Tearing Digital Layer: No Immediate Lock Change
Tearing Digital Layer: No Immediate Lock Change
Disclaimer: This post includes affiliate links
If you click on a link and make a purchase, I may receive a commission at no extra cost to you.
Quick Links
Key Takeaways
- BitLocker’s encryption keys can be stolen with a Raspberry Pi Pico, but the exploit only works with external TPMs using the LPC bus.
- Most modern hardware integrates the TPM, making it more difficult to extract BitLocker keys. AMD and Intel CPUs are likely safe.
- Despite the exploit, BitLocker’s AES-128 or AES-256 encryption is still secure, so there’s no need to abandon it.
Microsoft’s BitLocker is one of the most popular full-disk encryption tools, and is built into Windows 10 and 11 Pro providing an easy encryption option for millions of Windows users worldwide. But BitLocker’s reputation as a leading encryption tool could be under threat after a YouTuber successfully stole encryption keys and decrypted private data in just 43 seconds—using a Raspberry Pi Pico costing $6.
How Was BitLocker’s Encryption Broken?
BitLocker’s encryption was broken by YouTuber Stacksmashing, who posted a video detailing how he intercepted BitLocker data, extracted decryption keys, and successfully exploited the BitLocker encryption process.
Stacksmashing’s exploit involves the external Trusted Platform Module (TPM)—the same TPM chip that stops Windows 11 upgrades—found on some laptops and computers. While many motherboards integrate the TPM chip and modern CPUs integrate the TPM into their design, other machines still use an external TPM.
Now, here’s the issue and the exploit discovered by Stacksmashing. External TPMs communicate with the CPU using what’s known as an LPC bus (Low Pin Count), which is a way for low-bandwidth devices to maintain communication with other hardware without creating a performance overhead.
However, Stacksmashing found that while the data on the TPM is secure, during the boot-up process, the communication channels (the LPC bus) between the TPM and CPU are completely unencrypted. With the right tools, an attacker can intercept data sent between the TPM and CPU containing insecure encryption keys.
Tools like the Raspberry Pi Pico, the minute $6 single-board computer that has a bunch of uses. In this case, Stacksmashing connected a Raspberry Pi Pico to unused connectors on a test laptop and managed to read the binary data as the machine booted. The resulting data contained the Volume Master Key stored on the TPM, which he could then use to decrypt other data.
Is It Time to Ditch BitLocker?
Interestingly, Microsoft was already aware of the potential for this attack. However, this is the first time a practical attack has surfaced at large, illustrating just how fast BitLocker encryption keys can be stolen.
It raises the vital question of whether you should consider switching to a BitLocker alternative, like the free and open-source VeraCrypt . The good news is that you don’t need to jump ship for a few reasons.
First, the exploit only works with external TPMs that request data from the module using the LPC bus. Most modern hardware integrates the TPM. While a motherboard-based TPM could theoretically be exploited, it would require more time, effort, and an extensive period with the target device. Extracting BitLocker Volume Master Key data from a TPM becomes even more difficult if the module is integrated into the CPU.
AMD CPUs have integrated TPM 2.0 since 2016 (with the launch of AM4, known as fTPM), while Intel CPUs integrated TPM 2.0 with the launch of its 8th Generation Coffee Lake CPUs in 2017 (known as PTT). Suffice to say, if you’re using a machine with an AMD or Intel CPU manufacturer after those dates, you’re most likely safe.
It’s also worth noting that despite this exploit, BitLocker remains secure, and the actual encryption underpinning it, AES-128 or AES-256, is still secure.
Also read:
- [New] Navigating Twitter's Algorithm to Amplify Your Message
- [Updated] Exploring Social Networking YouTube Content on FB
- 2024 Approved Shine a Light on Your Content Creation
- Comprehensive Tutorial: How To Cleanup Extra Browsers Features on Windows 11 PCs
- How to Bypass Activation Lock on iPhone 13 Pro Max or iPad?
- In 2024, Here Are Some Reliable Ways to Get Pokemon Go Friend Codes For Realme C67 4G | Dr.fone
- In 2024, How to Cast Oppo A78 Screen to PC Using WiFi | Dr.fone
- In 2024, Top 5 Tracking Apps to Track Oppo K11 5G without Them Knowing | Dr.fone
- Mastering the Art of Credential Management Fix
- Precise Note-Taking Apps: The Seven Windows Stars
- Quick Guide: Efficient PowerToys Setup in Win11
- Speeding up Windows Edge: Steps for W10 & W11
- Strategies to Overcome Privilege Issues in Windows Installer Errors
- Tablet' Writes, Transcribes: Find the Winning Seven on PC
- The Essential Checklist for Selecting the Best Windows PC
- The Smart Way to Ascertain Your Windows System's Make
- Top 7 Phone Number Locators To Track Tecno Spark 20 Pro Location | Dr.fone
- Title: Tearing Digital Layer: No Immediate Lock Change
- Author: Richard
- Created at : 2024-10-14 04:31:30
- Updated at : 2024-10-20 22:18:59
- Link: https://win11-tips.techidaily.com/tearing-digital-layer-no-immediate-lock-change/
- License: This work is licensed under CC BY-NC-SA 4.0.