{"id":212386,"date":"2015-12-29T16:06:55","date_gmt":"2015-12-29T16:06:55","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/?p=212386"},"modified":"2015-12-29T16:08:16","modified_gmt":"2015-12-29T16:08:16","slug":"microsofts-storage-windows-encryption-keys-expose-users-hackers-govt-report","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/breaking-news\/microsofts-storage-windows-encryption-keys-expose-users-hackers-govt-report\/","title":{"rendered":"Microsoft\u2019s storage of Windows encryption keys could expose users to hackers, gov\u2019t \u2014 report"},"content":{"rendered":"<p>When it comes to computer security, encryption is key. That\u2019s because encrypted devices or data require a key only accessible to the owner, but many Microsoft users aren\u2019t as protected as they think, and could be exposed to hackers and law enforcement.<\/p>\n<div>\n<p>Since Windows 8.1, <em>\u201cdisk encryption\u201d<\/em> has been a built-in feature for smartphones and other devices. Though it is helpful against common thieves, its compulsory nature sends a backup copy of the recovery key to Microsoft when a user logs in through a Microsoft account. As soon as one double is created, it can lead to a slippery slope of vulnerability, inviting backdoor access to hackers or government agencies such as the Federal Bureau of Investigation.<\/p>\n<p>There is no warning or opt-out option for Microsoft users, something eerily akin to the Clipper chip program pushed by the National Security Agency and the Clinton White House in the 1990\u2019s, according to The Intercept, which <a href=\"https:\/\/theintercept.com\/2015\/12\/28\/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key\/\">first reported<\/a>\u00a0on the Windows vulnerability.<\/p>\n<p>The Clipper chip was an encryption technology developed by the NSA for telecom companies, allowing for <em>\u201ckey escrow,\u201d<\/em> or shared access between the government and the corporations to personal encrypted gadgets.<\/p>\n<p>The NSA\u2019s Clipper chip was defunct by 1996 thanks to advances in encryption technology. Today, options like PGP encryption exist for messaging, and there are free open-source tools like Signal which block out surveillance of phone calls.<\/p>\n<p>After a Microsoft user logs in for the first time, which automatically sends a copy of their encryption key to the company, the key can be deleted. However, this tactic may only be useful if nefarious forces haven\u2019t already accessed the machine or its accessories after a login, which is possible to accomplish in less time than it takes to delete the key.<\/p>\n<p><em>\u201cThe gold standard in disk encryption is end-to-end encryption, where only you can unlock your disk. This is what most companies use, and it seems to work well,\u201d<\/em> Johns Hopkins University cryptography professor Matthew Green told The Intercept. <em>\u201cThere are certainly cases where it\u2019s helpful to have a backup of your key or password. In those cases you might opt in to have a company store that information. But handing your keys to a company like Microsoft fundamentally changes the security properties of a disk encryption system.\u201d<\/em><\/p>\n<p><em>\u201cYour computer is now only as secure as that database of keys held by Microsoft, which means it may be vulnerable to hackers, foreign governments, and people who can extort Microsoft employees,\u201d<\/em> Green added.<\/p>\n<p>The logic behind Microsoft\u2019s decision to set up its encryption in this way is simple: provide for the most probable customer needs.<\/p>\n<p><em>\u201cWhen a device goes into recovery mode, and the user doesn\u2019t have access to the recovery key, the data on the drive will become permanently inaccessible. Based on the possibility of this outcome and a broad survey of customer feedback we chose to automatically backup the user recovery key. The recovery key requires physical access to the user device and is not useful without it,\u201d<\/em> a Microsoft spokesperson told the Intercept.<\/p>\n<p>The main competitor to Microsoft Windows is Apple iOS, and Apple leaves it up to the customer whether to store a key double on its iCloud. There is no such choice for Windows users unless they use more expensive systems like Windows Pro or Windows Enterprise. In those cases, a premium service called BitLocker allows users the choice of printing the key or saving it to a USB stick, rather than sending it to Microsoft.<\/p>\n<\/div>\n<p>Via <a href=\"https:\/\/www.rt.com\/usa\/327307-microsoft-storage-windows-encryption-keys\/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=RSS\">RT<\/a>.\u00a0This piece was reprinted by <a href=\"http:\/\/rinf.com\">RINF Alternative News<\/a> with permission or license.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to computer security, encryption is key. That\u2019s because encrypted devices or data require a key only accessible to the owner, but many Microsoft users aren\u2019t as protected as they think, and could be exposed to hackers and law enforcement. Since Windows 8.1, \u201cdisk encryption\u201d has been a built-in feature for smartphones and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":210751,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[487],"tags":[],"class_list":{"0":"post-212386","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-breaking-news"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/212386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=212386"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/212386\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media\/210751"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=212386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=212386"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=212386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}