Tagged articles
7 articles
Page 1 of 1
Black & White Path
Black & White Path
May 19, 2026 · Information Security

Is BitLocker Hiding a Deliberate Backdoor? Inside the YellowKey Bypass Attack

A security researcher released the YellowKey proof‑of‑concept showing that, on Windows 11 and Server 2022/2025, BitLocker can be bypassed without a password or recovery key by using a crafted USB and multiple reboots, sparking accusations that Microsoft may have embedded a backdoor in the WinRE component.

BitLockerTPMTransactional NTFS
0 likes · 13 min read
Is BitLocker Hiding a Deliberate Backdoor? Inside the YellowKey Bypass Attack
Black & White Path
Black & White Path
May 15, 2026 · Information Security

How the 'FailRelock' Flag Let Attackers Bypass BitLocker for the Fifth Time

A debug flag named FailRelock in Windows' recovery environment disables BitLocker relocking when set to 1, allowing an attacker with a USB drive and a modified INI file to obtain full access to encrypted drives—a fifth such breach in five years, highlighted with attack steps, technical analysis, and mitigation advice.

BitLockerDebug FlagFailRelock
0 likes · 6 min read
How the 'FailRelock' Flag Let Attackers Bypass BitLocker for the Fifth Time
21CTO
21CTO
Aug 1, 2023 · Information Security

Why Linus Torvalds Wants to Disable AMD’s fTPM RNG – A Hidden Kernel Issue

Linus Torvalds has publicly criticized AMD’s firmware‑based TPM random number generator for causing system stalls on Linux, urging the community to disable the fTPM hwrng until reliable fixes are delivered, highlighting broader security and firmware concerns.

AMDRandom Number GeneratorTPM
0 likes · 6 min read
Why Linus Torvalds Wants to Disable AMD’s fTPM RNG – A Hidden Kernel Issue
Architects' Tech Alliance
Architects' Tech Alliance
Apr 6, 2023 · Information Security

Key Chip‑Level Security Technologies for the Internet of Things

The article explains the security challenges of IoT deployments and describes chip‑level protection methods such as TPM, Secure Boot, Trusted Execution Environments, and hardware‑based trusted computing mechanisms like ARM TrustZone, Intel TXT, and AMD PSP, highlighting their roles in building a trustworthy IoT architecture.

IoT securitySecure BootTPM
0 likes · 10 min read
Key Chip‑Level Security Technologies for the Internet of Things