Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal.

#Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal.

Scheduled Pinned Locked Moved Uncategorized
microsoftveracryptwindowsinfosecprivacy
32 Posts 14 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rairii@labyrinth.zoneR rairii@labyrinth.zone
    @gsuberland @azonenberg @manawyrm @jik @zackwhittaker certificate expiry won't be enforced, however if outright revocation of binaries happen, that will be
    rairii@labyrinth.zoneR This user is from outside of this forum
    rairii@labyrinth.zoneR This user is from outside of this forum
    rairii@labyrinth.zone
    wrote last edited by
    #11
    @gsuberland @azonenberg @jik @manawyrm @zackwhittaker (talking about at executable load time here)
    gsuberland@chaos.socialG rairii@labyrinth.zoneR 2 Replies Last reply
    0
    • manawyrm@chaos.socialM manawyrm@chaos.social

      @gsuberland @azonenberg @jik @zackwhittaker that's what I would've expected as well, but I'm not 100% sure about how Windows driver signing works.

      Either way, the data is perfectly fine 🙂

      gsuberland@chaos.socialG This user is from outside of this forum
      gsuberland@chaos.socialG This user is from outside of this forum
      gsuberland@chaos.social
      wrote last edited by
      #12

      @manawyrm @azonenberg @jik @zackwhittaker fairly sure driver signatures don't have an expiry at all; it's only the CA that has an expiry and an expired CA doesn't invalidate an existing valid signature, as long as that signature's date was within the valid time range of the CA.

      gsuberland@chaos.socialG 1 Reply Last reply
      0
      • rairii@labyrinth.zoneR rairii@labyrinth.zone
        @gsuberland @azonenberg @jik @manawyrm @zackwhittaker (talking about at executable load time here)
        gsuberland@chaos.socialG This user is from outside of this forum
        gsuberland@chaos.socialG This user is from outside of this forum
        gsuberland@chaos.social
        wrote last edited by
        #13

        @Rairii @manawyrm @jik @azonenberg @zackwhittaker yup exactly the way I thought it worked

        1 Reply Last reply
        0
        • gsuberland@chaos.socialG gsuberland@chaos.social

          @manawyrm @azonenberg @jik @zackwhittaker fairly sure driver signatures don't have an expiry at all; it's only the CA that has an expiry and an expired CA doesn't invalidate an existing valid signature, as long as that signature's date was within the valid time range of the CA.

          gsuberland@chaos.socialG This user is from outside of this forum
          gsuberland@chaos.socialG This user is from outside of this forum
          gsuberland@chaos.social
          wrote last edited by
          #14

          @manawyrm @azonenberg @jik @zackwhittaker (yes just checked and this is exactly how it works)

          diagprov@mathstodon.xyzD 1 Reply Last reply
          0
          • manawyrm@chaos.socialM manawyrm@chaos.social

            @gsuberland @azonenberg @jik @zackwhittaker that's what I would've expected as well, but I'm not 100% sure about how Windows driver signing works.

            Either way, the data is perfectly fine 🙂

            jeffcodes@infosec.exchangeJ This user is from outside of this forum
            jeffcodes@infosec.exchangeJ This user is from outside of this forum
            jeffcodes@infosec.exchange
            wrote last edited by
            #15

            @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

            The data may be fine; however, not everyone who may use VeraCrypt has the same knowledge and skill base to know to pull up a Linux Live USB and go get their data back. I've encouraged non-technical users to use easy breakthroughs to add encryption to their Windows Home environments. They definitely will not have the knowledge do just go do this. Many may not have another device to create the Linux Live USB either.
            This is still a problem, whether or not the data is still available through other means.

            manawyrm@chaos.socialM 1 Reply Last reply
            0
            • jeffcodes@infosec.exchangeJ jeffcodes@infosec.exchange

              @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

              The data may be fine; however, not everyone who may use VeraCrypt has the same knowledge and skill base to know to pull up a Linux Live USB and go get their data back. I've encouraged non-technical users to use easy breakthroughs to add encryption to their Windows Home environments. They definitely will not have the knowledge do just go do this. Many may not have another device to create the Linux Live USB either.
              This is still a problem, whether or not the data is still available through other means.

              manawyrm@chaos.socialM This user is from outside of this forum
              manawyrm@chaos.socialM This user is from outside of this forum
              manawyrm@chaos.social
              wrote last edited by
              #16

              @jeffcodes @gsuberland @azonenberg @jik @zackwhittaker I'm very sorry, but users that aren't capable of getting help with recovering such data from someone that can handle a Linux Live ISO shouldn't be using VeraCrypt to begin with.
              It's extremely likely to just cause your system to stop booting (and that has happened to me 5+ times in the years I was using it) -- it's just a regular occurance and you'll need to deal with these things as a user.

              jeffcodes@infosec.exchangeJ 1 Reply Last reply
              0
              • rairii@labyrinth.zoneR rairii@labyrinth.zone
                @gsuberland @azonenberg @jik @manawyrm @zackwhittaker (talking about at executable load time here)
                rairii@labyrinth.zoneR This user is from outside of this forum
                rairii@labyrinth.zoneR This user is from outside of this forum
                rairii@labyrinth.zone
                wrote last edited by
                #17
                @azonenberg @gsuberland @jik @manawyrm @zackwhittaker that said. i wonder if this is MS attempting to do some form of moderation on driver / EFI signers, given the instances of game cheat devs and outright malware actors signing drivers in the past (do i need to cite that unknowncheats thread again?)

                that said, I quickly browsed around unknowncheats and didn't see anyone complaining about this, so...
                1 Reply Last reply
                0
                • manawyrm@chaos.socialM manawyrm@chaos.social

                  @jeffcodes @gsuberland @azonenberg @jik @zackwhittaker I'm very sorry, but users that aren't capable of getting help with recovering such data from someone that can handle a Linux Live ISO shouldn't be using VeraCrypt to begin with.
                  It's extremely likely to just cause your system to stop booting (and that has happened to me 5+ times in the years I was using it) -- it's just a regular occurance and you'll need to deal with these things as a user.

                  jeffcodes@infosec.exchangeJ This user is from outside of this forum
                  jeffcodes@infosec.exchangeJ This user is from outside of this forum
                  jeffcodes@infosec.exchange
                  wrote last edited by
                  #18

                  @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

                  IMO, it is not acceptable to simply overlook these hurdles and say, "this is not available to you because you're not technical like me." These tools are necessary against the mass surveillance of the companies like Microsoft, Google, etc. and governments alike.
                  We, as technologist, should be working to make these more accessible to those who are not technologists too. Those folks deserve the right and privacy and security like the rest of us.

                  manawyrm@chaos.socialM 1 Reply Last reply
                  0
                  • jeffcodes@infosec.exchangeJ jeffcodes@infosec.exchange

                    @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

                    IMO, it is not acceptable to simply overlook these hurdles and say, "this is not available to you because you're not technical like me." These tools are necessary against the mass surveillance of the companies like Microsoft, Google, etc. and governments alike.
                    We, as technologist, should be working to make these more accessible to those who are not technologists too. Those folks deserve the right and privacy and security like the rest of us.

                    manawyrm@chaos.socialM This user is from outside of this forum
                    manawyrm@chaos.socialM This user is from outside of this forum
                    manawyrm@chaos.social
                    wrote last edited by
                    #19

                    @jeffcodes @gsuberland @azonenberg @jik @zackwhittaker You're absolutely right and will get no argument from me there. I have always supported people encrypting their drives and will give support to people trying to do that.

                    Still, VeraCrypt is just a very fragile piece of kit and users need to know that and be able to either fix it themselves or know someone who can do it.

                    Telling just random people on the streets to install it will indeed just block access to their data -- even without MS.

                    jeffcodes@infosec.exchangeJ 1 Reply Last reply
                    0
                    • R relay@relay.publicsquare.global shared this topic
                    • jik@federate.socialJ jik@federate.social

                      #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                      If this doesn't convince you big tech has too much control, I don't know what will.
                      h/t @zackwhittaker
                      https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                      #infosec #privacy #TechIsShitDispatch

                      feld@friedcheese.usF This user is from outside of this forum
                      feld@friedcheese.usF This user is from outside of this forum
                      feld@friedcheese.us
                      wrote last edited by
                      #20
                      @jik @zackwhittaker

                      > If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦

                      uhmmm this seems like a pretty big design flaw. Imagine if on FreeBSD or Linux that your GELI / LUKS encryption stops working because some developer's computer was inaccessible....
                      1 Reply Last reply
                      0
                      • manawyrm@chaos.socialM manawyrm@chaos.social

                        @jeffcodes @gsuberland @azonenberg @jik @zackwhittaker You're absolutely right and will get no argument from me there. I have always supported people encrypting their drives and will give support to people trying to do that.

                        Still, VeraCrypt is just a very fragile piece of kit and users need to know that and be able to either fix it themselves or know someone who can do it.

                        Telling just random people on the streets to install it will indeed just block access to their data -- even without MS.

                        jeffcodes@infosec.exchangeJ This user is from outside of this forum
                        jeffcodes@infosec.exchangeJ This user is from outside of this forum
                        jeffcodes@infosec.exchange
                        wrote last edited by
                        #21

                        @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

                        Fair enough. I don't encourage just anyone either. Those who I have encouraged also know to call me if something blows up! 😂

                        1 Reply Last reply
                        0
                        • jik@federate.socialJ jik@federate.social

                          #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                          If this doesn't convince you big tech has too much control, I don't know what will.
                          h/t @zackwhittaker
                          https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                          #infosec #privacy #TechIsShitDispatch

                          L This user is from outside of this forum
                          L This user is from outside of this forum
                          luc0x61@mastodon.gamedev.place
                          wrote last edited by
                          #22

                          @jik @zackwhittaker
                          Encouraging the switch to a new Windows, a new PC, a new slop.
                          And reminding me I still have a VeraCrypt volume somewhere.

                          1 Reply Last reply
                          0
                          • gsuberland@chaos.socialG gsuberland@chaos.social

                            @manawyrm @azonenberg @jik @zackwhittaker (yes just checked and this is exactly how it works)

                            diagprov@mathstodon.xyzD This user is from outside of this forum
                            diagprov@mathstodon.xyzD This user is from outside of this forum
                            diagprov@mathstodon.xyz
                            wrote last edited by
                            #23

                            @gsuberland @manawyrm @azonenberg @jik @zackwhittaker the certificates used to sign them do have an expiry but timestamps solve both expired cert and expired CA. The only way to revoke it is to add that cert to a CRL and leave it there permanently. I've no idea if the windows kernel checks crls or just maintains a list of blocked certs but I'd expect it to share the logic with windows and keep a cached crl (could be wrong, a long time since I cared much about windows drivers).

                            UEFI I don't think checks either expiry or timestamps at all. Instead it has the dbx which can contain blocked certificates or hashes of binaries that should not load.

                            diagprov@mathstodon.xyzD gsuberland@chaos.socialG 2 Replies Last reply
                            0
                            • diagprov@mathstodon.xyzD diagprov@mathstodon.xyz

                              @gsuberland @manawyrm @azonenberg @jik @zackwhittaker the certificates used to sign them do have an expiry but timestamps solve both expired cert and expired CA. The only way to revoke it is to add that cert to a CRL and leave it there permanently. I've no idea if the windows kernel checks crls or just maintains a list of blocked certs but I'd expect it to share the logic with windows and keep a cached crl (could be wrong, a long time since I cared much about windows drivers).

                              UEFI I don't think checks either expiry or timestamps at all. Instead it has the dbx which can contain blocked certificates or hashes of binaries that should not load.

                              diagprov@mathstodon.xyzD This user is from outside of this forum
                              diagprov@mathstodon.xyzD This user is from outside of this forum
                              diagprov@mathstodon.xyz
                              wrote last edited by
                              #24

                              @gsuberland @manawyrm @azonenberg @jik @zackwhittaker they're blocked on signing new builds.

                              1 Reply Last reply
                              0
                              • diagprov@mathstodon.xyzD diagprov@mathstodon.xyz

                                @gsuberland @manawyrm @azonenberg @jik @zackwhittaker the certificates used to sign them do have an expiry but timestamps solve both expired cert and expired CA. The only way to revoke it is to add that cert to a CRL and leave it there permanently. I've no idea if the windows kernel checks crls or just maintains a list of blocked certs but I'd expect it to share the logic with windows and keep a cached crl (could be wrong, a long time since I cared much about windows drivers).

                                UEFI I don't think checks either expiry or timestamps at all. Instead it has the dbx which can contain blocked certificates or hashes of binaries that should not load.

                                gsuberland@chaos.socialG This user is from outside of this forum
                                gsuberland@chaos.socialG This user is from outside of this forum
                                gsuberland@chaos.social
                                wrote last edited by
                                #25

                                @diagprov @manawyrm @azonenberg @jik @zackwhittaker yup that tracks with my understanding of it. Windows does have a driver cert revocation mechanism and a more general blocklist to prevent loading known-vulnerable drivers, but I haven't studied it in detail.

                                diagprov@mathstodon.xyzD rairii@labyrinth.zoneR 2 Replies Last reply
                                0
                                • gsuberland@chaos.socialG gsuberland@chaos.social

                                  @diagprov @manawyrm @azonenberg @jik @zackwhittaker yup that tracks with my understanding of it. Windows does have a driver cert revocation mechanism and a more general blocklist to prevent loading known-vulnerable drivers, but I haven't studied it in detail.

                                  diagprov@mathstodon.xyzD This user is from outside of this forum
                                  diagprov@mathstodon.xyzD This user is from outside of this forum
                                  diagprov@mathstodon.xyz
                                  wrote last edited by
                                  #26

                                  @gsuberland @manawyrm @azonenberg @jik @zackwhittaker me neither but given how closely uefi code looks to Microsoft C code I bet the mechanism of dbx is very similar to the kernel.

                                  1 Reply Last reply
                                  0
                                  • jik@federate.socialJ jik@federate.social

                                    #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                                    If this doesn't convince you big tech has too much control, I don't know what will.
                                    h/t @zackwhittaker
                                    https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                                    #infosec #privacy #TechIsShitDispatch

                                    acm_redfox@jawns.clubA This user is from outside of this forum
                                    acm_redfox@jawns.clubA This user is from outside of this forum
                                    acm_redfox@jawns.club
                                    wrote last edited by
                                    #27

                                    @jik yeah, I just decided never to back up anywhere that wasn't a disk I owned...

                                    1 Reply Last reply
                                    0
                                    • gsuberland@chaos.socialG gsuberland@chaos.social

                                      @diagprov @manawyrm @azonenberg @jik @zackwhittaker yup that tracks with my understanding of it. Windows does have a driver cert revocation mechanism and a more general blocklist to prevent loading known-vulnerable drivers, but I haven't studied it in detail.

                                      rairii@labyrinth.zoneR This user is from outside of this forum
                                      rairii@labyrinth.zoneR This user is from outside of this forum
                                      rairii@labyrinth.zone
                                      wrote last edited by
                                      #28
                                      @gsuberland @diagprov @manawyrm @azonenberg @jik @zackwhittaker there are two types of revocation lists, the old one that can revoke certs and binaries by hash (two different lists for boot and drivers), and the new one that's just a CiPolicy and can therefore revoke by anything that a CiPolicy supports.
                                      1 Reply Last reply
                                      0
                                      • jik@federate.socialJ jik@federate.social

                                        #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                                        If this doesn't convince you big tech has too much control, I don't know what will.
                                        h/t @zackwhittaker
                                        https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                                        #infosec #privacy #TechIsShitDispatch

                                        jeff@mk.magicka.orgJ This user is from outside of this forum
                                        jeff@mk.magicka.orgJ This user is from outside of this forum
                                        jeff@mk.magicka.org
                                        wrote last edited by
                                        #29

                                        @jik@federate.social @zackwhittaker@mastodon.social depending on microslop has consequences tbh

                                        1 Reply Last reply
                                        0
                                        • jik@federate.socialJ jik@federate.social

                                          #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                                          If this doesn't convince you big tech has too much control, I don't know what will.
                                          h/t @zackwhittaker
                                          https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                                          #infosec #privacy #TechIsShitDispatch

                                          tranquillity@mastodon.minionflo.netT This user is from outside of this forum
                                          tranquillity@mastodon.minionflo.netT This user is from outside of this forum
                                          tranquillity@mastodon.minionflo.net
                                          wrote last edited by
                                          #30

                                          @jik @zackwhittaker what

                                          Why would being unable to sign stuff stop you from booting and decrypting your disk "in a few months"

                                          What did VeraCrypt do

                                          Why do they even have M$ signing keys

                                          Whay

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups