• Mwa@thelemmy.club
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 minutes ago

    AFAIK Microsoft gave the keys for Bitlocker to goverments before,So Classic Microsoft.

    • Mwa@thelemmy.club
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      6 minutes ago

      ig “Proprietary software is often malware” is kinda not a exaggeration.

  • Aceticon@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    46
    arrow-down
    4
    ·
    5 hours ago

    If you’re running Windows, always assume that if the US Authorities or Microsoft itself want to spy on you as an individual or on do a little industrial espionage on your company (which US agencies also do), they’ll just use a backdoor already present or at worse push an update to your machines(s) to create said backdoor.

    Treat any and all software made by US companies as a foreign agent.

    All the shit that the US Government and companies say about China, is pure Projection - the result of a mental process of “what would we do if we were the ones making those devices”. (And, yeah, China probably does that shit too)

    If it ain’t Open Source, you got it as a binary or it can self-update, that software is somebody else’s agent and you’re trusting their ethics and goodwill when you have it running in your system outside a sandbox.

    • ShankShill@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      7
      ·
      3 hours ago

      I was pumped to finally get decent Internet in the US, until I saw my ISP’s router appears as a device on the LAN. Luckily I’m savvy enough to put the whole local network behind a firewall on a different subnet, since there’s no other way of fixing this.

      • lightnsfw@reddthat.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        23 minutes ago

        Same. My housemates called the ISP for support once when they couldn’t wait literally 15 minutes for me to check out why their Internet was down (router just needed a restart) and the first thing out of the ISP dudes mouth was “with the way your network is configured I can’t see anything on your side” (which yeah, that’s the fucking point) he was in the middle of walking them through resetting the ISP router back to defaults when I arrived and put a stop to it. Why the fact that he was able to connect to their endpoint wasn’t sufficient to indicate to them that the Internet connection was not the issue I do not know.

      • youmaynotknow@lemmy.zip
        link
        fedilink
        English
        arrow-up
        7
        ·
        3 hours ago

        It’s not just US ISPs, this is worldwide behavior. Good on you to put a firewall between your network and your ISP’s gateway.

        I don’t know if you went further than that, but in my case, once I had my OPNSense deployed, I went ahead and disabled all the radios of the ISP’s ONT gateway, changed it’s DNS server to Mullvad, and only left 1 LAN IP address to the OPNSense.

        If you are aware of more things that can be done to give the ISP modem even less room to move around inside, I would appreciate you sharing it as well.

        I wish more people would take the time to learn a bit about securing their home networks. What I do is that I offer my knowledge for free to neighbors, friends and family. Some actually want it and act on it, but the sad truth is that the vast majority still has this ‘I have nothing to hide’ mentality, and I’m not explaining how much marketing BS that is to them for the 100th time.

        • Hathaway@lemmy.zip
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 hours ago

          As someone with a basic background in IT, nothing advanced, but enough to be the “family tech guy”, I just bought my router(mesh network) what can I do? Where do I start? I think I may have messed up with my brand choice, being EERO, as they seem to have things locked into their proprietary app. I was sorta desperate for a quick fix at the time, didn’t do the due diligence I should have.

          Edit: preemptive thank you if you take the time to reply. As I am not “friends or family to you”. I do appreciate the expertise!

          • oozynozh@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            55 minutes ago

            i’m sure that’s a fine setup for the average home user but devices that use proprietary firmware like that aren’t conducive to a security-first design where you hold all the keys. because it’s designed to be secure, even from you, it always has an asterisk on it (network is secure* according to eero). that and you have no way of verifying what data it’s phoning home (and a lot of devices soft brick themselves if you cut their connection to the cloud).

            the most useful advice i can generally offer is to add a proper network security device running pfSense or OpenWRT to seize some control over internet access and DNS resolution and to implement VLAN segmentation to keep trusted devices secure from trusted* and untrusted devices.

        • AlfredoJohn@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 hour ago

          Just adding if you have any resources about how to go about this i would more than appreciate any nuggets you can share. I have a some networking background from college but its been about a decade since I used any of it so any help to point me in the right direction of hardening my network like this would be extremely appreciated. Thanks!

  • an0nym0us_dr0ne@europe.pub
    link
    fedilink
    English
    arrow-up
    20
    ·
    5 hours ago

    No Shit Sherlock. Not as if it would be required by US law to have a backdoor or anything…

    No no, PatriotACT, CloudACT and stuff like PRISM just do not exist…

  • saykee@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 hours ago

    So glad I switched to proton and so glad my previous workplace uses BitLocker 🙌🏻

    • Alaknár@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      29
      ·
      6 hours ago

      Copy Fail, Dirty Frag and Fragnesia exist. What are you going to switch to now?

      • youmaynotknow@lemmy.zip
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        1
        ·
        3 hours ago

        Those are ‘vulnerabilities’ being exploited, and software will always have those, and when found, in Linux, they are patched, rather quickly in some cases. Microsoft develops Windows with the intention of making it vulnerable, so it is effectively commercial malware.

        Those are 2 entirely different things.

        • Alaknár@sopuli.xyz
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          2 hours ago

          Microsoft develops Windows with the intention of making it vulnerable, so it is effectively commercial malware

          The intention is currently suggested by a disgruntled ex-employee. I’d say that warrants caution before making such broad statements.

      • azuth@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        33
        arrow-down
        1
        ·
        6 hours ago

        They will be patched. There is also no indication that they 'be been known and exploited till recently.

        This was allegedly deliberately non patched to be exploited.

        Getting a system without bugs and security issues is impossible, you can at least avoid intentional compromise.

        • Alaknár@sopuli.xyz
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          9
          ·
          5 hours ago

          They will be patched. There is also no indication that they 'be been known and exploited till recently.

          Two of the three are being used in the wild, with Copy Fail being retroactively found at least 9 days before the disclosure.

          What are the indications that the BitLocker vulnerability is already being utilised?

          This was allegedly deliberately non patched to be exploited.

          Alleged by a guy who was fired from Microsoft. I’d take that with a pinch of salt.

          Getting a system without bugs and security issues is impossible, you can at least avoid intentional compromise.

          I agree! But other than one angry dude, not much else is pointing towards this being intentional - so far! Let’s see how things go.

          That being said, open source repos are being attacked constantly with attempts at intentional malicious code injection - I’m sure you’ve heard of XZ Utils? How many others went through and are being exploited without anyone noticing?

          • youmaynotknow@lemmy.zip
            link
            fedilink
            English
            arrow-up
            7
            arrow-down
            1
            ·
            3 hours ago

            Dude, enjoy your Windows then. This is not Twitter (or X or whatever) where you can go do your master’s bidding of creating noise to try and control the normies. Here most of us know how to do research and have the ability to differentiate bots (human or otherwise) from actual thinking individuals with a modicum of common sense and more than 2 functioning brain cells.

            Look at your down-votes and take a hint. That bullshit has no effect here.

            • Alaknár@sopuli.xyz
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              2
              ·
              2 hours ago

              Dude, enjoy your Windows then.

              Well, I’m a Linux user so I can’t.

              This is not Twitter (or X or whatever) where you can go do your master’s bidding of creating noise to try and control the normies

              Of course you can! Just like on every other social media! What are you even talking about? :D

              Here most of us know how to do research and have the ability to differentiate bots (human or otherwise) from actual thinking individuals with a modicum of common sense and more than 2 functioning brain cells.

              You’d think that, but if you actually know a bit about tech, this community is hilariously ignorant most of the time - on all the matters you mentioned. :D

              Look at your down-votes and take a hint. That bullshit has no effect here.

              The hint is that this community is extremely aggressive towards language that goes against the hive-mind. The bullshit has no effect because people can’t differentiate what’s bullshit and what isn’t, so they just automatically assume any statement that isn’t violently anti-MS is bullshit spewed by bots at their master’s bidding.

              Take your comment as example…

      • michaelmrose@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        6 hours ago

        Those are potential vulnerabilities that can be patched. This is an indication that MS intends for bitlocker which you really need to be secure to bother using windows on a laptop to never be secure by design.

        • Alaknár@sopuli.xyz
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          4
          ·
          5 hours ago

          Those are potential vulnerabilities that can be patched

          “Potential”? They are actively being exploited. And they don’t require physical access to the device.

          • wendigolibre@lemmy.zip
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            1
            ·
            2 hours ago

            They dont require physical access, but they require access to a non-root account on the machine. How often do you create accounts on your local machine for malicious actors to use?

            When you do a new OS install, do you create a separate user account for guests and then share the login details with random people?

            • Alaknár@sopuli.xyz
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              1
              ·
              2 hours ago

              Right, because it’s impossible to get a person’s credentials in this day and age.

      • 87Six@lemmy.zip
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        2
        ·
        6 hours ago

        I always wonder whether to block people like you.

        Sometimes I see your comments and get angry at how stupid you are.

        Other times I see your comments and become really aware of how intelligent I am compared to… whatever the hell you are.

        • Alaknár@sopuli.xyz
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          6
          ·
          5 hours ago

          I mean, if you have nothing of value to say, why even make a comment? Just block me and move on, mate.

          Or, I don’t know, engage and tell say why you think this comment was stupid?

          • youmaynotknow@lemmy.zip
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            2 hours ago

            I’ll gladly take over. The statement is stupid because it is already well known across the board that Microsoft is, by all intents and purposes, a malware developer. The Linux kernel on the other hand, and therefore Linux distros (most of them anyway), by being open source, at least give you the ability to look at the code and see if something IA broken, assuming you have the knowledge and the will, evidently.

            Now, blocking you when you’re evidently on Lemmy to spread misinformation, be it of your own will or because you were planted (irrelevant) would be a disservice to people that come in here to interact in ways that may help them escape the grasp big tech and governments currently have on them.

            This is not Twitter (or X) where most people just follow the “normy” trends. In here most of us are all too aware of moat of the truth out there, and keep digging ro help each other have the best life we can in these technologically dark times.

            So, if you don’t want your easily disproven bullshit comments countered and being downvoted to the point that people will just scroll past your shit, you’re going ro have ro block us. Otherwise, keep them coming, any of us will knock down your sheep-like pushes with sound logic and facts each and every time. Of course, if your comments are accurate, they will be upvoted as well. Cause and effect, you know?

            • Alaknár@sopuli.xyz
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              1
              ·
              1 hour ago

              The statement is stupid because it is already well known across the board that Microsoft is, by all intents and purposes, a malware developer

              Hahahahahaha, and you call my comments “stupid”? XD

              OK, I’m not even reading the rest, mate. I get it! I really do - “Microsoft bad!”, that’s all there is to it for you. There’s no discussion to be had here, unless someone is also a member of the cult, and then everyone can chant “Microsoft bad! Microsoft bad!”.

              Weak sauce, mate. Cheers!

          • youmaynotknow@lemmy.zip
            link
            fedilink
            English
            arrow-up
            2
            ·
            3 hours ago

            How many more people need to tell you exactly why your comments are ‘stupid’? I also think your comments are stupid, but more than that, I think you’re planted here to throw dirt on open source software in an attempt to lead people to big tech (which is a waste of time on your part).

            Like my fellow Lemmy smart users here, your comments also piss me off, just a bit, but there’s going ro be some people here that are looking for reasons and ways to get away from MS, Google, Apple and all other bullshit malware and spyware corporations, and I want to be able to counter bullshit like yours by clarifying how wrong those are and why, so blocking you is not the beat course of action for me. You are, however, welcome to block me, and I will stop following your ill-intended comments to counter them then.

            • Alaknár@sopuli.xyz
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              1 hour ago

              I think you’re planted here to throw dirt on open source software

              You have no idea how hilarious this sounds aimed at a Linux user. :D

              But I learned to expect nothing else from this community! :D

              Like my fellow Lemmy smart users here

              XD

  • Deebster@infosec.pub
    link
    fedilink
    English
    arrow-up
    59
    ·
    14 hours ago

    This Chaotic Eclipse/Nightmare Eclipse is the same one whose opening post read:

    I never wanted to reopen a blog and a new github account to drop code…

    But someone violated our agreement and left me homeless with nothing. They knew this will happen and they still stabbed me in the back anyways, this is their decision not mine.

    I’m guessing there’s plenty more to come.

    Kinda funny that they’re targeting Microsoft and yet using GitHub to share the PoCs.

    • muusemuuse@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      25
      arrow-down
      1
      ·
      12 hours ago

      It really isn’t. The encryption itself still hasn’t been defeated. The implementation is the problem. Microsoft just can’t get out of their own way. If they ignored all the business majors, nobody would be able to stop them.

      • 0x0@infosec.pub
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        9
        ·
        11 hours ago

        Lol, if they ignored that they would have gone extinct in the 90’s

  • hperrin@lemmy.ca
    link
    fedilink
    English
    arrow-up
    52
    arrow-down
    1
    ·
    17 hours ago

    Of course they did. They have no interest in protecting your privacy and every interest in making you think they do. I would’ve been way more surprised to learn there wasn’t a backdoor.

    • smeenz@lemmy.nz
      link
      fedilink
      English
      arrow-up
      13
      ·
      11 hours ago

      I’m left puzzed as to how this works …like… the data on the disk should be encrypted sector by sector…it takes forever to encrypt or decrypt a disk which is consistent with that understanding.

      When you boot into PE, I don’t understand how that OS can read anything off the disk, yellowkey or not, without knowing the encryption key…so how does it get that key. Is the vulnerability here that the key is stored in the TPM and win PE can be convinced to retrieve it without the proper credentials being provided ?

      If that’s the case, and the TPM can just provide the key on request…then… where is the security here ?

      • hperrin@lemmy.ca
        link
        fedilink
        English
        arrow-up
        9
        ·
        10 hours ago

        My guess is that the key to decrypt the disk is stored on the disk, encrypted by a Microsoft-known key. This seems to unlock that copy of the key rather than the copy encrypted by your own key.

        Though he did say to put the disk back in the original system in part of the instructions, so it might be TPM based. The way to check would be to try this on a system with a disk from another system, or with a wiped TPM.

        TPM is not security, it’s security theatre. If you don’t need to type a password in or insert a device with a key on it during boot, then it’s not secure, period.

  • DeathsEmbrace@lemmy.world
    link
    fedilink
    English
    arrow-up
    100
    arrow-down
    4
    ·
    20 hours ago

    The entire Microsoft, Apple and Google ecosystem is USA backdoors. That’s why I call it American spyware.

  • Miller@lemmy.world
    link
    fedilink
    English
    arrow-up
    179
    arrow-down
    6
    ·
    22 hours ago

    You mean that thing everyone knew about since the authorities derailed open-source TrueCrypt and forced them to message their users that they should migrate to BitLocker?

    • WesternInfidels@feddit.online
      link
      fedilink
      English
      arrow-up
      93
      arrow-down
      3
      ·
      edit-2
      22 hours ago

      There’s an open-source successor to TrueCrypt called VeraCrypt. For that matter, as far as I know, one can still download the last version of TrueCrypt. It hasn’t been disappeared.

      It’s true that the TrueCrypt developers retired and said that commercial packages like BitLocker were finally good enough and available enough that they didn’t feel compelled to maintain TrueCrypt. I remember that. I think it’s plausible that Microsoft has (or has provided to someone) back-door access to BitLocker, but I don’t remember any hint that the TrueCrypt developers had been coerced; have you got something you can link to?

      • Miller@lemmy.world
        link
        fedilink
        English
        arrow-up
        39
        arrow-down
        3
        ·
        21 hours ago

        Certainly at the time there was talk of coercion, there was talk the developers had been asked to put in a backdoor, had refused and then been encouraged to cease and desist their work on TrueCrypt and provide written recommendation of BitLocker, the wording of which did not seem to be their own. But people like conspiracies, maybe the authors did just move on, and if that was encouraged it probably was not as sinister as suggested. Security and privacy will always be duking it out.

        • tomiant@piefed.social
          link
          fedilink
          English
          arrow-up
          25
          arrow-down
          3
          ·
          edit-2
          20 hours ago

          But people like conspiracies,

          In spite of the fact that they never happen and that government mass surveillance isn’t a thing and hasn’t been exposed repeatedly for decades and that we all know they have not been aiming to do this exact thing for the better part of a century and that they are genuinely evil and literally never prove themselves to be over and over and over.

          • Miller@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            4 hours ago

            There is that, but in a more general sense I think people like conspiracies because they have a deep need to believe that there is an intelligent direction to human affairs, even if it is malign, and that the world is not actually chaotic and uncontrolled at the largest scale. It stems I suppose from infancy when even while we pushed at them we needed to know the unfathomable rules our parents set came from a better understanding of things than was available to us.

      • Creat@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        7
        ·
        17 hours ago

        These days, if you’re not on Windows you can use luks or just zfs with encryption enabled. Code is open and can be audited by anyone. But yes, VeraCrypt to my knowledge is also still a viable option.