ExploreTrendingAnalytics
Nostr Archives
ExploreTrendingAnalytics
jsr53d ago
NEW: Microsoft turned over Bitlocker keys to FBI. When you key escrow your disk encryption with someone, they can be targeted with a warrant. This case is a really good illustration that if you nudge users with a default to save their keys with you... they will do so & may not fully understand the implications. Of course, once the requests start working... they are likely to accelerate. Story: https://www.forbes.com/sites/thomasbrewster/2026/01/22/mi…
💬 16 replies

Replies (16)

Neo ⚡️53d ago
I wonder if the same could happen to @5db24d2f…12d97fa2 users wouldn't it only need something similar against bitkey and apple/google where the other keys are stored on their servers? 🤔
0000 sats
Judge Hardcase53d ago
Assuming @5db24d2f…12d97fa2 designed as advertised, of the 2-of-3 keys needed, Bitkey servers controls 1 key, the mobile app controls 1 key, and the hardware device itself controls 1 key. There is also an encrypted backup of the mobile app key stored in your cloud account - which requires the hardware device to decrypt it. In short, in addition to the key from Bitkey severs, the FBI would also need either your hardware device, or the key from your mobile app (which I suppose could potentially be lifted through some sort of spyware and/or malicious version of the app). *The key controlled by the hardware device isn't backed up anywhere (it's designed to not even be possiible). If the device is lost (or just stops working for whatever reason), the user's only recourse is to hope to still be able to get a new device and hope to still be able to coordinate with Bitkey to transfer funds (via the mobile app key and the Bitkey servers key) to an entirely new 2-of-3 keyset.
0000 sats
Neo ⚡️53d ago
It looks like the hardware is not needed at all 🙈 If you lose your hardware, you can use your phone, together with the key on Bitkey’s server, to set up new hardware (after a Delay and Notify period expires, during which Bitkey pushes alerts to your app to alert you of a recovery attempt). https://bitkey.build/what-do-you-mean-theres-no-seed-phrase/
0000 sats
Jeff53d ago
Apply says they don’t have the key
0000 sats
Judge Hardcase53d ago
PS... Apparently, your recovery contact(s) would also have what's necessary to decrypt your app key stored in the cloud... so, potentially, if FBI compromises Bitkey server, your cloud provider, and also somehow a recovery contact, I suppose your wallet could be at risk without you necessarily ever even knowing it.
0000 sats
Cykros53d ago
Bitlocker was always more a corporate compliance tool to meet the letter of the law around confidentiality and never a serious privacy tool. I imagine though some needed this proof.
0000 sats
Final53d ago
There is also a way bigger flaw beyond this, and that is this Device Encryption feature (and by extension BitLocker) has **no PIN or password**. The device will just decrypt itself by powering on as it only uses the PC's TPM. The only threat this kind of protects against is the hard disk being removed from the PC. It doesn't prevent someone exploiting the OS to extract data like you commonly see in mobile device forensic tools... This request for the recovery key is just to allow law enforcement to access the data while the hard disk is removed from the seized PC, because they insert hard disks into write blocked imaging kits to create a forensic clone of it's data to analyse with. Back before TPMs were widely embedded into CPU firmware it wasn't common to see them get sniffed to get the keys. Anyone could do it too: https://pulsesecurity.co.nz/articles/TPM-sniffing BitLocker has a TPM+PIN, TPM+Key and TPM+PIN+Key pre-boot authentication setting but you need to tinker on Group Policy to do that. You'd also need to enable other policies to make the PIN an alphanumeric password...
0000 sats
Bill Cypher53d ago
Now do LUKS. I'm genuinely curious. 1k sat bounty.
0000 sats
Judge Hardcase53d ago
Yeah, that's what I was trying to say with "coordinate with Bitkey to transfer funds (via the mobile app key and the Bitkey servers key) to an entirely new 2-of-3 keyset"
0000 sats
Neo ⚡️53d ago
Yeah but it looks like the cloud key is not encrypted then with the bitkey. So in the end it's a setup with 2 hotkeys on someone else's computer. This make the hardware device itself more like a gimmick imo that leads to false sense of security. Would anyone here feel secure having their life savings in such a setup? 🤔
0000 sats
Cerebrum53d ago
To confiscate the gov needs access to your phone, unlock code of phone and a warrant for Bitkey. Or somehow trick you in using the hardware with your finger print.
0000 sats
Jeff53d ago
Phone is the hardware in theory
0000 sats
Neo ⚡️53d ago
🙈
0000 sats
Final53d ago
TLDR: Use a secure passphrase if you want the device protected against any resourceful actor When most distros provide encryption with LUKS they at least ask you to set up a credential. Almost all distros just ask for a password. They don't seamlessly allow setting up in other ways in a UI like BitLocker does or in the installer. You often need to read up on docs and such which can be tiresome. LUKS full disk encryption in how most users would know it would only be safe if they used a long, secure passphrase that would be impossible to brute force. A short 6 digit numeric PIN works for some phones because a secure element throttles unlock attempts but would be brute forced very quickly on LUKS, VeraCrypt and so on because they aren't using a TPM for throttling. Secureblue (hardened Linux distro we like) supports LUKS with TPM and also FIDO2.
0000 sats
Judge Hardcase53d ago
No, the cloud key IS encrypted with the bitkey device... but as long as you still have the unencrypted version of that key on your phone (in the app), you don't even have to bother with decrypting the cloud key in order to coordinate with bitkey to setup a new device (and new 2-of-3 keyset). The only purpose for the cloud key is in case you lose your phone (or delete the app), you can decrypt the key stored in your cloud (using your bitkey device) for use on a new phone. *there are also encrypted version(s) of your app key stored in YOUR cloud that your recovery contact(s) hold the decryption key for. In case you lose both your phone AND your bitkey device, installing a fresh app on a new phone will allow you to use the decryption key held by a recovery contact to recover your app key from YOUR cloud - which in turn can be used to coordinate with bitkey to setup a new device (and new 2-of-3 keyset). Of course, the app on your phone combined with the app on your recovery contact's phone handle the coordination of all this to make it reasonably painless. (minus the waiting period you mentioned earlier). Again, assuming designed as advertised (which I think is fair to question), I think it's pretty clever. My biggest problem with bitkey is that they advertise it as "self-custody"; but unlike virtually any other hardware wallet, if you lose the bitkey device, because it's designed to have nothing to backup (e.g. a seed phrase), self-recovery is not possible. In my book, reliance on a 3rd-party for recovery necessarily disqualifies it as self-custody.
0000 sats
Judge Hardcase53d ago
... and no, personally, I would not feel secure having my life savings in something I don't consider to be self-custody (i.e. including self-recovery).
0000 sats