Back in January Microsoft encrypted all my hard drives without saying anything. I was playing around with a dual boot yesterday and somehow aggravated Secureboot. So my C: panicked and required a 40 character key to unlock.

Your key is backed up to the Microsoft account associated with your install. Which is considerate to the hackers. (and saved me from a re-install) But if you’ve got an unactivated copy, local account, or don’t know your M$ account credentials, your boned.

Control Panel > System Security > Bitlocker Encryption.

BTW, I was aware that M$ was doing this and even made fun of the effected users. Karma.

    • klay@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      4 hours ago

      luks-cryptsetup-backup

      If you encrypted your disk/partition, the lock is stored in the luks header. But if that one is broken, you cant decrypt anything even if you remember your key and all data is lost.

      • splendoruranium@infosec.pub
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 hours ago

        Thanks!
        As I understand it this shouldn’t concern me if my backups are full disk images via Clonezilla, as those should already include the LUKS header, correct?