Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal.

#Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal.

Scheduled Pinned Locked Moved Uncategorized
microsoftveracryptwindowsinfosecprivacy
32 Posts 14 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jik@federate.socialJ jik@federate.social

    #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
    If this doesn't convince you big tech has too much control, I don't know what will.
    h/t @zackwhittaker
    https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
    #infosec #privacy #TechIsShitDispatch

    L This user is from outside of this forum
    L This user is from outside of this forum
    luc0x61@mastodon.gamedev.place
    wrote last edited by
    #22

    @jik @zackwhittaker
    Encouraging the switch to a new Windows, a new PC, a new slop.
    And reminding me I still have a VeraCrypt volume somewhere.

    1 Reply Last reply
    0
    • gsuberland@chaos.socialG gsuberland@chaos.social

      @manawyrm @azonenberg @jik @zackwhittaker (yes just checked and this is exactly how it works)

      diagprov@mathstodon.xyzD This user is from outside of this forum
      diagprov@mathstodon.xyzD This user is from outside of this forum
      diagprov@mathstodon.xyz
      wrote last edited by
      #23

      @gsuberland @manawyrm @azonenberg @jik @zackwhittaker the certificates used to sign them do have an expiry but timestamps solve both expired cert and expired CA. The only way to revoke it is to add that cert to a CRL and leave it there permanently. I've no idea if the windows kernel checks crls or just maintains a list of blocked certs but I'd expect it to share the logic with windows and keep a cached crl (could be wrong, a long time since I cared much about windows drivers).

      UEFI I don't think checks either expiry or timestamps at all. Instead it has the dbx which can contain blocked certificates or hashes of binaries that should not load.

      diagprov@mathstodon.xyzD gsuberland@chaos.socialG 2 Replies Last reply
      0
      • diagprov@mathstodon.xyzD diagprov@mathstodon.xyz

        @gsuberland @manawyrm @azonenberg @jik @zackwhittaker the certificates used to sign them do have an expiry but timestamps solve both expired cert and expired CA. The only way to revoke it is to add that cert to a CRL and leave it there permanently. I've no idea if the windows kernel checks crls or just maintains a list of blocked certs but I'd expect it to share the logic with windows and keep a cached crl (could be wrong, a long time since I cared much about windows drivers).

        UEFI I don't think checks either expiry or timestamps at all. Instead it has the dbx which can contain blocked certificates or hashes of binaries that should not load.

        diagprov@mathstodon.xyzD This user is from outside of this forum
        diagprov@mathstodon.xyzD This user is from outside of this forum
        diagprov@mathstodon.xyz
        wrote last edited by
        #24

        @gsuberland @manawyrm @azonenberg @jik @zackwhittaker they're blocked on signing new builds.

        1 Reply Last reply
        0
        • diagprov@mathstodon.xyzD diagprov@mathstodon.xyz

          @gsuberland @manawyrm @azonenberg @jik @zackwhittaker the certificates used to sign them do have an expiry but timestamps solve both expired cert and expired CA. The only way to revoke it is to add that cert to a CRL and leave it there permanently. I've no idea if the windows kernel checks crls or just maintains a list of blocked certs but I'd expect it to share the logic with windows and keep a cached crl (could be wrong, a long time since I cared much about windows drivers).

          UEFI I don't think checks either expiry or timestamps at all. Instead it has the dbx which can contain blocked certificates or hashes of binaries that should not load.

          gsuberland@chaos.socialG This user is from outside of this forum
          gsuberland@chaos.socialG This user is from outside of this forum
          gsuberland@chaos.social
          wrote last edited by
          #25

          @diagprov @manawyrm @azonenberg @jik @zackwhittaker yup that tracks with my understanding of it. Windows does have a driver cert revocation mechanism and a more general blocklist to prevent loading known-vulnerable drivers, but I haven't studied it in detail.

          diagprov@mathstodon.xyzD rairii@labyrinth.zoneR 2 Replies Last reply
          0
          • gsuberland@chaos.socialG gsuberland@chaos.social

            @diagprov @manawyrm @azonenberg @jik @zackwhittaker yup that tracks with my understanding of it. Windows does have a driver cert revocation mechanism and a more general blocklist to prevent loading known-vulnerable drivers, but I haven't studied it in detail.

            diagprov@mathstodon.xyzD This user is from outside of this forum
            diagprov@mathstodon.xyzD This user is from outside of this forum
            diagprov@mathstodon.xyz
            wrote last edited by
            #26

            @gsuberland @manawyrm @azonenberg @jik @zackwhittaker me neither but given how closely uefi code looks to Microsoft C code I bet the mechanism of dbx is very similar to the kernel.

            1 Reply Last reply
            0
            • jik@federate.socialJ jik@federate.social

              #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
              If this doesn't convince you big tech has too much control, I don't know what will.
              h/t @zackwhittaker
              https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
              #infosec #privacy #TechIsShitDispatch

              acm_redfox@jawns.clubA This user is from outside of this forum
              acm_redfox@jawns.clubA This user is from outside of this forum
              acm_redfox@jawns.club
              wrote last edited by
              #27

              @jik yeah, I just decided never to back up anywhere that wasn't a disk I owned...

              1 Reply Last reply
              0
              • gsuberland@chaos.socialG gsuberland@chaos.social

                @diagprov @manawyrm @azonenberg @jik @zackwhittaker yup that tracks with my understanding of it. Windows does have a driver cert revocation mechanism and a more general blocklist to prevent loading known-vulnerable drivers, but I haven't studied it in detail.

                rairii@labyrinth.zoneR This user is from outside of this forum
                rairii@labyrinth.zoneR This user is from outside of this forum
                rairii@labyrinth.zone
                wrote last edited by
                #28
                @gsuberland @diagprov @manawyrm @azonenberg @jik @zackwhittaker there are two types of revocation lists, the old one that can revoke certs and binaries by hash (two different lists for boot and drivers), and the new one that's just a CiPolicy and can therefore revoke by anything that a CiPolicy supports.
                1 Reply Last reply
                0
                • jik@federate.socialJ jik@federate.social

                  #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                  If this doesn't convince you big tech has too much control, I don't know what will.
                  h/t @zackwhittaker
                  https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                  #infosec #privacy #TechIsShitDispatch

                  jeff@mk.magicka.orgJ This user is from outside of this forum
                  jeff@mk.magicka.orgJ This user is from outside of this forum
                  jeff@mk.magicka.org
                  wrote last edited by
                  #29

                  @jik@federate.social @zackwhittaker@mastodon.social depending on microslop has consequences tbh

                  1 Reply Last reply
                  0
                  • jik@federate.socialJ jik@federate.social

                    #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                    If this doesn't convince you big tech has too much control, I don't know what will.
                    h/t @zackwhittaker
                    https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                    #infosec #privacy #TechIsShitDispatch

                    tranquillity@mastodon.minionflo.netT This user is from outside of this forum
                    tranquillity@mastodon.minionflo.netT This user is from outside of this forum
                    tranquillity@mastodon.minionflo.net
                    wrote last edited by
                    #30

                    @jik @zackwhittaker what

                    Why would being unable to sign stuff stop you from booting and decrypting your disk "in a few months"

                    What did VeraCrypt do

                    Why do they even have M$ signing keys

                    Whay

                    1 Reply Last reply
                    0
                    • jik@federate.socialJ jik@federate.social

                      #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                      If this doesn't convince you big tech has too much control, I don't know what will.
                      h/t @zackwhittaker
                      https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                      #infosec #privacy #TechIsShitDispatch

                      jaap@mastodon.bsd.cafeJ This user is from outside of this forum
                      jaap@mastodon.bsd.cafeJ This user is from outside of this forum
                      jaap@mastodon.bsd.cafe
                      wrote last edited by
                      #31

                      @jik @zackwhittaker

                      1 Reply Last reply
                      0
                      • jik@federate.socialJ jik@federate.social

                        #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
                        If this doesn't convince you big tech has too much control, I don't know what will.
                        h/t @zackwhittaker
                        https://techcrunch.com/2026/04/08/veracrypt-encryption-software-windows-microsoft-lock-boot-issues/
                        #infosec #privacy #TechIsShitDispatch

                        ox1de@cyberplace.socialO This user is from outside of this forum
                        ox1de@cyberplace.socialO This user is from outside of this forum
                        ox1de@cyberplace.social
                        wrote last edited by
                        #32

                        @jik @zackwhittaker big tech can eat a big dick

                        1 Reply Last reply
                        0
                        • zak@infosec.exchangeZ zak@infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups