Today i took my first steps into the world of Linux by creating a bookable Mint Cinamon USB stick to fuck around on without wiping or portioning my laptop drive.
I realised windows has the biggest vulnerability for the average user.
While booting off of the usb I could access all the data on my laptop without having to input a password.
After some research it appears drives need to be encrypted to prevent this, so how is this not the default case in Windows?
I’m sure there are people aware but for the laymen this is such a massive vulnerability.
Modern windows machines will be installed with bitlocker (full disk encryption). With manual installs it might not be.
I have a Windows 11 work laptop, I might try it out and see what happens
I’m happy that you’re on a journey of discovery. This is not an insult. The word is partition. Someone corrected me on the spelling of something last night. We all make mistakes.
(especially with reference to a country with separate areas of government) the action or state of dividing or being divided into parts.
It’s the same situation with Linux just a simple login only has very basic protection you need to encrypt your disk if you want to make sure no one can read it.
bookable Mint Cinamon USB stick
Does book still mean cool?
No idea, it’s meant to be bootable
This is a case where Windows-bashing is hypocritical. Almost no Linux distro has disk encryption turned on by default (PopOS being the major exception).
It’s dumb and inexcusable IMO. Whatever the out-of-touch techies around here seem to think, normies do not have lumbering desktop computers any more. They have have mobile devices - at best laptops, mostly not even that.
If an unencrypted computer is now unacceptable on Android, then it should be on Linux too. No excuses.
It’s dumb and inexcusable IMO
No, it’s a choice, because:
-
History… encryption didn’t exist in the beginning. Upgrades won’t enable it.
-
Recovery… try telling the people that didn’t backup the encryption key - outside of the encrypted vault - that their data’s gone.
-
Performance… not such an issue these days, but it does slow your system down (and then everyone complains)
So, please continue to encrypt your data as you choose and be less judgemental on others, esp. anyone new
No excuses.
You can’t enable encryption after the fact? What a backwards system…
I will definitely say I wish encryption setup was a lot easier in Linux. Windows is like “wanna Bitlocker?” Done.
With most Linux installers, if you’re not installing in a very default way, and clicking that box to encrypt the drive, it’s time to go seriously digging. For a while.
I managed to encrypt a secondary drive with the same password on my EndeavourOS laptop, but I still need to enter the same password 2 times before getting into the OS.
I consider that a feat, and I’m not touching it for fear of losing everything lol.
Blah blah blah. Unencrypted data is the wrong default in 2025 for any OS. Linux should not be a poor man’s OS.
-
Almost no Linux distro has disk encryption turned on by default (PopOS being the major exception).
it’s usually an option in the guided disk partition
If an unencrypted computer is now unacceptable on Android, then it should be on Linux too. No excuses.
Linux is about choice, not whatever someone else thinks it’s acceptable
Echoing Jubilant Jaguar’s sentiment about defaults mattering, I think that sometimes an excess amount of choice can be overwhelming such that a user is less empowered to make choices about things they do care about (Leading to a less steep learning curve). Sensible defaults need not remove anyone’s choice
I don’t disagree with the premise. I may disagree encrypted hard drive by default a sensible choice
Sure. But defaults are important.
If an unencrypted computer is now unacceptable on Android, then it should be on Linux too. No excuses.
When is the last time you carried your desktop outside? Forgot it somewhere?
I always turn on LUKS during install. The only exceptions are when I’m doing tests of different distros on my machine that I lovingly call “FuckAround”.
It really is the best way to find out.
Anon discovers computers
By the way, no different for Linux, if you boot off of USB you can mount partitions and access anything if not encrypted and linux windows, encryption is not the default.
Windows does support encrypted drives with Bitlocker, unfortunately Bitlocker’s default settings leave it vulnerable to many different attacks.
And this is why we say physical access is root access.
Absolutely it’s crazy that it’s so simple that you can do it in the space of 5v minutes.
You should look into HDD platter recovery. There’s some really high quality stuff on YouTube.
Aw buddy.
Go look at the free software called autopsy
Same in Linux. No disk encryption and everything is easy accessible if you have physical access.
Unless someone ticked the “encrypt storage”-box in the installer, you don’t even have to pay for Pro to use it!
Physical access wouldn’t seem so hard. Say you worked at the company company and wanted to get the files your boss has on your evaluation or something. Wait till they’re on lunch, plug in a usb and pull them up.
I imagine patient records wouldn’t be encrypted either
such a “hack” would only work in a poorly written tv show
an unencrypted drive is like being able to look into a bank though a window, not ideal but things of value could/should/would still be in a safe or somewhere else completely
I imagine patient records wouldn’t be encrypted either
If computerised, they freaking well should be.
In general they’d be in a database with it’s own accesss control to interfaces and the databases data store should be encrypted. In my country there are standards for all healthcare IT systems that would include encryption and secure message exchange between systems. If they breached those they’d be in trouble.
If your doctor has a paper file in a filing cabinet on premises, written in English, then yes. The security is only the physical locks, just like your hme pc.
Any respectable company with Windows would be using BitLocker - full disk encryption. It’s super easy to setup if your computer has TPM, fully transparent for the user in most cases.
My work macbook won’t even let me mount an external storage device, but it doesn’t seem to care about my nextcloud client running in the background. Sorry for my blasphemous behaviour my cyber security comrades 🫡🥺
That’s why you can’t just boot from an usb
While booting off of the usb I could access all the data on my laptop without having to input a password.
This is entirely expected behavior. You didn’t encrypt your drive, so of course that data is available if you sidestep windows login protections. Check out Bitlocker for drive encryption.
I thought BitLocker was enabled by default on Windows 11, which is a terrible idea imo. Full disk encryption by default makes sense in professional settings, but not for the average users who have no clue that they’ll lose all their data if they lose the key. If I had a penny for every Windows user who didn’t understand the BitLocker message and saved the key on their encrypted drive, I’d have a lot of pennies. At the very least it should be prompted to give the user a choice.
Windows does not let you save the key to the drive being encrypted. (Unless you access it via SMB share, which I’ve done a number of times during setup before moving it off.)
You mean it prevents people from writing the key on a piece of paper when they get the BitLocker message, then copy it on a text file once their session is running and throw the paper away or lose it later ?
This is true - it is enabled by default in win11. I disagree with you it being a terrible idea - imagine all the sentistive data people put on their hard drives - would they want to to fall in the wrong hands if they lose their computer? Or if their hard drives fails so they can do a secure wipe?
I’m not a fan of Microsoft, but they did solve the key issue in the enterprise setting by storing the key in they entrance identity. Same should be done for home consumers, since having a Microsoft account is being shoved in everyone’s throat anyway…
Yeah, should be noted that bitlocker is only default enabled if you set windows up with a Microsoft account, since it then saves the recovery info on that account “in the cloud”.
If you set it up with a local account, you still need to enable it manually, so that you can save the recovery info somewhere else.
Yup. You’ll need to tkinker with Linux too if you want disk encryption. At the very least, set a BIOS password.
A secure future proof Whenblows 11 is akin to a healthy wealthy fentynal addict.
Yeh. But also this allowed me to save my files from my dying windows drive while moving to linux, so sometimes giant security holes can be handy.