Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

Base 8 is just like base 10, if you are missing two fingers. -- Tom Lehrer


computers / alt.windows7.general / Re: Totally bullshit subject - Microsoft does not manufacture TPMs. Re: How To Get Into A BitLocker-encrypted Computer

SubjectAuthor
* How To Get Into A BitLocker-encrypted Computerharry
+* Re: How To Get Into A BitLocker-encrypted ComputerJohn Doe
|+- Re: How To Get Into A BitLocker-encrypted ComputerAnonymous Remailer (austria)
|`- Re: How To Get Into A BitLocker-encrypted Computer-= Hawk =-
+* Re: How To Get Into A BitLocker-encrypted ComputerSilverSlimer
|`* Re: How To Get Into A BitLocker-encrypted Computerharry
| `- Re: How To Get Into A BitLocker-encrypted ComputerSilverSlimer
+- Re: How To Get Into A BitLocker-encrypted ComputerPaul
`- Re: Totally bullshit subject - Microsoft does not manufacture TPMs. Re: How To G<anon

1
How To Get Into A BitLocker-encrypted Computer

<3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2245&group=alt.windows7.general#2245

  copy link   Newsgroups: alt.comp.os.windows-10 alt.windows7.general alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: harry@right.here.com
Newsgroups: alt.comp.os.windows-10,alt.windows7.general,alt.privacy.anon-server
Subject: How To Get Into A BitLocker-encrypted Computer
Date: Fri, 20 Aug 2021 19:53:58 -0500
Organization: A noiseless patient Spider
Lines: 25
Message-ID: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="15a708afe1c4d073423e58463c883234";
logging-data="29413"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+Fbqc13j529hQHRKXBJXzb"
Cancel-Lock: sha1:3bKuZw2GjDhuW1DGOeErl5HIx1Q=
X-No-Archive: yes
X-Newsreader: Forte Agent 1.93/32.576 English (American)
 by: harry@right.here.com - Sat, 21 Aug 2021 00:53 UTC

Found this on the Bruce Schneier site.

https://www.schneier.com/crypto-gram/archives/2021/0815.html#cg17

Defeating Microsoft’s Trusted Platform Module

[2021.08.09] This is a really interesting story explaining how to
defeat Microsoft’s TPM in 30 minutes — without having to solder
anything to the motherboard.
Researchers at the security consultancy Dolos Group, hired to test the
security of one client’s network, received a new Lenovo computer
preconfigured to use the standard security stack for the organization.
They received no test credentials, configuration details, or other
information about the machine.

They were not only able to get into the BitLocker-encrypted computer,
but then use the computer to get into the corporate network.

It’s the “evil maid attack.” It requires physical access to your
computer, but you leave it in your hotel room all the time when you go
out to dinner.

Original post here:
https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network

Re: How To Get Into A BitLocker-encrypted Computer

<sfplv7$aum$1@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2246&group=alt.windows7.general#2246

  copy link   Newsgroups: alt.comp.os.windows-10 alt.windows7.general alt.privacy.anon-server free.spam
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: always.look@message.header (John Doe)
Newsgroups: alt.comp.os.windows-10,alt.windows7.general,alt.privacy.anon-server,free.spam
Subject: Re: How To Get Into A BitLocker-encrypted Computer
Date: Sat, 21 Aug 2021 01:47:19 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 50
Message-ID: <sfplv7$aum$1@dont-email.me>
References: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>
Injection-Date: Sat, 21 Aug 2021 01:47:19 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="b13c3643d3b3affe94aa1a19f6e5d94b";
logging-data="11222"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18rGnELx2wIlf3oUap8ipQdIVB73ek1tO0="
User-Agent: Xnews/2006.08.05
Cancel-Lock: sha1:j8/HUeVVfVHsx2S7wHFfRdztY+E=
 by: John Doe - Sat, 21 Aug 2021 01:47 UTC

First post under this ID, no archive...

--
harry@right.here.com wrote:

> Path: eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
> From: harry@right.here.com
> Newsgroups: alt.comp.os.windows-10,alt.windows7.general,alt.privacy.anon-server
> Subject: How To Get Into A BitLocker-encrypted Computer
> Date: Fri, 20 Aug 2021 19:53:58 -0500
> Organization: A noiseless patient Spider
> Lines: 25
> Message-ID: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>
> Mime-Version: 1.0
> Content-Type: text/plain; charset=utf-8
> Content-Transfer-Encoding: 8bit
> Injection-Info: reader02.eternal-september.org; posting-host="15a708afe1c4d073423e58463c883234"; logging-data="29413"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+Fbqc13j529hQHRKXBJXzb"
> Cancel-Lock: sha1:3bKuZw2GjDhuW1DGOeErl5HIx1Q=
> X-No-Archive: yes
> X-Newsreader: Forte Agent 1.93/32.576 English (American)
> Xref: reader02.eternal-september.org alt.comp.os.windows-10:151790 alt.windows7.general:195549 alt.privacy.anon-server:82373
>
> Found this on the Bruce Schneier site.
>
> https://www.schneier.com/crypto-gram/archives/2021/0815.html#cg17
>
> Defeating Microsoft� Ts Trusted Platform Module
>
> [2021.08.09] This is a really interesting story explaining how to
> defeat Microsoft� Ts TPM in 30 minutes � " without having to solder
> anything to the motherboard.
> Researchers at the security consultancy Dolos Group, hired to test the
> security of one client� Ts network, received a new Lenovo computer
> preconfigured to use the standard security stack for the organization.
> They received no test credentials, configuration details, or other
> information about the machine.
>
> They were not only able to get into the BitLocker-encrypted computer,
> but then use the computer to get into the corporate network.
>
> It� Ts the � oevil maid attack.� It requires physical access to your
> computer, but you leave it in your hotel room all the time when you go
> out to dinner.
>
> Original post here:
> https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network
>
>
>

Re: How To Get Into A BitLocker-encrypted Computer

<v%YTI.7155$vA6.1580@fx23.iad>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2247&group=alt.windows7.general#2247

  copy link   Newsgroups: alt.comp.os.windows-10 alt.windows7.general alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!news-out.netnews.com!news.alt.net!fdc2.netnews.com!peer02.ams1!peer.ams1.xlned.com!news.xlned.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx23.iad.POSTED!not-for-mail
Subject: Re: How To Get Into A BitLocker-encrypted Computer
Newsgroups: alt.comp.os.windows-10,alt.windows7.general,alt.privacy.anon-server
References: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>
From: silver@slim.er (SilverSlimer)
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101
Thunderbird/78.13.0
MIME-Version: 1.0
In-Reply-To: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Lines: 35
Message-ID: <v%YTI.7155$vA6.1580@fx23.iad>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Sat, 21 Aug 2021 01:52:27 UTC
Organization: blocknews - www.blocknews.net
Date: Fri, 20 Aug 2021 21:52:28 -0400
X-Received-Bytes: 2316
 by: SilverSlimer - Sat, 21 Aug 2021 01:52 UTC

On 2021-08-20 8:53 p.m., harry@right.here.com wrote:
> Found this on the Bruce Schneier site.
>
> https://www.schneier.com/crypto-gram/archives/2021/0815.html#cg17
>
> Defeating Microsoft’s Trusted Platform Module
>
> [2021.08.09] This is a really interesting story explaining how to
> defeat Microsoft’s TPM in 30 minutes — without having to solder
> anything to the motherboard.
> Researchers at the security consultancy Dolos Group, hired to test the
> security of one client’s network, received a new Lenovo computer
> preconfigured to use the standard security stack for the organization.
> They received no test credentials, configuration details, or other
> information about the machine.
>
> They were not only able to get into the BitLocker-encrypted computer,
> but then use the computer to get into the corporate network.
>
> It’s the “evil maid attack.” It requires physical access to your
> computer, but you leave it in your hotel room all the time when you go
> out to dinner.
>
> Original post here:
> https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network

Ridiculously interesting. Of course, with physical access to the
hardware being considered, there is no amount of security that is likely
to protect you. I can only hope that the security is sufficient for
remote attacks.

--
SilverSlimer
@silverslimer

Re: How To Get Into A BitLocker-encrypted Computer

<j6n0ig57bn5jevos5601vdnuvsclajlvit@4ax.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2248&group=alt.windows7.general#2248

  copy link   Newsgroups: alt.comp.os.windows-10 alt.windows7.general alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: harry@right.here.com
Newsgroups: alt.comp.os.windows-10,alt.windows7.general,alt.privacy.anon-server
Subject: Re: How To Get Into A BitLocker-encrypted Computer
Date: Fri, 20 Aug 2021 20:59:15 -0500
Organization: A noiseless patient Spider
Lines: 30
Message-ID: <j6n0ig57bn5jevos5601vdnuvsclajlvit@4ax.com>
References: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com> <v%YTI.7155$vA6.1580@fx23.iad>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="15a708afe1c4d073423e58463c883234";
logging-data="32586"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/B0AsSo5EufO7XEKkzFdKD"
Cancel-Lock: sha1:OvvDazE/fGkntKjG5MdVf91ndIw=
X-No-Archive: yes
X-Newsreader: Forte Agent 1.93/32.576 English (American)
 by: harry@right.here.com - Sat, 21 Aug 2021 01:59 UTC

On Fri, 20 Aug 2021 21:52:28 -0400, SilverSlimer <silver@slim.er>
wrote:

>On 2021-08-20 8:53 p.m., harry@right.here.com wrote:
>> Found this on the Bruce Schneier site.
>>
>> https://www.schneier.com/crypto-gram/archives/2021/0815.html#cg17
>>
>> Defeating Microsoft’s Trusted Platform Module

>>
>> Original post here:
>> https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network
>
>Ridiculously interesting. Of course, with physical access to the
>hardware being considered, there is no amount of security that is likely
>to protect you. I can only hope that the security is sufficient for
>remote attacks.

Having their hands of various comps through the years which were
encrypted with TrueCrypt or PGP didn't help the gov't crack them.
They went to court a number of times trying to force the owner to give
up the password/key/passphrase.

I remember one time when the owner's ex-husband ratted out the
ex-wife's password or whatever. How mean was that?

Of course, you better damn well have one very good password, key or
passphrase.

Re: How To Get Into A BitLocker-encrypted Computer

<359105bbd7a7c614df4ffd74b66ddbf4@remailer.privacy.at>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2252&group=alt.windows7.general#2252

  copy link   Newsgroups: alt.comp.os.windows-10 alt.windows7.general
Message-ID: <359105bbd7a7c614df4ffd74b66ddbf4@remailer.privacy.at>
Comments: This message did not originate from the Sender address above.
It was remailed automatically by anonymizing remailer software.
Please report problems or inappropriate use to the
remailer administrator at <abuse@remailer.privacy.at>.
Comments: This message was transferred to Usenet via mail2news gateway at
<mail2news@neodome.net>. Please send questions and concerns to
<admin@neodome.net>. Report inappropriate use to <abuse@neodome.net>.
Injection-Info: neodome.net;
posting-account="mail2news";
key="w4eALUtE1crhP8DXVFu7EXRkc2j791BdzZnF3/hHv6Ld2XCoawbdXgvqvzZ5KQqjQvJ/IA
ZF+vapP1ONEuXvkyfXRX2IhZ2ZIZwXFrQKfVF4wmu9M/oFWmgYRRL8O5QYtUeavkqNTcWbCgGBP
qtwUH4cVWAboeEXJSPiyHG85b0NSACves+yicmdXnKLTQXhJDF1qL5wGgm4YfojXdOw51mC5wAS
IkbRJWV3BzVHNOEFVMgcSrAb9htd1PucJmkndMGWi4yLBZjuNdYQygK8gZXZsSgCzt3fgE6we8E
2SNT3piZFrRWK/+jxSig5hHj0uLW64lRHvuDmKJb4QwRx5w==";
data="U2FsdGVkX1+yrbGkA4YcD0mOwOeYYQLGvCWSE/g/5WAWM6V0JhJMREOFkVGnGMPjuLmKp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";
mail-complaints-to="abuse@neodome.net"
From: mixmaster@remailer.privacy.at (Anonymous Remailer (austria))
Path: i2pn2.org!i2pn.org!news.neodome.net!mail2news
Injection-Date: Sat, 21 Aug 2021 03:45:02 +0000 (UTC)
Date: Sat, 21 Aug 2021 05:43:58 +0200 (CEST)
Newsgroups: alt.comp.os.windows-10,alt.windows7.general
References: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com> <sfplv7$aum$1@dont-email.me>
Subject: Re: How To Get Into A BitLocker-encrypted Computer
 by: Anonymous Remailer ( - Sat, 21 Aug 2021 03:43 UTC

In article <sfplv7$aum$1@dont-email.me>
John Doe <always.look@message.header> wrote:
>
> First post under this ID, no archive...
>

Whiner.

Re: How To Get Into A BitLocker-encrypted Computer

<sfq9b9$905$1@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2255&group=alt.windows7.general#2255

  copy link   Newsgroups: alt.comp.os.windows-10 alt.windows7.general
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nospam@needed.invalid (Paul)
Newsgroups: alt.comp.os.windows-10,alt.windows7.general
Subject: Re: How To Get Into A BitLocker-encrypted Computer
Date: Sat, 21 Aug 2021 03:18:01 -0400
Organization: A noiseless patient Spider
Lines: 47
Message-ID: <sfq9b9$905$1@dont-email.me>
References: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 21 Aug 2021 07:18:01 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="90842f223c508a4b8df123763a6c63f5";
logging-data="9221"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18bJwlsYhQmmqeGRxKCGjQhGTmGK8u/8Qc="
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
Cancel-Lock: sha1:ldsz0OghDVa5OOXM8mm4OmXhGYQ=
In-Reply-To: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>
 by: Paul - Sat, 21 Aug 2021 07:18 UTC

harry@right.here.com wrote:
> Found this on the Bruce Schneier site.
>
> https://www.schneier.com/crypto-gram/archives/2021/0815.html#cg17
>
> Defeating Microsoft’s Trusted Platform Module
>
> [2021.08.09] This is a really interesting story explaining how to
> defeat Microsoft’s TPM in 30 minutes — without having to solder
> anything to the motherboard.
> Researchers at the security consultancy Dolos Group, hired to test the
> security of one client’s network, received a new Lenovo computer
> preconfigured to use the standard security stack for the organization.
> They received no test credentials, configuration details, or other
> information about the machine.
>
> They were not only able to get into the BitLocker-encrypted computer,
> but then use the computer to get into the corporate network.
>
> It’s the “evil maid attack.” It requires physical access to your
> computer, but you leave it in your hotel room all the time when you go
> out to dinner.
>
> Original post here:
> https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network
>

https://arstechnica.com/gadgets/2021/08/how-to-go-from-stolen-pc-to-network-intrusion-in-30-minutes/

"With little else to go on, the researchers focused on the trusted platform module,
or TPM, a heavily fortified chip installed on the motherboard that communicates
directly with other hardware installed on the machine. The researchers noticed that,
as is the default for disk encryption using Microsoft’s BitLocker, the laptop booted
directly to the Windows screen, with no prompt for entering a PIN or password. That
meant the TPM was where the sole cryptographic secret for unlocking the drive was
stored."

And that's about the level of protection afforded Windows 10 Device Encryption
users. If you use the BitLocker Wizard, you can likely enable more than
one secret for authentication.

A benefit of doing it right, might be that the IT group preparing
the machine, would get to keep the recovery disk created when
the thing is set up. That would help in cases where the user
managed to reset the TPM.

Paul

Re: How To Get Into A BitLocker-encrypted Computer

<bnq1igdlgdc0diae201dc480ecfgtt3s7a@news.astraweb.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2257&group=alt.windows7.general#2257

  copy link   Newsgroups: alt.comp.os.windows-10 alt.windows7.general alt.privacy.anon-server free.spam
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!news-out.netnews.com!news.alt.net!fdc3.netnews.com!peer02.ams1!peer.ams1.xlned.com!news.xlned.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx06.iad.POSTED!not-for-mail
From: Bird0fPrey@TheNest.caw (-= Hawk =-)
Newsgroups: alt.comp.os.windows-10,alt.windows7.general,alt.privacy.anon-server,free.spam
Subject: Re: How To Get Into A BitLocker-encrypted Computer
Organization: Bird of Paradise
Message-ID: <bnq1igdlgdc0diae201dc480ecfgtt3s7a@news.astraweb.com>
References: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com> <sfplv7$aum$1@dont-email.me>
X-Newsreader: Forte Agent 1.93/32.576 English (American)
X-No-Archive: yes
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Antivirus: AVG (VPS 210821-2, 8/21/2021), Outbound message
X-Antivirus-Status: Clean
Lines: 12
X-Complaints-To: https://www.astraweb.com/aup
NNTP-Posting-Date: Sat, 21 Aug 2021 12:02:58 UTC
Date: Sat, 21 Aug 2021 08:02:58 -0400
X-Received-Bytes: 1328
 by: -= Hawk =- - Sat, 21 Aug 2021 12:02 UTC

On Sat, 21 Aug 2021 01:47:19 -0000 (UTC), John Doe
<always.look@message.header> scribbled:

>First post under this ID, no archive...

There was a time when you made YOUR first usenet post. . . and people
thought you were an asshole. Time's gone by. . . and people still think
you're an asshole.

--
May your shit come to life, and kiss you.
- F. Zappa

Re: How To Get Into A BitLocker-encrypted Computer

<W_6UI.5357$A_5.3920@fx40.iad>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2258&group=alt.windows7.general#2258

  copy link   Newsgroups: alt.comp.os.windows-10 alt.windows7.general alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!paganini.bofh.team!news.dns-netz.com!news.freedyn.net!newsfeed.xs4all.nl!newsfeed8.news.xs4all.nl!news.uzoreto.com!news-out.netnews.com!news.alt.net!fdc2.netnews.com!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!peer03.ams4!peer.am4.highwinds-media.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx40.iad.POSTED!not-for-mail
Subject: Re: How To Get Into A BitLocker-encrypted Computer
Newsgroups: alt.comp.os.windows-10,alt.windows7.general,alt.privacy.anon-server
References: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>
<v%YTI.7155$vA6.1580@fx23.iad> <j6n0ig57bn5jevos5601vdnuvsclajlvit@4ax.com>
From: silver@slim.er (SilverSlimer)
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101
Thunderbird/78.13.0
MIME-Version: 1.0
In-Reply-To: <j6n0ig57bn5jevos5601vdnuvsclajlvit@4ax.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Lines: 48
Message-ID: <W_6UI.5357$A_5.3920@fx40.iad>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Sat, 21 Aug 2021 13:14:30 UTC
Organization: blocknews - www.blocknews.net
Date: Sat, 21 Aug 2021 09:14:31 -0400
X-Received-Bytes: 3042
 by: SilverSlimer - Sat, 21 Aug 2021 13:14 UTC

On 2021-08-20 9:59 p.m., harry@right.here.com wrote:
> On Fri, 20 Aug 2021 21:52:28 -0400, SilverSlimer <silver@slim.er>
> wrote:
>
>> On 2021-08-20 8:53 p.m., harry@right.here.com wrote:
>>> Found this on the Bruce Schneier site.
>>>
>>> https://www.schneier.com/crypto-gram/archives/2021/0815.html#cg17
>>>
>>> Defeating Microsoft’s Trusted Platform Module
>
>>>
>>> Original post here:
>>> https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network
>>
>> Ridiculously interesting. Of course, with physical access to the
>> hardware being considered, there is no amount of security that is likely
>> to protect you. I can only hope that the security is sufficient for
>> remote attacks.
>
> Having their hands of various comps through the years which were
> encrypted with TrueCrypt or PGP didn't help the gov't crack them.
> They went to court a number of times trying to force the owner to give
> up the password/key/passphrase.
>
> I remember one time when the owner's ex-husband ratted out the
> ex-wife's password or whatever. How mean was that?
>
> Of course, you better damn well have one very good password, key or
> passphrase.

Between VeraCrypt and Bitlocker, I would expect that the former is more
effective at keeping the authorities away from the personal data. Since
Microsoft, like Apple, is part of the PRISM program, I'm sure that law
enforcement already knows very well how to get into the encrypted drives
and extract whatever they're looking for. VeraCrypt, in its open-source
nature, is probably a lot harder for them to penetrate.

As for a husband or a wife ratting on their significant other, that's
just wrong. The very nature of marriage makes it clear, in the wedding
ceremony, that once you put those rings on each other's fingers, you
become one. By telling on the other, you are basically telling on
yourself. Perhaps I'm idealistic, but I wouldn't be able to do it.

--
SilverSlimer
@silverslimer

Re: Totally bullshit subject - Microsoft does not manufacture TPMs. Re: How To Get Into A BitLocker-encrypted Computer

<20210825.022657.c49791fe@mix1.remailer.xyz>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=2279&group=alt.windows7.general#2279

  copy link   Newsgroups: alt.comp.os.windows-10 alt.windows7.general alt.privacy.anon-server alt.computer.security
Date: Wed, 25 Aug 2021 02:26:57 +0200
Injection-Date: Wed, 25 Aug 2021 00:30:01 +0000 (UTC)
Injection-Info: neodome.net;
posting-account="mail2news";
key="ey+JBqv2tty+/8849U/DN84bI2Fo9t5KbPIyoTwkc5jcwwTKuweMPZaGdKDZvxQr2VhR/r
b67oA9++YbC3PgGOEOquI7u4T/U2v2yQrUR2jCQAkldp8ad9PsK1a7KycKqiZ1fpsVF9QEEpiaD
kDCq9kFFi0W7YbHrHLDfPClgLP50aw5x1UcyQeeoNxsviLnuYneIZMC3GsNcD6MDBDnNWGzOiVO
sjWRTqKSGHmGRXlRzVa7cbnDTfUYbLX70Wtj8UOU4xie/4nZ5Y6w1NV5iiWDjM9VcPtrcnbSDOu
w2YkpUCQX5UqPwrWXl3sckp1DWjlhfghWHoErcX0VsfxIfA==";
data="U2FsdGVkX1/Ilkiol8U5eIAVSjBF5u2SIXGo99M+ra9fCLxKQweLab0J7Dq5ff9FGo89t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";
mail-complaints-to="abuse@neodome.net"
Path: i2pn2.org!i2pn.org!aioe.org!feeder1.feed.usenet.farm!feed.usenet.farm!news.neodome.net!mail2news
Message-ID: <20210825.022657.c49791fe@mix1.remailer.xyz>
Comments: This message was transferred to Usenet via mail2news gateway at
<mail2news@neodome.net>. Please send questions and concerns to
<admin@neodome.net>. Report inappropriate use to <abuse@neodome.net>.
Newsgroups: alt.comp.os.windows-10,alt.windows7.general,alt.privacy.anon-server,alt.computer.security
From: <anon@anonymous.com>
Subject: Re: Totally bullshit subject - Microsoft does not manufacture TPMs. Re: How To Get Into A BitLocker-encrypted Computer
References: <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>
 by: <anon@anonymous.com> - Wed, 25 Aug 2021 00:26 UTC

In article <3lj0igd0lm61murltavk28ggo8887c60q0@4ax.com>
>
> Found this on the Bruce Schneier site.
>
> https://www.schneier.com/crypto-gram/archives/2021/0815.html#cg17
>
> Defeating Microsoft’s Trusted Platform Module
>
> [2021.08.09] This is a really interesting story

except it isn't so interesting when one examines the facts.

"OEMs implement the TPM as a component in a trusted computing
platform, such as a PC, tablet, or phone. Trusted computing
platforms use the TPM to support privacy and security scenarios that
software alone cannot achieve."

"The Trusted Computing Group (TCG) is the nonprofit organization
that publishes and maintains the TPM specification. The TCG exists
to develop, define, and promote vendor-neutral, global industry
standards that support a hardware-based root of trust for
interoperable trusted computing platforms. The TCG also publishes
the TPM specification as the international standard ISO/IEC 11889,
using the Publicly Available Specification Submission Process that
the Joint Technical Committee 1 defines between the International
Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC)."

From the article,

"We received a Lenovo laptop preconfigured with the standard
security stack for this organization."

"The SSD was full disk encrypted (FDE) using Microsoft’s BitLocker,
secured via Trusted Platform Module (TPM)"

So the story here is that the TPM was breeched, not so much the OS
that configured to use it.

Harry's reading comprehension deficiency noted.

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor