Default drive encryption in Windows 11 24H2 has raised concerns about potential data loss risks if the Microsoft account linked to the encryption recovery key is inaccessible or deleted.
Device Encryption, a simplified version of BitLocker for Windows 11 Home, is automatically enabled during Windows 11 24H2 setup with a Microsoft account, posing data access issues if the account is lost.
Criticism has been directed at Microsoft for not adequately informing users about the implications of Device Encryption and the risk of data loss attached to Microsoft accounts.
A Reddit post highlighted the concerns, emphasizing the importance of data availability alongside confidentiality in cybersecurity discussion.
Device Encryption without redundant key backups could lead to catastrophic data loss, as noted by the Redditor MorCJul.
The controversy stems from Microsoft's decision to automatically activate Device Encryption for new Windows 11 Home installations with a Microsoft account, potentially causing irretrievable data loss upon account deletion.
Deleting a Microsoft account containing a Device Encryption recovery key without backups could result in inaccessible encrypted data on the system drive, leading to permanent data loss.
Users are advised to exercise caution when handling Microsoft account deletions to prevent unintended loss of critical encryption keys.
Microsoft should enhance transparency regarding Device Encryption during Windows 11 setup and provide clearer warnings about the implications of tied encryption keys to Microsoft accounts.
Users can check the status of Device Encryption on Windows 11 Home (24H2) devices by navigating to Privacy & Security > Device Encryption in Settings, allowing for manual activation or deactivation.
While Device Encryption can be disabled post-installation, caution is advised due to potential data loss risks associated with Microsoft account deletions.