home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.comp.os.windows-11      Steaming pile of horseshit Windows 11      4,852 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 3,990 of 4,852   
   Maria Sophia to All   
   PSA: Veracrypt has pre boot authenticati   
   24 Jan 26 21:51:50   
   
   XPost: alt.comp.os.windows-10, alt.comp.microsoft.windows   
   From: mariasophia@comprehension.com   
      
   PSA: Veracrypt has pre boot authentication   
        (& why it may be better for older PCs)   
      
   Many thanks to Frank Slootweg and others for responding to discussions such   
   that I needed to delve deeper in order to respond intelligently to their   
   concerns on how BitLocker on Windows Home and Pro differs from VeraCrypt.   
      
   Anything said below might be wrong, but from my research I have tried to   
   distil what I surmise is the distinction as I dug deeper in response to   
   criticisms specifically from Frank and Chris about my low friction high   
   protection model for direct data protection (& my disdain for biometrics).   
      
   Specifically, for protection from a burglar who steals our PC for the data.   
      
   1. VeraCrypt has pre boot authentication.   
      A. When you encrypt the system drive VeraCrypt installs a small boot   
         loader in the system partition.   
      B. That boot loader appears before Windows starts and requires a   
         password. Without that password the encryption key is never released.   
      
   2. What this means in practice   
      A. The OS cannot load until the correct password is entered.   
      B. The drive cannot be read by removing it and attaching it to another   
         machine. The data remains encrypted.   
      C. Biometrics cannot be used at this stage. Only a password or a   
         password plus keyfile can unlock the system.   
      
   3. BitLocker on Windows Home   
      A. Uses device encryption with TPM auto unlock.   
      B. No pre boot PIN is available.   
         This means the TPM releases the key without user input.   
      C. The user sign-in password or PIN is only for unlocking Windows after   
         the encryption key has already been released by the TPM.   
      D. Biometrics such as fingerprint or face unlock operate at the same   
         stage as the PIN. They unlock the session, not the encrypted drive.   
      E. Convenient for daily use, but weaker against physical theft because   
         the burglar can move the drive to another machine and attempt TPM   
         based attacks.   
      
   4. BitLocker on Windows Pro   
      A. Supports a pre boot PIN. This is the closest equivalent to VeraCrypt   
         pre-boot authentication.   
      B. The encryption key is not released until the PIN is entered.   
      C. Stronger than TPM auto unlock, but still tied to Microsoft account   
         recovery keys unless the user changes that default.   
      D. Biometrics do not apply at pre boot. They only unlock the Windows   
         session after the encryption key has been released.   
      
   5. VeraCrypt on any Windows edition   
      A. Always requires a password at boot. No TPM auto unlock exists.   
      B. Works the same on Home and Pro because it does not depend on Windows   
         features.   
      C. Can use keyfiles for an extra factor.   
         Strong if the keyfile is kept offline (e.g., usb stick or paper).   
      D. Does not support biometrics. This is by design because biometrics   
         cannot be used before the OS loads.   
      
   6. Why this matters specifically for the topic of theft of the entire PC.   
      A. Pre boot authentication protects the encryption key before any OS   
         code runs.   
      B. It prevents offline attacks where the drive is removed.   
      C. It is the strongest layer for data at rest protection on consumer   
         hardware.   
      D. Biometrics improve convenience for sign in, but they do not protect   
         encrypted data because they operate after the key has been released.   
      
   7. Summary   
      A. BIOS or UEFI passwords protect firmware settings.   
      B. BitLocker Home relies on TPM auto unlock, so no pre boot protection.   
      C. BitLocker Pro can use a pre boot PIN, which improves security.   
      D. VeraCrypt always uses pre boot authentication, regardless of Windows   
         edition (which is one reason it's a more universal solution).   
      E. OS sign in protects only the active session.   
      F. Biometrics reduce friction but do not protect encrypted data.   
      
   PSA: VeraCrypt has pre boot authentication.   
      
   Summary for older desktops   
   Older machines from around 2009 often lack a TPM or have an early TPM which   
   Windows will not use for device encryption. BitLocker Home depends on TPM   
   auto unlock and BitLocker Pro depends on TPM for its strongest modes.   
   Without   
   a TPM these features fall back to weaker modes or do not work at all. By   
   contrast VeraCrypt does not need a TPM. It works the same on any hardware   
   and   
   always uses a password at boot. That makes it a more universal solution for   
   older desktops where TPM based protection is not available.   
      
   Many thanks to Frank Slootweg and others for responding to discussions such   
   that I needed to delve deeper in order to respond intelligently to their   
   concerns on how BitLocker on Windows Home and Pro differs from VeraCrypt.   
      
   Anything said below might be wrong, but from my research I have tried to   
   distil what I surmise is the distinction as I dug deeper in response to   
   criticisms specifically from Frank and Chris about my low friction high   
   protection model for direct data protection and my disdain for biometrics.   
      
   Specifically, for protection from a burglar who steals our PC for the data.   
      
   1. VeraCrypt has pre boot authentication.   
      A. When you encrypt the system drive VeraCrypt installs a small boot   
         loader in the system partition.   
      B. That boot loader appears before Windows starts and requires a   
         password. Without that password the encryption key is never released.   
      
   2. What this means in practice   
      A. The OS cannot load until the correct password is entered.   
      B. The drive cannot be read by removing it and attaching it to another   
         machine. The data remains encrypted.   
      C. Biometrics cannot be used at this stage. Only a password or a   
         password plus keyfile can unlock the system.   
      
   3. BitLocker on Windows Home   
      A. Uses device encryption with TPM auto unlock.   
      B. No pre boot PIN is available. The TPM releases the key without user   
         input.   
      C. The user sign in password or PIN is only for unlocking Windows after   
         the encryption key has already been released by the TPM.   
      D. Biometrics such as fingerprint or face unlock operate at the same   
         stage as the PIN. They unlock the session, not the encrypted drive.   
      E. Convenient for daily use, but weaker against physical theft because   
         the burglar can move the drive to another machine and attempt TPM   
         based attacks.   
      
   4. BitLocker on Windows Pro   
      A. Supports a pre boot PIN. This is the closest equivalent to VeraCrypt   
         pre boot authentication.   
      B. The encryption key is not released until the PIN is entered.   
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca