How to bypass BitLocker using an USB stick...
https://github.com/Nightmare-Eclipse/YellowKey/tree/main
https://github.com/Nightmare-Eclipse/YellowKey/tree/main
It’s not a “back door” not really. What’s happening is simply how TPM‑only BitLocker is designed to work.This security guy is talking about a backdoor in BitLocker, not just another vulnerability...
It's a serious lost of trust in MS products!
Anyway, this one is so easy to use it can be used to help some customers...
Not from what I can see, but it also doesn't leverage the TPM at all... and that's very bad.Is Veracrypt immune? Requires a pre-boot password.
Crypto is hard... and people are really devious.
Isn't TPM-only mode the default when drive encryption is activated automatically by Windows including Home edition? This begs the question, what is the point of TPM-only encryption and what is the point of activating it automatically? I thought the point was protection of data if the machine is stolen...TPM‑only mode creates the appearance of strong security while silently relying on the assumption that attackers will never gain physical access to the device. It satisfies compliance checkboxes and insurance requirements, but it does not meaningfully protect a stolen machine.
I've had a couple of customers that have lost their data due to Windows automatic drive encryption and Microsoft account login issues. Maybe Yellowkey could have been used, or could be used next time I have a customer with this!Anyway, this one is so easy to use it can be used to help some customers...
I thought the point was protection of data if the machine is stolen...
OK, I get it now. Thanks for that explanation.The process is less about preventing illegal data access on device theft (which it does do in many cases) as it is about authenticating the boot process and ensuring the kernel isn't modified outside of the user's knowledge.
I always have done so, again if you aren't using a boot password to unlock the TPM, you've never separated the lock and the key sufficiently to prevent this risk.OK, I get it now. Thanks for that explanation.
Now that a tool (YellowKey) is freely available to enable copying files from a stolen computer with default encryption, it should be assumed that data is now likely to be obtained.
However, I also do not expect this tool to work for much longer. I expect Microsoft to patch something to resolve the WinPE hole, and in the process we're going to have more bitlocker failures requiring recovery keys.
and THIS is my main takeaway from this thread. I've always thought that the oh-so-narrow case that bitlocker protects against barely justified its existance. I'm embarassed to say I never dug into it enough to recognize its anti-malware value.What it does primarily, is lock the C volume into a state where the OS can detect if it's been modified outside of itself. We have entire categories of malware that use weaknesses in EFI to modify C drive contents on reboot. That simply cannot happen anymore.
Objectively, if you're doing the default TPM unlock thing, that's exactly what this is.Maybe I've watched too many hacker movies, but I always assumed BitLocker was like your front door lock, just intended to keep the honest people honest.