YellowKey reportedly works in Windows 11, Windows Server 2022 and 2025, but not in Windows 10.

  • ExLisper@lemmy.curiana.net
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    13 hours ago

    Why people are saying that the files being deleted indicate a backdoor? This is clearly to be executed while having access to the laptop. So it’s not like I’m tricking someone into connecting the USB drive and after the PC is infected I want to get rid of the evidence. If some FBI agent is using a USB drive to unlock a laptop at work, what’s the point of making the drive single use?

    This could also be part of the PoC created by the researcher, not part of the backdoor.

    • Bazoogle@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      8 hours ago

      They said in the article they recreated it on their own. So it couldn’t just be the proof of concept.

      If some FBI agent is using a USB drive to unlock a laptop at work, what’s the point of making the drive single use?

      Under cover/covert operations do actually happen.

      • ExLisper@lemmy.curiana.net
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 hours ago

        They said in the article they recreated it on their own. So it couldn’t just be the proof of concept.

        This could mean they just put the files from the exploit on a drive and reproduced it. The author of the exploit claims it’s very complex and no one knows how it works yet.

        Under cover/covert operations do actually happen.

        So what’s the scenario they are protecting themselves against? Someone catching the agent right after they unlocked some encrypted drive with the USB drive still on them? It sounds very far fetched to me that FBI would request a backdroor from Microsoft with this very specific requirement. I think it’s more likely they would cover it on their side with some easily erasable USB drive. Plus such a solution would also let them get rid of the backdoor if they are caught before they used it.