- 7,779
- 13,021
- TL;DR
- Bit Locker Passworld Vulnerability
The discussion centers on a vulnerability in Microsoft Windows BitLocker that exposes user passwords through a specific sequence of events. This vulnerability does not compromise BitLocker's encryption key but rather exploits how applications store passwords in memory. If a device is hibernated before the password is overwritten and subsequently stolen, a thief can access unencrypted passwords from the hibernation file, especially if multi-factor authentication (MFA) is not implemented by the service. The conversation also touches on related issues of personal data consent in light of GDPR regulations.
PREREQUISITESSecurity professionals, system administrators, and anyone concerned with data protection and encryption vulnerabilities in Windows environments.
Usually it's only after a 24-hour period expires. Weird.WWGD said:Yes, PF sometimes doesn't allow you to change your post. I tried editing before first posting it.
Equally weird, I was asked here, in other sites, for the first time I can remember, to give consent to the site Im in, to use my personal data.berkeman said:Usually it's only after a 24-hour period expires. Weird.
This was at PF? You were asked to give consent to use your personal data? Like Cookies or something else? Do you think it was because you used Bitlocker to sign in?WWGD said:Equally weird, I was asked here, in other sites, for the first time I can remember, to give consent to the site Im in, to use my personal data.
Here in PF as well as when I tried to use any app.berkeman said:This was at PF? You were asked to give consent to use your personal data? Like Cookies or something else? Do you think it was because you used Bitlocker to sign in?