You're not scheming enough, as I was saying... I thought I had given a sufficient clue, but apparently, you took everything literally, foolishly.
- Offline (i.e. without the targeted OS running), backup SAM and SECURITY data.
- Change user's password from standard interface.
- You're warned that user will lose all access to his encrypted files.
- I think that it's better / safer to use "net user" command to do that, to avoid possible side-effects and/or certificates deletion.
- Log into user's account with new password.
- Install whatever you need on his session: keylogger, spyware, etc. since you can do everything - either with his account or with administrator's account and UAC prompts.
- This can be as dumb as copying the files (they will be decrypted if done properly) to a "hidden" place, using a proper tool that doesn't do raw copy, and it's even better if the tool has a bandwidth limitation and a "suicide exit".
- Such a copier should even be launched with SYSTEM privileges, and through "RunDLL" to be near invisible.
- A really machiavellian one would overwrite dummy files with the same size created for this occasion, so that user's won't even see a free disk space change. Software would jump across cores to hide its CPU usage - basic behavior is to use only idle time to really do copies, of course...
- Log out, put OS offline again and restore SAM and SECURITY data - this will restore his password, but whatever you installed is still there.
- Wait for his login and then his data.
It can even work on the only admin account, since you need to boot a live OS to put the targeted OS offline - Windows is a bit trickier than Linux for this, it isn't enough to backup "/etc/passwd" here.
BTW, you can check: change the test account's password forcefully, log in - OK, encrypted files aren't available. Now, go back to your admin session, change again the password to the original one and log again the test account: miracle, encrypted files are accessible again!
Another thing, but I never investigated this part, is something about EFS (the encryption layer in NTFS) :
"Also, in case of a user losing access to their key, support for additional decryption keys has been built into the EFS system, so that a recovery agent can still access the files if needed."
This only sentence is enough for me to consider EFS as not secured enough in anything but a (near) trusted environment. It's way enough to encrypt "private" or restricted files (like a business proposal) at work. It's just a joke for "Confidential Defense", "Secret Defense", or illegal data.
And, AGAIN, FDE doesn't have these flaws...
You really don't understand anything... A real FDE doesn't leave ANY sector unencrypted, and a good one will even shuffle the sectors numbering so you won't even know where the "Sector #0" is located. An excellent one will also require a 2FA token to unlock the disk.
You don't understand shit about what is possible on an analyze machine, I even think that you believe that they are standard PC - at work, they are simple boards with a shitload of various connectors, custom FPGA & ASIC, etc. with another shitload of spy buses. You can plug anything on it, get a vampire connection on anything, get an interception connection on anything, and trigger any bus from any other bus event. We have guys at work able to make an UEFI bootloader, and to build custom Linux kernels and distros, or custom Windows - both being executed on encrypted hardware. Obviously, we also have tools to investigate such hardware when a problem occurs... And we are "only" a medium-sized enterprise, with poor capabilities compared to a governmental agency.
And for "well-know" files, you do realize that you can't find them on a fully encrypted disk? So you don't have the encrypted version to start any cryptanalyze? But it's VERY different if you're dumb enough to NTFS-encrypt, let's say, a "gplv2.txt" file somewhere... Because you'll use the SAME key to encrypt your other data. And unlike a FDE, since you have the two versions (crypted/unencrypted) and the NTFS encryption algorithm is well-known, you're vulnerable to a differential attack - which is not possible with a FDE. Obviously, if you encrypt a whole directory containing a lot of well-know files, then the differential attack is even easier...
You don't realize that, like most "vulnerabilities" reported regularly, you can't exploit these flaws with a normal system and with a normal mindset. I'm certainly not the best hacker in the world, but I destroyed enough protections in my digital life to know what is inherently dangerous or flawed, and what is secured, or at least a big enough pain in the ass, to be used without worrying about it.
No. UAC and sandboxing are two different things on Windows. Sandboxing isn't even possible on every hardware, and is only a light VM. Since you can't exchange easily files between the host and the sandbox (default is full isolation), it won't help in many cases just because you'll miss runtimes, drivers, frameworks, etc. A standard VM with automatically reverted snapshots is usually far superior, at the cost of more resources while executing it.
UAC, on the other side, is simply something that forbid access to critical (or even only "important") parts of Windows without an explicit consent. It works more or less like "su/sudo" on Unix.
A lot of people here would be pleased to hear how you consider their country - if I was an Aussie, I would be pissed off, for example, since this country have laws against both porn and encryption. Also, a life sentence isn't really better than a death sentence.
As usual, you don't understand shit about the subject. If you're smart enough, you can't reveal the encryption key because it was stored or 2FA-protected on another device that, unfortunately, got "accidentally" destroyed - or is hidden enough, for example as a "fortune" server somewhere...
Better a short jail sentence for "illegal encryption" rather than a long/death sentence for possessing (really) illegal porn stuff. Same difference as between misdemeanor and crime.
The fact that you don't need manual commands anymore to enable FDE doesn't mean that the option is checked by default... Windows is as secure as OpenBSD regarding this, since you can also check (or leave unchecked) the checkbox at install time to enable/disable FDE.
And if you're so an OpenBSD's fanboy, what the hell do you do on Windows? Assume your choice and stay on this "alternative" OS - by "alternative", understand "one time you don't have drivers, one time you try to resolve incompatibilities between the 43 versions of the 12 libraries that does the same thing but can't work together".
I always wonder why such a "wonderful" OS has less than 0.01% market share: even Arch seems more popular than OpenBSD!
Why are you dumb and ignorant? You are so ignorant that you overlook the basic courtesy of quoting my messages or my name when responding to me, which has been considered normal practice since the 90s...
And clearly, you live in Carebear's Land, or in your own world inside your head... You're like a lost redneck in the backwoods of Alabama who thinks that just because he has an automatic rifle, nothing can happen to him and that the Constitution will protect him from everything... Sweet summer child...
Again, you're neither cunning enough nor paranoid enough to talk about security. You just have a thin veneer of knowledge on the subject, and you think you're an expert because of that.