<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[So I’ve just had a quick play with this and yes, it works.]]></title><description><![CDATA[<p>So I’ve just had a quick play with this and yes, it works. Essentially BitLocker has a backdoor. <a href="https://github.com/Nightmare-Eclipse/YellowKey" rel="nofollow noopener"><span>https://</span><span>github.com/Nightmare-Eclipse/Y</span><span>ellowKey</span></a></p><p>Mitigation = BitLocker PIN and BIOS password lock.</p>]]></description><link>https://board.circlewithadot.net/topic/9f5829cf-bf38-4b98-8d6e-8076f57e3420/so-i-ve-just-had-a-quick-play-with-this-and-yes-it-works.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:24:39 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/9f5829cf-bf38-4b98-8d6e-8076f57e3420.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 13 May 2026 05:40:57 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 20:20:16 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social" rel="nofollow noopener">@<span>GossiTheDog</span></a></span> <br />The aurhor <a href="https://deadeclipse666.blogspot.com/2026/05/were-doing-silent-patches-now-huh-also.html" rel="nofollow noopener">claims</a> that TPM + PIN is <strong>not</strong> protection.</p><p>Personally I have a hard time understanding how that could be bypassed. Thoughts?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116569120232405418</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/wdormann/statuses/116569120232405418</guid><dc:creator><![CDATA[wdormann@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 20:20:16 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 19:56:44 GMT]]></title><description><![CDATA[<p><span><a href="/user/gsuberland%40chaos.social" rel="nofollow noopener">@<span>gsuberland</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social" rel="nofollow noopener">@<span>GossiTheDog</span></a></span> I think I used something like this last year. <strong>After</strong> a bios update a new Windows update fucked up my OS and the machine kept rebooting and going into recovery...</p><p>From that recovery mode I had access to the <strong>unlocked OS disk</strong> (without using the recovery key) and I was able to copy the couple of folders which were not in my backup... before I wiped the disk and did a clean install.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/sassdawe/statuses/116569027652326826</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/sassdawe/statuses/116569027652326826</guid><dc:creator><![CDATA[sassdawe@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 19:56:44 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 19:26:38 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> Okay I got it working on the desktop, even though `reagentc /info` showed that it was enabled, running `reagentc /disable` then `reagentc /enable` made the machine vulnerable</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.kaisev.net/users/daigle/statuses/116568909302444738</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.kaisev.net/users/daigle/statuses/116568909302444738</guid><dc:creator><![CDATA[daigle@mastodon.kaisev.net]]></dc:creator><pubDate>Wed, 13 May 2026 19:26:38 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 19:13:08 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> Do you think U.S. authorities could be investigating NightmareEclipse due to their disclosures?</p><p>I imagine Microsoft is investigating internally to determine if it's someone with previous/current access to internal info that is still legally protected (by contract or law).</p><p>Based on their posts, MS might already know their identity if they have interacted with this person via MSRC and have their payment info for the bug bounty programs.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/AlesandroOrtiz/statuses/116568856258849574</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/AlesandroOrtiz/statuses/116568856258849574</guid><dc:creator><![CDATA[alesandroortiz@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 19:13:08 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 19:04:35 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> This doesn't work for me. I'm using an exFat Ventoy USB (it's all I have right now) on  a T16 Gen 1 and a desktop. Both with TPM, no PIN.</p><p>ThinkPad - won't boot with CTRL held down, I briefly release it on the Lenovo screen. CMD pops up but C:\ is mapped to a Ventoy partition and the BitLocker partition wasn't mounted or unlocked.</p><p>Desktop - I got to CMD and C:\ was mounted but locked.</p><p>Without the USB CMD doesn't open on either PC. I might try again later with clean NTFS USB stick.</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.kaisev.net/users/daigle/statuses/116568822638310429</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.kaisev.net/users/daigle/statuses/116568822638310429</guid><dc:creator><![CDATA[daigle@mastodon.kaisev.net]]></dc:creator><pubDate>Wed, 13 May 2026 19:04:35 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 19:00:20 GMT]]></title><description><![CDATA[<p><span><a href="/user/gsuberland%40chaos.social" rel="nofollow noopener">@<span>gsuberland</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social" rel="nofollow noopener">@<span>GossiTheDog</span></a></span> Slightly easier than grabbing the key off LPC I guess.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/AMS/statuses/116568805879820061</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/AMS/statuses/116568805879820061</guid><dc:creator><![CDATA[ams@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 19:00:20 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 18:53:13 GMT]]></title><description><![CDATA[<p>Me and <span><a href="/user/wdormann%40infosec.exchange">@<span>wdormann</span></a></span> have both recreated the BitLocker backdoor^H^H^Hvulnerability <a href="https://www.bleepingcomputer.com/news/security/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released/" rel="nofollow noopener"><span>https://www.</span><span>bleepingcomputer.com/news/secu</span><span>rity/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released/</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://cyberplace.social/users/GossiTheDog/statuses/116568777898644704</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://cyberplace.social/users/GossiTheDog/statuses/116568777898644704</guid><dc:creator><![CDATA[gossithedog@cyberplace.social]]></dc:creator><pubDate>Wed, 13 May 2026 18:53:13 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 16:49:54 GMT]]></title><description><![CDATA[<span><a href="/user/gossithedog%40cyberplace.social" rel="ugc">@<span>GossiTheDog</span></a></span> You've probably seen this, but there were a bunch more in WinRE: <a href="https://media.ccc.de/v/39c3-bitunlocker-leveraging-windows-recovery-to-extract-bitlocker-secrets" rel="ugc">https://media.ccc.de/v/39c3-bitunlocker-leveraging-windows-recovery-to-extract-bitlocker-secrets</a>]]></description><link>https://board.circlewithadot.net/post/https://ue.oiaa.aaio.eu/objects/8ff41cfc-86de-47ef-b09b-6f4057b56422</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://ue.oiaa.aaio.eu/objects/8ff41cfc-86de-47ef-b09b-6f4057b56422</guid><dc:creator><![CDATA[jja2000@ue.oiaa.aaio.eu]]></dc:creator><pubDate>Wed, 13 May 2026 16:49:54 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 16:30:43 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> Very interesting indeed.  I only have a work laptop with windows 11 so I have no testbed.  Everything else is Linux, and famliy has Macbooks.  I use to be able to boot Linux from a portable ssd drive + portable hard drive on my work laptop to make a compressed backup of the entire laptop SSD, so I could just roll back to last working image.  Could this exploit be used to perform some "essentials" backup that could be used to restore from a bitlocker lockout or other failures?</p>]]></description><link>https://board.circlewithadot.net/post/https://newsie.social/users/mdb/statuses/116568217552946776</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://newsie.social/users/mdb/statuses/116568217552946776</guid><dc:creator><![CDATA[mdb@newsie.social]]></dc:creator><pubDate>Wed, 13 May 2026 16:30:43 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 15:59:24 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> I mean they already do key escrow if you link to a MSFT account right?  So seems sloppy for an intentional backdoor.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/mikesiegel/statuses/116568094463186880</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/mikesiegel/statuses/116568094463186880</guid><dc:creator><![CDATA[mikesiegel@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 15:59:24 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 15:58:01 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/568/088/657/565/480/original/566f65de08b70df0.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/mikesiegel/statuses/116568089010065464</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/mikesiegel/statuses/116568089010065464</guid><dc:creator><![CDATA[mikesiegel@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 15:58:01 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 15:33:25 GMT]]></title><description><![CDATA[<p><span><a href="/user/berglerma%40mastodon.social">@<span>berglerma</span></a></span> <span><a href="/user/gsuberland%40chaos.social">@<span>gsuberland</span></a></span> <span><a href="/user/mkoek%40mastodon.nl">@<span>mkoek</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> This is BitLocker we are talking about. There's about one yearly post somewhere online, from someone new who bypassed bitlocker with an arduino and two paperclips. It's always passive attacks on the bus.</p>]]></description><link>https://board.circlewithadot.net/post/https://c.im/users/pianosaurus/statuses/116567992239142979</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://c.im/users/pianosaurus/statuses/116567992239142979</guid><dc:creator><![CDATA[pianosaurus@c.im]]></dc:creator><pubDate>Wed, 13 May 2026 15:33:25 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 15:23:51 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social" rel="nofollow noopener">@<span>GossiTheDog</span></a></span> </p><blockquote><ul><li>it provides a login bypass, as you’re dumped as SYSTEM prior to Windows Hello or password login </li></ul></blockquote><p>Technically you're running in WinPE with unlocked <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f604.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--smile" style="height:23px;width:auto;vertical-align:middle" title="C:" alt="😄" /> drive.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/jernej__s/statuses/116567954666560839</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/jernej__s/statuses/116567954666560839</guid><dc:creator><![CDATA[jernej__s@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 15:23:51 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 15:17:19 GMT]]></title><description><![CDATA[<p><span><a href="/user/rairii%40labyrinth.zone">@<span>Rairii</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> <span><a href="/user/mkoek%40mastodon.nl">@<span>mkoek</span></a></span> yeah, I was just thinking "hm I should edit that post from yesterday to mention fTPMs"</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/gsuberland/statuses/116567928974176185</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/gsuberland/statuses/116567928974176185</guid><dc:creator><![CDATA[gsuberland@chaos.social]]></dc:creator><pubDate>Wed, 13 May 2026 15:17:19 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 15:15:50 GMT]]></title><description><![CDATA[<span><a href="/user/gsuberland%40chaos.social" rel="ugc">@<span>gsuberland</span></a></span> <span><a href="/user/mkoek%40mastodon.nl" rel="ugc">@<span>mkoek</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social" rel="ugc">@<span>GossiTheDog</span></a></span> not always - this wouldn't work with a "firmware TPM" implementation in IntelME/AMD PSP or in Pluton for example]]></description><link>https://board.circlewithadot.net/post/https://labyrinth.zone/objects/af91e389-7714-4b28-9611-4afb0bf15b58</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://labyrinth.zone/objects/af91e389-7714-4b28-9611-4afb0bf15b58</guid><dc:creator><![CDATA[rairii@labyrinth.zone]]></dc:creator><pubDate>Wed, 13 May 2026 15:15:50 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 15:11:32 GMT]]></title><description><![CDATA[<p><span><a href="/user/splinux%40mastodon.uno">@<span>splinux</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> my mom sent me an old ssd in the same situation. Haven't been able to recover her data from it so far. <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f61e.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--disappointed" style="height:23px;width:auto;vertical-align:middle" title=":-(" alt="😞" /></p>]]></description><link>https://board.circlewithadot.net/post/https://phpc.social/users/kboyd/statuses/116567906223246829</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://phpc.social/users/kboyd/statuses/116567906223246829</guid><dc:creator><![CDATA[kboyd@phpc.social]]></dc:creator><pubDate>Wed, 13 May 2026 15:11:32 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 14:51:47 GMT]]></title><description><![CDATA[<p><span><a href="/user/prsfalken%40mastodon.social">@<span>prsfalken</span></a></span> <span><a href="/user/barubary%40infosec.exchange">@<span>barubary</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> they’re excellent at planning Copilot and spyware integrations, though.</p>]]></description><link>https://board.circlewithadot.net/post/https://haz.pink/users/can/statuses/116567828543118339</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://haz.pink/users/can/statuses/116567828543118339</guid><dc:creator><![CDATA[can@haz.pink]]></dc:creator><pubDate>Wed, 13 May 2026 14:51:47 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 14:28:27 GMT]]></title><description><![CDATA[<p><span><a href="https://mastodon.social/@drm" rel="nofollow noopener">@<span>drm</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social" rel="nofollow noopener">@<span>GossiTheDog</span></a></span> Ah bah j'ai toujours cru que Bitlocker était by-design vuln aux downgrade attacks</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/S1m/statuses/116567736813129309</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/S1m/statuses/116567736813129309</guid><dc:creator><![CDATA[s1m@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 14:28:27 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 14:02:07 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> I suspect you have that NSA key set. <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f609.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--wink" style="height:23px;width:auto;vertical-align:middle" title="😉" alt="😉" /></p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/moelassus/statuses/116567633288070417</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/moelassus/statuses/116567633288070417</guid><dc:creator><![CDATA[moelassus@mastodon.social]]></dc:creator><pubDate>Wed, 13 May 2026 14:02:07 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 13:46:27 GMT]]></title><description><![CDATA[<p><span><a href="/user/s1m%40infosec.exchange">@<span>S1m</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4aa.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--muscle" style="height:23px;width:auto;vertical-align:middle" title="💪" alt="💪" /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f3fc.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--skin-tone-3" style="height:23px;width:auto;vertical-align:middle" title="🏼" alt="🏼" />. Je crois que tu confonds avec cette vuln <a href="https://github.com/garatc/BitUnlocker" rel="nofollow noopener"><span>https://</span><span>github.com/garatc/BitUnlocker</span><span></span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/drm/statuses/116567571630265395</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/drm/statuses/116567571630265395</guid><dc:creator><![CDATA[drm@mastodon.social]]></dc:creator><pubDate>Wed, 13 May 2026 13:46:27 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 13:28:44 GMT]]></title><description><![CDATA[<p><span><a href="https://mastodon.social/@drm">@<span>drm</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> Toujours à la pointe les collègues. C'est pas un patch qui nécessite une mise à jour des certifs secureboot ça ? Le genre de mise à jour qui est toujours retardée</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/S1m/statuses/116567501985386800</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/S1m/statuses/116567501985386800</guid><dc:creator><![CDATA[s1m@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 13:28:44 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 13:27:01 GMT]]></title><description><![CDATA[<p><span><a href="/user/s1m%40infosec.exchange">@<span>S1m</span></a></span> <span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> testé hier par un collègue, ça marche bien ! Mais ça va être rapidement patché... <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f62d.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--sob" style="height:23px;width:auto;vertical-align:middle" title="😭" alt="😭" /></p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/drm/statuses/116567495274976493</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/drm/statuses/116567495274976493</guid><dc:creator><![CDATA[drm@mastodon.social]]></dc:creator><pubDate>Wed, 13 May 2026 13:27:01 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 13:12:35 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> thanks God i can recover an Old ssd whose bitlocker key is somewhere in the short-circuited mainboard Something Something Secure Module and I happen to not have a backup of that specific bitlocker key</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.uno/users/splinux/statuses/116567438500507016</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.uno/users/splinux/statuses/116567438500507016</guid><dc:creator><![CDATA[splinux@mastodon.uno]]></dc:creator><pubDate>Wed, 13 May 2026 13:12:35 GMT</pubDate></item><item><title><![CDATA[Reply to So I’ve just had a quick play with this and yes, it works. on Wed, 13 May 2026 12:59:45 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> </p><p><span><a href="https://mastodon.social/@drm">@<span>drm</span></a></span> Plus besoin de s'embêter à faire du TPM sniffing</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/S1m/statuses/116567388009416530</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/S1m/statuses/116567388009416530</guid><dc:creator><![CDATA[s1m@infosec.exchange]]></dc:creator><pubDate>Wed, 13 May 2026 12:59:45 GMT</pubDate></item></channel></rss>