Today i took my first steps into the world of Linux by creating a bookable Mint Cinamon USB stick to fuck around on without wiping or portioning my laptop drive.

I realised windows has the biggest vulnerability for the average user.

While booting off of the usb I could access all the data on my laptop without having to input a password.

After some research it appears drives need to be encrypted to prevent this, so how is this not the default case in Windows?

I’m sure there are people aware but for the laymen this is such a massive vulnerability.

57 points

Same in Linux. No disk encryption and everything is easy accessible if you have physical access.

permalink
report
reply
6 points

Physical access wouldn’t seem so hard. Say you worked at the company company and wanted to get the files your boss has on your evaluation or something. Wait till they’re on lunch, plug in a usb and pull them up.

I imagine patient records wouldn’t be encrypted either

permalink
report
parent
reply
33 points

Any respectable company with Windows would be using BitLocker - full disk encryption. It’s super easy to setup if your computer has TPM, fully transparent for the user in most cases.

permalink
report
parent
reply
3 points

My work macbook won’t even let me mount an external storage device, but it doesn’t seem to care about my nextcloud client running in the background. Sorry for my blasphemous behaviour my cyber security comrades 🫡🥺

permalink
report
parent
reply
4 points

That’s why you can’t just boot from an usb

permalink
report
parent
reply
6 points

I imagine patient records wouldn’t be encrypted either

If computerised, they freaking well should be.

In general they’d be in a database with it’s own accesss control to interfaces and the databases data store should be encrypted. In my country there are standards for all healthcare IT systems that would include encryption and secure message exchange between systems. If they breached those they’d be in trouble.

If your doctor has a paper file in a filing cabinet on premises, written in English, then yes. The security is only the physical locks, just like your hme pc.

permalink
report
parent
reply
2 points

such a “hack” would only work in a poorly written tv show

an unencrypted drive is like being able to look into a bank though a window, not ideal but things of value could/should/would still be in a safe or somewhere else completely

permalink
report
parent
reply
7 points

Unless someone ticked the “encrypt storage”-box in the installer, you don’t even have to pay for Pro to use it!

permalink
report
parent
reply
70 points

And this is why we say physical access is root access.

permalink
report
reply
12 points

Absolutely it’s crazy that it’s so simple that you can do it in the space of 5v minutes.

permalink
report
parent
reply
12 points

You should look into HDD platter recovery. There’s some really high quality stuff on YouTube.

permalink
report
parent
reply
7 points

Aw buddy.

Go look at the free software called autopsy

permalink
report
parent
reply
11 points

I’m sure there are people aware but for the laymen this is such a massive vulnerability.

This is only a vulnerability if you suspect a threat actor might physically access your computer. For most people, this is not a concern. There’s also the issue that it has processing overhead, so it might make certain operations feel sluggish.

Encryption is not a panacea, because if someone ever forgets their password (something common for the layperson), the data on that drive is inaccessible. No chance for recovery. Certain types of software may not like it either. It’s one of many considerations someone should make when determining their own threat model, but this is not a security flaw. It’s an option for consideration, and most people are probably better off from a useability standpoint with encryption disabled by default.

permalink
report
reply
4 points

I think it just really goes to show you can’t hide anything on a computer physically.

I also feel this is something that should be taught in school (maybe it is i finished school over 13 years ago)

I always knew there were ways to recover files off of hard drives. I just assumed they needed to be physically remounted not just plug in a usb and off you go

permalink
report
parent
reply
8 points

Physically remounting a drive is the same thing as just plugging in a USB and going to town. Instead of taking the drives to a different system, you’re bringing the different system to the drives!

permalink
report
parent
reply
3 points

where I live they never really taught conputer literacy. some places teach ms office and that’s it

permalink
report
parent
reply
1 point
*

I think it just really goes to show you can’t hide anything on a computer physically.

What do you mean? It’s certainly possible when using encryption software such as bitlocker. It’s just not always enabled by default.In fact it’s saved my ass from total data loss a couple of times.

If you can make sure nobody has physical access to your pc than there’s a case to be made that you don’t need it, and if you can’t and are afraid that someone has both knowledge of this fact and the intention to (ab)use it, you use bitlocker.

permalink
report
parent
reply
5 points

Encryption is not a panacea, because if someone ever forgets their password (something common for the layperson), the data on that drive is inaccessible.

It’s because of stuff like this that Microsoft wants people to create an Microsoft account. Recovery key automatically saved to your Microsoft account. For business the recovery key can also be automatically saved in a central location.

permalink
report
parent
reply
1 point
*
Deleted by creator
permalink
report
reply
0 points

Are you saying the performance hit is from running off an encrypted drive?

permalink
report
parent
reply
3 points
*
Deleted by creator
permalink
report
parent
reply
2 points

Given that AES instructions have been implemented directly in the CPU since 2008, any performance penalty should be negligible.

permalink
report
parent
reply
9 points

so how is this not the default case in Windows?

It actually is now

permalink
report
reply
8 points

And people are pissed because they don’t realize, and when they don’t have the key any more, all their data is gone!

permalink
report
parent
reply
0 points

The encryption key is stored remotely and can be retrieved through the Microsoft account

permalink
report
parent
reply
2 points

That assumes they know which Microsoft account it was attached to, the password, and have another device to access that account and retrieve the recovery key. If they did the setup five years ago, they’ve probably forgotten all that info.

permalink
report
parent
reply
7 points

IIRC, this is one of the reasons that Windows 11 requires TPM 2.0, so that the drive can be encrypted using the TPM as the key.

permalink
report
parent
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 7.7K

    Monthly active users

  • 7.6K

    Posts

  • 203K

    Comments