Microsoft is being sued by a man who feels cheated by the current plans to sunset Windows 10. He makes some good points, but I doubt he’ll win.
Microsoft is being sued by a man who feels cheated by the current plans to sunset Windows 10. He makes some good points, but I doubt he’ll win.
If you don’t switch on SecureBoot, that can still be the truth.
Can you tell me more about what secure boot does in this correct? (Assuming this isn’t a joke)
If you don’t enable SecureBoot then you can’t install Win 11.
As a bonus, you won’t be able to install the latest Call of Duty or Battlefield titles either.
Call of Battle and Duty Field?! And I thought not installing Win11 was a great experience! I can’t wait to not buy and not play both of those games!
Thanks SecureBoot!
Except you technically can. Windows 11 registry allows for installation without secure boot and its called after the upgrade process, thats what things like rufus patch to allow it.
Now idk if secure boot has to be enabled for windows 10 to consider it upgrade ready, but its technically all in there
Okay but you should enable secure boot on any device you want to keep any level of private data on. It’s trivial to break into a device that doesn’t have it enabled if you can physically access it. Laptops especially should have secure boot enabled.
Yeah, but I might need to break into it to access it, e.g. if hardware dies, or Windows has a fit and breaks something.
This also why I don’t do whole disk encryption; it makes recovery impossible
You can work around it in both cases. SecureBoot will only prevent you from running non-signed boot loaders. If that breaks then you just turn off SecureBoot while you work on the issue (assuming SecureBoot failing isn’t due to a compromised boot loader) and the machine will boot normally minus any data stored in the TPM such as the encryption key. For the encryption key, this is something you are supposed to keep a copy of outside the TPM for scenarios like this. On Windows consumer PCs, this is stored in your Microsoft account or the place you specify when enabling it. For Azure or AD-joined PC’s this can be stored in Azure or AD.
The only ways SecureBoot and encryption will burn you are if there is data stored in the TPM that you don’t have a backup of or way of re-creating, or if the encryption headers on the drive are lost. That said, if you aren’t using a TPM some Windows features will break regardless and if the drive is so messed up that the encryption headers are lost then you’re probably back to backups anyway.
The thing is on desktop pcs… If someone got physical access to it you don’t want to… You got way bigger issues haha
I’d argue that you now have two major issues. Someone breaking into a house and stealing a desktop isn’t unheard of. Full disk encryption with secure boot deployed will save you the headache of also having your identity/bank account/cc info stolen a few days later.
… Secure boot has nothing to do with encryption and your data. Bitlocker can work without secure boot https://superuser.com/questions/1200958/does-enabling-bitlocker-require-secureboot
I mean yeah that’s why I made the distinction in my comment… Without secure boot you’re still opening yourself up to a whole host of other attack vectors even if you have bitlocker enabled.
I’d argue that 99,9% don’t use full disk encryption cause it’s Infact a performance degrading feature.
And there’s nothing to be stolen , all my passwords are in a password manager , all important accounts including the password manager have 2fa.
If someone isn’t a pw manager or 2fa it’s all their fault honestly.