Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

4
  • Removing the HDD from a laptop is a big hassle. I also don't have another computer at hand. So Bitlocker would still allow thieves to obtain my data simply by booting my laptop with a Live CD?
    – ujjain
    Commented Oct 10, 2013 at 19:01
  • 1
    No, not with a LiveCD. The only way is if they can boot it up just like you do into your Windows installation.
    – Kemo Sabe
    Commented Oct 10, 2013 at 19:09
  • Ok, but how does the BIOS / EFI boot up the system if the system files themselves are encrypted? Even if boot loader wasn't encrypted it needs to hold the decryption key in order to access the system files or not? In linux you usually have the decryption keyfile that is encrypted as well and ask you for a password on boot (in initramfs). Then it uses the key do decrypt the system partition and resume booting process. On windows it doesn't, which implies that the decryption key is not protected and hackers could somehow extract it from bootloader in order to decrypt the drive.
    – Petr
    Commented Jan 30, 2016 at 14:09
  • The key comes from TPM and will only be revealed if the environment is secure/has not been changed; it is not on the hard drive.
    – divB
    Commented Nov 22, 2016 at 18:17