• Papamousse
    link
    fedilink
    532 months ago

    uhoh, and wait for the time when the user will update his BIOS, that resets TPM2, and at reboot bitlocker asks for the 48 digits key to decrypt hard drive, that the user never saved…

      • Papamousse
        link
        fedilink
        142 months ago

        it should be in your MS online account as someone wrote, but in case of, I always save it on a USB key, hidden somewhere. You can also print it, or take a picture of it with your phone. Because there is no way to get it back.

    • @[email protected]
      link
      fedilink
      52 months ago

      Wait? My Lenovo laptop did exactly this. It first encrypted the SSD without telling me, then it updated the bios via windows update (or via Lenovo assistant, but still it was unattended)

      Luckily I was using a Microsoft account (usually I don’t because fuck that) so the keys were automatically backupped

      • Romkslrqusz
        link
        fedilink
        112 months ago

        The automatic encryption and subsequent backup both took place because you were using a Microsoft Account

    • @[email protected]
      link
      fedilink
      32 months ago

      I updated my BIOS few days ago and on reboot got a warning about bitlocker and resetting fTPM, but I’m on linux. I dumped luks headers, and master priv keys before resetting just in case but everything worked as usual. Do you know if I just got lucky or if luks dosn’t use TPM? Should I hold on to the luks headers and master priv key backup?

      • @[email protected]
        link
        fedilink
        English
        12 months ago

        There’s an extension that can unlock LUKS drives using the TPM, but by default it does not do that, and probably that extension isn’t installed either