![]() So are you supposed to hand your computer over to the hacker? It seems like there is no alternative. ![]() It is not actually a flaw in software – many others (if not all) cryptographic algorithms may be “cracked” that way.īut what it does mean? It does mean that the rogue must have physical access to your computer while it is turned on and unlocked, because if your computer is turned off it is out of risk (at least if you have encrypted system drive). Secondly, the hacker has to have full memory dump to recover the key from it. Possession of the encrypted data itself doesn’t matter if you use this technology. Actually this is the situation which Vista or Windows 7 BitLocker is to protect you from. ![]() But what are the requirements to do so and how secure is BitLocker after the software is released? Not really, but…įirstly, the malefactor has to have in possession your hard drive or an exact copy of that drive at the very least. No, the company really issued the software which is able under certain circumstances recover the key used by Windows BitLocker drive encryption. Well, is it a failure of Microsoft Corporation to protect your data, does Passware know how to bypass Microsoft Bitlocker? Or is it another canard, brought to life be journalist? In my opinion it is the latter. Those of you who don’t know what is BitLocker may read about it at BrightHub. Passware Company recently issued next version of their software named Passware Kit Forensic, which, among all other features is stated (by online magazines and community, not by the company) to be able break Microsoft BitLocker protection, introduced in Windows Vista.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |