Top | 7 | |
Newsletter 05/18/2025 | If you find this article of value, please help keep the blog going by making a contribution at GoFundMe or Paypal |
Back to Contents |
Tales from the En-Crypt-ion, Part 1
Introduction This is another example of Microsoft's enforcing, without a user's knowledge or consent, its standard for computer security. Or, as is my opinion of OneDrive, Microsoft once again pulls a boner. As Dictionary.com defines it, the term "pulls a boner" is another way of saying, "Make a blunder." This fact should be of great concern to any and all Windows 11 users. When a user's root drive is encrypted, and the user is not aware of that fact, a problem can easily morph into a disaster This series of web articles will introduce readers to drive encryption. Below is an outline of what readers of this series will learn about drive encryption.
Part 1
1. How and when your drive becomes encrypted. When discussing drive encryption, I feel somewhat like an antivaxer. Yes, drive encryption will help protect you from the ravages of data theft should your computer become compromised. Once the drive is locked with encryption, a key is needed to decrypt the drive and make it readable again. On the other hand, the possible negative outcomes of drive encryption can be quite daunting for most users to mitigate. Yes, when drive encryption goes bad, users might well lose all data that is not backed up. So, whenever I was asked about drive encryption, my advice was to not do it. I never want to get blamed for any catastrophe that may befall a user. To understand how encryption and decryption work, it is useful to consider how ransomware works. Here is how ransomware works. The crooks encrypt the files on a compromised machine. The victim then has no access to their files. Then the owner of that machine is forced to pay "a ransom" to get the decryption key in order to get access to the victim's files. At least, that's the theory. Often, once the ransomed is paid, no key is provided; or the key provided doesn't work. Microsoft, however, is not in the crime business.
My first exposure to this new fact of Windows computing life came about in April 2025 when I helped a client setup a brand new HP Windows 11 desktop computer. After the obligatory BIOS update that all new computers must perform at setup, and once the BIOS update was completed, but before the required reboot, a blue error screen appeared. The screen said that because the TPM module was either not installed or had failed, the drive encryption must be overcome by using the 16 character encryption key. The blue screen displayed the key. This made no sense to me. If the TPM module was not present or not working properly, then Windows 11 would not have been able to be installed in the first place. Over many years of trial and tears, I have learned to do nothing when first confronted with an unknown Windows error. The computer needed to be manually shutdown. Then to my great relief, it started back up without a hitch. Once Windows fully started, I used Device Manager to verify that indeed the Trusted Platform Module (TPM) was installed and working. Further research for this series, informed me that a BIOS update could force drive encryption or make the encryption fail. Not only will a BIOS update force drive encryption, so will a clean installation of Windows 11. A clean Windows 11 reinstallation is when all the data on the drive is removed, and the drive is repartitioned, before Windows is installed. So, if your older Windows 11 PC gets infected, and you take the recommended action to backup your data and wipe the drive clean before reinstalling Windows 11, you will end up with a newly encrypted hard drive on your computer. I have proved that in the field with my own work. Finally, all new Windows 11 PCs come with drive encryption turned on by default. Ah Jeez ...
2. The Pros and Cons of Drive encryption. The single most important reason that you may want to use drive encryption is that encryption is one factor in keeping your data secure from thieves and other miscreants. If your laptop or desktop were to be stolen, then the culprits would have a hard time getting access to your files. Encryption would also be another barrier hackers would need to overcome if your computer were to become infected with malware. As sort of the Yin to the Yang of drive encryption protecting your data, there many possible scenarios where drive encryption could cause a user to lose their data. Access to the encryption key is required whenever a locked drive needs to be unlocked. The key is stored at a user's account on the Microsoft.com website. If one were to lose access to their Microsoft account before storing the key in text format somewhere, the result could be the loss of access to the encrypted drive. Likewise, deleting or changing the Microsoft account without first storing the key somewhere might also result in being locked out of the drive. I have encountered many users who do not know how to navigate the Microsoft website. Some kind of drive or system failure might also require having the decryption key to fix the problem. The possible scenarios are too numerous to discuss herein. The main point is this: If your drive is encrypted — which more likely than not it is — you really MUST have the decryption key stored as text one way or another. And not have it stored only on the PC that has the locked drive.
3. How to recognize that your drive is encrypted.
4. The Mysteries of the Drive Lock Are Revealed. As stated above, if there is a lock icon attached to your drive in File Explorer, then your drive is encrypted. This does, of course, beg the question: If my drive is encrypted, then why do I not need a key to access the drive? Although it is possible that the encryption has failed in some way, the usual answer is that when you start YOUR computer with YOUR PIN, the drive is unlocked. This is a property of the TPM module which is a hardware requirement for Windows 11. Basically, the recovery key is burned into the TPM module when the manufacturing of the individual PC occurred. When you enter your PIN, the operating system allows you access to your drive. So now, please read on to Part 2.
|
|||||||||||||||
¯\_(ツ)_/¯¯ Gerald Reiff |
Back to Top | ← previous post | next post → |
If you find this article of value, please help keep the blog going by making a contribution at GoFundMe or Paypal |