this post was submitted on 13 May 2026
950 points (99.8% liked)

Technology

84653 readers
5319 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

YellowKey reportedly works in Windows 11, Windows Server 2022 and 2025, but not in Windows 10.

you are viewing a single comment's thread
view the rest of the comments
[–] Thorry@feddit.org 85 points 1 day ago* (last edited 1 day ago) (6 children)

Not to be that guy, but that's 100% on you for not having backups of important work. It's 3 years and your fucking research dissertation, how the fuck do you keep that all in one place?

This time you got fucked by Microsoft for having shit software. But it could have been your hardware that exploded, your house catching fire, your shit being stolen, you downloading malware from that one site you told your girlfriend you'd never visit again, shitty infrastructure causing power issues or flooding, you yourself having a nervous breakdown and nuking the thing.

Keep everything important at least in three places, one of which should be in a physically different (remote) place. Backup often, keep to the schedule and test your backups.

Jeez man, using Microsoft software and not having backups is like walking around with a loaded gun pointed at your dick. It's all well and good till you get your dick blown off.

[–] dual_sport_dork@lemmy.world 31 points 1 day ago (3 children)

In the immortal words of Daniel Rutter (again): If nothing else, backups are necessary because at some point in your life you will confidently instruct your computer to destroy your data.

[–] Alberat@lemmy.world 24 points 1 day ago* (last edited 1 day ago) (2 children)

i just deleted a month of notes by doing:

find $(pwd) "*.tmp" -delete

instead of:

find $(pwd) -iname "*.tmp" -delete

turns out the former throws an error on "*.tmp" but still deletes everything lol... PSA for everyone

[–] Matriks404@lemmy.world 2 points 1 day ago (1 children)

I think it's your fault if you don't have backups... but I legitimately think that we should restrict usage of classic Unix tools to scripts, and use safer tools ourselves... but I guess that's just my opinion.

[–] Alberat@lemmy.world 1 points 1 day ago* (last edited 1 day ago)

yeah i didnt want to script removing the tmp files bc theyre sometimes useful... usually i do read;find -delete; as like a "confirm" for me...

also, i do backup, but i guess only once a month... i was in the middle of a backup, the commands were: git add --all; git commit; find -delete; git push; and then confusion when i saw the .git folder was gone

ive been doing this for over a decade and this is the second (third?) time something like this has happened.

anyway, not trying to defend myself, maybe i should script the find and delete thing... but i just wanna hopefully prevent someone else's data deletion.

[–] pool_spray_098@lemmy.world 1 points 1 day ago

Damn! That's a brutal one. Someone should maybe change that behavior.

[–] pcouy@lemmy.pierre-couy.fr 4 points 1 day ago (1 children)

A few years ago I deleted my whole home folder by bind-mounting it inside a chroot. When I was done with the chroot, I rm -rf-ed it without unmounting my home first.

[–] northface@lemmy.ml 1 points 1 day ago

This happened to me, just a few weeks ago. I am glad I had btrfs snapshots...

[–] raspberriesareyummy@lemmy.world 3 points 1 day ago (1 children)
[–] phutatorius@lemmy.zip 2 points 1 day ago (2 children)

I was lucky last time, was able to reconstruct almost all of it (99.7%) in 3 weeks of after-work messing around. The 0.3% is non-critical.

Now I do something I wrote myself with cron, rsync, hardlinks and gpg. It's simple, easy to test and fairly bulletproof. Protip: keep many backups of your keys or you'll wish you had.

Syncthing (distributed folder sharing including “keep x copies of each file”) and duplicity (gpg-encrypted, incremental backup anywhere) are your friends.

Been using them for a very, very long time. A++ open source, cross-platform solutions.

Yeah, I was hesitant to encrypt backups for a long time, and now I have the problem that you can't store backups of encryption headers on the encrypted device(s)

[–] Korhaka@sopuli.xyz 9 points 1 day ago

I have a better backup system in place for my factorio saves. Script syncs the live copy to several places on the network along with compressing a timestamped copy to an external HDD which stores a bunch of copies. Then manually I might trim them down every few years or so as I don't really need 3 different copies from March 2024 still.

[–] Ferrous@lemmy.ml 20 points 1 day ago

"If it only exists on your laptop, it doesn't exist"

[–] HeyJoe@lemmy.world 3 points 1 day ago (1 children)

Yeah, I would also like to know more on how bitlocker screwed him. Like was it a legit problem or that the device died and didnt have the keys to decrypt it? If it's not keeping the keys somewhere safe, which it even makes you do by not allowing you to select the local device, then idk how the blame is microsoft is shitty. Need more info though.

IT lapsed and diddnt have keys for the computer. So windows 10 "updated" to windows 11 the computer bricked. IT also blocked us from plugging in usb sticks. Which they then blamed me for not backing everything thing up to one drive. It's all just left a sour taste in my mouth

[–] neclimdul@lemmy.world 5 points 1 day ago* (last edited 1 day ago) (1 children)

I to have multi tiered backups for my laptops and do regular restores to validate them. Same for my parents and all my non technical family and friends. Its amazing that big companies mess this up since everyone does it. It's just so cheap and easy to do. /s

[–] FrederikNJS@piefed.zip -2 points 1 day ago (1 children)
  1. Find online backup service
  2. Pay for subscription
  3. Install backup software
  4. ...
  5. Still have your data

I use Backblaze myself... But there are many other straightforward and easy backup solutions out there.

[–] raspberriesareyummy@lemmy.world 2 points 1 day ago (1 children)

Storing important data online on someone else's computer is beyond fucked up levels of stupid: You only need to lose your encryption key once in your lifetime afterwards, and you can consider your backup public for all the world to see. And a single encryption weakness / backdoor will expose data just the same. Not to mention using third party sw to "do the backup" for you and relying on them to encrypt it so that they themselves can't read it, is very naive.

Once your data left your home network, it is no longer yours to control.

[–] FrederikNJS@piefed.zip 2 points 1 day ago (1 children)

Well... That depends entirely on your threat model...

In my setup, the backup is encrypted locally, and then uploaded to Backblaze. If I leak my encryption key, then yes, Backblaze and any state actor that can compel Backblaze, might be able to read my backup (and the same goes for an encryption vulnerability). But since the connection to access the backup is also authenticated, the rest of the public would not be able to read my backup. If I leak my access credentials, then everyone could get my encrypted backup data, but not be able to decrypt it. Of course if I leak both the access credentials and the encryption key, then yes anyone that obtains both can read my backup.

Many regular people use Microsoft Onedrive or Google Drive, which offers even less protection, but it's certainly sufficient and well enough protected to keep your dissertation protected.

In most backup services you have the option to choose what gets backed up, and what does not. But sure, it entirely depends on who you want to protect yourself from.

If your main concern is state actors, then yeah... You probably shouldn't use something like Backblaze. You should keep everything on your own hardware. And convince a friend or some family to have a NAS sitting somewhere that can host your backup destination.

For my case I'm mostly concerned about data continuity (not losing data). But privacy is certainly also a concern, and here I have chosen to believe that the encryption is sound enough, and that my ability to keep my encryption key safe, is sufficient for the data it protects.

My main concern is that all my data is online, potentially forever (I have to assume it will be) and the only thing needed to access it is a comparatively tiny encryption key (we're talking Megabytes) that I have to keep safe forever (or until I delete it). If I ever mess up, or a computer with the encryption key gets compromised, then there goes my data into the public domain...