Share via


System Integrity Team Blog

Attending DEFCON presentations that target a product you use or helped build can be exciting in a...

Date: 09/04/2008

Protecting BitLocker from Cold Attacks (and other threats)

Date: 02/25/2008

Hi. My name is Douglas MacIver and I specialize in security assurance at Microsoft as a member of...

Date: 02/25/2008

Although the most appropriate way to detect BitLocker is to use the interfaces in BitLocker’s WMI...

Date: 10/26/2006

As people start analyzing BitLocker, a question that keeps getting raised is "Can I break into...

Date: 10/03/2006

While working on the BitLocker data encryption we realized that no existing algorithm satisfied all...

Date: 09/15/2006

Recently the BitLocker Penetration team was asked some questions about the security of the recovery...

Date: 08/10/2006

I’ve been working to optimize our AES implementation. BitLocker encrypts and decrypts more data than...

Date: 05/19/2006

BitLocker Drive Encryption offers users a number of different modes to protect the key used in...

Date: 04/10/2006

Recently I read yet another report (https://www.komotv.com/stories/42263.htm) of stolen laptops...

Date: 03/21/2006

Two weeks ago BBC News published an article speculating about a possible “back door” in BitLocker...

Date: 03/02/2006

I finally managed to organize a team blog so that we can put out some technical information without...

Date: 03/02/2006