![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
4·
9 months agoNever read again? These can’t be modified, but they can be read. After all, it’d be pretty useless to store data on a medium than can never be read.
Never read again? These can’t be modified, but they can be read. After all, it’d be pretty useless to store data on a medium than can never be read.
Sure, but I suspect this is the real motivation for the article:
Windows 11 Pro force-enables the software version of BitLocker during installation, without providing a clear way to opt out
It sounds like many people may be using software encryption without realizing it, if Windows 11 Pro uses it by default.
Here’s the original report: https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/
It doesn’t specifically attribute this to the NSA, and it’s very hard to definitively say who created what malware anyways.
That being said, if you read through the report, the details on this really scream “state actor” most probably. The level of modularity, the infrastructure of the C2 server, and the detailed & flexible spying capabilities all point to some government agency more than anything else.