commander@lemmy.world to Technology@lemmy.worldEnglish · 4 hours agoMicrosoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunchtechcrunch.comexternal-linkmessage-square42fedilinkarrow-up1343arrow-down13
arrow-up1340arrow-down1external-linkMicrosoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunchtechcrunch.comcommander@lemmy.world to Technology@lemmy.worldEnglish · 4 hours agomessage-square42fedilink
minus-squareKongar@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up4arrow-down2·2 hours agoAnd people make fun of me for turning off secure boot and tpm. They just cause grief for no benefit.
minus-squarefrongt@lemmy.ziplinkfedilinkEnglisharrow-up2·12 minutes agoWell this isn’t directly related to those, so maybe some derision is warranted.
minus-squarepartial_accumen@lemmy.worldlinkfedilinkEnglisharrow-up5·2 hours agoAs long as you’re doing your own whole disk encryption, you have a valid path to still be secure. However, if you’re running an unencrypted disk, you’re much more likely to lose your data to a non-state actor.
And people make fun of me for turning off secure boot and tpm. They just cause grief for no benefit.
Well this isn’t directly related to those, so maybe some derision is warranted.
As long as you’re doing your own whole disk encryption, you have a valid path to still be secure. However, if you’re running an unencrypted disk, you’re much more likely to lose your data to a non-state actor.