Back in January Microsoft encrypted all my hard drives without saying anything. I was playing around with a dual boot yesterday and somehow aggravated Secureboot. So my C: panicked and required a 40 character key to unlock.
Your key is backed up to the Microsoft account associated with your install. Which is considerate to the hackers. (and saved me from a re-install) But if you’ve got an unactivated copy, local account, or don’t know your M$ account credentials, your boned.
Control Panel > System Security > Bitlocker Encryption.
BTW, I was aware that M$ was doing this and even made fun of the effected users. Karma.
Why cant windows copy luks and let you choose your own password
You can use pins, passwords, TPM, a usb key, or multiple in combination. But generally TPM is the best option for most users
Oh I thought you can only pick tpm
because people will set hunter2 and be done with it.
How did you get my password?
All I see is *******. What do you see?
So?
I’m power sure you can get your recovery key and write that down elsewhere.
Ik that