Bitlocker Security Questions


Coincidence? The flow was so continuous that I didn't know a year had gone by until barreleye mentioned resurrecting the thread lol

1737885802926.webp
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel
    CPU
    Intel(R) Core(TM) i9-14900K
    Motherboard
    GIGABYTE Z790 AORUS Elite X WIFI7
    Memory
    Corsair 128GB (4x32GB) DDR5 5600MT/S CL40 Memory Kit
    Graphics Card(s)
    Onboard
    Sound Card
    Onboard
    Monitor(s) Displays
    43 inch 4k
    Screen Resolution
    2k (2560 x 1440)
    Hard Drives
    WD_BLACK 1TB NVMe SSD with Heatsink 7300 mb/s
    PSU
    MEG Ai1300P PCIE 5 & ATX 3.0 PSU 1300 watts
    Case
    Phanteks (PH-ES614PTG_BK) Enthoo Pro ATX , Tempered Glass, Integrated RGB Lighting
    Cooling
    ENERMAX LIQMAXFLO 360mm A-RGB AIO CPU Liquid Cooler
    Keyboard
    Wireless logitech
    Mouse
    Wireless logitech
In my research neither AES 128-bit encryption nor AES 256-bit encryption used by BitLocker has ever been hacked. Does anyone have evidence to the contrary?

You have it the wrong way around. The right question is does anyone have evidence that it cannot be hacked. Your assumption always must be that it can unless proven that it cannot.

Hitler thought enigma was uncrackable, and the joke was that it would have been faster for German commanders to ring Bletchley to get their orders.
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel
    CPU
    Intel(R) Core(TM) i9-14900K
    Motherboard
    GIGABYTE Z790 AORUS Elite X WIFI7
    Memory
    Corsair 128GB (4x32GB) DDR5 5600MT/S CL40 Memory Kit
    Graphics Card(s)
    Onboard
    Sound Card
    Onboard
    Monitor(s) Displays
    43 inch 4k
    Screen Resolution
    2k (2560 x 1440)
    Hard Drives
    WD_BLACK 1TB NVMe SSD with Heatsink 7300 mb/s
    PSU
    MEG Ai1300P PCIE 5 & ATX 3.0 PSU 1300 watts
    Case
    Phanteks (PH-ES614PTG_BK) Enthoo Pro ATX , Tempered Glass, Integrated RGB Lighting
    Cooling
    ENERMAX LIQMAXFLO 360mm A-RGB AIO CPU Liquid Cooler
    Keyboard
    Wireless logitech
    Mouse
    Wireless logitech
You have it the wrong way around. The right question is does anyone have evidence that it cannot be hacked. Your assumption always must be that it can unless proven that it cannot.

Hitler thought enigma was uncrackable, and the joke was that it would have been faster for German commanders to ring Bletchley to get their orders.
This. And you don't necessarily have to crack the encryption algorithm itself to still be able to decrypt. Microsoft kept insinuating that stealing the keys was so difficult in fact, you had to be a bit paranoid to be worried. Until someone proved that stealing them was close to effortless in a lot of cases. Next, Microsoft kept propelling the false belief that persists among average users, that an attacker who has the ability to swap the motherboard + SSD without easily being detected cannot easily manufacture a fake BitLocker screen to covertly transmit the valid PIN i.e. after letting the unsuspecting user enter the PIN. I have said it before, and will keep saying it.. just because you're paranoid, doesn't mean they're not after you.
 

My Computers

System One System Two

  • OS
    11 Home
    Computer type
    Laptop
    Manufacturer/Model
    Asus TUF Gaming F16 (2024)
    CPU
    i7 13650HX
    Memory
    16GB DDR5
    Graphics Card(s)
    GeForce RTX 4060 Mobile
    Sound Card
    Eastern Electric MiniMax DAC Supreme; Emotiva UMC-200; Astell & Kern AK240
    Monitor(s) Displays
    Sony Bravia XR-55X90J
    Screen Resolution
    3840×2160
    Hard Drives
    512GB SSD internal
    37TB external
    PSU
    Li-ion
    Cooling
    2× Arc Flow Fans, 4× exhaust vents, 5× heatpipes
    Keyboard
    Logitech K800
    Mouse
    Logitech G402
    Internet Speed
    20Mbit/s up, 250Mbit/s down
    Browser
    FF
  • Operating System
    11 Home
    Computer type
    Laptop
    Manufacturer/Model
    Medion S15450
    CPU
    i5 1135G7
    Memory
    16GB DDR4
    Graphics card(s)
    Intel Iris Xe
    Sound Card
    Eastern Electric MiniMax DAC Supreme; Emotiva UMC-200; Astell & Kern AK240
    Monitor(s) Displays
    Sony Bravia XR-55X90J
    Screen Resolution
    3840×2160
    Hard Drives
    2TB SSD internal
    37TB external
    PSU
    Li-ion
    Mouse
    Logitech G402
    Keyboard
    Logitech K800
    Internet Speed
    20Mbit/s up, 250Mbit/s down
    Browser
    FF
And you don't necessarily have to crack the encryption algorithm itself to still be able to decrypt.

Exactly. Engima probably still is uncrackable even today with supercomputers if using brute force and trying every combination, but by intelligently eliminating a lot of possibilities the combinations can be reduced to a manageable size. I'm not a cryptologist, but it seems that theory could be applied to any puzzle.

Russia's one-time pad couldn't be cracked either, until someone used the one-time pad twice, and then someone noticed. One-time pad - Wikipedia

Locks just keep honest people out.

just because you're paranoid, doesn't mean they're not after you.

Just because the water is calm doesn't mean there are no crocodiles ;)
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel
    CPU
    Intel(R) Core(TM) i9-14900K
    Motherboard
    GIGABYTE Z790 AORUS Elite X WIFI7
    Memory
    Corsair 128GB (4x32GB) DDR5 5600MT/S CL40 Memory Kit
    Graphics Card(s)
    Onboard
    Sound Card
    Onboard
    Monitor(s) Displays
    43 inch 4k
    Screen Resolution
    2k (2560 x 1440)
    Hard Drives
    WD_BLACK 1TB NVMe SSD with Heatsink 7300 mb/s
    PSU
    MEG Ai1300P PCIE 5 & ATX 3.0 PSU 1300 watts
    Case
    Phanteks (PH-ES614PTG_BK) Enthoo Pro ATX , Tempered Glass, Integrated RGB Lighting
    Cooling
    ENERMAX LIQMAXFLO 360mm A-RGB AIO CPU Liquid Cooler
    Keyboard
    Wireless logitech
    Mouse
    Wireless logitech
Exactly. Engima probably still is uncrackable even today with supercomputers if using brute force and trying every combination, but by intelligently eliminating a lot of possibilities the combinations can be reduced to a manageable size. I'm not a cryptologist, but it seems that theory could be applied to any puzzle.

Russia's one-time pad couldn't be cracked either, until someone used the one-time pad twice, and then someone noticed. One-time pad - Wikipedia

Locks just keep honest people out.



Just because the water is calm doesn't mean there are no crocodiles ;)
Another excellent example was the Sky ECC app.

 

My Computers

System One System Two

  • OS
    11 Home
    Computer type
    Laptop
    Manufacturer/Model
    Asus TUF Gaming F16 (2024)
    CPU
    i7 13650HX
    Memory
    16GB DDR5
    Graphics Card(s)
    GeForce RTX 4060 Mobile
    Sound Card
    Eastern Electric MiniMax DAC Supreme; Emotiva UMC-200; Astell & Kern AK240
    Monitor(s) Displays
    Sony Bravia XR-55X90J
    Screen Resolution
    3840×2160
    Hard Drives
    512GB SSD internal
    37TB external
    PSU
    Li-ion
    Cooling
    2× Arc Flow Fans, 4× exhaust vents, 5× heatpipes
    Keyboard
    Logitech K800
    Mouse
    Logitech G402
    Internet Speed
    20Mbit/s up, 250Mbit/s down
    Browser
    FF
  • Operating System
    11 Home
    Computer type
    Laptop
    Manufacturer/Model
    Medion S15450
    CPU
    i5 1135G7
    Memory
    16GB DDR4
    Graphics card(s)
    Intel Iris Xe
    Sound Card
    Eastern Electric MiniMax DAC Supreme; Emotiva UMC-200; Astell & Kern AK240
    Monitor(s) Displays
    Sony Bravia XR-55X90J
    Screen Resolution
    3840×2160
    Hard Drives
    2TB SSD internal
    37TB external
    PSU
    Li-ion
    Mouse
    Logitech G402
    Keyboard
    Logitech K800
    Internet Speed
    20Mbit/s up, 250Mbit/s down
    Browser
    FF
Another excellent example was the Sky ECC app.

I don't know of any communications that hasn't be compromised by a government, except talking in person by white noise and covering your lips.

Bitlocker will stop friends and family but it's not stopping a government or pro criminal. I wouldn't trust $1 million in bitcoin to bitlocker, for sure.
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel
    CPU
    Intel(R) Core(TM) i9-14900K
    Motherboard
    GIGABYTE Z790 AORUS Elite X WIFI7
    Memory
    Corsair 128GB (4x32GB) DDR5 5600MT/S CL40 Memory Kit
    Graphics Card(s)
    Onboard
    Sound Card
    Onboard
    Monitor(s) Displays
    43 inch 4k
    Screen Resolution
    2k (2560 x 1440)
    Hard Drives
    WD_BLACK 1TB NVMe SSD with Heatsink 7300 mb/s
    PSU
    MEG Ai1300P PCIE 5 & ATX 3.0 PSU 1300 watts
    Case
    Phanteks (PH-ES614PTG_BK) Enthoo Pro ATX , Tempered Glass, Integrated RGB Lighting
    Cooling
    ENERMAX LIQMAXFLO 360mm A-RGB AIO CPU Liquid Cooler
    Keyboard
    Wireless logitech
    Mouse
    Wireless logitech
All I was asking for was proof that AES 256-bit encryption has ever been hacked. I understand that theoretically it can be hacked but never has been as it would take computer power we don't currently have. Until then, I'm confident using AES 256-bit encryption in my password manager and in BitLocker.
 

My Computer

System One

  • OS
    Windows 11 Pro
    Computer type
    Laptop
    Manufacturer/Model
    Dell XPS 16 9640
    CPU
    Intel Core Ultra 9 185H
    Memory
    32GB LPDDR5x 7467 MT/s
    Graphics Card(s)
    NVIDIA GeForce RTX 4070 8GB GDDR6
    Monitor(s) Displays
    16.3 inch 4K+ OLED Infinity Edge Touch
    Screen Resolution
    3840 x 2400
    Hard Drives
    1 Terabyte M.2 PCIe NVMe SSD
    Cooling
    Vapor Chamber Cooling
    Mouse
    None
    Internet Speed
    960 Mbps Netgear Mesh + 2 Satellites
    Browser
    Microsoft Edge (Chromium) + Bing
    Antivirus
    Microsoft Windows Security (Defender)
    Other Info
    Microsoft 365 subscription
    Microsoft OneDrive 1TB Cloud
    Microsoft Visual Studio
    Microsoft Visual Studio Code
    Microsoft PowerToys
    Macrium Reflect X subscription
    Dell Support Assist
    Dell Command | Update
    1Password Password Manager
    Amazon Kindle for PC
    Interactive Brokers Trader Workstation
    Lightroom/Photoshop subscription
    BitLocker
    CoPilot
I'm certain defeating any modern encryption would require stealing the key. So it's not the encryption that is insecure, just the user!
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 24H2 26100.2894
    Computer type
    Laptop
    Manufacturer/Model
    Acer Swift SF114-34
    CPU
    Pentium Silver N6000 1.10GHz
    Memory
    4GB
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD
    Cooling
    fanless
    Internet Speed
    150 Mbps
    Browser
    Brave
    Antivirus
    Webroot Secure Anywhere
    Other Info
    System 3

    ASUS T100TA Transformer
    Processor Intel Atom Z3740 @ 1.33GHz
    Installed RAM 2.00 GB (1.89 GB usable)
    System type 32-bit operating system, x64-based processor

    Edition Windows 10 Home
    Version 22H2 build 19045.3570
  • Operating System
    Windows 11 Pro 23H2 22631.2506
    Computer type
    Laptop
    Manufacturer/Model
    HP Mini 210-1090NR PC (bought in late 2009!)
    CPU
    Atom N450 1.66GHz
    Memory
    2GB
    Browser
    Brave
    Antivirus
    Webroot
All I was asking for was proof that AES 256-bit encryption has ever been hacked. I understand that theoretically it can be hacked but never has been as it would take computer power we don't currently have. Until then, I'm confident using AES 256-bit encryption in my password manager and in BitLocker.
you almost never go after the encryption.. a door has a lock and then you pick the lock instead of digging through a ten foot concrete wall.
 

My Computers

System One System Two

  • OS
    Linux: Debian and Kali-Linux.. Windows 2xWin8.1, 2x7Pro, Servers 1x2008R2, 1xRocky Linux
    Manufacturer/Model
    AsusX53, Aspire E1-572. AsusUX32A, HP Pro3130mt+3010mt, HP Proliant ML150G3, 3xCustom-PC, i3, i5, i7
    CPU
    i3, i5 and i7 From 2gen to 9th gen... Server dual Xenon
    Hard Drives
    Sata, SAS
  • Operating System
    Retro:1x2003server.2xXPpro, 1xWin2000, 2xWin98SE, 1xWin95, 1xWin3.11, 2xMS-DOS
    Manufacturer/Model
    Commodore, AST, Fujitsu, Compaq, etc etc. etc
    CPU
    Oldest intel 8088 up to P4 dual core
    Hard Drives
    MFM, IDE, SCSI
you almost never go after the encryption.. a door has a lock and then you pick the lock instead of digging through a ten foot concrete wall.
And that would entail going after the unencrypted data while it's currently in use. Now you're talking about basic security of the PC itself, the weakest link.
 

My Computer

System One

  • OS
    Windows 11 Pro
    Computer type
    Laptop
    Manufacturer/Model
    Dell XPS 16 9640
    CPU
    Intel Core Ultra 9 185H
    Memory
    32GB LPDDR5x 7467 MT/s
    Graphics Card(s)
    NVIDIA GeForce RTX 4070 8GB GDDR6
    Monitor(s) Displays
    16.3 inch 4K+ OLED Infinity Edge Touch
    Screen Resolution
    3840 x 2400
    Hard Drives
    1 Terabyte M.2 PCIe NVMe SSD
    Cooling
    Vapor Chamber Cooling
    Mouse
    None
    Internet Speed
    960 Mbps Netgear Mesh + 2 Satellites
    Browser
    Microsoft Edge (Chromium) + Bing
    Antivirus
    Microsoft Windows Security (Defender)
    Other Info
    Microsoft 365 subscription
    Microsoft OneDrive 1TB Cloud
    Microsoft Visual Studio
    Microsoft Visual Studio Code
    Microsoft PowerToys
    Macrium Reflect X subscription
    Dell Support Assist
    Dell Command | Update
    1Password Password Manager
    Amazon Kindle for PC
    Interactive Brokers Trader Workstation
    Lightroom/Photoshop subscription
    BitLocker
    CoPilot
And that would entail going after the unencrypted data while it's currently in use. Now you're talking about basic security of the PC itself, the weakest link.
You always go after the weakest link.. why complicate things if the goal is to obtain the data.
Hackers always go after the login credentials to get access to high security setups.. You cant hack a network with an active enterprise firewall if you are on the outside.. so you go after the person that has the login credentials with social engineering to obtain the goal(key)
 

My Computers

System One System Two

  • OS
    Linux: Debian and Kali-Linux.. Windows 2xWin8.1, 2x7Pro, Servers 1x2008R2, 1xRocky Linux
    Manufacturer/Model
    AsusX53, Aspire E1-572. AsusUX32A, HP Pro3130mt+3010mt, HP Proliant ML150G3, 3xCustom-PC, i3, i5, i7
    CPU
    i3, i5 and i7 From 2gen to 9th gen... Server dual Xenon
    Hard Drives
    Sata, SAS
  • Operating System
    Retro:1x2003server.2xXPpro, 1xWin2000, 2xWin98SE, 1xWin95, 1xWin3.11, 2xMS-DOS
    Manufacturer/Model
    Commodore, AST, Fujitsu, Compaq, etc etc. etc
    CPU
    Oldest intel 8088 up to P4 dual core
    Hard Drives
    MFM, IDE, SCSI
You always go after the weakest link.. why complicate things if the goal is to obtain the data.
Hackers always go after the login credentials to get access to high security setups.. You cant hack a network with an active enterprise firewall if you are on the outside.. so you go after the person that has the login credentials with social engineering to obtain the goal(key)
Also, the social engineering part becomes even less complicated if the unsuspecting user continues to falsely believe that the data is secure as a result of it being protected by using BitLocker with AES 256-bit encryption. In essence, the stronger the encryption algorithm, the better. For the hackers anyway...
 

My Computers

System One System Two

  • OS
    11 Home
    Computer type
    Laptop
    Manufacturer/Model
    Asus TUF Gaming F16 (2024)
    CPU
    i7 13650HX
    Memory
    16GB DDR5
    Graphics Card(s)
    GeForce RTX 4060 Mobile
    Sound Card
    Eastern Electric MiniMax DAC Supreme; Emotiva UMC-200; Astell & Kern AK240
    Monitor(s) Displays
    Sony Bravia XR-55X90J
    Screen Resolution
    3840×2160
    Hard Drives
    512GB SSD internal
    37TB external
    PSU
    Li-ion
    Cooling
    2× Arc Flow Fans, 4× exhaust vents, 5× heatpipes
    Keyboard
    Logitech K800
    Mouse
    Logitech G402
    Internet Speed
    20Mbit/s up, 250Mbit/s down
    Browser
    FF
  • Operating System
    11 Home
    Computer type
    Laptop
    Manufacturer/Model
    Medion S15450
    CPU
    i5 1135G7
    Memory
    16GB DDR4
    Graphics card(s)
    Intel Iris Xe
    Sound Card
    Eastern Electric MiniMax DAC Supreme; Emotiva UMC-200; Astell & Kern AK240
    Monitor(s) Displays
    Sony Bravia XR-55X90J
    Screen Resolution
    3840×2160
    Hard Drives
    2TB SSD internal
    37TB external
    PSU
    Li-ion
    Mouse
    Logitech G402
    Keyboard
    Logitech K800
    Internet Speed
    20Mbit/s up, 250Mbit/s down
    Browser
    FF
Also, the social engineering part becomes even less complicated if the unsuspecting user continues to falsely believe that the data is secure as a result of it being protected by using BitLocker with AES 256-bit encryption. In essence, the stronger the encryption algorithm, the better. For the hackers anyway...
we have to be careful of how much we say in here do to rule6 even we only talk about theory approaches and methods how to protect yourself against it... i have already got posts deleted.
 

My Computers

System One System Two

  • OS
    Linux: Debian and Kali-Linux.. Windows 2xWin8.1, 2x7Pro, Servers 1x2008R2, 1xRocky Linux
    Manufacturer/Model
    AsusX53, Aspire E1-572. AsusUX32A, HP Pro3130mt+3010mt, HP Proliant ML150G3, 3xCustom-PC, i3, i5, i7
    CPU
    i3, i5 and i7 From 2gen to 9th gen... Server dual Xenon
    Hard Drives
    Sata, SAS
  • Operating System
    Retro:1x2003server.2xXPpro, 1xWin2000, 2xWin98SE, 1xWin95, 1xWin3.11, 2xMS-DOS
    Manufacturer/Model
    Commodore, AST, Fujitsu, Compaq, etc etc. etc
    CPU
    Oldest intel 8088 up to P4 dual core
    Hard Drives
    MFM, IDE, SCSI
we have to be careful of how much we say in here do to rule6 even we only talk about theory approaches and methods how to protect yourself against it... i have already got posts deleted.
I am not discussing the subject of hacking someone else's computer. Rather, I am discussing the simple fact that BitLocker Drive Encryption on editions of Windows 11 that support the feature never was designed to, by itself, be adequately secure in any way, shape or form. Its purpose is for it to be used in conjunction with a whole list of additional things like Multi-Factor Authentication (MFA) or better yet: passwordless authentication, UEFI Secure Boot, TPM 2.0, Windows Trusted Boot, Windows Measured Boot, an Anti Malware remote service, Device Health Attestation (DHA), surveillance of the physical environment, chassis intrusion detection mechanisms, and whatnot.
 

My Computers

System One System Two

  • OS
    11 Home
    Computer type
    Laptop
    Manufacturer/Model
    Asus TUF Gaming F16 (2024)
    CPU
    i7 13650HX
    Memory
    16GB DDR5
    Graphics Card(s)
    GeForce RTX 4060 Mobile
    Sound Card
    Eastern Electric MiniMax DAC Supreme; Emotiva UMC-200; Astell & Kern AK240
    Monitor(s) Displays
    Sony Bravia XR-55X90J
    Screen Resolution
    3840×2160
    Hard Drives
    512GB SSD internal
    37TB external
    PSU
    Li-ion
    Cooling
    2× Arc Flow Fans, 4× exhaust vents, 5× heatpipes
    Keyboard
    Logitech K800
    Mouse
    Logitech G402
    Internet Speed
    20Mbit/s up, 250Mbit/s down
    Browser
    FF
  • Operating System
    11 Home
    Computer type
    Laptop
    Manufacturer/Model
    Medion S15450
    CPU
    i5 1135G7
    Memory
    16GB DDR4
    Graphics card(s)
    Intel Iris Xe
    Sound Card
    Eastern Electric MiniMax DAC Supreme; Emotiva UMC-200; Astell & Kern AK240
    Monitor(s) Displays
    Sony Bravia XR-55X90J
    Screen Resolution
    3840×2160
    Hard Drives
    2TB SSD internal
    37TB external
    PSU
    Li-ion
    Mouse
    Logitech G402
    Keyboard
    Logitech K800
    Internet Speed
    20Mbit/s up, 250Mbit/s down
    Browser
    FF
I am not discussing the subject of hacking someone else's computer. Rather, I am discussing the simple fact that BitLocker Drive Encryption on editions of Windows 11 that support the feature never was designed to, by itself, be adequately secure in any way, shape or form. Its purpose is for it to be used in conjunction with a whole list of additional things like Multi-Factor Authentication (MFA) or better yet: passwordless authentication, UEFI Secure Boot, TPM 2.0, Windows Trusted Boot, Windows Measured Boot, an Anti Malware remote service, Device Health Attestation (DHA), surveillance of the physical environment, chassis intrusion detection mechanisms, and whatnot.
I didn't either that time ;-)
 

My Computers

System One System Two

  • OS
    Linux: Debian and Kali-Linux.. Windows 2xWin8.1, 2x7Pro, Servers 1x2008R2, 1xRocky Linux
    Manufacturer/Model
    AsusX53, Aspire E1-572. AsusUX32A, HP Pro3130mt+3010mt, HP Proliant ML150G3, 3xCustom-PC, i3, i5, i7
    CPU
    i3, i5 and i7 From 2gen to 9th gen... Server dual Xenon
    Hard Drives
    Sata, SAS
  • Operating System
    Retro:1x2003server.2xXPpro, 1xWin2000, 2xWin98SE, 1xWin95, 1xWin3.11, 2xMS-DOS
    Manufacturer/Model
    Commodore, AST, Fujitsu, Compaq, etc etc. etc
    CPU
    Oldest intel 8088 up to P4 dual core
    Hard Drives
    MFM, IDE, SCSI
Put seed phrase for bitcoin wallet on laptop with bitlocker and say "come get it". If it's uncrackable there is nothing to fear. ;)
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel
    CPU
    Intel(R) Core(TM) i9-14900K
    Motherboard
    GIGABYTE Z790 AORUS Elite X WIFI7
    Memory
    Corsair 128GB (4x32GB) DDR5 5600MT/S CL40 Memory Kit
    Graphics Card(s)
    Onboard
    Sound Card
    Onboard
    Monitor(s) Displays
    43 inch 4k
    Screen Resolution
    2k (2560 x 1440)
    Hard Drives
    WD_BLACK 1TB NVMe SSD with Heatsink 7300 mb/s
    PSU
    MEG Ai1300P PCIE 5 & ATX 3.0 PSU 1300 watts
    Case
    Phanteks (PH-ES614PTG_BK) Enthoo Pro ATX , Tempered Glass, Integrated RGB Lighting
    Cooling
    ENERMAX LIQMAXFLO 360mm A-RGB AIO CPU Liquid Cooler
    Keyboard
    Wireless logitech
    Mouse
    Wireless logitech
Put seed phrase for bitcoin wallet on laptop with bitlocker and say "come get it". If it's uncrackable there is nothing to fear. ;)
This is not the purpose of BitLocker.

BitLocker is fully unlocked while I'm using my computer or when using my portable backup SSD drives. Only when I'm not logged in to my PC and when my portable SSD drives are not connected is BitLocker activated.

If my laptop is stolen, my laptop SSD can only be unlocked with Windows Hello biometrics or the 256-bit encryption key. If my backup portable drives are stolen, they cannot be decrypted without a password or 256-bit encryption key.

What needs to be understood is that BitLocker is protection from physical data theft and nothing more.

BitLocker is only one part of my total backup and security strategy.
 

My Computer

System One

  • OS
    Windows 11 Pro
    Computer type
    Laptop
    Manufacturer/Model
    Dell XPS 16 9640
    CPU
    Intel Core Ultra 9 185H
    Memory
    32GB LPDDR5x 7467 MT/s
    Graphics Card(s)
    NVIDIA GeForce RTX 4070 8GB GDDR6
    Monitor(s) Displays
    16.3 inch 4K+ OLED Infinity Edge Touch
    Screen Resolution
    3840 x 2400
    Hard Drives
    1 Terabyte M.2 PCIe NVMe SSD
    Cooling
    Vapor Chamber Cooling
    Mouse
    None
    Internet Speed
    960 Mbps Netgear Mesh + 2 Satellites
    Browser
    Microsoft Edge (Chromium) + Bing
    Antivirus
    Microsoft Windows Security (Defender)
    Other Info
    Microsoft 365 subscription
    Microsoft OneDrive 1TB Cloud
    Microsoft Visual Studio
    Microsoft Visual Studio Code
    Microsoft PowerToys
    Macrium Reflect X subscription
    Dell Support Assist
    Dell Command | Update
    1Password Password Manager
    Amazon Kindle for PC
    Interactive Brokers Trader Workstation
    Lightroom/Photoshop subscription
    BitLocker
    CoPilot
This is not the purpose of BitLocker.

BitLocker is fully unlocked while I'm using my computer or when using my portable backup SSD drives. Only when I'm not logged in to my PC and when my portable SSD drives are not connected is BitLocker activated.

If my laptop is stolen, my laptop SSD can only be unlocked with Windows Hello biometrics or the 256-bit encryption key. If my backup portable drives are stolen, they cannot be decrypted without a password or 256-bit encryption key.

What needs to be understood is that BitLocker is protection from physical data theft and nothing more.

BitLocker is only one part of my total backup and security strategy.

Of course if laptop is running then it's even easier. I'm describing a travel situation, where you set your device down for a moment then it's gone.

So to test the security, put bitcoin on a laptop, power it down, then publicly announce there is bitcoin on the laptop. If no one can break bitlocker then you cannot lose your bitcoin and you're only out the cost of the laptop in exchange for knowing that bitlocker is indeed secure.
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel
    CPU
    Intel(R) Core(TM) i9-14900K
    Motherboard
    GIGABYTE Z790 AORUS Elite X WIFI7
    Memory
    Corsair 128GB (4x32GB) DDR5 5600MT/S CL40 Memory Kit
    Graphics Card(s)
    Onboard
    Sound Card
    Onboard
    Monitor(s) Displays
    43 inch 4k
    Screen Resolution
    2k (2560 x 1440)
    Hard Drives
    WD_BLACK 1TB NVMe SSD with Heatsink 7300 mb/s
    PSU
    MEG Ai1300P PCIE 5 & ATX 3.0 PSU 1300 watts
    Case
    Phanteks (PH-ES614PTG_BK) Enthoo Pro ATX , Tempered Glass, Integrated RGB Lighting
    Cooling
    ENERMAX LIQMAXFLO 360mm A-RGB AIO CPU Liquid Cooler
    Keyboard
    Wireless logitech
    Mouse
    Wireless logitech
This is not the purpose of BitLocker.

BitLocker is fully unlocked while I'm using my computer or when using my portable backup SSD drives. Only when I'm not logged in to my PC and when my portable SSD drives are not connected is BitLocker activated.

If my laptop is stolen, my laptop SSD can only be unlocked with Windows Hello biometrics or the 256-bit encryption key. If my backup portable drives are stolen, they cannot be decrypted without a password or 256-bit encryption key.

What needs to be understood is that BitLocker is protection from physical data theft and nothing more.

BitLocker is only one part of my total backup and security strategy.
This is the problem if they steal the computer.
 

My Computers

System One System Two

  • OS
    Linux: Debian and Kali-Linux.. Windows 2xWin8.1, 2x7Pro, Servers 1x2008R2, 1xRocky Linux
    Manufacturer/Model
    AsusX53, Aspire E1-572. AsusUX32A, HP Pro3130mt+3010mt, HP Proliant ML150G3, 3xCustom-PC, i3, i5, i7
    CPU
    i3, i5 and i7 From 2gen to 9th gen... Server dual Xenon
    Hard Drives
    Sata, SAS
  • Operating System
    Retro:1x2003server.2xXPpro, 1xWin2000, 2xWin98SE, 1xWin95, 1xWin3.11, 2xMS-DOS
    Manufacturer/Model
    Commodore, AST, Fujitsu, Compaq, etc etc. etc
    CPU
    Oldest intel 8088 up to P4 dual core
    Hard Drives
    MFM, IDE, SCSI

My Computer

System One

  • OS
    Windows 10
    Computer type
    Laptop
    Manufacturer/Model
    HP
    CPU
    Intel(R) Core(TM) i7-4800MQ CPU @ 2.70GHz
    Motherboard
    Product : 190A Version : KBC Version 94.56
    Memory
    16 GB Total: Manufacturer : Samsung MemoryType : DDR3 FormFactor : SODIMM Capacity : 8GB Speed : 1600
    Graphics Card(s)
    NVIDIA Quadro K3100M; Intel(R) HD Graphics 4600
    Sound Card
    IDT High Definition Audio CODEC; PNP Device ID HDAUDIO\FUNC_01&VEN_111D&DEV_76E0
    Hard Drives
    Model Hitachi HTS727575A9E364
    Antivirus
    Microsoft Defender
    Other Info
    Mobile Workstation

Latest Support Threads

Back
Top Bottom