News:

Willkommen im Notebookcheck.com Forum! Hier können Sie über alle unsere Artikel und allgemein über notebookrelevante Dinge diskutieren. Viel Spass!

Main Menu

Post reply

Other options
Verification:
Please leave this box empty:
Shortcuts: ALT+S post or ALT+P preview

Topic summary

Posted by Rick78
 - Today at 17:49:53
Quote from: Petr on Today at 15:36:55No, they haven't. Pre-boot PIN is safe even for this attack.

"Denial is the most predictable of all human responses. But, rest assured, this will be the sixth time we have backdored it, and we have become exceedingly efficient at it."
Posted by Petr
 - Today at 15:36:55
No, they haven't. Pre-boot PIN is safe even for this attack.


Posted by Rick78
 - Today at 12:11:50
Quote from: Petr on Today at 09:51:56I am sure this does't work if you use the pre-boot PIN. You always should.
Since this is a windows backdoor you can safely assume that they also have something for bypassing your beloved PIN. I have been making this joke for years now that bitlocker should be renamed as WPE = Windows Potato Encryption.

Anyone who thinks that windows is secure or private in 2026 - "You just need to un-check some settings and edit the registry and your golden" is simply delusional. What a farce of an OS.
Posted by Petr
 - Today at 09:51:56
I am sure this does't work if you use the pre-boot PIN. You always should.
Posted by Redaktion
 - Yesterday at 23:46:16
Nightmare-Eclipse has released YellowKey, a fully BitLocker encrypted disk bypass for vulnerable Windows 11 and Server systems. The hack leverages code left behind in the WinRE recovery environment to unlock encrypted disks without knowledge of the encryption keys.

https://www.notebookcheck.net/YellowKey-fully-bypasses-Microsoft-BitLocker-encryption-on-affected-Windows-PCs-Bitcoins-personal-data-at-risk.1296120.0.html