this post was submitted on 13 May 2026
568 points (99.7% liked)

Technology

84583 readers
4301 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

YellowKey reportedly works in Windows 11, Windows Server 2022 and 2025, but not in Windows 10.

you are viewing a single comment's thread
view the rest of the comments
[–] AnyOldName3@lemmy.world 43 points 12 hours ago* (last edited 12 hours ago) (1 children)

By exploit standards, that's not especially hard. I don't think there's really anything blocking accessing it at all if an NTFS volume is mounted on a typical desktop Linux distro, as it's just NTFS permissions blocking it, and they're not typically obeyed by Linux in the first place.

In the face of your edit, I see that you've misunderstood the exploit. You need write access to the System Volume Information directory of your own USB stick, not anything on the target machine. It's much easier to get access to things on a computer than it is to get access on one particular computer, and this exploit lets you jump from one to the other.

[–] 9tr6gyp3@lemmy.world 7 points 12 hours ago (2 children)

Its bitlocker encrypted. You need to unlock the disk to see System Volume Information in Linux.

[–] AnyOldName3@lemmy.world 21 points 12 hours ago (1 children)

I'll copy the bit here that I just edited into my reply after you edited the first post:

In the face of your edit, I see that you’ve misunderstood the exploit. You need write access to the System Volume Information directory of your own USB stick, not anything on the target machine. It’s much easier to get access to things on a computer than it is to get access on one particular computer, and this exploit lets you jump from one to the other.

[–] 9tr6gyp3@lemmy.world 16 points 12 hours ago

Ah yeah, I misunderstood. Thanks for the clarification.

[–] humanspiral@lemmy.ca 1 points 6 hours ago (1 children)

does bitlocker encrypt whole volume, or userdata folders? It's a performance issue to encrypt anything that doesn't need to be.

[–] 9tr6gyp3@lemmy.world 2 points 5 hours ago* (last edited 5 hours ago)

Its whole-volume encryption, not file encryption. Most modern CPUs have built-in AES-NI instructions so its not much of a performance penalty (as long as AES is used for encryption).