Regular old ZIP with AES-256 should do the trick for anything truly important you want to keep locked down.
You could always do sly stuff like Hidden volumes with Veracrypt as well. Leave the crumb trail for the low key shit or old nudes of gfs you have permission to keep.
This article said “by default”. The article they link to on that talks about encryption on by default on new PCs. The article I read before this one said “Microsoft recommends”.
How can the recovery password and recovery key be stored?
The recovery password and recovery key for an operating system drive or a fixed data drive can be saved to a folder, saved to one or more USB devices, saved to a Microsoft Account, or printed.
Regular old ZIP with AES-256 should do the trick for anything truly important you want to keep locked down.
You could always do sly stuff like Hidden volumes with Veracrypt as well. Leave the crumb trail for the low key shit or old nudes of gfs you have permission to keep.
Or don’t use an operating system that uploads your encryption keys to their corporate servers for “backup”.
Ya’ll know Veracrypt isn’t Bitlocker right?
Or decline the upload recommendation.
There is no recommendation that a user can decline. Windows uploads the keys without asking, without consent.
Do you have a source for that?
This article said “by default”. The article they link to on that talks about encryption on by default on new PCs. The article I read before this one said “Microsoft recommends”.
BitLocker FAQ says
/edit: fix quote