Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Radicle: The Sovereign Forge

    Microsoft Mishandling Example.com

    What has Docker become?

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Ashley St. Clair, the mother of one of Elon Musk’s children, sues xAI over Grok sexual images

      January 17, 2026

      Anthropic joins OpenAI’s push into health care with new Claude tools

      January 12, 2026

      The mother of one of Elon Musk’s children says his AI bot won’t stop creating sexualized images of her

      January 7, 2026

      A new pope, political shake-ups and celebs in space: The 2025-in-review news quiz

      December 31, 2025

      AI has become the norm for students. Teachers are playing catch-up.

      December 23, 2025
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Monero Holds $500, But Rising Risk Emerges as Traders Pull Back

      January 23, 2026

      US DOJ Recasts Crypto as Fraud Infrastructure in New Review

      January 23, 2026

      Where Is Ethereum’s Bottom? Analysts Weigh On-Chain and Technical Signals

      January 23, 2026

      Ledger To Turn Crypto Security into Wall Street Gold in $4 Billion IPO

      January 23, 2026

      Can XRP HODLer Conviction Beat Profit Booking and the 18% Price Breakdown Risk?

      January 23, 2026
    • Technology

      Radicle: The Sovereign Forge

      January 23, 2026

      Microsoft Mishandling Example.com

      January 23, 2026

      What has Docker become?

      January 23, 2026

      Microsoft Gave FBI Keys to Unlock Encrypted Data, Exposing Major Privacy Flaw

      January 23, 2026

      Presence in Death

      January 23, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Microsoft Gave FBI Keys to Unlock Encrypted Data, Exposing Major Privacy Flaw
    Technology

    Microsoft Gave FBI Keys to Unlock Encrypted Data, Exposing Major Privacy Flaw

    TechAiVerseBy TechAiVerseJanuary 23, 2026No Comments6 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Microsoft Gave FBI Keys to Unlock Encrypted Data, Exposing Major Privacy Flaw
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Microsoft Gave FBI Keys to Unlock Encrypted Data, Exposing Major Privacy Flaw

    Microsoft says it will provide encryption keys for Windows PC data protected by BitLocker where it has access to them and it’s received a valid warrant.

    getty

    Early last year, the FBI served Microsoft with a search warrant, asking it to provide recovery keys to unlock encrypted data stored on three laptops. Federal investigators in Guam believed the devices held evidence that would help prove individuals handling the island’s Covid unemployment assistance program were part of a plot to steal funds.

    The data was protected with BitLocker, software that’s automatically enabled on many modern Windows PCs to safeguard all the data on the computer’s hard drive. BitLocker scrambles the data so that only those with a key can decode it.

    It’s possible for users to store those keys on a device they own, but Microsoft also recommends BitLocker users store their keys on its servers for convenience. While that means someone can access their data if they forget their password, or if repeated failed attempts to login lock the device, it also makes them vulnerable to law enforcement subpoenas and warrants.

    In the Guam case, it handed over the encryption keys to investigators.

    Microsoft confirmed to Forbes that it does provide BitLocker recovery keys if it receives a valid legal order. “While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide… how to manage their keys,” said Microsoft spokesperson Charles Chamberlayne.

    He said the company receives around 20 requests for BitLocker keys per year and in many cases, the user has not stored their key in the cloud making it impossible for Microsoft to assist.

    “If Apple can do it, if Google can do it, then Microsoft can do it.”

    The Guam case is the first known instance where the Redmond, Washington company has provided any encryption key to law enforcement. Back in 2013, a Microsoft engineer claimed he’d been approached by government officials to install backdoors in BitLocker, but had turned the requests down.

    Senator Ron Wyden said in a statement to Forbes that it is “simply irresponsible for tech companies to ship products in a way that allows them to secretly turn over users’ encryption keys.”

    “Allowing ICE or other Trump goons to secretly obtain a user’s encryption keys is giving them access to the entirety of that person’s digital life, and risks the personal safety and security of users and their families,” he added.

    This isn’t just an issue in the U.S. Jennifer Granick, surveillance and cybersecurity counsel at the ACLU, noted that foreign governments with questionable human rights records also demand data from tech giants like Microsoft. “Remote storage of decryption keys can be quite dangerous,” she said.


    Got a tip on Big Tech’s role in surveillance? Contact the reporter, Thomas Brewster, at tbrewster@forbes.com or +1 929-512-7964 on Signal.


    Law enforcement regularly asks tech giants to provide encryption keys, implement backdoor access or weaken their security in other ways. But other companies have refused. Apple in particular has repeatedly been asked for access to encrypted data in its cloud or on its devices. In a highly publicized showdown with the government in 2016, Apple fought an FBI order to help open phones belonging to terrorists who shot and killed 14 in San Bernardino, California. Ultimately, the FBI found a contractor to hack into the iPhones.

    Privacy and encryption experts told Forbes the onus should be on Microsoft to provide stronger protection for consumers’ personal devices and data. Apple, with its comparable FileVault and Passwords systems, and Meta’s WhatsApp messaging app also allow users to backup data on their apps and store a key in the cloud. However, both also allow the user to put the key in an encrypted file in the cloud, making law enforcement requests for it useless. Neither are reported to have turned over encryption keys of any kind in the past.

    “This is private data on a private computer and they made the architectural choice to hold access to that data. They absolutely should be treating it like something that belongs to the user,” said Matt Green, cryptography expert and associate professor at the Johns Hopkins University Information Security Institute.

    “If Apple can do it, if Google can do it, then Microsoft can do it. Microsoft is the only company that’s not doing this,” he added. “It’s a little weird… The lesson here is that if you have access to keys, eventually law enforcement is going to come.”

    Granick raised concerns about the breadth of information that the FBI could obtain if agents get access to data protected by BitLocker. “The keys give the government access to information well beyond the time frame of most crimes, everything on the hard drive,” she said. “Then we have to trust that the agents only look for information relevant to the authorized investigation, and do not take advantage of the windfall to rummage around.”

    In the Guam case, the court docket shows the warrant was successfully executed. The lawyer for defendant Charissa Tenorio, who pleaded not guilty, said the information provided to her by the case’s prosecutors included information from her client’s computer and that it included references to BitLocker keys that Microsoft had provided the FBI. The case is ongoing.

    Both Green and Granick said Microsoft could have users install a key on a piece of hardware like a thumb drive, which would act as a backup or recovery key. Microsoft does allow for that option, but it’s not the default setting for BitLocker on Windows PCs.

    Without the encryption keys from Microsoft, the FBI would’ve struggled to get any useful data from the computers. BitLocker’s encryption algorithms have proven impenetrable to prior law enforcement attempts to break in, according to a Forbes review of historical cases. In early 2025, a forensic expert with ICE’s Homeland Security Investigations unit wrote in a court document that his agency did “not possess the forensic tools to break into devices encrypted with Microsoft BitLocker, or any other style of encryption.” In one previous case, federal investigators obtained keys by discovering that a suspect had stored them on unencrypted drives.

    Now that the FBI and other agencies know Microsoft will comply with warrants similar to the Guam case, they’ll likely make more demands for encryption keys, Green said. “My experience is, once the U.S. government gets used to having a capability, it’s very hard to get rid of it.”

    MORE ON FORBES

    ForbesAI Bathroom Monitors? Welcome To America’s New Surveillance High SchoolsBy Thomas BrewsterForbesICE Finds Violent Threats Against Agents In Student’s Deleted Tweets, DOJ SaysBy Thomas BrewsterForbesThis 25-Year-Old Founder Wants To Kick Chinese Drones Out Of American SkiesBy Zoya HasanForbesWarehouse With $35 Million Of Apple Devices Linked To Chinese Fraud RingBy Thomas Brewster

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticlePresence in Death
    Next Article What has Docker become?
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Radicle: The Sovereign Forge

    January 23, 2026

    Microsoft Mishandling Example.com

    January 23, 2026

    What has Docker become?

    January 23, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025631 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025238 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025138 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology January 23, 2026

    Radicle: The Sovereign Forge

    Radicle: The Sovereign Forge Radicle is a sovereign {code forge} built on Git. Get started…

    Microsoft Mishandling Example.com

    What has Docker become?

    Microsoft Gave FBI Keys to Unlock Encrypted Data, Exposing Major Privacy Flaw

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Radicle: The Sovereign Forge

    January 23, 20260 Views

    Microsoft Mishandling Example.com

    January 23, 20260 Views

    What has Docker become?

    January 23, 20260 Views
    Most Popular

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.