Windows Disk Encryption

I suppose it is safe to say the would be pozzers have become the pozzed. The i5 2400 with the lowest end Gigabyte mainboard I could find (doesn't even have USB 3 support, but my VR set I am getting requires 3.2 Gen 2 anyways which I needed to add in) doesn't have working backdoors. BitLocker from Microsoft doesn't have backdoors. It relies on assuming your hardware has them built in already.

Now that I upgraded to the USB 3.2 Gen 2 and a GTX 1050Ti for VR as well as going Win10 Enterprise, I encrypt my disks with Veracrypt just in case Microsoft tried to get sneaky on me by slipping something in once they realized people were exploiting cybersecurity flaws.

What do you use for Windows encryption? I thought the mindset was that no Windows machine can be trusted. That is just not true. There was no foresight that clever hackers could know whether hardware was pozzed with a backdoor. There is a reason I don't have an Nvidia control center installed.

You want my email for a driver? Do you want my phone # too?

Attached: Futaba.Anzu.full.1864002.jpg (850x850, 278.95K)

Other urls found in this thread:

propublica.org/article/prosecutors-dropping-child-porn-charges-after-software-tools-are-questioned
techcrunch.com/2018/11/05/crucial-samsung-solid-state-drives-busted-encryption/
semiconductor.samsung.com/consumer-storage/support/notice/
youtube.com/watch?v=larYVJOqfRQ
guru3d.com/news-story/researchers-successfully-bypass-hardware-encryption-in-samsung-and-crucial-ssds.html
msrc.microsoft.com/update-guide/en-us/vulnerability/ADV180028
twitter.com/AnonBabble

Your raid team does NOT want to have to quickly shuffle as fast as they can without falling down a staircase, end up tripping over some Amazon boxes, screws, screwdrivers and all other sorts of type of shit just to see this.

Trust me.

Attached: veracrypt.jpg (474x474, 13.47K)

Threat model? Encryption is useless against governments, who knows what flaws are built into existing standards no one knows about. The only real way to keep information safe from them is to make it analog and physically inaccessible, or mental and not tell anyone.

Against remote and local attacks by people looking for money, or for ease of mind, Bitlocker is built-in and all you need.

>Threat model?

CIA narcoterrorist

surely there was some type of flaw, right

or not

Attached: neptune wallpaper 3.jpg (3840x2160, 2.24M)

windows 8+ snychronizes bitlocker keys online to your onedrive/microsoft account so it's already almost an official backdoor.
there are also bitlocker commands that could unlock a disk using specialized windows live usb (law enforcment tools).
I guess the average Any Forums-gger wouldn't know but now you know. I'm not spreading the tool so I'm not doing anything wrong.

in sincerely doubt what you are testifying is true

why didn't law enforcement use such tool to crack open Criminals in Action's PC then?

here is what i am saying: it would have been a jackpot for the FBI and law enforcement and be ultimately damning. you're full of shit.

Attached: [Exiled-Destiny]_Ergo_Proxy_Ep04_(B60CC539).mkv_snapshot_01.51_[2022.02.12_10.54.50].jpg (853x480, 24.4K)

>I guess the average Any Forums-gger wouldn't know but now you know.

and if you don't want the public to think you are racist can you please stop spamming racial epithets at every opportunity

Attached: [Exiled-Destiny]_Ergo_Proxy_Ep04_(B60CC539).mkv_snapshot_01.48_[2022.02.12_10.54.41].jpg (853x480, 42.33K)

Have you ever considered just not looking at CP?
Only GNU/Linux offers actually secure system encryption with dmcrypt/LUKS. Best you can do on Windows is make Veracrypt/Truecrypt virtual volumes or use Cryptomator or Boxcryptor; you can't do truely secure system encryptions on Winddows. On GNU/Linux fscrypt is a good choice if you want to do file based encryption after already dmcrypting your system.

>Only GNU/Linux offers actually secure system encryption with dmcrypt/LUKS.

that is what i thought but it is not so. i use LUKS on my debian systems.

but why if there was a six-figure bounty on any information related to my arrest on conspiracy charges didn't the feds simply crack the bitlocker with an official tool or use some type of cybersecurity workaround?

it's hardware based, not software!

Attached: The IDOLM@STER Cinderella Girls - EP04 - Everyday life, really full of joy.mkv_snapshot_18.55_[2022.01.05_12.51.50].jpg (1920x1080, 234.46K)

propublica.org/article/prosecutors-dropping-child-porn-charges-after-software-tools-are-questioned
FBI cares about stopping pedos, but not as much as it cares about trying to convince the next MLK to kill himself.
There are a lot of issues with bitlocker but one is that it assumes if your drive claims to support aes encryption on-drive, it just uses that. Problem is those drives are 100% pozzed and keep the keys just sitting there right on the drive. Look it up.

techcrunch.com/2018/11/05/crucial-samsung-solid-state-drives-busted-encryption/

>propublica.org/article/prosecutors-dropping-child-porn-charges-after-software-tools-are-questioned
>Yet when investigators checked Tolworthy’s hard drive, the images weren’t there. Even though investigators said different offensive files surfaced on another computer that he owned, the case was tossed.

this is different shit

it was planted with some bullshit not-believable story

Attached: The IDOLM@STER Cinderella Girls - EP03 - A ball is resplendent, enjoyable, and....mkv_snapshot_16.24_[2022.01.01_02.25.58].jpg (439x1080, 88.82K)

look, i am not trying to get in a big shit sling fest but i don't think all this shit is that credible. there is only one way to know, and that is a real world application

with a real OPFOR because a drill just went live

Attached: becky wall.jpg (367x447, 19.08K)

semiconductor.samsung.com/consumer-storage/support/notice/

>this thing is supposed to be 17

gpt3 thread

if you're using windows, you're already pozzed to the point where disk encryption becomes meaningless

the lot of you are pot smoking kiddy diddlers

no worries guys. anzu is okay.

youtube.com/watch?v=larYVJOqfRQ

Attached: neptune 1080p.jpg (1280x720, 236.65K)

guru3d.com/news-story/researchers-successfully-bypass-hardware-encryption-in-samsung-and-crucial-ssds.html
msrc.microsoft.com/update-guide/en-us/vulnerability/ADV180028
So run manage-bde.exe -status
And if it says a drive is using hardware encryption under encryption method, you will need to create a group policy to force software encryption and un-encrypt then re-encrypt the drive.

let me hack into bitlocker by not really knowing what the fuck i am doing

oops, its broken now

on to veracrypt i guess

Attached: nico tine.jpg (631x750, 42.17K)

Microsoft uses PhotoDNA to spy on all of your files. You can trust the CIA/FBI won't misuse their CP database to track free-thinking citizens by checking for other types of hashes. They would never do that. They'd never destroy trust in the polio vaccine so they could assassinate people in Pakistan.
Windows is pozzed. Simple as.
Bitlocker/Veracrypt is just anti-tyrone protection.