillyfluke 3 hours ago | parent | next [-]

>Please read this section of Apple's own document

Don't know if the problem is on my end but your link goes to a 20 page document. If this is not a mistake you should quote the actual section and text you are referrimg to.

KellyCriterion 4 hours ago | parent | prev [-]

>>Do you think Tim Cook gave that gold bar to Trump for nothing?

Not in US - THANKS for this hint: I googled it! Wow!!! The both do bribery (offering&accepting) in front of the recording camera in a government building!!

Relly "impressive" :-X

cromka 4 hours ago | parent | prev [-]

Yeah, the problem is whether they already bent over for Trump admin or not yet.

Noaidi 4 hours ago | parent [-]

Yes, I know this sounds conspiratorial, but I think the whole Liquid Ass thing was a rush to put some other software in Apple products to appease the Trump admin.

For example, it is new in Tahoe that they store your filevault encryption key in your icloud keychain without telling you.

https://sixcolors.com/post/2025/09/filevault-on-macos-tahoe-...

eddyg 4 hours ago | parent | next [-]

Which is a very good thing.

iCloud is much more secure than most people realize because most people don’t take the 30 minutes to learn how it is architected.

You can (and should) watch https://www.youtube.com/watch?v=BLGFriOKz6U&t=1993s for all the details about how iCloud is protected, but especially the time-linked section. :)

ionwake 3 hours ago | parent [-]

I dont need to know anything about icloud to know this repy doesnt answer the "they didnt tell anyone" part which naturally makes me suspicious.

microtonal 3 hours ago | parent | prev | next [-]

But iCloud Keychain is end-to-end encrypted using device-specific keys, so Apple cannot read items in your iCloud Keychain (modulo adding their own key as a device key, rolling out a backdoor, etc. but that applies to all proprietary software).

blackoil 2 hours ago | parent [-]

How is the data recovered if device is lost?

internet2000 2 hours ago | parent [-]

If you lose access to all devices in the circle of trust, the data is lost. If you're curious: https://support.apple.com/guide/security/secure-keychain-syn...

cromka 4 hours ago | parent | prev [-]

My conspiration theory about Liquid Ass is their hardware for past 5 years was so good that they needed to make people finally upgrade it. My Air M1 16GB worked absolutely fine until it slowed down immensely on macOS 26.

microtonal 3 hours ago | parent | prev | next [-]

Last time I onboarded a Mac (a few months ago), it would very explicitly ask if you want to enable support for remote FileVault unlocking.

That said, they could also roll out a small patch to a specific device to extract the keys. When you really want to be safe (and since you can be a called a 'left extremist' for moving your car out of the way, that now includes a lot of people), probably use Linux with LUKS.

GeekyBear 3 hours ago | parent | prev | next [-]

Any American company will hand over data stored on their server (that they have access to) in response to a warrant.

Apple provides an optional encryption level (ADP) where they don't have a copy of your encryption key.

When Apple doesn't have the encryption key, they can't decrypt your data, so they can't provide a copy of the decrypted data in response to a warrant.

They explain the trade off during device setup: If Apple doesn't have a copy of the key, they can't help you if you should lose your copy of the key.

kube-system 2 hours ago | parent [-]

Any company in any country will hand over data in response to a warrant. There is no country with a higher standard of protection than a warrant.

GeekyBear an hour ago | parent [-]

Sure, but every company doesn't make it as difficult as possible to set up a new encrypted computer without uploading a copy of your your encryption key to their servers.

That's a Microsoft thing.

bdavbdav 3 hours ago | parent | prev | next [-]

Except you’re not coerced (near enough forced?) to use an account password managed by MS on Apple. Until MS themselves publish, for home users, how to set up without an MS account, I’m considering it forced.

Hamuko 4 hours ago | parent | prev [-]

iCloud login is still optional on macOS. Can't download stuff from the App Store and I think some continuity things require iCloud, but otherwise pretty solid.

daft_pink 4 hours ago | parent | prev | next [-]

At least they’re honest.

politelemon 4 hours ago | parent | prev | next [-]

The major OS vendors (apple, google, ms) are complicit in data turnover and have been for over ten years now. It has been reported multiple times so I'm struggling to see the angle being projected here. This feels like click harvesting got the HN "Microsoft bad" crowd.

sillyfluke 3 hours ago | parent | next [-]

The segment of the population that is the target of political vindictiveness from the FBI seems to have changed somewhat with this administration so it makes sense to remind people of the vulnerabilities from time to time.

internet2000 4 hours ago | parent | prev [-]

The San Bernardino iPhone case proves that Apple is very much so not complicit.

pjmlp 4 hours ago | parent | next [-]

The Apple that offers gold statues to authoritarian regimes would certainly behave differently.

People also forget how they kind of always played ball in similar governments.

cromka 4 hours ago | parent | prev [-]

This was a decade ago, before the big tech went to brown nose Trump on live TV. We live in different reality nowadays. Apple doesn't even market their encryption and safety anymore, like they did on massive billboards all over the world.

internet2000 4 hours ago | parent [-]

They've only done more since 2016.

Lockdown mode: https://support.apple.com/en-us/105120

Advanced Data Protection for iCloud: https://support.apple.com/en-us/108756

cromka 4 hours ago | parent [-]

Sure, but these are all mere statements. You don't know if they fully back that until there's a public standoff with law enforcement/administration and there weren't any in recent years. Yet at the same time it's hard to believe there were no attempts from that government to decrypt some devices they needed. So the fact we hear nothing about it is also an information to me. Sure, this is all speculation, but all things considered...

Besides, they fully comply with Chinese requirements, so...

PS. Others report Filevault keys are also being backed to iCloud since September and they didn't tell anyone: https://sixcolors.com/post/2025/09/filevault-on-macos-tahoe-...

internet2000 2 hours ago | parent | next [-]

iCloud Keychain is end-to-end encrypted, even without the Advanced Data Protection setting. https://support.apple.com/en-us/102651 Not something they can turn over to the feds.

And if you don't want iCloud Keychain, you are still given the choice to encrypt and print the backup key.

andrewksl 2 hours ago | parent | prev [-]

They fully comply with Chinese requirements if you subscribe to iCloud in China, and they do this quite transparently. They do not, notably, say they don't share anything with China and then go ahead and do it anyway.

Unless Apple is straight up lying about their technology and encryption methods used to secure iCloud and their hardware, the issue of a public standoff is moot, because Apple couldn't help them if they wanted to. And while perhaps it's possible that Apple would lie to consumers to please US law enforcement, it's a bit of a stretch to say that because there haven't been any high-profile cases where law enforcement tries to force Apple to give up what they don't have, that this must be evidence that they're in cahoots.

Timothycquinn an hour ago | parent | prev | next [-]

Time to use Linux as the on the metal OS.

unixhero 3 hours ago | parent | prev | next [-]

Stallman was correct

bdhcuidbebe 31 minutes ago | parent | prev | next [-]

But, the pile of reasons for not running windows is already through the roof…

dist-epoch 4 hours ago | parent | prev | next [-]

Everybody should have access to your hard drive, not just the FBI, so please do not encrypt your hard-drive.

If you encrypt your drive and upload the key to Microsoft, you are engaging in anti-competitive behavior since you give them access to your data, but not also to the local thief.

Just don't encrypt your drive if you cant be bothered to secure your key. Encryption-neutrality.

hohithere 2 hours ago | parent | prev | next [-]

Damn I love my dear little tux.

0dayman 2 hours ago | parent | prev | next [-]

shocking

jonplackett 3 hours ago | parent | prev | next [-]

He headline misleading - they will give it if there’s a court order, not just if asked.

Still crap but the headline is intentionally inaccurate for clickbaiting

rwmj 3 hours ago | parent [-]

Microsoft confirms it will obey the law.

cynicalsecurity 2 hours ago | parent | prev | next [-]

VeraCrypt.

anonnon 21 minutes ago | parent | prev | next [-]

Which is really galling when you consider how many Windows 11 users have inadvertently been locked out of their own bought-and-paid-for computers thanks to BitLocker.

zb3 3 hours ago | parent | prev | next [-]

The problem is not that they will give the key (government can force them - this is expected), but that they even have the key in the first place.. I bet this is done without proper consent, or with choice like "yes" vs "maybe later"..

Noaidi 4 hours ago | parent | prev | next [-]

Apple will do this too. Your laptop encryption key is stored in your keychain (without telliing you!). All is needed is a warrant for your iCloud account and they also have access to your laptop.

sixcolors.com/post/2025/09/filevault-on-macos-tahoe-no-longer-uses-icloud-to-store-its-recovery-key/

betaby 2 hours ago | parent | next [-]

> Your laptop encryption key is stored in your keychain

Probably not if one is not using Apple cloud on their laptops.

> stored in your keychain (without telliing you!)

How to verify that? Any commands/tools/guides?

_blk 4 hours ago | parent | prev | next [-]

Thanks, that's good to know. I suspect WhatsApp's "we're fully E2E encrypted" would be similar too.

cedws 4 hours ago | parent [-]

It's most software. Cryptography is user-unfriendly. The mechanisms used to make it user friendly sacrifice security.

There's a saying that goes "not your keys not your crypto" but this really extends to everything. If you don't control the keys something else does behind the scenes. A six digit PIN you use to unlock your phone or messaging app doesn't have enough entropy to be secure, even to derive a key-encryption-key.

If you pass a KDF with a hardness of ~5 seconds a four digit PIN to derive a key, then you can brute force the whole 10,000 possible PINs in ~13 hours. After ~6.5 hours you would have a 50% chance of guessing correctly. Six digit PIN would take significantly longer, but most software uses a hardness nowhere near 5 seconds.

eddyg 4 hours ago | parent | prev [-]

Wrong.

You can (and should) watch all of https://www.youtube.com/watch?v=BLGFriOKz6U&t=1993s for the details about how iCloud is protected by HSMs and rate limits to understand why you’re wrong, but especially the time-linked section… instead of spreading FUD about something you know nothing about.

FabHK 3 hours ago | parent | prev | next [-]

"US firm confirms it will comply with US law if asked."

betaby 2 hours ago | parent [-]

Unless that's a data privacy or monopoly related. Then they won't.

lingrush4 3 hours ago | parent | prev | next [-]

Very different phrasing between the headline and the subtitle:

> Microsoft confirms it will give the FBI your Windows PC data encryption key if asked

> Microsoft says it will hand those over to the FBI if requested via legal order

Microsoft complying with legal orders is not news. But why hire actual journalists when you can just lie in your headlines and still get clicks?

dismalaf 36 minutes ago | parent | prev | next [-]

Local company complies with the law. In other news, the sky is blue...

modzu 3 hours ago | parent | prev | next [-]

not your keys? not your crypto

expedition32 4 hours ago | parent | prev | next [-]

Honestly I have no problem with this but I do remember a lot of gaslighting about how America is free and Europe a totalitarian state.

lovebeans 4 hours ago | parent | prev | next [-]

Yes and this is a good thing. No organization, no matter how large or powerful, should be beyond the reach of the law.

stabbles 4 hours ago | parent | next [-]

That's a false dichotomy. You can hold an organization accountable to the law without requiring them to maintain a "master key" to your private data.

lovebeans 4 hours ago | parent [-]

It isn't required.

preisschild 4 hours ago | parent | prev [-]

Ideally they wouldnt even have this key / the private data in the first place

lovebeans 4 hours ago | parent [-]

The user can opt out of this if they want.

throwconsti 2 hours ago | parent | prev | next [-]

MS confirms it has to comply with warrants to the consternation of many.

SketchySeaBeast 4 hours ago | parent | prev [-]

Duplicate story. Previous discussion here. https://news.ycombinator.com/item?id=46735545

Edit: Nevermind.

cromka 4 hours ago | parent [-]

No it isn't. This is an evolution of that story.