Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal.

#Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal.

Scheduled Pinned Locked Moved Uncategorized
microsoftveracryptwindowsinfosecprivacy
32 Posts 14 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • azonenberg@ioc.exchangeA azonenberg@ioc.exchange

    @manawyrm @jik @zackwhittaker wait, so if the certificate expires *existing signed binaries* will no longer run? Does this mean any signed bootloader has an inherent shelf life and will need to be re-signed every so many years even if no changes are being made to it?

    gsuberland@chaos.socialG This user is from outside of this forum
    gsuberland@chaos.socialG This user is from outside of this forum
    gsuberland@chaos.social
    wrote last edited by
    #6

    @azonenberg @manawyrm @jik @zackwhittaker afaik no. the expiry usually isn't enforced.

    azonenberg@ioc.exchangeA manawyrm@chaos.socialM rairii@labyrinth.zoneR 3 Replies Last reply
    0
    • gsuberland@chaos.socialG gsuberland@chaos.social

      @azonenberg @manawyrm @jik @zackwhittaker afaik no. the expiry usually isn't enforced.

      azonenberg@ioc.exchangeA This user is from outside of this forum
      azonenberg@ioc.exchangeA This user is from outside of this forum
      azonenberg@ioc.exchange
      wrote last edited by
      #7

      @gsuberland @manawyrm @jik @zackwhittaker Usually the way cert expiration for signing works is signatures are timestamped by a third party and any signature *made* post expiry is not trusted, but old ones are valid in perpetuity as long as the cert had been valid when the signature was created

      gsuberland@chaos.socialG 1 Reply Last reply
      0
      • gsuberland@chaos.socialG gsuberland@chaos.social

        @azonenberg @manawyrm @jik @zackwhittaker afaik no. the expiry usually isn't enforced.

        manawyrm@chaos.socialM This user is from outside of this forum
        manawyrm@chaos.socialM This user is from outside of this forum
        manawyrm@chaos.social
        wrote last edited by
        #8

        @gsuberland @azonenberg @jik @zackwhittaker that's what I would've expected as well, but I'm not 100% sure about how Windows driver signing works.

        Either way, the data is perfectly fine 🙂

        gsuberland@chaos.socialG jeffcodes@infosec.exchangeJ 2 Replies Last reply
        0
        • azonenberg@ioc.exchangeA azonenberg@ioc.exchange

          @gsuberland @manawyrm @jik @zackwhittaker Usually the way cert expiration for signing works is signatures are timestamped by a third party and any signature *made* post expiry is not trusted, but old ones are valid in perpetuity as long as the cert had been valid when the signature was created

          gsuberland@chaos.socialG This user is from outside of this forum
          gsuberland@chaos.socialG This user is from outside of this forum
          gsuberland@chaos.social
          wrote last edited by
          #9

          @azonenberg @manawyrm @jik @zackwhittaker yes, precisely

          1 Reply Last reply
          0
          • gsuberland@chaos.socialG gsuberland@chaos.social

            @azonenberg @manawyrm @jik @zackwhittaker afaik no. the expiry usually isn't enforced.

            rairii@labyrinth.zoneR This user is from outside of this forum
            rairii@labyrinth.zoneR This user is from outside of this forum
            rairii@labyrinth.zone
            wrote last edited by
            #10
            @gsuberland @azonenberg @manawyrm @jik @zackwhittaker certificate expiry won't be enforced, however if outright revocation of binaries happen, that will be
            rairii@labyrinth.zoneR 1 Reply Last reply
            0
            • rairii@labyrinth.zoneR rairii@labyrinth.zone
              @gsuberland @azonenberg @manawyrm @jik @zackwhittaker certificate expiry won't be enforced, however if outright revocation of binaries happen, that will be
              rairii@labyrinth.zoneR This user is from outside of this forum
              rairii@labyrinth.zoneR This user is from outside of this forum
              rairii@labyrinth.zone
              wrote last edited by
              #11
              @gsuberland @azonenberg @jik @manawyrm @zackwhittaker (talking about at executable load time here)
              gsuberland@chaos.socialG rairii@labyrinth.zoneR 2 Replies Last reply
              0
              • manawyrm@chaos.socialM manawyrm@chaos.social

                @gsuberland @azonenberg @jik @zackwhittaker that's what I would've expected as well, but I'm not 100% sure about how Windows driver signing works.

                Either way, the data is perfectly fine 🙂

                gsuberland@chaos.socialG This user is from outside of this forum
                gsuberland@chaos.socialG This user is from outside of this forum
                gsuberland@chaos.social
                wrote last edited by
                #12

                @manawyrm @azonenberg @jik @zackwhittaker fairly sure driver signatures don't have an expiry at all; it's only the CA that has an expiry and an expired CA doesn't invalidate an existing valid signature, as long as that signature's date was within the valid time range of the CA.

                gsuberland@chaos.socialG 1 Reply Last reply
                0
                • rairii@labyrinth.zoneR rairii@labyrinth.zone
                  @gsuberland @azonenberg @jik @manawyrm @zackwhittaker (talking about at executable load time here)
                  gsuberland@chaos.socialG This user is from outside of this forum
                  gsuberland@chaos.socialG This user is from outside of this forum
                  gsuberland@chaos.social
                  wrote last edited by
                  #13

                  @Rairii @manawyrm @jik @azonenberg @zackwhittaker yup exactly the way I thought it worked

                  1 Reply Last reply
                  0
                  • gsuberland@chaos.socialG gsuberland@chaos.social

                    @manawyrm @azonenberg @jik @zackwhittaker fairly sure driver signatures don't have an expiry at all; it's only the CA that has an expiry and an expired CA doesn't invalidate an existing valid signature, as long as that signature's date was within the valid time range of the CA.

                    gsuberland@chaos.socialG This user is from outside of this forum
                    gsuberland@chaos.socialG This user is from outside of this forum
                    gsuberland@chaos.social
                    wrote last edited by
                    #14

                    @manawyrm @azonenberg @jik @zackwhittaker (yes just checked and this is exactly how it works)

                    diagprov@mathstodon.xyzD 1 Reply Last reply
                    0
                    • manawyrm@chaos.socialM manawyrm@chaos.social

                      @gsuberland @azonenberg @jik @zackwhittaker that's what I would've expected as well, but I'm not 100% sure about how Windows driver signing works.

                      Either way, the data is perfectly fine 🙂

                      jeffcodes@infosec.exchangeJ This user is from outside of this forum
                      jeffcodes@infosec.exchangeJ This user is from outside of this forum
                      jeffcodes@infosec.exchange
                      wrote last edited by
                      #15

                      @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

                      The data may be fine; however, not everyone who may use VeraCrypt has the same knowledge and skill base to know to pull up a Linux Live USB and go get their data back. I've encouraged non-technical users to use easy breakthroughs to add encryption to their Windows Home environments. They definitely will not have the knowledge do just go do this. Many may not have another device to create the Linux Live USB either.
                      This is still a problem, whether or not the data is still available through other means.

                      manawyrm@chaos.socialM 1 Reply Last reply
                      0
                      • jeffcodes@infosec.exchangeJ jeffcodes@infosec.exchange

                        @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

                        The data may be fine; however, not everyone who may use VeraCrypt has the same knowledge and skill base to know to pull up a Linux Live USB and go get their data back. I've encouraged non-technical users to use easy breakthroughs to add encryption to their Windows Home environments. They definitely will not have the knowledge do just go do this. Many may not have another device to create the Linux Live USB either.
                        This is still a problem, whether or not the data is still available through other means.

                        manawyrm@chaos.socialM This user is from outside of this forum
                        manawyrm@chaos.socialM This user is from outside of this forum
                        manawyrm@chaos.social
                        wrote last edited by
                        #16

                        @jeffcodes @gsuberland @azonenberg @jik @zackwhittaker I'm very sorry, but users that aren't capable of getting help with recovering such data from someone that can handle a Linux Live ISO shouldn't be using VeraCrypt to begin with.
                        It's extremely likely to just cause your system to stop booting (and that has happened to me 5+ times in the years I was using it) -- it's just a regular occurance and you'll need to deal with these things as a user.

                        jeffcodes@infosec.exchangeJ 1 Reply Last reply
                        0
                        • rairii@labyrinth.zoneR rairii@labyrinth.zone
                          @gsuberland @azonenberg @jik @manawyrm @zackwhittaker (talking about at executable load time here)
                          rairii@labyrinth.zoneR This user is from outside of this forum
                          rairii@labyrinth.zoneR This user is from outside of this forum
                          rairii@labyrinth.zone
                          wrote last edited by
                          #17
                          @azonenberg @gsuberland @jik @manawyrm @zackwhittaker that said. i wonder if this is MS attempting to do some form of moderation on driver / EFI signers, given the instances of game cheat devs and outright malware actors signing drivers in the past (do i need to cite that unknowncheats thread again?)

                          that said, I quickly browsed around unknowncheats and didn't see anyone complaining about this, so...
                          1 Reply Last reply
                          0
                          • manawyrm@chaos.socialM manawyrm@chaos.social

                            @jeffcodes @gsuberland @azonenberg @jik @zackwhittaker I'm very sorry, but users that aren't capable of getting help with recovering such data from someone that can handle a Linux Live ISO shouldn't be using VeraCrypt to begin with.
                            It's extremely likely to just cause your system to stop booting (and that has happened to me 5+ times in the years I was using it) -- it's just a regular occurance and you'll need to deal with these things as a user.

                            jeffcodes@infosec.exchangeJ This user is from outside of this forum
                            jeffcodes@infosec.exchangeJ This user is from outside of this forum
                            jeffcodes@infosec.exchange
                            wrote last edited by
                            #18

                            @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

                            IMO, it is not acceptable to simply overlook these hurdles and say, "this is not available to you because you're not technical like me." These tools are necessary against the mass surveillance of the companies like Microsoft, Google, etc. and governments alike.
                            We, as technologist, should be working to make these more accessible to those who are not technologists too. Those folks deserve the right and privacy and security like the rest of us.

                            manawyrm@chaos.socialM 1 Reply Last reply
                            0
                            • jeffcodes@infosec.exchangeJ jeffcodes@infosec.exchange

                              @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

                              IMO, it is not acceptable to simply overlook these hurdles and say, "this is not available to you because you're not technical like me." These tools are necessary against the mass surveillance of the companies like Microsoft, Google, etc. and governments alike.
                              We, as technologist, should be working to make these more accessible to those who are not technologists too. Those folks deserve the right and privacy and security like the rest of us.

                              manawyrm@chaos.socialM This user is from outside of this forum
                              manawyrm@chaos.socialM This user is from outside of this forum
                              manawyrm@chaos.social
                              wrote last edited by
                              #19

                              @jeffcodes @gsuberland @azonenberg @jik @zackwhittaker You're absolutely right and will get no argument from me there. I have always supported people encrypting their drives and will give support to people trying to do that.

                              Still, VeraCrypt is just a very fragile piece of kit and users need to know that and be able to either fix it themselves or know someone who can do it.

                              Telling just random people on the streets to install it will indeed just block access to their data -- even without MS.

                              jeffcodes@infosec.exchangeJ 1 Reply Last reply
                              0
                              • R relay@relay.publicsquare.global shared this topic
                              • jik@federate.socialJ jik@federate.social

                                #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                                If this doesn't convince you big tech has too much control, I don't know what will.
                                h/t @zackwhittaker
                                https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                                #infosec #privacy #TechIsShitDispatch

                                feld@friedcheese.usF This user is from outside of this forum
                                feld@friedcheese.usF This user is from outside of this forum
                                feld@friedcheese.us
                                wrote last edited by
                                #20
                                @jik @zackwhittaker

                                > If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦

                                uhmmm this seems like a pretty big design flaw. Imagine if on FreeBSD or Linux that your GELI / LUKS encryption stops working because some developer's computer was inaccessible....
                                1 Reply Last reply
                                0
                                • manawyrm@chaos.socialM manawyrm@chaos.social

                                  @jeffcodes @gsuberland @azonenberg @jik @zackwhittaker You're absolutely right and will get no argument from me there. I have always supported people encrypting their drives and will give support to people trying to do that.

                                  Still, VeraCrypt is just a very fragile piece of kit and users need to know that and be able to either fix it themselves or know someone who can do it.

                                  Telling just random people on the streets to install it will indeed just block access to their data -- even without MS.

                                  jeffcodes@infosec.exchangeJ This user is from outside of this forum
                                  jeffcodes@infosec.exchangeJ This user is from outside of this forum
                                  jeffcodes@infosec.exchange
                                  wrote last edited by
                                  #21

                                  @manawyrm @gsuberland @azonenberg @jik @zackwhittaker

                                  Fair enough. I don't encourage just anyone either. Those who I have encouraged also know to call me if something blows up! 😂

                                  1 Reply Last reply
                                  0
                                  • jik@federate.socialJ jik@federate.social

                                    #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                                    If this doesn't convince you big tech has too much control, I don't know what will.
                                    h/t @zackwhittaker
                                    https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                                    #infosec #privacy #TechIsShitDispatch

                                    L This user is from outside of this forum
                                    L This user is from outside of this forum
                                    luc0x61@mastodon.gamedev.place
                                    wrote last edited by
                                    #22

                                    @jik @zackwhittaker
                                    Encouraging the switch to a new Windows, a new PC, a new slop.
                                    And reminding me I still have a VeraCrypt volume somewhere.

                                    1 Reply Last reply
                                    0
                                    • gsuberland@chaos.socialG gsuberland@chaos.social

                                      @manawyrm @azonenberg @jik @zackwhittaker (yes just checked and this is exactly how it works)

                                      diagprov@mathstodon.xyzD This user is from outside of this forum
                                      diagprov@mathstodon.xyzD This user is from outside of this forum
                                      diagprov@mathstodon.xyz
                                      wrote last edited by
                                      #23

                                      @gsuberland @manawyrm @azonenberg @jik @zackwhittaker the certificates used to sign them do have an expiry but timestamps solve both expired cert and expired CA. The only way to revoke it is to add that cert to a CRL and leave it there permanently. I've no idea if the windows kernel checks crls or just maintains a list of blocked certs but I'd expect it to share the logic with windows and keep a cached crl (could be wrong, a long time since I cared much about windows drivers).

                                      UEFI I don't think checks either expiry or timestamps at all. Instead it has the dbx which can contain blocked certificates or hashes of binaries that should not load.

                                      diagprov@mathstodon.xyzD gsuberland@chaos.socialG 2 Replies Last reply
                                      0
                                      • diagprov@mathstodon.xyzD diagprov@mathstodon.xyz

                                        @gsuberland @manawyrm @azonenberg @jik @zackwhittaker the certificates used to sign them do have an expiry but timestamps solve both expired cert and expired CA. The only way to revoke it is to add that cert to a CRL and leave it there permanently. I've no idea if the windows kernel checks crls or just maintains a list of blocked certs but I'd expect it to share the logic with windows and keep a cached crl (could be wrong, a long time since I cared much about windows drivers).

                                        UEFI I don't think checks either expiry or timestamps at all. Instead it has the dbx which can contain blocked certificates or hashes of binaries that should not load.

                                        diagprov@mathstodon.xyzD This user is from outside of this forum
                                        diagprov@mathstodon.xyzD This user is from outside of this forum
                                        diagprov@mathstodon.xyz
                                        wrote last edited by
                                        #24

                                        @gsuberland @manawyrm @azonenberg @jik @zackwhittaker they're blocked on signing new builds.

                                        1 Reply Last reply
                                        0
                                        • diagprov@mathstodon.xyzD diagprov@mathstodon.xyz

                                          @gsuberland @manawyrm @azonenberg @jik @zackwhittaker the certificates used to sign them do have an expiry but timestamps solve both expired cert and expired CA. The only way to revoke it is to add that cert to a CRL and leave it there permanently. I've no idea if the windows kernel checks crls or just maintains a list of blocked certs but I'd expect it to share the logic with windows and keep a cached crl (could be wrong, a long time since I cared much about windows drivers).

                                          UEFI I don't think checks either expiry or timestamps at all. Instead it has the dbx which can contain blocked certificates or hashes of binaries that should not load.

                                          gsuberland@chaos.socialG This user is from outside of this forum
                                          gsuberland@chaos.socialG This user is from outside of this forum
                                          gsuberland@chaos.social
                                          wrote last edited by
                                          #25

                                          @diagprov @manawyrm @azonenberg @jik @zackwhittaker yup that tracks with my understanding of it. Windows does have a driver cert revocation mechanism and a more general blocklist to prevent loading known-vulnerable drivers, but I haven't studied it in detail.

                                          diagprov@mathstodon.xyzD rairii@labyrinth.zoneR 2 Replies Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups