Unlocked Encryptor: Delay New Adoption for Deliberation
Unlocked Encryptor: Delay New Adoption for Deliberation
Disclaimer: This post includes affiliate links
If you click on a link and make a purchase, I may receive a commission at no extra cost to you.
Quick Links
Key Takeaways
- BitLocker’s encryption keys can be stolen with a Raspberry Pi Pico, but the exploit only works with external TPMs using the LPC bus.
- Most modern hardware integrates the TPM, making it more difficult to extract BitLocker keys. AMD and Intel CPUs are likely safe.
- Despite the exploit, BitLocker’s AES-128 or AES-256 encryption is still secure, so there’s no need to abandon it.
Microsoft’s BitLocker is one of the most popular full-disk encryption tools, and is built into Windows 10 and 11 Pro providing an easy encryption option for millions of Windows users worldwide. But BitLocker’s reputation as a leading encryption tool could be under threat after a YouTuber successfully stole encryption keys and decrypted private data in just 43 seconds—using a Raspberry Pi Pico costing $6.
How Was BitLocker’s Encryption Broken?
BitLocker’s encryption was broken by YouTuber Stacksmashing, who posted a video detailing how he intercepted BitLocker data, extracted decryption keys, and successfully exploited the BitLocker encryption process.
Stacksmashing’s exploit involves the external Trusted Platform Module (TPM)—the same TPM chip that stops Windows 11 upgrades—found on some laptops and computers. While many motherboards integrate the TPM chip and modern CPUs integrate the TPM into their design, other machines still use an external TPM.
Now, here’s the issue and the exploit discovered by Stacksmashing. External TPMs communicate with the CPU using what’s known as an LPC bus (Low Pin Count), which is a way for low-bandwidth devices to maintain communication with other hardware without creating a performance overhead.
However, Stacksmashing found that while the data on the TPM is secure, during the boot-up process, the communication channels (the LPC bus) between the TPM and CPU are completely unencrypted. With the right tools, an attacker can intercept data sent between the TPM and CPU containing insecure encryption keys.
Tools like the Raspberry Pi Pico, the minute $6 single-board computer that has a bunch of uses. In this case, Stacksmashing connected a Raspberry Pi Pico to unused connectors on a test laptop and managed to read the binary data as the machine booted. The resulting data contained the Volume Master Key stored on the TPM, which he could then use to decrypt other data.
Is It Time to Ditch BitLocker?
Interestingly, Microsoft was already aware of the potential for this attack. However, this is the first time a practical attack has surfaced at large, illustrating just how fast BitLocker encryption keys can be stolen.
It raises the vital question of whether you should consider switching to a BitLocker alternative, like the free and open-source VeraCrypt . The good news is that you don’t need to jump ship for a few reasons.
First, the exploit only works with external TPMs that request data from the module using the LPC bus. Most modern hardware integrates the TPM. While a motherboard-based TPM could theoretically be exploited, it would require more time, effort, and an extensive period with the target device. Extracting BitLocker Volume Master Key data from a TPM becomes even more difficult if the module is integrated into the CPU.
AMD CPUs have integrated TPM 2.0 since 2016 (with the launch of AM4, known as fTPM), while Intel CPUs integrated TPM 2.0 with the launch of its 8th Generation Coffee Lake CPUs in 2017 (known as PTT). Suffice to say, if you’re using a machine with an AMD or Intel CPU manufacturer after those dates, you’re most likely safe.
It’s also worth noting that despite this exploit, BitLocker remains secure, and the actual encryption underpinning it, AES-128 or AES-256, is still secure.
Also read:
- [New] Trailblazing Technique Use Apple Watch for Mac
- [New] Transform Your Snapshots with VSCO Essentials for 2024
- [Updated] 2024 Approved Dive Into the World of Expertise with YouTube's Top 10 Makeup Vloggers
- [Updated] Capturing Snapchat on Screen A Step-by-Step Guide for 2024
- ASUS Vivobook S 15: The Ultimate Student-Friendly Laptop
- Customizing Firewall Defenses in 5 Easy Steps
- Forgot Apple iPhone 15 Pro Max Backup Password? Heres What to Do
- In 2024, QuickLUT Tweaks for Perfect Video Output
- In 2024, Simple and Effective Ways to Change Your Country on YouTube App Of your Apple iPhone 11 | Dr.fone
- Mastering iPhone Burst Photography
- Microsoft World, Google Map Powerhouse
- Streamlining Comic File Access in Modern Windows
- Unlock Advanced Backup Capabilities
- Unveiling 'Phone Link': Microsoft’s Bluetooth Connectivity App
- Title: Unlocked Encryptor: Delay New Adoption for Deliberation
- Author: David
- Created at : 2024-09-27 16:14:24
- Updated at : 2024-09-28 20:56:37
- Link: https://win11.techidaily.com/unlocked-encryptor-delay-new-adoption-for-deliberation/
- License: This work is licensed under CC BY-NC-SA 4.0.