Timeline for How do I know that bitlocker works when Windows boots without a password?
Current License: CC BY-SA 3.0
7 events
when toggle format | what | by | license | comment | |
---|---|---|---|---|---|
Nov 22, 2016 at 18:17 | comment | added | divB | The key comes from TPM and will only be revealed if the environment is secure/has not been changed; it is not on the hard drive. | |
Jan 30, 2016 at 14:09 | comment | added | Petr | Ok, but how does the BIOS / EFI boot up the system if the system files themselves are encrypted? Even if boot loader wasn't encrypted it needs to hold the decryption key in order to access the system files or not? In linux you usually have the decryption keyfile that is encrypted as well and ask you for a password on boot (in initramfs). Then it uses the key do decrypt the system partition and resume booting process. On windows it doesn't, which implies that the decryption key is not protected and hackers could somehow extract it from bootloader in order to decrypt the drive. | |
Oct 10, 2013 at 19:14 | review | First posts | |||
Oct 10, 2013 at 19:23 | |||||
Oct 10, 2013 at 19:12 | history | edited | Kemo Sabe | CC BY-SA 3.0 |
Added for further clarification.
|
Oct 10, 2013 at 19:09 | comment | added | Kemo Sabe | No, not with a LiveCD. The only way is if they can boot it up just like you do into your Windows installation. | |
Oct 10, 2013 at 19:01 | comment | added | ujjain | Removing the HDD from a laptop is a big hassle. I also don't have another computer at hand. So Bitlocker would still allow thieves to obtain my data simply by booting my laptop with a Live CD? | |
Oct 10, 2013 at 18:58 | history | answered | Kemo Sabe | CC BY-SA 3.0 |