D
danhar555
[COLOR=rgba(34, 34, 34, 1)]Running the following commands on C: volume which is an internal eMMC drive (not HD/SSD if it matters) in a laptop running Windows 10 Home:[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] manage-bde -on c: # encrypt data
manage-bde -status c: # show status (after waiting a while for encryption to finish)[/COLOR]
[COLOR=rgba(34, 34, 34, 1)]Output:[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] Volume C: [BOOTCAMP]
[OS Volume]
Size: 57.71 GB
BitLocker Version: 2.0[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Conversion Status: Fully Encrypted[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Percentage Encrypted: 100.0%[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Encryption Method: XTS-AES 128[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Protection Status: Protection Off[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Lock Status: Unlocked[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Identification Field: Unknown[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Key Protectors: None Found[/COLOR]
[COLOR=rgba(34, 34, 34, 1)]It says that the volume is encrypted with no protectors (since I haven't added them yet) so the question is what's used to derive the encryption keys if no TPM, password etc are added and why is it allowed (does it have any specific usage)?[/COLOR]
Continue reading...
[COLOR=rgba(34, 34, 34, 1)] manage-bde -on c: # encrypt data
manage-bde -status c: # show status (after waiting a while for encryption to finish)[/COLOR]
[COLOR=rgba(34, 34, 34, 1)]Output:[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] Volume C: [BOOTCAMP]
[OS Volume]
Size: 57.71 GB
BitLocker Version: 2.0[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Conversion Status: Fully Encrypted[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Percentage Encrypted: 100.0%[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Encryption Method: XTS-AES 128[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Protection Status: Protection Off[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Lock Status: Unlocked[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Identification Field: Unknown[/COLOR]
[COLOR=rgba(34, 34, 34, 1)] [/COLOR][COLOR=rgba(34, 34, 34, 1)]Key Protectors: None Found[/COLOR]
[COLOR=rgba(34, 34, 34, 1)]It says that the volume is encrypted with no protectors (since I haven't added them yet) so the question is what's used to derive the encryption keys if no TPM, password etc are added and why is it allowed (does it have any specific usage)?[/COLOR]
Continue reading...