Today i took my first steps into the world of Linux by creating a bookable Mint Cinamon USB stick to fuck around on without wiping or portioning my laptop drive.

I realised windows has the biggest vulnerability for the average user.

While booting off of the usb I could access all the data on my laptop without having to input a password.

After some research it appears drives need to be encrypted to prevent this, so how is this not the default case in Windows?

I’m sure there are people aware but for the laymen this is such a massive vulnerability.

  • Mensh123@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    18 days ago

    Yup. You’ll need to tkinker with Linux too if you want disk encryption. At the very least, set a BIOS password.

    • catloaf@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      19 days ago

      And people are pissed because they don’t realize, and when they don’t have the key any more, all their data is gone!

      • Rogue@feddit.uk
        link
        fedilink
        arrow-up
        0
        ·
        18 days ago

        The encryption key is stored remotely and can be retrieved through the Microsoft account

        • catloaf@lemm.ee
          link
          fedilink
          English
          arrow-up
          0
          ·
          18 days ago

          That assumes they know which Microsoft account it was attached to, the password, and have another device to access that account and retrieve the recovery key. If they did the setup five years ago, they’ve probably forgotten all that info.

    • tomcatt360@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      19 days ago

      IIRC, this is one of the reasons that Windows 11 requires TPM 2.0, so that the drive can be encrypted using the TPM as the key.

  • brucethemoose@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    19 days ago

    Good practice is putting anything important on an encrypted USB drive (as that stuff usually isn’t very big), and just treating the machine as “kinda insecure”

    If you set up a BIOS password, someone at least needs to unscrew your computer to get stuff. But this is generally not setup because people, well, forget their passwords…

  • Xanza@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    19 days ago

    While booting off of the usb I could access all the data on my laptop without having to input a password.

    This is entirely expected behavior. You didn’t encrypt your drive, so of course that data is available if you sidestep windows login protections. Check out Bitlocker for drive encryption.

  • ArcaneSlime@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    0
    ·
    19 days ago

    Yeh. But also this allowed me to save my files from my dying windows drive while moving to linux, so sometimes giant security holes can be handy.

  • data1701d (He/Him)@startrek.website
    link
    fedilink
    English
    arrow-up
    0
    ·
    18 days ago

    How old is your laptop? Pretty much every Windows machine I’ve ever owned after a certain year requires you to type in your Bitlocker key, including my first-gen Surface Go from 2018.

    Also, you often have to manually set up encryption on most Linux installs as well - I did it for my Thinkpad. I need to do it for my desktop as well - I should probably do a reinstall, but I’m thinking of backing everything up and trying to do it in-place just for fun. On top of that, we can finally transition to btrfs.

    Wink

    • MNByChoice@midwest.social
      link
      fedilink
      arrow-up
      0
      ·
      18 days ago

      Pretty much every Windows machine I’ve ever owned after a certain year requires you to type in your Bitlocker key, including my first-gen Surface Go from 2018.

      This is interesting. I had a work computer require this ~4 years ago, but not one of the three since have (personal and different employers.)

    • wuphysics87@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      18 days ago

      Microsoft used to have a division for testing windows on various hardware configurations. They stopped doing that when they could just put different versions of windows on people’s computers and use telemetry to check the differences. This could be an artifact of that.

  • Fizz@lemmy.nz
    link
    fedilink
    arrow-up
    0
    ·
    16 days ago

    Most Linux users run fully unencrypted drives as well. Its a vulnerability and a risk but its not a massive threat to the average person.

    Idk if the average person is a laptop user but laptop users would definitely place a higher value on disk encryption.

  • kittenroar@beehaw.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    17 days ago

    This is not that big of a deal most of the time, since you are the only person interacting with your computer, but it’s worth remembering when you decide to recycle or donate – you have to securely wipe in that case. Also bear in mind, if you do encrypt your drive, there are now more possibilities for total data loss.

    Oh, fun fact: you can change a users windows password inside Linux. Comes in handy for recovery, ie, user forgot their password.

  • whysofurious@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    18 days ago

    I still remember years ago one time windows fucked itself and god knows why I couldn’t fix it even with USB recovery or stuff like that (long time ago, I don’t remember).

    Since I couldn’t boot into recovery mode the easiest way to backup my stuff to a connected external drive was “open notepad from the command line -> use the GUI send to… command to send the files to the external drive -> wait and profit” lol.

  • nanook@friendica.eskimo.com
    link
    fedilink
    arrow-up
    0
    ·
    18 days ago

    By the way, no different for Linux, if you boot off of USB you can mount partitions and access anything if not encrypted and linux windows, encryption is not the default.

  • pulido@lemmings.world
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    17 days ago

    Yes, any laptop without an encrypted storage drive will have its data accessible by someone booting from a live USB.

    It really is a massive vulnerability, but it’s not well known because so few people even understand the concept of a ‘live USB’ to make it a widespread threat or concern.

    So yeah, if you’re ever in possession of a Windows machine that doesn’t have an encrypted disk, you can view the users’ files without knowing their password via a live USB.

    It’s also not limited to laptops.