this post was submitted on 05 Aug 2025
438 points (99.5% liked)

Greentext

6903 readers
735 users here now

This is a place to share greentexts and witness the confounding life of Anon. If you're new to the Greentext community, think of it as a sort of zoo with Anon as the main attraction.

Be warned:

If you find yourself getting angry (or god forbid, agreeing) with something Anon has said, you might be doing it wrong.

founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] rekabis@lemmy.ca 32 points 1 day ago (1 children)
  • The average user has no need to use Bitlocker
  • The average user should be using a local account instead of a Microsoft Account.
  • Using a Microsoft Account causes Bitlocker to auto-enable.
  • Loss of access to your Microsoft Account when Bitlocker is enabled can cause loss of all your data.
  • Microsoft can and will roundly ignore you if you lose access to your Microsoft Account.

Microsoft has painted users into a very dangerous corner. Security is vitally important, but not when it’s almost maliciously implemented.

Even as a security professional I understand that most people will be ill served by having their computer locked down like Fort Knox. There are ways of ensuring security without having all personal content go permanently poof with the slightest wrong move.

[–] RichardTickler@lemmy.world 4 points 1 day ago (1 children)

100% agree with the sentiment. Working in IT makes you realize how incapable some people can be with even the simplest computer tasks at times. What would you recommend as an alternative for secure data in the case of the average person? File level encryption instead of disk level? Wondering what would be the best way to go about getting my family to secure their private info.

[–] rekabis@lemmy.ca 2 points 1 day ago* (last edited 1 day ago) (1 children)

For safety, backups are much better than encryption.

The only thing encryption does is prevent others from reading your data if the machine gets physically lost or stolen. And ironically, that might prevent a stolen machine from ever making it back into your hands.

For desktops, encryption of a machine that doesn’t have critically private/sensitive content is even dumber. I mean, if you have terabytes of CP or are a terrorist, then sure, lock that down to make the police earn their wages. Or do it even if you don’t, but you just want to give authorities the middle finger.

But not much on the average computer needs encryption so long as you keep good physical and network security. And the problem with that is much of it is behavioural - they will need to learn how to not do dangerous things online and off.

In order to protect data is a good backup system - something that just works, is dummy proof, can be administered remotely, and which can restore content easily and reliably.

On a Mac, nothing beats iCloud. It’s encrypted before it even gets uploaded, and Apple has repeatedly shown it cannot retrieve the content… it needs to be forcibly cracked.

On the PC (both Windows and Linux) I prefer Duplicati backing up to BackBlaze B2.

[–] LH0ezVT@sh.itjust.works 1 points 4 hours ago

I absolutely agree with you, disk encryption is mostly against someone physically taking your device. Phones and laptops? Absolutely, yeah. Desktops? I have some faith in my door lock, and if the cops show up, have fun with my steam library. Most of the data that is interesting for law enforcement is on people's phones nowadays, like regular contacts, media, or message histories. If you encrypt your desktop, sure, by all means do it, but it should be opt-in, not opt-out (or don't-opt-at-all, microsoft).

[–] thirtyfold8625@thebrainbin.org 1 points 20 hours ago
[–] spaghettiwestern@sh.itjust.works 16 points 1 day ago* (last edited 1 day ago)

This happened when I booted a friend's computer from a live USB Mint stick. It took hours to find the correct password for her account and get Windows running again.

A few years ago Microsoft deleted my Linux ext2 directory when I dual booted to Windows and ran Windows Update.

At this point I'm convinced one of Microsoft's primary business functions is selling malware.

[–] some_guy@lemmy.sdf.org 67 points 2 days ago (2 children)

I work in IT and understand that the tradeoff for good security is a reduction in convenience. But this really reads like deliberate punishment. I get the same sense on Apple's platforms. Wanna change your cloud password? Prove you know the unlock code to a device that you no longer own and haven't had in a year. This is especially awesome when your employer makes you change passcodes on a regular basis and you have no idea what you used back then.

[–] Psythik@lemmy.world 6 points 1 day ago

Ran into this issue literally yesterday. The wife went back to iOS after giving Android a try for four years (I don't get why, but I try not to judge).

Anyway, she couldn't remember her Apple ID and had to pull out the phone she hasn't used in years to recover her account. Thankfully she was smart enough to charge the battery to 50% every few months. Otherwise it would have gone bad and she would have been fucked; literally would have had to pay a tech hundreds to replace a battery for a phone she no longer uses, just to reset a simple password.

I understand and appreciate the need for good security, but this is beyond ridiculous.

[–] lemming741@lemmy.world 15 points 2 days ago (5 children)

My password manager keeps a history, and it has saved my bacon twice now.

[–] some_guy@lemmy.sdf.org 6 points 2 days ago (2 children)

Yeah, they VIP that I was helping when I encountered the above issue was not using a pw manager and the device in question had been replaced (by the org) a bit more than a year ago. We also had an insane pw policy at the time that made users change them every three months, so good luck remembering. So grateful that madness is over.

load more comments (2 replies)
load more comments (4 replies)
[–] muusemuuse@sh.itjust.works 18 points 1 day ago

Weaponized security. These fuckers booby-trapped usb boot.

I really don’t miss windows. I’m happy with almost everything else but windows. Fischer price macOS is perfectly acceptable to me at this point.

Fuck Liquid Glass though.

[–] Gullible@sh.itjust.works 125 points 2 days ago (1 children)
[–] nuko147@lemmy.world 72 points 2 days ago (2 children)

...and grounds for committing sudoku. 🤣

[–] wieson@feddit.org 12 points 2 days ago (1 children)

Ahh you mentioned the number puzzle sudoku. What you were looking for, was the word for japanese honour suicide: sirtaki.

[–] Peruvian_Skies@sh.itjust.works 11 points 1 day ago (1 children)
[–] dalekcaan@feddit.nl 8 points 1 day ago (2 children)

No, Sriracha is a spicy sauce made from hot peppers and garlic. You're thinking of Siddhartha.

[–] Mossheart@lemmy.ca 5 points 1 day ago (1 children)

No, Siddhartha is a novel by Hermann Hesse about spiritual discovery.

You're thinking of Sebulba.

[–] Buddahriffic@lemmy.world 3 points 1 day ago

No, Sebulba was one of the positive influences Anakin Skywalker had in his early life.

You mean Sequin Pants.

[–] bstix@feddit.dk 4 points 1 day ago (1 children)

Close but no, Siddhartha is the name of Buddha. You're thinking of Sepultura.

No, Sepultura is a Brazilian metal band. You're thinking of Sophocles.

[–] Sir_Premiumhengst@lemmy.world 23 points 2 days ago

Hm... Eclains why all the Linux install tutorials start with: disable secure boot, disable bit locker,...

[–] asqapro@reddthat.com 4 points 1 day ago

Someone correct me if I'm wrong, but that greentext doesn't accurately reflect how BitLocker works (unless there's some missing context). Assuming you override the boot order using the one-time boot option and live boot that way, rebooting afterwards won't affect the TPM or BitLocker because nothing has actually changed. If you change the boot order in the BIOS / UEFI settings and move USB boot above the normal boot drive in order to live boot, then the TPM will see a change and BitLocker will lock. But you can just change the boot order back to the way it was and the TPM will be happy again and BitLocker will automatically unlock. Unless you do something really stupid like clearing the TPM altogether.

I guess it's also possible the person didn't just live boot and tried to install Zorin while live booted, which would cause issues, but I doubt that's the case here.

[–] 9point6@lemmy.world 26 points 2 days ago (1 children)

This is partly Microsoft's fault, for sure, but it's also more of a function of how secureboot works. A Linux system using TPM backed FDE with secureboot enabled would have the same problem going the other way.

Secureboot prevents a lot of ways the TPM could be compromised, so as part of "securely" turning it off, it wipes the keys (otherwise those protections would be pointless, the first thing an attacker would do would be to turn off secureboot).

[–] PlzGivHugs@sh.itjust.works 66 points 2 days ago (1 children)

The main problem is it turning itself on with no input from or feedback to the user, and not giving the user access to the key without using a Microsoft account. I've heard of people getting screwed by this because they set up with a local account and thus never got their secureboot key (or did, but it was hidden somewhere and they were never told to save it).

[–] 9point6@lemmy.world 13 points 2 days ago* (last edited 2 days ago)

Oh yeah sorry I should have elaborated when I said it's partly Microsoft's fault. ATEOTD, this mostly happened because neither of them expected the FDE to be enabled which is on Microsoft for silently enabling it

[–] Sarothazrom@lemmy.world 11 points 2 days ago* (last edited 2 days ago)

This is probably my fault, big brother Microsoft saw me replace Win11 last month with Linux and don't want real OS's taking up their precious market share.

[–] ikidd@lemmy.world 3 points 1 day ago (1 children)

Microsoft's SSO is an absolute train wreck. I'd rather pound my pecker flat with a mallet than deal with another Microsoft account.

load more comments (1 replies)
[–] unexposedhazard@discuss.tchncs.de 20 points 2 days ago (3 children)

Literally happened to me two days ago. Everything was fine until i installed gpu drivers and then it said "plz give secure boot password" and i had to abort mid install. Also was infront of a fresh linux recruit.

load more comments (3 replies)
[–] Honytawk@lemmy.zip 7 points 1 day ago (2 children)

How can something "enable itself" while requiring a password?

[–] floquant@lemmy.dbzer0.com 9 points 1 day ago

It's not strictly a password, it's a recovery key for the encryption. The drive is unlocked automatically at boot by the key residing in the TPM, if the system "hasn't been compromised"

Bitlocker is enabled by default on new Windows installations, and you can run into this situation by resizing partitions or messing around with your EFI partition. Disabling secure boot without disabling bitlocker first will result in this.

Make sure you have your recovery key, or completely disable bitlocker until you're done provisioning your system (or uninstall windows altogether)

[–] tgxn@lemmy.tgxn.net 12 points 1 day ago

it was already enabled, he just tripped secureboot.

[–] underscores@lemmy.zip 6 points 2 days ago

dual boot with windows ? good fucking luck

load more comments
view more: next ›