logoalt Hacker News

iscoelhotoday at 7:06 AM1 replyview on HN

If the device doesn't have BitLocker, this exploit is pointless because you can already boot any OS USB and immediately have full access to the unencrypted disk.

This exploit is only ever relevant with BitLocker enabled (as a method to "bypass" BitLocker's security premise [categorically classifying this as, dare I say, a "BitLocker bypass"]).

To avoid typing 1)2)3)4) a bunch of more times, I'll just say 2/3/4) all still fit the definition of downplaying the situation.


Replies

Dylan16807today at 7:11 AM

> If the device doesn't have BitLocker, this exploit is pointless because you can already boot any OS USB

For this hypothetical, assume the owner took basic precautions to lock booting to the hard drive and password protect the BIOS.

But I'm not 100% familiar with how recovery mode normally works, so maybe it doesn't matter.

> To avoid typing 1)2)3)4) a bunch of more times, I'll just say 2/3/4) all still fit the definition of downplaying the situation.

I think that level of pushback against the claims is a valid (and small) amount of "downplaying". I haven't seen anyone claiming this isn't a serious issue.

show 1 reply