Skip to content

Commit fa6077d

Browse files
committed
update: Bitlocker cmdline workaround no longer works in Home (#3170)
1 parent cb2ea5e commit fa6077d

File tree

1 file changed

+5
-42
lines changed

1 file changed

+5
-42
lines changed

docs/encryption.md

Lines changed: 5 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ icon: material/file-lock
55
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
66
cover: encryption.webp
77
---
8+
89
**Encryption** is the only secure way to control who can access your data. If you are currently not using encryption software for your hard disk, emails, or files, you should pick an option here.
910

1011
## Multi-platform
@@ -101,58 +102,20 @@ Built-in OS encryption solutions generally leverage hardware security features s
101102

102103
![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right }
103104

104-
**BitLocker** is the full volume encryption solution bundled with Microsoft Windows that uses the Trusted Platform Module ([TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm)) for hardware-based security.
105+
**BitLocker** is the full volume encryption solution bundled with Microsoft Windows that uses the Trusted Platform Module ([TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm)) for hardware-based security. Microsoft also has a more [technical](https://learn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker) document intended for IT professionals and device administrators.
105106

106107
[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title="Documentation" }
107108

108109
</details>
109110

110111
</div>
111112

112-
BitLocker is [officially supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on the Pro, Enterprise, and Education editions of Windows. It can be enabled on Home editions provided that they meet the following prerequisites.
113-
114-
<details class="example" markdown>
115-
<summary>Enabling BitLocker on Windows Home</summary>
116-
117-
To enable BitLocker on "Home" editions of Windows, you must have partitions formatted with a [GUID Partition Table](https://en.wikipedia.org/wiki/GUID_Partition_Table) and have a dedicated TPM (v1.2, 2.0+) module. You may need to [disable the non-Bitlocker "Device encryption" functionality](https://discuss.privacyguides.net/t/enabling-bitlocker-on-the-windows-11-home-edition/13303/5) (which is inferior because it sends your recovery key to Microsoft's servers) if it is enabled on your device already before following this guide.
118-
119-
1. Open a command prompt and check your drive's partition table format with the following command. You should see "**GPT**" listed under "Partition Style":
120-
121-
```powershell
122-
powershell Get-Disk
123-
```
124-
125-
2. Run this command (in an admin command prompt) to check your TPM version. You should see `2.0` or `1.2` listed next to `SpecVersion`:
126-
127-
```powershell
128-
powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm
129-
```
130-
131-
3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**.
132-
4. Login with your admin account and type this in the command prompt to start encryption:
133-
134-
```powershell
135-
manage-bde -on c: -used
136-
```
137-
138-
5. Close the command prompt and continue booting to regular Windows.
139-
6. Open an admin command prompt and run the following commands:
140-
141-
```powershell
142-
manage-bde c: -protectors -add -rp -tpm
143-
manage-bde -protectors -enable c:
144-
manage-bde -protectors -get c: > %UserProfile%\Desktop\BitLocker-Recovery-Key.txt
145-
```
146-
147-
<div class="admonition tip" markdown>
148-
<p class="admonition-title">Tip</p>
149-
150-
Backup `BitLocker-Recovery-Key.txt` on your Desktop to a separate storage device. Loss of this recovery code may result in loss of data.
151-
152-
</div>
113+
BitLocker is [officially supported](https://support.microsoft.com/en-us/windows/bitlocker-overview-44c0c61c-989d-4a69-8822-b95cd49b1bbf) on the Pro, Enterprise, and Education editions of Windows. If you have Home edition we recommend you [upgrade to Pro](https://support.microsoft.com/en-us/windows/upgrade-windows-home-to-windows-pro-ef34d520-e73f-3198-c525-d1a218cc2818), which can be achieved without reinstalling Windows or losing your files. An alternative solution could be to use VeraCrypt's [system encryption](https://veracrypt.io/en/System%20Encryption.html) feature. VeraCrypt does not use the system's TPM chip and all encryption keys are stored in memory, leaving them [vulnerable to extraction](https://blog.elcomsoft.com/2021/06/breaking-veracrypt-obtaining-and-extracting-on-the-fly-encryption-keys) while the device is online and mounted
153114

154115
</details>
155116

117+
device vulnerable to have them stolen while it is online and the system volume is open. This could either be by malware or
118+
156119
### FileVault
157120

158121
<div class="admonition recommendation" markdown>

0 commit comments

Comments
 (0)