| ▲ | charcircuit an hour ago | |||||||
It's not an actual backdoor. An attacker found a way to exploit Windows after booting it up in this recovery mode. The security of files on the device depends on it being impossible for Windows to be pwned by an attacker on any surface exposed before the user is unlocked. This is why operating systems like GrapheneOS disable the USB port on the initial boot to limit the attack surface that an attacker has. | ||||||||
| ▲ | tsimionescu 11 minutes ago | parent [-] | |||||||
Having a specific file name trigger the decryption to happen automatically, while also removing said files after this is achieved, is an extremely unlikely bug. I think for most people evaluating this, the onus is now on anyone thinking this is not a backdoor to prove how a mistake in the code can trigger this very specific scenario. This is like finding out that an OS accepts an SSH private key circulating online that the sysadmin for those OS boxes never authorized, and saying "wait, we don't know that this is a backdoor into that system, the attackers just found a bug". | ||||||||
| ||||||||