434
submitted 3 days ago by moe90@feddit.nl to c/technology@lemmy.world
you are viewing a single comment's thread
view the rest of the comments
[-] Rooki@lemmy.world 37 points 3 days ago

Yeah it can happen, when you force people without their consent encrypting their data.

[-] cy_narrator@discuss.tchncs.de 1 points 6 hours ago

Forcing people is one thing, not telling them its a thing is completely different. Most Windows users dont even know their Windows has bitlocker enabled and those keys are out of their sight

[-] Melonpoly@lemmy.world 16 points 3 days ago

Isn't that what Iphone and Android already do?

[-] Object@sh.itjust.works 21 points 3 days ago

One major difference is that it is so much easier to lock yourself out of the desktop TPM chip compared to mobile device security chips because they're not tightly coupled.

[-] acosmichippo@lemmy.world 2 points 3 days ago

and phones make you use your unlock pin often, so people are forced to remember it. on the other hand windows lets you use a short pin instead of your full account password pretty much forever which results in people forgetting the password completely.

[-] Rooki@lemmy.world 2 points 3 days ago

That isnt even the part it is encrypted, the TPM encryption is either "Automatic" or over a password (any length) on startup so far i know it from my work with Bitlocker (tpm 2.0) on windows 10. Idk if this is different on windows 11.

[-] surewhynotlem@lemmy.world 9 points 3 days ago

Huh .. I never noticed. Probably because my phone OS never failed to boot, requiring me to pull data off the HDD directly.

[-] Landless2029@lemmy.world 6 points 3 days ago

Samsung is notorious for this.

[-] Lembot_0002@lemm.ee 4 points 3 days ago

Most people don't have anything of importance on their phones. And the tuning options are almost absent on phones, so it is less problematic bug-wise.

[-] thesystemisdown@lemmy.world 20 points 3 days ago

For many, a mobile device is their sole computer, and things of importance to them are stored on it.

[-] user224@lemmy.sdf.org 2 points 3 days ago
[-] Rooki@lemmy.world 1 points 3 days ago

But THAT is recoverable EASILY, not like lost forever if you dont recover data from that phones storage.

Something like OTP are rather more important.

[-] user224@lemmy.sdf.org 1 points 3 days ago

Well, I wasn't talking about recovery, but need for encryption.

[-] Rooki@lemmy.world 1 points 3 days ago

I guess thats true.

[-] ieatpillowtags@lemm.ee 9 points 3 days ago

No you’re right, nobody has precious photos or videos on their phone 🙄

[-] Lembot_0002@lemm.ee 4 points 3 days ago

If they don't save those photos somewhere else from time to time, it means those photos aren't that important.

[-] spooky2092 11 points 3 days ago* (last edited 3 days ago)

You're assuming they actually understand proper data protection procedures. You have a very misplaced amount of faith in the knowledge of the average person. Plenty of people just expect stuff to work and are horrified when they realize they're not.

I saw that all the time when I worked in mobile phone sales/support.

[-] oo1@lemmings.world 2 points 2 days ago

I backup my precious dick pics at several offsite locations by sending them to as many people as possible as often as possible.

8-

[-] Takumidesh@lemmy.world 4 points 3 days ago

This is a post about people who don't understand encryption.

[-] pressanykeynow@lemmy.world 2 points 3 days ago

Yeah, nothing important. Just your banking apps, personal documents, photos, government apps, emails, all the services linked to your phone via mobile number, personal chats, work chats, 2fa codes, some other not important stuff. But at least it doesn't have your games. Unless you play games on your phone, then you are fucked.

[-] Rooki@lemmy.world 2 points 3 days ago

The only phone manufacture that does that is Google with pixel. Any other phone is for my knowledge either "weakly" encrypted or not at all.

Still your Mobile OS isnt just upgrading and encrypting your SD card and main drive. Thats the point.

[-] InnerScientist@lemmy.world 2 points 2 days ago

All devices launching with Android 10 and higher are required to use file-based encryption.

To use the AOSP implementation of FBE securely, a device needs to meet the following dependencies:

  • Kernel Support for Ext4 encryption or F2FS encryption.
  • Keymaster Support with HAL version 1.0 or higher. There is no support for Keymaster 0.3 as that does not provide the necessary capabilities or assure sufficient protection for encryption keys.   
    
  • Keymaster/Keystore and Gatekeeper must be implemented in a Trusted Execution Environment (TEE) to provide protection for the DE keys so that an unauthorized OS (custom OS flashed onto the device) cannot simply request the DE keys.   
    
  • Hardware Root of Trust and Verified Boot bound to the Keymaster initialization is required to ensure that DE keys are not accessible by an unauthorized operating system.

https://source.android.com/docs/security/features/encryption/file-based?hl=en

[-] MonkderVierte@lemmy.ml 2 points 3 days ago* (last edited 3 days ago)

Different threat model and usage scenario. See the spilled milk comment.

this post was submitted on 02 May 2025
434 points (100.0% liked)

Technology

69726 readers
3328 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS