Today i took my first steps into the world of Linux by creating a bookable Mint Cinamon USB stick to fuck around on without wiping or portioning my laptop drive.

I realised windows has the biggest vulnerability for the average user.

While booting off of the usb I could access all the data on my laptop without having to input a password.

After some research it appears drives need to be encrypted to prevent this, so how is this not the default case in Windows?

I’m sure there are people aware but for the laymen this is such a massive vulnerability.

  • JubilantJaguar@lemmy.world
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    1 hour ago

    This is a case where Windows-bashing is hypocritical. Almost no Linux distro has disk encryption turned on by default (PopOS being the major exception).

    It’s dumb and inexcusable IMO. Whatever the out-of-touch techies around here seem to think, normies do not have lumbering desktop computers any more. They have have mobile devices - at best laptops, mostly not even that.

    If an unencrypted computer is now unacceptable on Android, then it should be on Linux too. No excuses.

  • nanook@friendica.eskimo.com
    link
    fedilink
    arrow-up
    11
    ·
    4 hours ago

    By the way, no different for Linux, if you boot off of USB you can mount partitions and access anything if not encrypted and linux windows, encryption is not the default.

  • Mio@feddit.nu
    link
    fedilink
    arrow-up
    1
    ·
    2 hours ago

    I think on laptops Windows i trying to encrypt the drives. Maybe online if you are logged in to a Microsoft account for bitlocker to save the encryption key. Encrypting the drives should be your decision to take.

  • Mensh123@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    3 hours ago

    Yup. You’ll need to tkinker with Linux too if you want disk encryption. At the very least, set a BIOS password.

  • whysofurious@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    4 hours ago

    I still remember years ago one time windows fucked itself and god knows why I couldn’t fix it even with USB recovery or stuff like that (long time ago, I don’t remember).

    Since I couldn’t boot into recovery mode the easiest way to backup my stuff to a connected external drive was “open notepad from the command line -> use the GUI send to… command to send the files to the external drive -> wait and profit” lol.

  • Xanza@lemm.ee
    link
    fedilink
    English
    arrow-up
    10
    ·
    9 hours ago

    While booting off of the usb I could access all the data on my laptop without having to input a password.

    This is entirely expected behavior. You didn’t encrypt your drive, so of course that data is available if you sidestep windows login protections. Check out Bitlocker for drive encryption.

  • data1701d (He/Him)@startrek.website
    link
    fedilink
    English
    arrow-up
    5
    ·
    8 hours ago

    How old is your laptop? Pretty much every Windows machine I’ve ever owned after a certain year requires you to type in your Bitlocker key, including my first-gen Surface Go from 2018.

    Also, you often have to manually set up encryption on most Linux installs as well - I did it for my Thinkpad. I need to do it for my desktop as well - I should probably do a reinstall, but I’m thinking of backing everything up and trying to do it in-place just for fun. On top of that, we can finally transition to btrfs.

    Wink

    • wuphysics87@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      6 hours ago

      Microsoft used to have a division for testing windows on various hardware configurations. They stopped doing that when they could just put different versions of windows on people’s computers and use telemetry to check the differences. This could be an artifact of that.

    • MNByChoice@midwest.social
      link
      fedilink
      arrow-up
      2
      ·
      7 hours ago

      Pretty much every Windows machine I’ve ever owned after a certain year requires you to type in your Bitlocker key, including my first-gen Surface Go from 2018.

      This is interesting. I had a work computer require this ~4 years ago, but not one of the three since have (personal and different employers.)

  • redlemace@lemmy.world
    link
    fedilink
    arrow-up
    40
    arrow-down
    1
    ·
    12 hours ago

    Same in Linux. No disk encryption and everything is easy accessible if you have physical access.

    • Fonzie!@ttrpg.network
      link
      fedilink
      arrow-up
      1
      ·
      2 hours ago

      Unless someone ticked the “encrypt storage”-box in the installer, you don’t even have to pay for Pro to use it!

    • Aussiemandeus@aussie.zoneOP
      link
      fedilink
      arrow-up
      9
      arrow-down
      3
      ·
      12 hours ago

      Physical access wouldn’t seem so hard. Say you worked at the company company and wanted to get the files your boss has on your evaluation or something. Wait till they’re on lunch, plug in a usb and pull them up.

      I imagine patient records wouldn’t be encrypted either

      • vandsjov@feddit.dk
        link
        fedilink
        arrow-up
        22
        ·
        12 hours ago

        Any respectable company with Windows would be using BitLocker - full disk encryption. It’s super easy to setup if your computer has TPM, fully transparent for the user in most cases.

        • o_d [he/him]@lemmygrad.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          10 hours ago

          My work macbook won’t even let me mount an external storage device, but it doesn’t seem to care about my nextcloud client running in the background. Sorry for my blasphemous behaviour my cyber security comrades 🫡🥺

  • ArcaneSlime@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    7
    ·
    9 hours ago

    Yeh. But also this allowed me to save my files from my dying windows drive while moving to linux, so sometimes giant security holes can be handy.

  • phantomwise@lemmy.ml
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    2
    ·
    11 hours ago

    I thought BitLocker was enabled by default on Windows 11, which is a terrible idea imo. Full disk encryption by default makes sense in professional settings, but not for the average users who have no clue that they’ll lose all their data if they lose the key. If I had a penny for every Windows user who didn’t understand the BitLocker message and saved the key on their encrypted drive, I’d have a lot of pennies. At the very least it should be prompted to give the user a choice.

    • krash@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      6 hours ago

      This is true - it is enabled by default in win11. I disagree with you it being a terrible idea - imagine all the sentistive data people put on their hard drives - would they want to to fall in the wrong hands if they lose their computer? Or if their hard drives fails so they can do a secure wipe?

      I’m not a fan of Microsoft, but they did solve the key issue in the enterprise setting by storing the key in they entrance identity. Same should be done for home consumers, since having a Microsoft account is being shoved in everyone’s throat anyway…

      • fatalicus@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        4 hours ago

        Yeah, should be noted that bitlocker is only default enabled if you set windows up with a Microsoft account, since it then saves the recovery info on that account “in the cloud”.

        If you set it up with a local account, you still need to enable it manually, so that you can save the recovery info somewhere else.

    • catloaf@lemm.ee
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      11 hours ago

      Windows does not let you save the key to the drive being encrypted. (Unless you access it via SMB share, which I’ve done a number of times during setup before moving it off.)

      • phantomwise@lemmy.ml
        link
        fedilink
        arrow-up
        3
        arrow-down
        2
        ·
        10 hours ago

        You mean it prevents people from writing the key on a piece of paper when they get the BitLocker message, then copy it on a text file once their session is running and throw the paper away or lose it later ?

  • Telorand@reddthat.com
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    12 hours ago

    I’m sure there are people aware but for the laymen this is such a massive vulnerability.

    This is only a vulnerability if you suspect a threat actor might physically access your computer. For most people, this is not a concern. There’s also the issue that it has processing overhead, so it might make certain operations feel sluggish.

    Encryption is not a panacea, because if someone ever forgets their password (something common for the layperson), the data on that drive is inaccessible. No chance for recovery. Certain types of software may not like it either. It’s one of many considerations someone should make when determining their own threat model, but this is not a security flaw. It’s an option for consideration, and most people are probably better off from a useability standpoint with encryption disabled by default.

    • vandsjov@feddit.dk
      link
      fedilink
      arrow-up
      4
      ·
      12 hours ago

      Encryption is not a panacea, because if someone ever forgets their password (something common for the layperson), the data on that drive is inaccessible.

      It’s because of stuff like this that Microsoft wants people to create an Microsoft account. Recovery key automatically saved to your Microsoft account. For business the recovery key can also be automatically saved in a central location.

    • Aussiemandeus@aussie.zoneOP
      link
      fedilink
      arrow-up
      4
      ·
      12 hours ago

      I think it just really goes to show you can’t hide anything on a computer physically.

      I also feel this is something that should be taught in school (maybe it is i finished school over 13 years ago)

      I always knew there were ways to recover files off of hard drives. I just assumed they needed to be physically remounted not just plug in a usb and off you go

      • bluesheep@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        3 hours ago

        I think it just really goes to show you can’t hide anything on a computer physically.

        What do you mean? It’s certainly possible when using encryption software such as bitlocker. It’s just not always enabled by default.In fact it’s saved my ass from total data loss a couple of times.

        If you can make sure nobody has physical access to your pc than there’s a case to be made that you don’t need it, and if you can’t and are afraid that someone has both knowledge of this fact and the intention to (ab)use it, you use bitlocker.

      • Telorand@reddthat.com
        link
        fedilink
        arrow-up
        6
        ·
        12 hours ago

        Physically remounting a drive is the same thing as just plugging in a USB and going to town. Instead of taking the drives to a different system, you’re bringing the different system to the drives!