• 3 Posts
  • 311 Comments
Joined 2 years ago
cake
Cake day: June 15th, 2023

help-circle

  • IHawkMiketoTechnologyMicrosoft is killing OneNote for Windows 10
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    2
    ·
    5 days ago

    They’re only killing the crappy store/UWP version that nobody used anyway and only caused confusion. The normal OneNote bundled in Office isn’t going anywhere as far as I know.

    That said, I’ve moved a lot of my note taking to Obsidian. It’s not a perfect replacement but it’s a fantastic markdown editor and now I use both for different use cases.











  • Nothing you said is wrong, in fact it’s all good advice. But none of what you listed implicitly provides protection against ransomware either.

    For that you need backups that are immutable. That is, even you as the admin cannot alter, encrypt, or delete them because your threat model should assume full admin account compromise. There are several onprem solutions for it and most of the cloud providers offer immutable storage now too.

    And at the very least, remove AD SSO from your backup software admin portals (and hypervisors); make your admins use a password safe.






  • This is the right answer. OEM keys are tied to the hardware so you technically need a retail key. The HP machines were almost certainly using OEM keys (chalk the first one working up to luck I suppose).

    That said, by calling the licensing clearinghouse on the phone I have had them activate stuff that they probably shouldn’t have so it’s worth a shot. But I haven’t had to call them in over 10 years so YMMV. If you call them you’ll need the original OEM key from the sticker or by booting up the old PC and pulling it from WMI.




  • As another poster mentioned, QubesOS with anti evil maid will work, but that’s the defense against state actors too and is overkill for this threat model.

    BitLocker or any FDE using SecureBoot and PCR 7 will be sufficient for this (with Linux you also need PCRs 8+9 to protect against grub and initramfs attacks). Even if they can replace something in the boot chain with something trusted, it’ll change PCR 7 and you’d be prompted to unlock with a recovery key (don’t blindly enter it without verifying the boot chain and knowing why you’re being prompted).

    With Secure Boot alone, the malicious bootloader would still need to be trusted (something like BlackLotus).

    Also make sure you have a strong BIOS password and disable boot from USB, PXE, and anything else that isn’t the specific EFI bootloader used by your OS(es).