Agent Feb 27, 2024 @ 7:14am
Advice on making the most of BitLocker full disk encryption?
I've moved to encrypting all my windows devices with full disk BitLocker encryption. This includes external drives.

What I'm curious about here is what habits I need to get into to further improve my protection against say a more sophisticated hacker. The whole point of this is to prevent PHYSICAL access to the device, so any possible way to get in should be mitigated.

If someone stole your device, they'd need your windows user account pin code to get in. If you sign in beforehand the encryption key is stored on RAM? So to lock the drive again Microsoft suggests to either shutdown, restart, or put the system into hibernation mode.

I always used to lock my devices while not in use, but this could still leave me open to DMA or cold boot attacks etc. Do these still apply to if you are using CPU for your TPM rather than a dedicated TPM module?
< >
Showing 1-5 of 5 comments
Omega Feb 27, 2024 @ 7:25am 
Bitlocker is effectively uncrackable.

A TPM unlocked drive will have data at rest encrypted. This means any data the computer is not actively working on is encrypted, unencrypted data may live in the systems RAM. Data at rest encryption will prevent someone from just pulling out the hard disk and reading the data directly from it, they will require the ability to log in to the machine to access it.

If you are worrying about a cold boot attack, where someone turns on your PC and then freezes your memory to -180c to then read the keys from them you shouldn't use data at rest encryption, you shouldn't even be running Windows to begin with.


Also do not use PIN codes to log in, a 4 or 6 letter code is stupidly easy to bruteforce.

Never lose your recovery code, if your BIOS is reset or updated, or if you ever switch to another system Bitlocker will ask for it.
Agent Feb 27, 2024 @ 7:34am 
Originally posted by Omega:
Bitlocker is effectively uncrackable.

A TPM unlocked drive will have data at rest encrypted. This means any data the computer is not actively working on is encrypted, unencrypted data may live in the systems RAM. Data at rest encryption will prevent someone from just pulling out the hard disk and reading the data directly from it, they will require the ability to log in to the machine to access it.

If you are worrying about a cold boot attack, where someone turns on your PC and then freezes your memory to -180c to then read the keys from them you shouldn't use data at rest encryption, you shouldn't even be running Windows to begin with.


Also do not use PIN codes to log in, a 4 or 6 letter code is stupidly easy to bruteforce.

Never lose your recovery code, if your BIOS is reset or updated, or if you ever switch to another system Bitlocker will ask for it.
Thanks for the info. In that case probably very unlikely I'm interesting enough to do a cold boot attack. Search results can overblow these minor security concerns.

I'll try memorising a solid password instead, I guess since it's offline there'd be no real way to time out brute forcing.

I've got recovery codes stored in multiple places and in a safe that's bolted to the wall.
Omega Feb 27, 2024 @ 7:34am 
Originally posted by smallcat:
A video circulated on Internet showing how to hack a TPM is several seconds .
Massively overblow.

This was already known. And this only affects systems with a physical separate TPM module, systems with the TPM integrated in to the CPU or SoC this does not affect.
Agent Feb 27, 2024 @ 7:36am 
Originally posted by smallcat:
A video circulated in Internet showing how to hack a TPM is several seconds .

As a gamer i have not much to hide thus i dont need more than a firewall and an antivirus app . I have only an app developed by me wbich has a high value but it s on a hdd and it s not connected to internet . As for a physical access i m not protected but i doubt anyone will attack me .
That was for a dedicated TPM module. It doesn't work on CPU TPM from Intel or AMD.

I do IT administration for a small firm, so there's lots of data I need to keep secure. While the odds of someone gaining physical access to my stuff are low, the chances are still there. It'll give me peace of mind if everything is encrypted vs not.
Last edited by Agent; Feb 27, 2024 @ 7:37am
Zef Feb 27, 2024 @ 7:57am 
You do what you want ofcourse but i will never use bitlocker on my own personal devices as a power user, i only use local users on windows and modify the system myself using GPO, regedit, host files and such.

All my important data is backupped on my NAS aswell.
< >
Showing 1-5 of 5 comments
Per page: 1530 50

Date Posted: Feb 27, 2024 @ 7:14am
Posts: 5