135
The power of Linux (aussie.zone)

Today i took my first steps into the world of Linux by creating a bookable Mint Cinamon USB stick to fuck around on without wiping or portioning my laptop drive.

I realised windows has the biggest vulnerability for the average user.

While booting off of the usb I could access all the data on my laptop without having to input a password.

After some research it appears drives need to be encrypted to prevent this, so how is this not the default case in Windows?

I'm sure there are people aware but for the laymen this is such a massive vulnerability.

top 50 comments
sorted by: hot top controversial new old
[-] pulido@lemmings.world 2 points 13 hours ago* (last edited 13 hours ago)

Yes, any laptop without an encrypted storage drive will have its data accessible by someone booting from a live USB.

It really is a massive vulnerability, but it's not well known because so few people even understand the concept of a 'live USB' to make it a widespread threat or concern.

So yeah, if you're ever in possession of a Windows machine that doesn't have an encrypted disk, you can view the users' files without knowing their password via a live USB.

It's also not limited to laptops.

[-] kittenroar@beehaw.org 2 points 23 hours ago* (last edited 23 hours ago)

This is not that big of a deal most of the time, since you are the only person interacting with your computer, but it's worth remembering when you decide to recycle or donate -- you have to securely wipe in that case. Also bear in mind, if you do encrypt your drive, there are now more possibilities for total data loss.

Oh, fun fact: you can change a users windows password inside Linux. Comes in handy for recovery, ie, user forgot their password.

[-] some_guy@lemmy.sdf.org 10 points 1 day ago

I'm happy that you're on a journey of discovery. This is not an insult. The word is partition. Someone corrected me on the spelling of something last night. We all make mistakes.

(especially with reference to a country with separate areas of government) the action or state of dividing or being divided into parts.

[-] Forester@pawb.social 67 points 2 days ago

And this is why we say physical access is root access.

[-] Aussiemandeus@aussie.zone 13 points 2 days ago

Absolutely it's crazy that it's so simple that you can do it in the space of 5v minutes.

[-] Forester@pawb.social 11 points 2 days ago

You should look into HDD platter recovery. There's some really high quality stuff on YouTube.

[-] Manifish_Destiny@lemmy.world 7 points 2 days ago

Aw buddy.

Go look at the free software called autopsy

[-] easily3667@lemmus.org 3 points 1 day ago

Modern windows machines will be installed with bitlocker (full disk encryption). With manual installs it might not be.

[-] llii@discuss.tchncs.de 1 points 19 hours ago

I think Bitlocker isn't even supported on Windows 11 Home. I was shocked when I wanted to set up disk encryption on my wife's notebook.

[-] easily3667@lemmus.org 2 points 18 hours ago* (last edited 10 hours ago)

It's got like a "lite" version. You have to use the terminal to check if it's enabled but that's that Microsoft started doing in win10 home. I assume some asshat in marketing got the agreement they could keep their branding even if Microsoft gave out encryption for free.

Here it is https://support.microsoft.com/en-us/windows/device-encryption-in-windows-cf7e2b6f-3e70-4882-9532-18633605b7df

Personally I found it made more sense to just bring an old pro license so I could be sure it was enabled.

[-] Aussiemandeus@aussie.zone 2 points 1 day ago

I have a Windows 11 work laptop, I might try it out and see what happens

[-] redlemace@lemmy.world 53 points 2 days ago

Same in Linux. No disk encryption and everything is easy accessible if you have physical access.

[-] lord_ryvan@ttrpg.network 7 points 1 day ago

Unless someone ticked the “encrypt storage”-box in the installer, you don't even have to pay for Pro to use it!

[-] Aussiemandeus@aussie.zone 9 points 2 days ago

Physical access wouldn't seem so hard. Say you worked at the company company and wanted to get the files your boss has on your evaluation or something. Wait till they're on lunch, plug in a usb and pull them up.

I imagine patient records wouldn't be encrypted either

[-] oo1@lemmings.world 6 points 1 day ago

I imagine patient records wouldn’t be encrypted either

If computerised, they freaking well should be.

In general they'd be in a database with it's own accesss control to interfaces and the databases data store should be encrypted. In my country there are standards for all healthcare IT systems that would include encryption and secure message exchange between systems. If they breached those they'd be in trouble.

If your doctor has a paper file in a filing cabinet on premises, written in English, then yes. The security is only the physical locks, just like your hme pc.

[-] vandsjov@feddit.dk 29 points 2 days ago

Any respectable company with Windows would be using BitLocker - full disk encryption. It’s super easy to setup if your computer has TPM, fully transparent for the user in most cases.

[-] Jhex@lemmy.world 1 points 1 day ago

such a "hack" would only work in a poorly written tv show

an unencrypted drive is like being able to look into a bank though a window, not ideal but things of value could/should/would still be in a safe or somewhere else completely

[-] enemenemu@lemm.ee 4 points 2 days ago

That's why you can't just boot from an usb

[-] Kazel@lemmy.dbzer0.com 14 points 1 day ago

Anon discovers computers

[-] phantomwise@lemmy.ml 21 points 2 days ago

I thought BitLocker was enabled by default on Windows 11, which is a terrible idea imo. Full disk encryption by default makes sense in professional settings, but not for the average users who have no clue that they'll lose all their data if they lose the key. If I had a penny for every Windows user who didn't understand the BitLocker message and saved the key on their encrypted drive, I'd have a lot of pennies. At the very least it should be prompted to give the user a choice.

[-] catloaf@lemm.ee 5 points 2 days ago

Windows does not let you save the key to the drive being encrypted. (Unless you access it via SMB share, which I've done a number of times during setup before moving it off.)

[-] phantomwise@lemmy.ml 4 points 2 days ago

You mean it prevents people from writing the key on a piece of paper when they get the BitLocker message, then copy it on a text file once their session is running and throw the paper away or lose it later ?

[-] krash@lemmy.ml 2 points 1 day ago

This is true - it is enabled by default in win11. I disagree with you it being a terrible idea - imagine all the sentistive data people put on their hard drives - would they want to to fall in the wrong hands if they lose their computer? Or if their hard drives fails so they can do a secure wipe?

I'm not a fan of Microsoft, but they did solve the key issue in the enterprise setting by storing the key in they entrance identity. Same should be done for home consumers, since having a Microsoft account is being shoved in everyone's throat anyway...

[-] phantomwise@lemmy.ml 1 points 14 hours ago

It's a matter of perspective I guess. I'm not a fan of overkill security measures that get too much in the way of usability and risk creating problems for you, especially when physical access is a minor risk in most cases. I agree that having a Microsoft account to backup your key is a solution, but not a very good one since you trade vulnerability to a possible physical access that probably is never going to happen for the absolute certainty of your data being spied on by Microsoft...

load more comments (1 replies)
[-] Xanza@lemm.ee 14 points 2 days ago

While booting off of the usb I could access all the data on my laptop without having to input a password.

This is entirely expected behavior. You didn't encrypt your drive, so of course that data is available if you sidestep windows login protections. Check out Bitlocker for drive encryption.

[-] andrewth09@lemmy.world 7 points 1 day ago

Windows does support encrypted drives with Bitlocker, unfortunately Bitlocker's default settings leave it vulnerable to many different attacks.

[-] pineapple@lemmy.ml 4 points 1 day ago

It's the same situation with Linux just a simple login only has very basic protection you need to encrypt your disk if you want to make sure no one can read it.

[-] Telorand@reddthat.com 12 points 2 days ago

I'm sure there are people aware but for the laymen this is such a massive vulnerability.

This is only a vulnerability if you suspect a threat actor might physically access your computer. For most people, this is not a concern. There's also the issue that it has processing overhead, so it might make certain operations feel sluggish.

Encryption is not a panacea, because if someone ever forgets their password (something common for the layperson), the data on that drive is inaccessible. No chance for recovery. Certain types of software may not like it either. It's one of many considerations someone should make when determining their own threat model, but this is not a security flaw. It's an option for consideration, and most people are probably better off from a useability standpoint with encryption disabled by default.

[-] vandsjov@feddit.dk 5 points 2 days ago

Encryption is not a panacea, because if someone ever forgets their password (something common for the layperson), the data on that drive is inaccessible.

It’s because of stuff like this that Microsoft wants people to create an Microsoft account. Recovery key automatically saved to your Microsoft account. For business the recovery key can also be automatically saved in a central location.

[-] Aussiemandeus@aussie.zone 4 points 2 days ago

I think it just really goes to show you can't hide anything on a computer physically.

I also feel this is something that should be taught in school (maybe it is i finished school over 13 years ago)

I always knew there were ways to recover files off of hard drives. I just assumed they needed to be physically remounted not just plug in a usb and off you go

[-] Telorand@reddthat.com 8 points 2 days ago

Physically remounting a drive is the same thing as just plugging in a USB and going to town. Instead of taking the drives to a different system, you're bringing the different system to the drives!

[-] ReversalHatchery@beehaw.org 3 points 2 days ago

where I live they never really taught conputer literacy. some places teach ms office and that's it

load more comments (1 replies)
[-] oo1@lemmings.world 2 points 1 day ago

bookable Mint Cinamon USB stick

Does book still mean cool?

[-] Aussiemandeus@aussie.zone 1 points 1 day ago

No idea, it's meant to be bootable

[-] Feyd@programming.dev 8 points 2 days ago

so how is this not the default case in Windows?

It actually is now

[-] tomcatt360@lemmy.zip 7 points 2 days ago

IIRC, this is one of the reasons that Windows 11 requires TPM 2.0, so that the drive can be encrypted using the TPM as the key.

[-] catloaf@lemm.ee 7 points 2 days ago

And people are pissed because they don't realize, and when they don't have the key any more, all their data is gone!

[-] data1701d@startrek.website 5 points 1 day ago

How old is your laptop? Pretty much every Windows machine I've ever owned after a certain year requires you to type in your Bitlocker key, including my first-gen Surface Go from 2018.

Also, you often have to manually set up encryption on most Linux installs as well - I did it for my Thinkpad. I need to do it for my desktop as well - I should probably do a reinstall, but I'm thinking of backing everything up and trying to do it in-place just for fun. On top of that, we can finally transition to btrfs.

Wink

[-] Aussiemandeus@aussie.zone 2 points 1 day ago

I think my laptop is from 2018 so is getting old. It's an asus predator gaming laptop

[-] wuphysics87@lemmy.ml 2 points 1 day ago

Microsoft used to have a division for testing windows on various hardware configurations. They stopped doing that when they could just put different versions of windows on people's computers and use telemetry to check the differences. This could be an artifact of that.

load more comments (1 replies)
[-] audaxdreik@pawb.social 7 points 2 days ago* (last edited 2 days ago)

Yep! They don't teach this stuff because consumer level cyber security is in the absolute pits of despair and moreover, they're trying to do away with what little we have access to. Governments and police agencies like how easy it is to access files.

Personally I don't bother with full disk encryption (FDE) since I don't really have anything private on my main computer. Just a bunch of game files, comics, movies, etc. Anything extremely important such as tax documents, personal data, etc. is honestly very small and I keep in a little Proton Drive folder, <1GB total. I think the best approach is to simply educate yourself and be aware of what's worth protecting and how best to protect that. Just enabling FDE and thinking you're safe ignores all the other avenues that personal data can be stolen.

My current pet conspiracy theory is that FDE with BitLocker isn't even worth it on Windows due to the TPM requirement. Why is that a bad thing? Your system probably has fTPM supported by the BIOS, why not just enable that?

https://techcommunity.microsoft.com/blog/windows-itpro-blog/tpm-2-0-%E2%80%93-a-necessity-for-a-secure-and-future-proof-windows-11/4339066

Integrating with features like Secure Boot and Windows Hello for Business, TPM 2.0 enhances security by ensuring that only verified software is executed and protecting confidential details.

https://ieeexplore.ieee.org/document/5283799 (I don't believe we'll see this EXACT implementation of DRM, I'm just providing an example of TPM being used for DRM and that these ideas have been in consideration since at least 2009).

Now, if I were Microsoft and I wanted to exert an excessive amount of control over your system by making sure you couldn't run any inauthentic or "pirated" software to bring it more inline with the walled garden Apple approach they've been salivating over for the past decade+, you'd first need to ensure you had a good baseline enabled. You know, kind of like the thing you'd do by forcing everyone into an OS upgrade and trashing a lot of old hardware.

It won't be instantaneous, I don't know exactly how or what it's going to look like when they start tightening their grip. Again, this is all speculation, but it's not hard to connect the dots and their behavior over the past couple years does not give them the benefit of the doubt. Microsoft is no longer a company that can be assumed to be acting in the best interest of the average consumer, they're not doing this for your security. They want to know that your computer is a "trusted platform".

EDIT: Further lunatic conspiracy theories: BitLocker is/will be backdoored so Microsoft forcing you into that ecosystem further guarantees they have access to your system. This all stinks to me, like your landlord telling you how you can arrange the furniture in your own apartment.

[-] ReversalHatchery@beehaw.org 3 points 2 days ago

they're not doing this for your security. They want to know that your computer is a "trusted platform".

security in terms of Trusted Computing is never about your security, and neither about your trust

EDIT: Further lunatic conspiracy theories: BitLocker is/will be backdoored so Microsoft forcing you into that ecosystem further guarantees they have access to your system. This all stinks to me, like your landlord telling you how you can arrange the furniture in your own apartment.

a backup of your bitlocker key is in your Microsoft account, and normally nowhere else. It's pretty easy for Microsoft to lock you out of your ow computer and data completely, if they wanted. Because you supposedly violated a license, or the terms of use or anything. just sayin', Microsoft already has (and had for a few years now) a scandal about extorting for your personal phone number by locking down your account a few days after registration, until you hand it over. and even there they justify it with a ToS violation, which is just a lie

[-] audaxdreik@pawb.social 3 points 2 days ago

For those not in the know, "Trusted Computing" is a very specific THING and maybe not what you'd expect, https://en.wikipedia.org/wiki/Trusted_Computing

TC is controversial as the hardware is not only secured for its owner, but also against its owner, leading opponents of the technology like free software activist Richard Stallman to deride it as "treacherous computing",[3][4] and certain scholarly articles to use scare quotes when referring to the technology.[5][6]

You can pretty much guess where I land.

a backup of your bitlocker key is in your Microsoft account, and normally nowhere else. It’s pretty easy for Microsoft to lock you out of your ow computer and data completely, if they wanted.

You make a good point, I'm missing the forest for the trees. Why even bother theorizing that BitLocker may be compromised when they're removing local accounts for consumers and forcing the key to be uploaded to their servers anyway?

[-] ReversalHatchery@beehaw.org 1 points 1 day ago

Why even bother theorizing that BitLocker may be compromised when they're removing local accounts for consumers and forcing the key to be uploaded to their servers anyway?

yeah, with that, it's basically compromised, but maybe not bitlocker itself but the key storage

load more comments (2 replies)
[-] Mensh123@lemmy.world 2 points 1 day ago

Yup. You'll need to tkinker with Linux too if you want disk encryption. At the very least, set a BIOS password.

[-] whysofurious@lemmy.dbzer0.com 2 points 1 day ago* (last edited 1 day ago)

I still remember years ago one time windows fucked itself and god knows why I couldn't fix it even with USB recovery or stuff like that (long time ago, I don't remember).

Since I couldn't boot into recovery mode the easiest way to backup my stuff to a connected external drive was "open notepad from the command line -> use the GUI send to.. command to send the files to the external drive -> wait and profit" lol.

[-] brucethemoose@lemmy.world 3 points 2 days ago

Good practice is putting anything important on an encrypted USB drive (as that stuff usually isn't very big), and just treating the machine as "kinda insecure"

If you set up a BIOS password, someone at least needs to unscrew your computer to get stuff. But this is generally not setup because people, well, forget their passwords...

load more comments
view more: next ›
this post was submitted on 26 Apr 2025
135 points (100.0% liked)

Linux

53635 readers
888 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS