this post was submitted on 14 Feb 2024
943 points (98.1% liked)
Comic Strips
12479 readers
3334 users here now
Comic Strips is a community for those who love comic stories.
The rules are simple:
- The post can be a single image, an image gallery, or a link to a specific comic hosted on another site (the author's website, for instance).
- The comic must be a complete story.
- If it is an external link, it must be to a specific story, not to the root of the site.
- You may post comics from others or your own.
- If you are posting a comic of your own, a maximum of one per week is allowed (I know, your comics are great, but this rule helps avoid spam).
- The comic can be in any language, but if it's not in English, OP must include an English translation in the post's 'body' field (note: you don't need to select a specific language when posting a comic).
- Politeness.
- Adult content is not allowed. This community aims to be fun for people of all ages.
Web of links
- [email protected]: "I use Arch btw"
- [email protected]: memes (you don't say!)
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
When I got asked that once, I told them they should bring me their laptop. 10 minutes tops and I'll have access to their files. They really didn't know, if I was bluffing or not.
(I wasn't. The average laptop is genuinely that badly secured.)
Almost every personal computer that isn't a MacBook is poorly secured due to the lack of filesystem encryption as a default. No one encrypts their data at rest, and as such you just have to pull their drive and read it with another computer. Hell, I don't encrypt my entire file system despite being aware of this because of the inconvenience of added boot time, but everything that matters is encrypted and backed up across multiple devices.
The best thing anyone can do is keep the amount of critical, digital data they have to a minimum, keep that data encrypted and backed up, and use a password manager properly. That alone makes it exceedingly unlikely you will ever be a victim of cybercrime solely because you're more of a pain in the ass to compromise than 99.9% of the world.
I personally have almost 10TB of data between all my systems, but of that maybe 10 MB is actually valuable to anyone but me.
Pretty sure bitlocker is enabled by default since Windows 11 rolled, to my understanding it's part of the reason they now require Microsoft accounts for device on boarding.
Linux has disk encryption and I didn't need to make a Microsoft account
Windows encrypts by default now. I don't know if any Linux distros do by default but it was certainly option for me to enable it at install time.
There's literally an open source tool suite you can flash on a thumb drive, stick it in a sleeping notebook and get access to it. Sadly don't find it anymore.
Only for local accounts which Windows pushed people away from for security risks. And then near mandated the standard user can't figure out how to create this security flaw
Lol.
VeraCrypt / LUKS
Lol Windows user password is the digital equivalent of a pad lock, it only keeps honest people honest lmfaoo
Local accounts, yes. How are you bypassing Microsoft accounts with 2 factor authentication enabled? Unix and Mac passwords were the same for local accounts before.
Easiest way right now would be to acquire a username password to get into their phone provider, say Verizon. Then log into their Verizon account and move their phone number to a new phone. (this will only require knowledge of their security questions, also a phone not purchased by a card or registered to you if you don't want it traceable)
Once done then you can reset the password using the unknown password to their Microsoft account using the 2 factor that sends to their phone number....maybe.
Especially on windows 11 we don't stand much of a chance getting passed.
Likely easier to pick up the password book they wrote all of their passwords down in and accessing them. (Performed by most people over 50 I know)
Edit: also, you will find their Facebook password written there haha
Assuming bitlocker isn't enabled (Which it probably isn't since it's still not default yet AFAIK) boot Linux live USB > access files under user folder on disk
Bitlocker is enabled by default, requiring tpm. Which internal tpm is used by most all devices. Also you won't get into any commercial devices as the bios will be locked by password, so booting by USB will not happen.
Source: Microsoft, "On supported devices running Windows 10 or newer BitLocker will automatically be turned on the first time you sign into a personal Microsoft account (such as @outlook.com or @hotmail.com) or your work or school account."
Alt source: I have spent years working for DOD and other IT positions
Oh that's probably why I never ran into it, I only do local accounts because fuck Microsoft online accounts lmao
Yeah, I don't use Microsoft online accounts, but "work or school accounts" come up in many jobs because Windows is still used by many companies. I want to get certified or such for Googles BS (edit: bullshit not fancy terms) just because so many companies hire for transitions from Microsoft to Google or vise versa. It shouldn't be a hard transfer... But I don't have the time or money at the moment, so the $1000 for the course for certs sounds like a pain... But the $70-75 an hour for remotely transferring their systems and supporting it sounds like it is worth it. If you know anyone with background on the Google side of it please let me know if the certification is a waste of time.
Pad lock on a 4' tall fence
I had not heard of it before. I would have just booted a Linux Live USB. So long as there's no disk encryption, you can just access the hard drive in the laptop like any other data disk.
Or in other words, I'm actually not even trained/informed about hacking. I just accidentally acquired this knowledge by installing Linux at some point. 🙃