Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Attending DEFCON presentations that target a product you use or helped build can be exciting in a...
Date: 09/04/2008
Protecting BitLocker from Cold Attacks (and other threats)
Date: 02/25/2008
Hi. My name is Douglas MacIver and I specialize in security assurance at Microsoft as a member of...
Date: 02/25/2008
Although the most appropriate way to detect BitLocker is to use the interfaces in BitLocker’s WMI...
Date: 10/26/2006
As people start analyzing BitLocker, a question that keeps getting raised is "Can I break into...
Date: 10/03/2006
While working on the BitLocker data encryption we realized that no existing algorithm satisfied all...
Date: 09/15/2006
Recently the BitLocker Penetration team was asked some questions about the security of the recovery...
Date: 08/10/2006
I’ve been working to optimize our AES implementation. BitLocker encrypts and decrypts more data than...
Date: 05/19/2006
BitLocker Drive Encryption offers users a number of different modes to protect the key used in...
Date: 04/10/2006
Recently I read yet another report (https://www.komotv.com/stories/42263.htm) of stolen laptops...
Date: 03/21/2006
Two weeks ago BBC News published an article speculating about a possible “back door” in BitLocker...
Date: 03/02/2006
I finally managed to organize a team blog so that we can put out some technical information without...
Date: 03/02/2006