Connect with us

Technology

Microsoft crosses privacy line few expected

Published

on

Microsoft crosses privacy line few expected

NEWYou can now listen to Fox News articles!

For years, we’ve been told that encryption is the gold standard for digital privacy. If data is encrypted, it is supposed to be locked away from hackers, companies and governments alike. That assumption just took a hit. 

In a federal investigation tied to alleged COVID-19 unemployment fraud in Guam, a U.S. territory where federal law applies, Microsoft confirmed it provided law enforcement with BitLocker recovery keys. Those keys allowed investigators to unlock encrypted data on multiple laptops.

This is one of the clearest public examples to date of Microsoft providing BitLocker recovery keys to authorities as part of a criminal investigation. While the warrant itself may have been lawful, the implications stretch far beyond one investigation. For everyday Americans, this is a clear signal that “encrypted” does not always mean “inaccessible.”

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

In the Guam investigation, Microsoft provided BitLocker recovery keys that allowed law enforcement to unlock encrypted laptops. (David Paul Morris/Bloomberg via Getty Images)

What happened in the Guam BitLocker case?

Federal investigators believed three Windows laptops held evidence tied to an alleged scheme involving pandemic unemployment funds. The devices were protected with BitLocker, Microsoft’s built-in disk encryption tool enabled by default on many modern Windows PCs. BitLocker works by scrambling all data on a hard drive so it cannot be read without a recovery key. 

Users can store that key themselves, but Microsoft also encourages backing it up to a Microsoft account for convenience. In this case, that convenience mattered. When served with a valid search warrant, Microsoft provided the recovery keys to investigators. That allowed full access to the data stored on the devices. Microsoft says it receives roughly 20 such requests per year and can only comply when users have chosen to store their keys in the cloud.

We reached out to Microsoft for comment, but did not hear back before our deadline.

Advertisement

How Microsoft was able to unlock encrypted data

According to John Ackerly, CEO and co-founder of Virtru and a former White House technology advisor, the problem is not encryption itself. The real issue is who controls the keys. He begins by explaining how convenience can quietly shift control. “Microsoft commonly recommends that users back up BitLocker recovery keys to a Microsoft account for convenience. That choice means Microsoft may retain the technical ability to unlock a customer’s device. When a third party holds both encrypted data and the keys required to decrypt it, control is no longer exclusive.”

Once a provider has the ability to unlock data, that power rarely stays theoretical. “When systems are built so that providers can be compelled to unlock customer data, lawful access becomes a standing feature. It is important to remember that encryption does not distinguish between authorized and unauthorized access. Any system designed to be unlocked on demand will eventually be unlocked by unintended parties.”

Ackerly then points out that this outcome is not inevitable. Other companies have made different architectural choices. “Other large technology companies have demonstrated that a different approach is possible. Apple has designed systems that limit its own ability to access customer data, even when doing so would ease compliance with government demands. Google offers client-side encryption models that allow users to retain exclusive control of encryption keys. These companies still comply with the law, but when they do not hold the keys, they cannot unlock the data. That is not obstruction. It is a design choice.”

Finally, he argues that Microsoft still has room to change course. “Microsoft has an opportunity to address this by making customer-controlled keys the default and by designing recovery mechanisms that do not place decryption authority in Microsoft’s hands. True personal data sovereignty requires systems that make compelled access technically impossible, not merely contractually discouraged.”

In short, Microsoft could comply because it had the technical ability to do so. That single design decision is what turned encrypted data into accessible data.

Advertisement

“With BitLocker, customers can choose to store their encryption keys locally, in a location inaccessible to Microsoft, or in Microsoft’s consumer cloud services,” a Microsoft spokesperson told CyberGuy in a statement. “We recognize that some customers prefer Microsoft’s cloud storage, so we can help recover their encryption key if needed. While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide whether to use key escrow and how to manage their keys.”

WHY CLICKING THE WRONG COPILOT LINK COULD PUT YOUR DATA AT RISK

When companies hold encryption keys, lawful requests can unlock far more data than most people expect. (Kurt “CyberGuy” Knutsson)

Why this matters for data privacy

This case has reignited a long-running debate over lawful access versus systemic risk. Ackerly warns that centralized control has a long and troubling history. “We have seen the consequences of this design pattern for more than two decades. From the Equifax breach, which exposed the financial identities of nearly half the U.S. population, to repeated leaks of sensitive communications and health data during the COVID era, the pattern is consistent: centralized systems that retain control over customer data become systemic points of failure. These incidents are not anomalies. They reflect a persistent architectural flaw.”

When companies hold the keys, they become targets. That includes hackers, foreign governments and legal demands from agencies like the FBI. Once a capability exists, it rarely goes unused.

Advertisement

How other tech giants handle encryption differently

Apple has designed systems, such as Advanced Data Protection, where it cannot access certain encrypted user data even when served with government requests. Google offers client-side encryption for some services, primarily in enterprise environments, where encryption keys remain under the customer’s control. These companies still comply with the law, but in those cases, they do not possess the technical means to unlock the data. That distinction matters. As encryption experts often note, you cannot hand over what you do not have.

What we can do to protect our privacy

The good news is that personal privacy is not gone. The bad news is that it now requires intention. Small choices matter more than most people realize. Ackerly says the starting point is understanding control. “The main takeaway for everyday users is simple: if you don’t control your encryption keys, you don’t fully control your data.”

That control begins with knowing where your keys are stored. “The first step is understanding where your encryption keys live. If they’re stored in the cloud with your provider, your data can be accessed without your knowledge.”

Once keys live outside your control, access becomes possible without your consent. That is why the way data is encrypted matters just as much as whether it is encrypted. “Consumers should look for tools and services that encrypt data before it reaches the cloud — that way, it is impossible for your provider to hand over your data. They don’t have the keys.” Defaults are another hidden risk. Many people never change them. “Users should also look to avoid default settings designed for convenience. Default settings matter, and when convenience is the default, most individuals will unknowingly trade control for ease of use.”

When encryption is designed so that even the provider cannot access the data, the balance shifts back to the individual. “When data is encrypted in a way that even the provider can’t access, it stays private — even if a third party comes asking. By holding your own encryption keys, you’re eliminating the possibility of the provider sharing your data.” Ackerly says the lesson is simple but often ignored. “The lesson is straightforward: you cannot outsource responsibility for your sensitive data and assume that third parties will always act in your best interest. Encryption only fulfills its purpose when the data owner is the sole party capable of unlocking it.” Privacy still exists. It just no longer comes by default.

Advertisement

700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

Reviewing default security and backup settings can help you keep control of your private data. (Kurt “CyberGuy” Knutsson)

Practical steps you can take today

You do not need to be a security expert to protect your data. A few practical checks can go a long way.

1) Start by checking where your encryption keys live

Many people do not realize that their devices quietly back up recovery keys to the cloud. On a Windows PC, sign in to your Microsoft account and look under device security or recovery key settings. Seeing a BitLocker recovery key listed online means it is stored with Microsoft. 

For other encrypted services, such as Apple iCloud backups or Google Drive, open your account security dashboard and review encryption or recovery options. Focus on settings tied to recovery keys, backup encryption, or account-based access. When those keys are linked to an online account, your provider may be able to access them. The goal is simple. Know whether your keys live with you or with a company.

Advertisement

2) Avoid cloud-based key backups unless you truly need them

Cloud backups are designed for convenience, not privacy. If possible, store recovery keys offline. That can mean saving them to a USB drive, printing them and storing them in a safe place, or using encrypted hardware you control. The exact method matters less than who has access. If a company does not have your keys, it cannot be forced to turn them over.

3) Choose services that encrypt data before it reaches the cloud

Not all encryption works the same way, even if companies use similar language. Look for services that advertise end-to-end or client-side encryption, such as Signal for messages, or Apple’s Advanced Data Protection option for iCloud backups. These services encrypt your data on your device before it is uploaded, which means the provider cannot read it or unlock it later. Here is a simple rule of thumb. If a service can reset your password and restore all your data without your involvement, it likely holds the encryption keys. That also means it could be forced to hand over access. When encryption happens on your device first, providers cannot unlock your data because they never had the keys to begin with. That design choice blocks third-party access by default.

4) Review default security settings on every new device

Default settings usually favor convenience. That can mean easier recovery, faster syncing and weaker privacy. Take five minutes after setup and lock down the basics.

iPhone: tighten iCloud and account recovery

Turn on Advanced Data Protection for iCloud (strongest iCloud protection)

Advertisement
  • Open Settings
  • Tap your name
  • Tap iCloud
  • Scroll down and tap Advanced Data Protection
  • Tap Turn On Advanced Data Protection
  • Follow the prompts to set up Account Recovery options, like a Recovery Contact or Recovery Key

Review iCloud Backup

  • Open Settings
  • Tap your name
  • Tap iCloud
  • Tap iCloud Backup
  • Decide if you want it on or off, based on your privacy comfort level

Strengthen your Apple ID security

  • Open Settings
  • Tap your name
  • Tap Sign-In & Security
  • Make sure Two-Factor Authentication (2FA) is turned on and review trusted phone numbers and devices
  • Review trusted phone numbers and devices

Android: lock your Google account and backups

Review and control device backup

Settings may vary depending on your Android phone’s manufacturer.

  • Open Settings
  • Tap Google
  • Tap Backup (or All services then Backup)
  • Tap Manage backup
  • Choose what backs up and confirm which Google account stores it

NEW ANDROID MALWARE CAN EMPTY YOUR BANK ACCOUNT IN SECONDS

Strengthen your screen lock, since it protects the device itself

Settings may vary depending on your Android phone’s manufacturer.

  • Open Settings
  • Tap Security or Security & privacy
  • Set a strong PIN or password
  • Turn on biometrics if you want, but keep the PIN strong either way

Secure your Google account

Settings may vary depending on your Android phone’s manufacturer.

Advertisement
  • Open Settings
  • Tap Google
  • Tap Manage your Google Account
  • Go to Security
  • Turn on 2-Step Verification and review recent security activity

Mac: enable FileVault and review iCloud settings

Turn on FileVault disk encryption

  • Click the Apple menu
  • Select System Settings
  • Click Privacy & Security
  • Scroll down and click FileVault
  • Click Turn On
  • Save your recovery method securely

Review iCloud syncing

  • Open System Settings
  • Click your name
  • Click iCloud
  • Review what apps and data types sync
  • Turn off anything you do not want stored in the cloud

Windows PC: check BitLocker and where the recovery key is stored

Confirm BitLocker status and settings

  • Open Settings
  • Go to Privacy & security
  • Tap Device encryption or BitLocker (wording varies by device)

Check whether your BitLocker recovery key is stored in your Microsoft account

  • Go to your Microsoft account page
  • Open Devices
  • Select your PC
  • Look for Manage recovery keys or a BitLocker recovery key entry
  • If you see a key listed online, it means the key is stored with Microsoft. That is why Microsoft was able to provide keys in the Guam case.

If your account can recover everything with a few clicks, a third party might be able to recover it too. Convenience can be helpful, but it can also widen access.

5) Treat convenience features as privacy tradeoffs

Every shortcut comes with a cost. Before enabling a feature that promises easy recovery or quick access, pause and ask one question. If I lose control of this account, who else gains access? If the answer includes a company or third party, decide whether the convenience is worth it. 

These steps are not extreme or technical. They are everyday habits. In a world where lawful access can quietly become routine access, small choices now can protect your privacy later.

Strengthen protection beyond encryption

Encryption controls who can access your data, but it does not stop every real-world threat. Once data is exposed, different protections matter.

Advertisement

Strong antivirus software adds device-level protection

Strong antivirus software helps block malware, spyware and credential-stealing attacks that can bypass privacy settings altogether. Even encrypted devices are vulnerable if malicious software gains control before encryption comes into play.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com

An identity theft protection service helps when exposure turns into fraud

If personal data is accessed, sold, or misused, identity protection services can monitor for suspicious activity, alert you early and help lock down accounts before damage spreads. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

Advertisement

Kurt’s key takeaways

Microsoft’s decision to comply with the BitLocker warrant may have been legal. That doesn’t make it harmless. This case exposes a hard truth about modern encryption. Privacy depends less on the math and more on how systems are built. When companies hold the keys, the risk falls on the rest of us.

Do you trust tech companies to protect your encrypted data, or do you think that responsibility should fall entirely on you? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Uber Eats adds AI assistant to help with grocery shopping

Published

on

Uber Eats adds AI assistant to help with grocery shopping

Uber announced a new AI feature called “Cart Assistant” for grocery shopping in its Uber Eats app.

The new feature works a couple different ways. You can use text prompts, as you would with any other AI chatbot, to ask it to build a grocery list for you. Or you can upload a picture of your shopping list and ask it to populate your cart with all your favorite items, based on your order history. You can be as generic as you — “milk, eggs, cereal” — and the bot will make a list with all your preferred brands.

And that’s just to start out. Uber says in the coming months, Cart Assistant will add more features, including “full recipe inspiration, meal plans, and the ability to ask follow up questions, and expand to retail partners.”

But like all chatbots, Uber acknowledges that Cart Assistant may make mistakes, and urges users to double-check and confirm the results before placing any orders.

It will also only work at certain grocery stores, with Uber announcing interoperability at launch with Albertsons, Aldi, CVS, Kroger, Safeway, Sprouts, Safeway, Walgreen, and Wegmans. More stores will be added in the future, the company says.

Advertisement

Uber has a partnership with OpenAI to integrate Uber Eats into its own suite of apps. But Uber spokesperson Richard Foord declined to say whether the AI company’s technology was powering the new chatbot in Uber Eats. “Cart Assistant draws on publicly available LLM models as well as Uber’s own AI stack,” Foord said in an email.

Uber has been racing to add more AI-driven features to its apps, including robotaxis with Waymo and sidewalk delivery robots in several cities. The company also recently revived its AI Labs to collaborate with its partners on building better products using delivery and customer data.

Continue Reading

Technology

Humanoid robots are getting smaller, safer and closer

Published

on

Humanoid robots are getting smaller, safer and closer

NEWYou can now listen to Fox News articles!

For decades, humanoid robots have lived behind safety cages in factories or deep inside research labs. Fauna Robotics, a New York-based robotics startup, says that era is ending. 

The company has introduced Sprout, a compact humanoid robot designed from the ground up to operate around people. Instead of adapting an industrial robot for public spaces, Fauna built Sprout specifically for homes, schools, offices, retail spaces and entertainment venues.

“Sprout is a humanoid platform designed from first principles to operate around people,” the company said. “This is a new category of robot built for the spaces where we live, work, and play.” That philosophy drives nearly every design choice behind Sprout.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

ROBOTS LEARN 1,000 TASKS IN ONE DAY FROM A SINGLE DEMO

Sprout is designed to operate safely around people, even in shared spaces like homes and classrooms where close interaction matters. (Fauna Robotics)

Why Fauna believes humanoid robots belong beyond factories

Fauna Robotics’ founders started with a simple idea. If robots are going to become part of daily life, they must move naturally around humans and earn trust through safety and reliability. Most humanoid robots today focus on industrial efficiency or controlled research environments. Fauna is targeting a different reality. Service industries now make up the majority of the global workforce. At the same time, labor shortages continue to grow in healthcare, education, hospitality and eldercare. Sprout is designed to explore how humanoid robots could support those spaces without creating new safety risks or operational headaches.

HUMANOID ROBOT MAKES ARCHITECTURAL HISTORY BY DESIGNING A BUILDING

The robot uses onboard sensing and navigation to move confidently through indoor spaces without needing safety cages or fixed paths. (Fauna Robotics)

Advertisement

Sprout is a safety-first humanoid robot built for people

Standing about 3.5 feet tall, Sprout fits naturally into human spaces instead of towering over them. At roughly 50 pounds, it carries less kinetic energy during movement or contact, which makes close interaction safer by design. Lightweight materials and a soft-touch exterior further reduce risk. The design avoids sharp edges and limits pinch points, allowing the robot to operate near people without safety cages. Quiet motors and smooth movement also reduce noise and help Sprout feel less intimidating in shared spaces.

Rather than complex multi-fingered hands, Sprout uses simple one-degree-of-freedom grippers. This approach lowers weight and improves durability while still supporting practical tasks like object fetching, hand-offs, and basic shared-space interaction. Flexible arms and legs allow the robot to walk, kneel, and crawl. Sprout can also fall and recover without damaging sensitive components. In everyday environments, where conditions are rarely perfect, that resilience matters.

Under the hood, Sprout uses a highly articulated body with 29 degrees of freedom to support smooth movement and expressive gestures. Onboard NVIDIA compute provides the processing power needed for perception, navigation, and human-robot interaction without relying on external systems. A battery that supports several hours of active use makes Sprout practical for research, development, and real-world testing in shared human spaces.

Built for natural human-robot interaction

Sprout’s expressive face helps it communicate in a way people can quickly understand. Simple facial cues show what the robot is doing and how it is feeling, so you do not need technical knowledge to follow along. The robot can walk, kneel, crawl, and recover from falls, which helps it move naturally in everyday spaces. Because its motors are quiet, and its movements are smooth, Sprout feels less startling and more predictable when it is nearby. Behind the scenes, Sprout supports teleoperation, mapping and navigation. These tools give developers the building blocks to create interactions that feel intuitive and human, not stiff or mechanical.

ELON MUSK TEASES A FUTURE RUN BY ROBOTS

Advertisement

Instead of complex hands, Sprout uses simple, durable grippers that prioritize safety while still handling everyday tasks like hand-offs and object pickup. (Fauna Robotics)

A modular software platform for rapid development

Sprout runs on a modular software system that is built to grow over time. Developers get stable controls along with tools for deployment, monitoring, and data collection, so they can focus on building new ideas instead of managing the robot itself. As new abilities improve, Fauna can add them through software updates rather than redesigning the hardware. This keeps costs down and helps Sprout stay useful longer as technology evolves. Fauna also kept sensing simple. Sprout uses head-mounted RGB-D sensors instead of wrist cameras, which reduces complexity and maintenance. At the same time, it still gives the robot a strong perception for moving and working safely in shared spaces.

Who Sprout is designed for

Fauna positions Sprout as a developer-first humanoid platform rather than a finished consumer product. It is designed for developers who want to build and test applications on accessible hardware with full SDK access and built-in movement, perception, navigation, and expression. At the same time, enterprises can use Sprout to create next-generation AI applications that operate safely in places like retail, hospitality, and offices. Researchers can also use the platform to study locomotion, manipulation, autonomy, and human-robot interaction without building a robot from scratch. Together, these uses point to real-world deployments across retail and hospitality, consumer and home settings, research and education, and entertainment experiences.

What this means for you

Even if you never plan to build a robot, Sprout signals a shift in how robotics companies think about everyday life. Humanoid robots are no longer being designed only for factories and labs. Companies like Fauna are betting that the future of robotics depends on safety, trust, and natural interaction in human spaces. If successful, platforms like Sprout could lead to robots that assist in classrooms, support hospitality staff, help researchers move faster and create interactive experiences that feel less robotic and more human.

Take my quiz: How safe is your online security?

Advertisement

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Sprout is not trying to replace workers or flood homes with machines overnight. Instead, Fauna is laying the groundwork for a future where humanoid robots earn their place through careful design and responsible deployment. By prioritizing safety, simplicity, and developer collaboration, Sprout represents a quieter but potentially more meaningful step forward in humanoid robotics. The real test will be how developers and researchers use the platform and whether people feel comfortable sharing space with robots like Sprout.

Would you trust a humanoid robot to work beside you in a school, hotel, or office if it were designed for safety first? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Boston Dynamics CEO Robert Playter is stepping down after six years

Published

on

Boston Dynamics CEO Robert Playter is stepping down after six years

Robert Playter, CEO of Boston Dynamics, announced on Tuesday that he is stepping down from his role effective immediately and leaving the company on February 27th, as previously reported by A3. Under Playter’s leadership, Boston Dynamics navigated its way through an acquisition from Softbank that brought it to Hyundai in 2021, and it launched a new all-electric version of its humanoid Atlas robot in 2024. Just a few days ago, the company posted another video of its research Atlas robots attempting tumbling passes and outdoor runs as more enterprise-ready editions start to roll out.

Boston Dynamics announced at CES last month that Atlas robots will begin working in Hyundai’s car plants starting in 2028, as the robotics field has become increasingly crowded by competitors like Tesla and Figure, as well as AI companies with “world model” tech built for robots.

Playter has been at Boston Dynamics for over 30 years and has served as CEO since 2020, replacing the company’s original CEO, Marc Raibert. Boston Dynamics CFO Amanda McMaster will serve as interim CEO while the company’s board of directors searches for Playter’s replacement.

“Boston Dynamics has been the ride of a lifetime. What this place has become has exceeded anything I could have ever imagined all those years ago in our funky lab in the basement of the MIT Media Lab,” Playter said in a letter to employees, which was shared with The Verge. He also highlighted the company’s successes with its Spot, Stretch, and Atlas robots.

“From the earliest days of hopping robots, to the world’s first quadrupeds, to spearheading the entire humanoid industry, Playter made his mark as a pioneer of innovation. He transformed Boston Dynamics from a small research and development lab into a successful business that now proudly calls itself the global leader in mobile robotics,” Nikolas Noel, VP of marketing and communications at Boston Dynamics, said in a statement to The Verge, adding, “He will be sorely missed, but we hope he enjoys some well-deserved time off. Thanks Rob.”

Advertisement
Continue Reading

Trending