Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.comp.os.windows-10    |    Steaming pile of horseshit Windows 10    |    197,590 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 196,888 of 197,590    |
|    Maria Sophia to Paul    |
|    Re: PSA: Veracrypt has pre boot authenti    |
|    25 Jan 26 11:52:07    |
      XPost: alt.comp.os.windows-11, alt.comp.microsoft.windows       From: mariasophia@comprehension.com              Paul wrote:       >> In summary, Veracrypt is the solution that is designed by users for users,       >> while, IMHO, Bitlocker is a marketing abomination designed for MS lock-in.       >       > One problem with the protection placed on Home, is users       > not being aware it is present.       >       > That's a pretty big issue.       >       > Encryption involves a cost:benefit analysis. If       > a given implementation is mostly cost, and no benefit,       > why is it even there ?       >       > manage-bde -status       >       > Either don't use encryption, or design your own encryption       > scheme that meets your requirements. If that means upgrading       > to Pro as a solution, then fine, disable the Home version       > of encryption, then do the Upgrade. Or, go with Veracrypt       > or something similar.       >       > When an OS has strange policies, you're pretty well forced       > to stay on top of every subsystem :-/              This is intended to be a discussion of the benefits of alternative choices       to Bitlocker on Microsoft Windows (both Home & Pro/EDU/Enterprise) such as       Veracrypt.              On older desktops (such as mine), TPM isn't an option, so BitLocker       can work on my non-TPM desktop but BitLocker has nowhere secure to store       the key for auto-unlock. So Bitlocker will only work with a manual       configuration and with weaker protection than on a TPM-equipped machine.              VeraCrypt, by contrast, works normally with full strength on any hardware              Still, Paul makes a good point about the cost:benefit side of encryption.       The biggest problem with the BitLocker implementation on Home is exactly       what he said, which is that users often do not even know it is enabled, how       it works, or what its limitations are. Hidden security is not the same as       controlled security.              That is where the difference between BitLocker and VeraCrypt becomes clear.              BitLocker changes behavior depending on edition, TPM version, and Microsoft       account defaults. VeraCrypt does none of that. It behaves the same on every       machine and always requires the user to make an explicit decision about the       boot password and key handling.              So I agree with Paul that strange OS policies force users to stay on top of       every subsystem. My point in the PSA is simply that VeraCrypt avoids those       policy traps by giving the user full visibility and full control, which is       why it ends up being the more predictable FDE solution on both older and       newer hardware (IMHO).              I don't discount that there are other solutions which may be just as good.       --       My conclusions follow the simplest model that fits every known fact.              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca