I’ll explain in a bit why that is futile. So far, the only known way to crack the encryption algorithms in BitLocker is to brute force your way into it. Well, no algorithm is indeed 100% foolproof but, algorithms used in BitLocker are much smarter. You might be wondering, it is just encryption, a similar concept that had been in use since world wars and they were proven to be crackable. The encryption key is stored in the USB drive of choice which has to be connected to the PC every time the system boots. Alternatively, you could go for the option to use a USB stick as the key. However, that defeats the whole purpose of encryption as the password is also stored in the disk somewhere. If your motherboard doesn’t come with a TPM, you can change some settings to use a password every time the system boots up. ![]() The TPM is made to work only with that motherboard. Since the key is physically separate from the main memory, even if someone manages to steal the drive, they cannot access its sensitive content. Every time the device boots, the TPM is accessed for the key to decrypt information. Most modern motherboards come with a chip called TPM (Trusted Platform Module) soldered onto them. The solution is to encrypt the disk and store the key in a separate physical location other than the disk itself. The way BitLocker accomplishes this is brilliant.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |