Feedback & Followups
- A timely reminder both that malicious ads remain a big problem, and that Mac users are not immune to malware: Mac malware is sneaking into some sponsored Google ads — appleinsider.com/…
Deep Dive — 🧯 Understanding the Microsoft BitLocker Key ‘Controversy’
TL;DR — most NosillaCastaways probably want to continue to accept the BitLocker default setting and continue to have the encryption key backed up to their Microsoft Account.
Windows supports full disk encryption using a feature named BitLocker, and it works like any other full disk encryption technology, protecting the data on the disk from being accessed by anyone who steals the computer or the drive.
All of these systems work in a similar way — the actual bits on the disk are encrypted with a long, complex key, but since that can’t be easily written down, let alone remembered, that key gets re-encrypted with the user’s password. This means that to unlock the drive, normally the user enters their password, which decrypts the key, which decrypts the data on the drive. If they forget their password, the data on the drive can still be recovered if there’s a backup copy of the actual encryption key. This design has the added advantage of allowing users to reset their password without needing to re-encrypt the entire drive; only the drive’s actual key needs to be re-encrypted with the new password.
All this protects the data on the drive from both criminals and government agencies.
However, it also means that if the user forgets their password, it’s impossible for them to recover their data without a copy of the underlying key. Unless the user is OK with depending entirely on their backups, that would be catastrophic! To say that might cause some support headaches for Microsoft would be an understatement 😉
So, Microsoft provide mechanisms for backing up the key when BitLocker is initialised.
For home users, Microsoft provide two recovery options — you can export a copy of the key to a thumb drive that you then need to keep safe, or you can save the key to your Microsoft Personal account.
Expecting typical home users to have a spare thumb drive and then to keep it safe is not realistic, so the default option offered to home users is to save the key to their Microsoft account.
This obviously provides good protection from accidental data loss, but it comes with a trade-off — Microsoft have a copy of the key and can be compelled to hand it over to government agencies armed with an appropriate order from a judge.
For most home users, this tradeoff makes perfect sense — their biggest risk by far is data loss!
However, some high-risk users might prefer to manage the key themselves, or even, to choose to treat the drive as disposable, and accept the fact that if they forget their password, all data on the drive is gone. If you’re a cloud-first kind of person, this is actually a very reasonable option.
What Changed? Why the Fresh Headlines/Controversy?
At a technological level, nothing changed!
All that happened is that we now have a publicly disclosed example of Microsoft being issued with an appropriate disclosure order and complying with it.
On foot of the (baseless in my opinion) internet outrage, Microsoft also shared that they comply with about 20 orders each year. Given how many Windows users there are, that’s an infinitesimally small fraction!
Remember, without your drive or a bit-level clone of your drive, the key is useless!
Notes for Enterprise/Education Users
If your Windows device is managed by your organisation, then the chances are high that the treatment of your BitLocker key is out of your control. Organisations can lock the setting down with an MDM (Mobile Device Management) policy.
Assuming they setting the organisation force is to back the key up to the cloud, it won’t go into the user’s personal Microsoft account though, instead, it will go into the organisation’s Active Directory or Entra ID, which may or may not be in the cloud at all, and even if it is, Microsoft may or may not have access depending on how the organisation manages their master encryption keys.
However, remember that on a managed device, your organisation owns the data! That means that your organisation is in complete control over access to all the data stored on that device. You can’t assume anything you do on a managed device is hidden from your organisation, let alone from a government armed with a court order issued to either your organisation or Microsoft.
Notes for Mac Users
For the most part, the story is very similar for Mac users, just substitute FileVault for BitLocker and iCloud for Personal Microsoft Account. In fact, for users of managed devices, the situation is effectively identical — your organisation is in full control, and you can’t assume anything.
For home users, things are a little more complicated, though, because Apple made a small but impactful change with macOS 26.
Older versions of macOS behave almost identically to BitLocker. One subtle difference is that Apple never back up the raw encryption key, instead they back up a long and truly random recovery code that can be used to decrypt a copy of the key stored on the drive itself. But ultimately, Mac users before macOS 26 were defaulted to saving this recovery key to their iCloud Account, and they had the option to fall back to displaying the recovery code so they could write it down and store it somewhere safe.
But that has changed a little with macOS 26. When you set up full disk encryption with the macOS 26 installer, the default is not to store the recovery key in your iCloud account, but in the Password app. This means you can display the code any time you like, export it to another password manager, and it syncs with your iCloud Key Chain, which is fully end-to-end encrypted, so Apple can’t access it.
This means that for people with new Macs bought after macOS 26 was released, their keys are not available to Apple, even when provided with a court order. Encryption keys are configured when a drive is formatted, so unless you reformat your drive, simply upgrading to macOS 26 won’t change your encryption keys.
Links
- A good news story explaining what happened: Microsoft quietly gave FBI access to BitLocker encryption keys — cyberinsider.com/… (but not a fair headline IMO)
- 🎧 Steve Gibson comes to the same conclusion I do: Security Now Episode 1062 [twit.tv/…](https://twit.tv/shows/security-now/episodes/1062?autostart=false)
❗ Action Alerts
- Apple Warns of “Extremely Sophisticated” Web Attacks on iPhones Running Older iOS Versions — www.macobserver.com/… (Be sure all your iOS devices are fully patched!)
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com/… (Out-of-band patch! Affects Windows versions.)
Worthy Warnings
- Two notable data breaches not being proactively responded to by the affected companies:
- Researcher reveals evidence of private Instagram profiles leaking photos — www.bleepingcomputer.com/… (Problem seems to have been silently patched, but no idea how much damage was done, or to which users)
- HIBP adds alleged Under Armour data breach impacting 72 million emails — cyberinsider.com/…
Notable News
- 🧯If you’re worried about the Moltbook hype on social media, no need: https://www.macobserver.com/news/moltbook-viral-posts-where-ai-agents-are-conspiring-against-humans-are-mostly-fake/ — www.macobserver.com/… (The related MoltBot self-hosted AI agent is getting a lot of buzz. Experiment with extreme caution, this is agentic AI at its most dangerous, not for humanity, but for the users!)
- Let’s Encrypt have launched a new campaign named Encrypt it Already, targeting specific big-tech companies with specific demands (examples below) — www.encryptitalready.org/…
- Facebook Messenger should use end-to-end encryption for group messages
- Apple & Google should deliver on their promise of interoperable end-to-end encryption of RCS
- Bluesky should launch its promised end-to-end encryption for DMs
- A timely reminder of why it’s important to let your car patch itself when it asks: Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026 — www.bleepingcomputer.com/… (All bugs demoed now in 90-day responsible disclosure window)
- New Firehound security portal tracks data protection failures by AI apps in the various app stores — www.cultofmac.com/… (A timely reminder that nothing Apple and Google implement in their OSes can protect your data on the app’s own cloud infrastructure!)
- More enforcement actions by regulators on both sides of the pond:
- 🇺🇸 FTC bans GM from selling drivers’ location data for five years — www.bleepingcomputer.com/…
- 🇪🇺 🇦🇹 Microsoft ordered to halt illegal tracking of children in Austria — cyberinsider.com/… (Similar to a case from a few months ago, again, too many cookies, and again, Microsoft HQ is in trouble for influencing Microsoft Europe too much, resulting in GDPR breaches.)
- Good news for people seeking trustworthy VPNs:
- New Mullvad security audit finds no critical flaws or privacy risks — cyberinsider.com/…
- SurfShark passed its latest audit with no high-severity findings, and proactive action by the company in response to lower-severity findings to nip possible future issues in the bud — cyberinsider.com/… (I don’t consider the headline a fair reflection of the content of the article, so ignore it!)
- Related: AdGuard open-sources its custom VPN protocol ‘TrustTunnel’ — cyberinsider.com/… (Special protocol to make VPN traffic impossible to distinguish from regular web traffic to prevent authoritarian governments or overbearing ISPs from filtering it out)
- Some nice security enhancements:
- iOS 26.3 Adds “Limit Precise Location” for Better Carrier Privacy —www.macobserver.com/…
- Two big caveats — will only work on iPhones with Apple’s own C-series modem chips, and on the networks of carriers who opt in to the feature
- Google rolls out Android theft protection feature updates — www.bleepingcomputer.com/…
- Microsoft Teams to add brand impersonation warnings to calls — www.bleepingcomputer.com/… (An interesting use of AI)
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com/… (🎉 a big enhancement for small businesses and enterprises)
- WhatsApp introduces new security mode that shields high-risk users — cyberinsider.com/… (A kind of app-specific lockdown mode for people at high risk of being targeted)
- 1Password introduces new built-in phishing protection to fight AI scams — cyberinsider.com/… (a nice little speed bump to interrupt users trying to manually paste passwords that are correctly not auto-filling because they’re not actually on the site they think they are)
Excellent Explainers
- Intego started the year with some excellent overviews of important cybersecurity topics:
- What Is SSO? How Single Sign-On Works and Why It Matters — www.intego.com/…
- What Is Cyber Insurance? Coverage, Costs, and Real-World Examples — www.intego.com/…
- What Is a Keylogger? How It Works, Risks, and How to Remove It — www.intego.com/…
- Boot Sector Virus: Definition, How It Works, and How to Recover — www.intego.com/…
- 🎧 The new series of the Red Hat podcast Compiler focuses on cybersecurity, their first episode is a great overview: Compiler: Data Security 101 — overcast.fm/…
Interesting Insights
- 🎦 A fun deep-dive into how Passkeys really work on websites, showing the entire process in action on a dummy website, including all the code and the content of all the messages over and back to the server — youtube.com/…(Via Joop in the NosillaCast slack)
Palate Cleansers
- From Allison: Bugs Apple Loves — www.bugsappleloves.com (via Kantor in the NosillaCast slack)
Legend
When the textual description of a link is part of the link, it is the title of the page being linked to, when the text describing a link is not part of the link, it is a description written by Bart.
| Emoji | Meaning |
|---|---|
| 🎧 | A link to audio content, probably a podcast. |
| ❗ | A call to action. |
| flag | The story is particularly relevant to people living in a specific country, or, the organisation the story is about is affiliated with the government of a specific country. |
| 📊 | A link to graphical content, probably a chart, graph, or diagram. |
| 🧯 | A story that has been over-hyped in the media, or, “no need to light your hair on fire” 🙂 |
| 💵 | A link to an article behind a paywall. |
| 📌 | A pinned story, i.e. one to keep an eye on that’s likely to develop into something significant in the future. |
| 🎩 | A tip of the hat to thank a member of the community for bringing the story to our attention. |
| 🎦 | A link to video content. |
