Cornballer

joined 6 days ago
[–] Cornballer@lemmy.zip 35 points 1 day ago* (last edited 1 day ago) (5 children)

Somebody on twitter “reverse engineered” the exploit. Apparently ms shipped debug code in production. At least it’s not called Backdoor_FBI outright.

How it works:

  1. Recovery tools look for a config file called RecoverySimulation.ini on the OS drive
  2. If Active=Yes, it enables "test mode" for the recovery tools
  3. Test mode unlocks your BitLocker drive but a flag called FailRelock tells it to skip relocking
  4. cmd.exe spawns with full access to your "encrypted" drive
[–] Cornballer@lemmy.zip 11 points 1 day ago* (last edited 1 day ago) (3 children)

Apparently they are amazing aides for the visually impaired.

full thread

[–] Cornballer@lemmy.zip 1 points 6 days ago

Search for addon manager to reorder the categories. I use aiostreams for a more granular experience. You can also add some curated lists from Trakt for when you’re less inspired.