by lima on 1/18/25, 12:31 PM with 96 comments
by wat10000 on 1/18/25, 3:00 PM
As long as your encryption is decent, this makes it fundamentally impossible to read the drive from a turned-off state without knowing or cracking the password.
by layer8 on 1/18/25, 9:27 PM
[0] https://en.wikipedia.org/wiki/BitLocker#TPM_alone_is_not_eno...
by yread on 1/18/25, 11:46 PM
> The easiest way to get this working has three parts:
> Get the original BCD from the victim’s device. This ensures the configuration matches the specific partition GUIDs. You can do that by shift-rebooting Windows, going “Troubleshoot > Advanced options > Command Prompt”, mounting the boot partition, and copying its contents to a USB drive. Or, be more advanced and use an SMB mount, if you don’t have USB access.
Do I understand it correctly that to bypass the encryption you need access to the decrypted contents of the encrypted disk? Did the original exploit guess the layout of the partitions instead?
by laurensr on 1/18/25, 4:36 PM
by kopirgan on 1/19/25, 12:44 AM
by lostmsu on 1/18/25, 3:34 PM
by lostmsu on 1/18/25, 3:37 PM
Do new devices still suffer from the issue?
by varispeed on 1/18/25, 4:19 PM
by antithesis-nl on 1/18/25, 3:47 PM
by kylebenzle on 1/18/25, 3:45 PM