System Integrity Team Blog
Attending DEFCON presentations that target a product you use or helped build can be exciting in a...
Date: 09/04/2008
Protecting BitLocker from Cold Attacks (and other threats)
Date: 02/25/2008
Hi. My name is Douglas MacIver and I specialize in security assurance at Microsoft as a member of...
Date: 02/25/2008
Although the most appropriate way to detect BitLocker is to use the interfaces in BitLocker’s WMI...
Date: 10/26/2006
As people start analyzing BitLocker, a question that keeps getting raised is "Can I break into...
Date: 10/03/2006
While working on the BitLocker data encryption we realized that no existing algorithm satisfied all...
Date: 09/15/2006
Recently the BitLocker Penetration team was asked some questions about the security of the recovery...
Date: 08/10/2006
I’ve been working to optimize our AES implementation. BitLocker encrypts and decrypts more data than...
Date: 05/19/2006
BitLocker Drive Encryption offers users a number of different modes to protect the key used in...
Date: 04/10/2006
Recently I read yet another report (https://www.komotv.com/stories/42263.htm) of stolen laptops...
Date: 03/21/2006
Two weeks ago BBC News published an article speculating about a possible “back door” in BitLocker...
Date: 03/02/2006
I finally managed to organize a team blog so that we can put out some technical information without...
Date: 03/02/2006