I think the Bitlocker "vuln" is a good reminder not to use vendor provided encryption for any sensitive data. https://github.com/Nightmare-Eclipse/YellowKey/ You load a specific file onto a flash drive, plug it into a Bitlocker encrypted computer, reboot it while holding a key combination, and it pops up a command prompt with full access to the encrypted volume. There's no way this isn't a backdoor.
this exploit works only if you dont use a PIN/password for your Bitlocker and the volume automatically unlocks
so it gives you access to an encrypted volume which automatically unlocks anyway
the only difference is that it immediately gives you root access to the volume instead of having to go through the Windows login procedure - this might be a stolen laptop you dont have an account on
The author claims the exploit also works with TPM+PIN, he just hasn't released the PoC:
> Second thing is, No, TPM+PIN does not help, the issue is still exploitable regardless, I asked myself this question, can it still work in a TPM+PIN environment ? Yes it does, I'm just not publishing the PoC, I think what's out there is already bad enough.
they might mean "after you enter the bitlocker PIN you get root access without having a login password on the system" - still just a privilege escalation bug
> I think the Bitlocker "vuln" is a good reminder not to use vendor provided encryption for any sensitive data
I don't think that's true. Some vendors have a better track record than others. Nobody's popped the storage encryption on iOS or MacOS devices yet AFAIK; and the fact that it's tied to a hardware secure element makes it pretty strong.
I don't see anything on the linked page that supports a conclusion that NSA has successfully broken the encryption at rest of an Apple device's storage since they introduced the secure element.
Prism targeted network communication to my knowledge, hence the data wouldn't be siphoned from at rest encrypted devices. Instead it would've been leaked before it was copied to that local encrypted device, whenever it was transmitted over the wire. Eg when your background task uploaded it to iCloud or similar.
There is no way for us, the users, to know wherever they have the capability to add additional keys to decrypt the data because the platform isn't open source and doesn't have attestation wrt what's actually serving the requests.
And it's worth remembering that apple had similar articles published before prism too which were ultimately proven to be groundless by prism.
Ah yes, the bizarro world where systems are normally unhackable so the default assumption is impenetrable security and you need to prove they are insecure.
Thank god this is not the world where things get hacked all the time and where any claim of meaningful security is a extraordinary claim that demands extraordinary evidence and proof before credibly asserting it, but everybody just ignores that part and just pinky promises it and everybody just believes them for the 104th time without evidence.
Please read and follow the guidelines. If you have something substantive to contribute, like a story about it being popped, or a technical critique of Apple’s implementation, please do so.
That warning also doesn’t render right on my
iPhone (the buttons are overlapping slightly), and I don’t recall seeing it on other repos. Is it new/bespoke?
I think the Bitlocker "vuln" is a good reminder not to use vendor provided encryption for any sensitive data. https://github.com/Nightmare-Eclipse/YellowKey/ You load a specific file onto a flash drive, plug it into a Bitlocker encrypted computer, reboot it while holding a key combination, and it pops up a command prompt with full access to the encrypted volume. There's no way this isn't a backdoor.
this exploit works only if you dont use a PIN/password for your Bitlocker and the volume automatically unlocks
so it gives you access to an encrypted volume which automatically unlocks anyway
the only difference is that it immediately gives you root access to the volume instead of having to go through the Windows login procedure - this might be a stolen laptop you dont have an account on
The author claims the exploit also works with TPM+PIN, he just hasn't released the PoC:
> Second thing is, No, TPM+PIN does not help, the issue is still exploitable regardless, I asked myself this question, can it still work in a TPM+PIN environment ? Yes it does, I'm just not publishing the PoC, I think what's out there is already bad enough.
https://deadeclipse666.blogspot.com/2026/05/were-doing-silen...
they might mean "after you enter the bitlocker PIN you get root access without having a login password on the system" - still just a privilege escalation bug
That’s quite a stretch, to say the least.
claiming to have a 10 times more impressive PoC but not releasing it "out of goodness of heart" is also quite a stretch
> I think the Bitlocker "vuln" is a good reminder not to use vendor provided encryption for any sensitive data
I don't think that's true. Some vendors have a better track record than others. Nobody's popped the storage encryption on iOS or MacOS devices yet AFAIK; and the fact that it's tied to a hardware secure element makes it pretty strong.
You mean aside from the NSA? https://en.wikipedia.org/wiki/PRISM
I don't see anything on the linked page that supports a conclusion that NSA has successfully broken the encryption at rest of an Apple device's storage since they introduced the secure element.
Care to share a quote?
Prism targeted network communication to my knowledge, hence the data wouldn't be siphoned from at rest encrypted devices. Instead it would've been leaked before it was copied to that local encrypted device, whenever it was transmitted over the wire. Eg when your background task uploaded it to iCloud or similar.
It’s worth remembering that since Snowden, much of iCloud is now end-to-end encrypted using keys that Apple cannot unwrap: https://support.apple.com/guide/security/secure-icloud-keych...
Fwiw, that's a clear statement - but only that.
There is no way for us, the users, to know wherever they have the capability to add additional keys to decrypt the data because the platform isn't open source and doesn't have attestation wrt what's actually serving the requests.
And it's worth remembering that apple had similar articles published before prism too which were ultimately proven to be groundless by prism.
What, exactly, was proven to be groundless?
Ah yes, the bizarro world where systems are normally unhackable so the default assumption is impenetrable security and you need to prove they are insecure.
Thank god this is not the world where things get hacked all the time and where any claim of meaningful security is a extraordinary claim that demands extraordinary evidence and proof before credibly asserting it, but everybody just ignores that part and just pinky promises it and everybody just believes them for the 104th time without evidence.
Sarcasm is not welcome on Hacker News.
https://news.ycombinator.com/newsguidelines.html
Please read and follow the guidelines. If you have something substantive to contribute, like a story about it being popped, or a technical critique of Apple’s implementation, please do so.
You may also refer to Apple’s platform security white paper: https://help.apple.com/pdf/security/en_US/apple-platform-sec...
It's so obvious that many of the bugs being found are/were most likely M$ backdoors.
There doesn't seem to be any other plausible explanation. The reckoning needs to come and people need to stop using their products for good.
Would love a whistleblower to explain which part of the government or company forced it.
Haven't there been heaps of vulnerabilities cropping up all over recently, including CopyFail and Dirty Frag?
Oh cool. My brother's old laptop is locked. Maybe this will help
Only affects win11
Haha I texted him about this and he said he already re-installed Windows. Bad timing. It was just a couple weeks ago he told me about this.
Windows 11 is almost 5 years old at this point
So weird that GitHub requires a login to view their BlueHammer repo.
https://github.com/Nightmare-Eclipse/BlueHammer
That warning also doesn’t render right on my iPhone (the buttons are overlapping slightly), and I don’t recall seeing it on other repos. Is it new/bespoke?
Laid off Microsoft researcher?
Could the Bitlocker vulnerability be a backdoor mandated by some government agency?
Related:
YellowKey Bitlocker Bypass Vulnerability
https://news.ycombinator.com/item?id=48114997
i think so~