The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Researchers crack Microsoft feature, say encryption backdoors similarly crackable

    Discussion in 'Windows OS and Software' started by hmscott, Aug 11, 2016.

  1. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Bungling Microsoft single-handedly proves that golden backdoor keys are a terrible idea
    Redmond races to revoke Secure Boot policy
    http://www.theregister.co.uk/2016/08/10/microsoft_secure_boot_ms16_100/

    "Updated: Microsoft leaked the golden keys that unlock Windows-powered tablets, phones and other devices sealed by Secure Boot – and is now scrambling to undo the blunder.

    These skeleton keys can be used to install non-Redmond operating systems on locked-down computers. In other words, on devices that do not allow you to disable Secure Boot even if you have administrator rights – such as ARM-based Windows RT tablets – it is now possible to sidestep this block and run, say, GNU/Linux or Android.

    What's more, it is believed it will be impossible for Microsoft to fully revoke the leaked keys."


    Researchers crack Microsoft feature, say encryption backdoors similarly crackable

    http://thehill.com/policy/cybersecu...ft-feature-say-encryption-backdoors-similarly

    "Researchers who uncovered a security key that protects Windows devices as they boot up say their discovery is proof that encryption backdoors do not work."
    ...
    "Four hours after the research was posted, someone posted what purports to be the key-disabling key. Now, anyone looking to bypass Secure Boot is able to do so."


    Researchers crack Microsoft feature; say encryption backdoors similarly crackable
    https://www.reddit.com/r/privacy/comments/4x1tss/researchers_crack_microsoft_feature_say/
     
    Last edited: Aug 11, 2016
    inm8#2, Mr. Fox, Starlight5 and 7 others like this.
  2. StormJumper

    StormJumper Notebook Virtuoso

    Reputations:
    579
    Messages:
    3,537
    Likes Received:
    488
    Trophy Points:
    151
    Put this way where there is a will there will be a way to crack it.
     
  3. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    The sad thing is, MS handed over the keys as if it was nothing.

    No cracking, no hacking, no hatting of any shade required.

    Sometimes I think MS is on our side... o_O
     
  4. hmscott

    hmscott Notebook Nobel Laureate

    Reputations:
    7,110
    Messages:
    20,384
    Likes Received:
    25,139
    Trophy Points:
    931
    Raiderman and Mr. Fox like this.
  5. radji

    radji Farewell, Solenya...

    Reputations:
    3,856
    Messages:
    3,074
    Likes Received:
    2,619
    Trophy Points:
    231
    And this is why I use a BIOS password. No getting around that by remote.
     
  6. bennni

    bennni Notebook Evangelist

    Reputations:
    91
    Messages:
    450
    Likes Received:
    277
    Trophy Points:
    76
    Apparently it only applies to Windows Phone and Windows RT because they cannot disable UEFI secureboot. I suppose any security by obscurity is only good for as long as it is kept secret and this is another example of that limitation.