home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.comp.os.windows-10      Steaming pile of horseshit Windows 10      197,590 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 196,863 of 197,590   
   Maria Sophia to Chris   
   Re: Any point to password protecting the   
   24 Jan 26 21:27:53   
   
   XPost: alt.comp.os.windows-11   
   From: mariasophia@comprehension.com   
      
   Chris wrote:   
   > Brian Gregory  wrote:   
   >> On 22/01/2026 15:59, Maria Sophia wrote:   
   >>> On biometrics, a key point is that they do not protect data at rest.   
   >>> A fingerprint or face scan unlocks the Windows session, but once the   
   >>> drive is removed from the laptop the biometric layer is irrelevant. The   
   >>> data on the drive is readable unless it is encrypted. Biometrics solve a   
   >>> convenience problem for sign in, not a data protection problem for a   
   >>> stolen device. That is why I treat them more as a marketing gimmick rather   
   >>> than a security control for data at rest.   
   >>   
   >> Obviously biometrics are not something you add to add protection.   
   >> They simply avoid you having to type a password or PIN.   
   >   
   > Disagree. You can't guess a biometric like you can a PIN. You can't   
   > shoulder surf someone's biometric like a  PIN code.   
   >   
   > Biometrics are more secure. If implemented properly, obviously. Some early   
   > mobile phone implementations were terrible.   
      
   Hi Chris,   
      
   While OEMs strive to differentiate hype on biometrics, it's my assessment   
   that the biometrics available to consumers are merely marketing gimmicks.   
      
   Even so, on the specific topic of what I've termed "biometric marketing   
   gimmicks", we are mixing several security layers in this thread discussion.   
      
   1. BIOS or UEFI passwords   
      A. Supervisor or admin password   
         Controls access to firmware settings. Prevents changes to boot   
         order, secure boot, virtualization, and other low level options.   
      B. User or power on password   
         Stops the machine from booting until the password is entered.   
         Does not protect the drive if it is removed from the system.   
      C. Purpose   
         Protects the boot path and firmware settings. Does not protect   
         data at rest unless combined with disk encryption.   
      
   2. Boot level authentication   
      A. BitLocker PIN (Windows Pro)   
         A pre boot PIN that must be entered before the OS loads. This   
         protects the encryption key. Stronger than relying on TPM alone.   
      B. BitLocker device encryption (Windows Home)   
         No pre boot PIN. TPM auto unlocks the drive. Convenient but   
         weaker against physical theft.   
      C. VeraCrypt pre boot authentication (see separate thread on this)   
         Requires a password before the OS loads. Can also use keyfiles.   
         Protects the encryption key before any OS code runs.   
      
   3. Operating system sign in   
      A. Password   
         Traditional sign in. Can be long and strong. Does not protect   
         data at rest unless tied to disk encryption.   
      B. PIN   
         Local to the device. Shorter but protected by TPM. Used to   
         release the encryption key. Still guessable if observed.   
      C. Biometrics   
         Fingerprint or face scan. Convenience feature that unlocks the   
         session after the encryption key has already been released.   
         Cannot protect data at rest. Cannot replace the encryption key.   
      
   4. Application level secrets   
      A. VeraCrypt keyfiles   
         Extra factor stored on removable media. Must be present to   
         unlock a volume. Strong if kept separate from the device.   
      B. KeePassXC master password   
         Protects the password database. Strength depends entirely on   
         the master password. Biometrics do not protect the database.   
      C. KeePassXC keyfile   
         Optional second factor. Must be provided along with the master   
         password. Strong if stored offline.   
      
   5. Summary of roles   
      A. BIOS or UEFI passwords   
         Protect firmware settings and boot control.   
      B. Boot level authentication   
         Protects the encryption key before the OS loads.   
      C. OS sign in   
         Protects the active session, not the data at rest.   
      D. Application level secrets   
         Protect individual encrypted containers or password vaults.   
      
   Back to biometric marketing gimmicks, what they actually can do is...   
      A. Reduce friction so users actually lock their devices.   
      B. Prevent casual misuse or shoulder surfing during sign in.   
      C. Do not protect data at rest. Do not protect encryption keys.   
      D. Are convenience features layered on top of real controls.   
   --   
   My conclusions follow the simplest model that fits every known fact.   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca