Chris Murphy wrote:
> cryptsetup does have Bitlocker support, so long as you have the recovery
> key you can unlock and get access to your data, I've tested this.

But you need a recovery key to begin with, because the main key is sealed in 
the TPM and not visible from anything other than Windows.

So Bitlocker essentially forces Windows on you.

> Bitlocker has nothing to do with Secure Boot.

Disabling "Secure" (Restricted) Boot will change the TPM measurements and 
hence also prevent the key from being unsealed.

https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-countermeasures#uefi-and-secure-boot

So Bitlocker essentially forces Restricted Boot on you.

> This is entirely beside the point though, which is to try and make dual
> boot as useful for users as possible. We want users to be confident about
> both OS's remain accessible in a discoverable way, without having to jump
> through hoops.

Sure. Really sad though that we have to work around a broken piece of 
"security" software that effectively functions like a ransomware.

Where is the outcry about this misfeature?

Setting up Bitlocker behind the user's back, i.e., also without prompting 
for a passphrase, provides absolutely no security in the event of a stolen 
notebook because somebody else hitting the power button will NOT change the 
TPM measurements, the power button is not a fingerprint reader.

        Kevin Kofler
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to