BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.cccv.de//38c3-community-stages//talk//LU3PKP
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-38c3-community-stages-LU3PKP@cfp.cccv.de
DTSTART;TZID=CET:20241228T191500
DTEND;TZID=CET:20241228T201500
DESCRIPTION:Ever wondered how Cellebrite and law enforcement gain access to
  encrypted devices without knowing the password? In this talk\, we’ll de
 monstrate how to bypass BitLocker encryption on a fully up-to-date Windows
  11 system using Secure Boot. We’ll leverage a little-known software vul
 nerability that Microsoft has been unable to patch since 2022: bitpixie (C
 VE-2023-21563).\n\nWe'll live-demo the exploit\, and will walk through the
  entire process—from the prerequisites and inner workings of the exploit
  to why Microsoft has struggled to address this flaw. We'll also discuss h
 ow to protect yourself from this and similar vulnerabilities.
DTSTAMP:20260313T043044Z
LOCATION:Stage HUFF
SUMMARY:Windows BitLocker: Screwed without a Screwdriver - th0mas
URL:https://cfp.cccv.de/38c3-community-stages/talk/LU3PKP/
END:VEVENT
END:VCALENDAR
