Get the latest tech news
Windows BitLocker – Screwed Without a Screwdriver
Breaking up-to-date Windows 11 BitLocker encryption -- on-device but software-only
While I disagree with their claim that the default Secure Boot-based TPM config is sufficient against attacks “without much skill or with limited physical access”, their recommendations are otherwise comprehensive and worth exploring. If your are at all interested in secure/verified boot, how this exactly combined to create automated unlocks, and why Linux users have been prompted with obscure SBAT errors in the past couple months, I recommend you check it out! Use QEMU with libvirt/virt-manager Windows 11 24H2 as the guest OS: This version greatly simplifies BitLocker activation, automatically enabling it as long as Secure Noot is on and the user is logged into a Microsoft account.
Or read this on Hacker News