• Re: BitLocker encryption broken in 43 seconds with sub-$10 Raspberry Pi

    From Paul@21:1/5 to Mr. Man-wai Chang on Thu Feb 8 13:15:27 2024
    XPost: alt.comp.os.windows-11

    On 2/8/2024 12:07 PM, Mr. Man-wai Chang wrote:
    BitLocker encryption broken in 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPM | Tom's Hardware
    <https://www.tomshardware.com/pc-components/cpus/youtuber-breaks-bitlocker-encryption-in-less-than-43-seconds-with-sub-dollar10-raspberry-pi-pico>

    Bitlocker is one of the most easily accessible encryption solutions available today, being a built-in feature of Windows 10 Pro and Windows 11 Pro that's designed to secure your data from prying eyes. However, YouTuber stacksmashing demonstrated a
    colossal security flaw with Bitlocker that allowed him to bypass Windows Bitlocker in less than a minute with a cheap sub-$10 Raspberry Pi Pico, thus gaining access to the encryption keys that can unlock protected data. After creating the device, the
    exploit only took 43 seconds to steal the master key.

    To do this, the YouTuber took advantage of a design flaw found in many systems that feature a dedicated Trusted Platform Module, or TPM. For some configurations, Bitlocker relies on an external TPM to store critical information, such as the Platform
    Configuration Registers and Volume Master Key (some CPUs have this built-in). For external TPMs, the TPM key communications across an LPC bus with the CPU to send it the encryption keys required for decrypting the data on the drive.

    Related:

    bitlocker broken stackmashing - YouTube <https://www.youtube.com/results?search_query=bitlocker+broken+stackmashing>

    So you unplug the TPM and stick it in your pocket.

    You can't sniff something, that is not there.

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)