Microsoft Is Decrypting Your Files in The Cloud

231,859
0
Published 2023-05-19
In this video I discuss the recent news of Microsoft scanning messages in their cloud software for passwords to decrypt zip archives that are also sent through their cloud platforms so they can decrypt and scan those encrypted archives as well, this means that the spying present in Microsofts cloud software goes much further than we thought.

My merch is available at
based.win/

Subscribe to me on Odysee.com
odysee.com/@AlphaNerd:8

₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿

Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436

Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV

Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079

Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz

All Comments (21)
  • @glutton8055
    Who would’ve guessed that a shady company would do shady things?
  • Imagine my shock. Any US based cloud is just a data source for the three letter agencies.
  • @Kwijibob
    Pretty sure breaking encryption to gain unauthorized access to anything on a computer is a violation of the Computer Fraud and Abuse Act
  • @ArniesTech
    It's astonishing how much effort MS puts into promoting Linux 💪😎
  • @anon_y_mousse
    The fact that an OS vendor has implemented a "feature" that deletes your files when they detect something they don't like is proof that we NEED Linux, all of the BSD's and any other open source operating system and everyone should move to such a system now.
  • @O___P
    I left Windows back when they first started giving you mandatory restarts with only a safe timeframe each day. Set something to compile overnight, came back to a restarted computer, installed Linux. Haven't regretted it since. Sure, there's gonna be ways to avoid stuff like this, but why would you want to actively fight your OS?
  • @Adenybaloi
    "Let Microsoft's AI raise your kids" both funny and disturbing.
  • @ishmaboy
    I fucking love how we're still referring to the feds as "glow in the darks". God. RIP Terry you magnificent bastard you
  • This is the exact same reason why I don't trust most, if not all VPN providers. You may be hiding your information from whoever, but the VPN provider still has access to your information in the end and probably selling it further themselves, hence the reason why the names you keep hearing about being advertised everywhere on YouTube have such insane advertising budgets. There's no way they would be able to afford so much aggressive marketing just by selling you a good deal on a subscription offer. There shouldn't be such thing as trusting a big company with storing and protecting your data. Your information will always be used or sold. We have seen multiple cases in the past, most recently from Apple where a line stating that they do not collect your data does not mean absolutely anything.
  • @vincei4252
    How is this not considered mass industrial espionage ?
  • @snudget
    Windows is just so vulnerable to malware that microsoft has to delete them before they get on your computer.
  • @cocogus
    I just assume big tech can do everything, including stuff I didn't think was possible. That way, I'm not surprised when it's revealed that they have even more data than we previously thought.
  • @0-9-1
    I never trusted anything related to "The Cloud" I'll keep my "outdated" hdds and cds.
  • @SilkCrown
    I don't have proof, but I suspect Windows Defender hashes files on your local drives to get a picture of what kind of data you store locally as well.
  • Zip does not hide filenames even when contents are encrypted. They only introduced it in spec 6.2, but still, all the original files meta data, including file CRC, comes in plain text. All this "encrypted malware analysis" could be nothing more than results of scanning meta data of archived files. On the other hand, bruteforcing ms' zip is a joke (and often you dont even need to bruteforce, there are too many flaws to zipcrypto). I think it would be actually cheaper to legit cracking it with all those crc-hashtables and gpus they have in their "cloud" than to develop a system to scan emails in attempts to extract actual passwords.
  • @hrznn
    If you're reverse engineering Windows malware, you usually have to run it inside a vulnerable Windows build. Directly sharing directories with the VM is not very pog when the VM will be infected, so it's easier to run everything through OneDrive, because it's built in already. And to avoid them decrypting zip files, double package it with the same password, or split the archive file in half altogether, or create your own archiving algorithm. A game dev I know used a regular zip library but swapped every byte pair of the finished archive, and inserted an invalid archive before the real one, and stripped most of the important metadata required for extraction, only the bare minimum remaining to be able to unpack it again. But he wrote it in Java so a quick "decompilation" solved that relatively quickly.
  • @ForestOfSleep
    Reminder: "The Cloud" is just someone else's computer
  • If they are doing this what makes you think they aren't stealing your txt files or the source code you write on Visual Studio. Yeah, this is probably much worse.