Back in January Microsoft encrypted all my hard drives without saying anything. I was playing around with a dual boot yesterday and somehow aggravated Secureboot. So my C: panicked and required a 40 character key to unlock.

Your key is backed up to the Microsoft account associated with your install. Which is considerate to the hackers. (and saved me from a re-install) But if you’ve got an unactivated copy, local account, or don’t know your M$ account credentials, your boned.

Control Panel > System Security > Bitlocker Encryption.

BTW, I was aware that M$ was doing this and even made fun of the effected users. Karma.

  • FartsWithAnAccent@fedia.io
    link
    fedilink
    arrow-up
    42
    ·
    22 hours ago

    It logs literally everything you do with screenshots, then sends it to M$ despite their assurances that it would be local only.

    Super invasive!

    • Ephera@lemmy.ml
      link
      fedilink
      English
      arrow-up
      3
      ·
      20 hours ago

      I’m not aware of them uploading the screenshotted data, not for now anyways.

      • GoodLuckToFriends@lemmy.today
        link
        fedilink
        English
        arrow-up
        11
        ·
        19 hours ago

        The data is indexed and parsed somehow. The last report on it that I saw had a picture of a semi-famous person be properly indexed under the person’s name, despite it being a picture that was taken by the person talking about recall, which means the image was not public. Whatever recall was doing, it analyzed the picture, and that’s probably not a local process.