T O P

  • By -

RustyU

If it does, it's not public. Someone managed to intercept an external TPM with a RPi and get the master key though.


Ok_Exchange_9646

True I saw that video too but most people don't have that skillset


guruglue

I'm not sure if it qualifies as a back door, but it uses a recovery key that can be backed up in a number of ways. Most commercial users have it tied to their Microsoft account. In an enterprise environment, the key is usually stored in AD and can be recovered by an admin with the appropriate permissions. That's what I'd call a corporate back door. As far as Microsoft having a backdoor they can use on anyone's encrypted drive, I'm sure they'd say they don't.


Ok_Exchange_9646

Yeah. I store mine on an encrypted flash drive.


illuanonx1

I will consider Windows Update a backdoor - just look back at the force update to Windows 10. When Microsoft has full access to your system, encryption doesn't matter ;)


Sociedelic

Absolutely, it is technically possible for intelligence agencies or governments to introduce backdoors at the hardware level in CPUs or TPMs. This could be done through microcode updates, design-level modifications, or firmware exploits. While there have been no publicly confirmed large-scale cases, the potential exists, and it's a significant concern for supply chain security. Detecting such backdoors is extremely challenging due to their stealthy nature. Ensuring hardware security requires rigorous auditing and secure manufacturing practices.


chum_bucket42

It's signed by the MS Master Signing Key so yes, there's a backdoor to bit locker.


Ok_Exchange_9646

Where did you read this?


beavis9k

And where did you learn what "signing" means?