{"id":5926,"date":"2024-06-04T13:54:39","date_gmt":"2024-06-04T11:54:39","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=5926"},"modified":"2024-06-04T13:54:39","modified_gmt":"2024-06-04T11:54:39","slug":"ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/","title":{"rendered":"Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1024x536.jpg\" alt=\"BVF sifrovanie nahladovy obrazok\" class=\"wp-image-5927\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1024x536.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-300x157.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-768x402.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-370x194.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-760x398.jpg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Ned\u00e1vno YouTuber stacksmashing nahral <a href=\"https:\/\/www.youtube.com\/watch?v=wTl4vEednkQ&amp;ab_channel=stacksmashing\">video o\u00a0prelomen\u00ed zabudovan\u00e9ho \u0161ifrovania<\/a> v\u00a0syst\u00e9me Windows, \u010d\u00edm v\u00a0podstate obi\u0161iel <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/operating-system-security\/data-protection\/bitlocker\/countermeasures\">\u0161ifrovanie disku<\/a> na\u00a0v\u00e4\u010d\u0161ine zariaden\u00ed pou\u017e\u00edvaj\u00facich celosvetovo najzn\u00e1mej\u0161\u00ed opera\u010dn\u00fd syst\u00e9m od\u00a0spolo\u010dnosti Microsoft prostredn\u00edctvom lacn\u00e9ho n\u00e1stroja za\u00a0menej ako 10\u00a0eur.<\/p>\n\n\n\n<p>Podarilo sa mu to za&nbsp;rekordn\u00fd \u010das \u2013 len 43&nbsp;sek\u00fand. Hoci bolo \u0161ifrovanie \u010dasto prezentovan\u00e9 ako \u00fa\u010dinn\u00fd a&nbsp;bezpe\u010dn\u00fd n\u00e1stroj na&nbsp;ochranu \u00fadajov, teraz sa zd\u00e1, \u017ee aj ono m\u00e1 svoje muchy, napriek tomu, \u017ee sa spolieha na&nbsp;pokro\u010dil\u00e9 funkcie, ako s\u00fa moduly d\u00f4veryhodnej platformy (<a href=\"https:\/\/support.microsoft.com\/sk-sk\/topic\/%C4%8Do-je-tpm-705f241d-025d-4470-80c5-4feeb24fa1ee\">TPM<\/a>), ktor\u00e9 si u\u017e vy\u017eaduje aj <a href=\"https:\/\/www.pcmag.com\/news\/what-is-a-tpm-and-why-do-i-need-one-for-windows-11\">najnov\u0161\u00ed opera\u010dn\u00fd syst\u00e9m Windows<\/a>.<\/p>\n\n\n\n<p>D\u00e1 sa v\u0161ak s\u00a0touto bezpe\u010dnostnou dierou nie\u010do robi\u0165? Rie\u0161enie je na\u0161\u0165astie pomerne jednoduch\u00e9 a\u00a0nestoj\u00ed to\u013eko, ko\u013eko by st\u00e1lo \u00fapln\u00e9 naru\u0161enie bezpe\u010dnosti.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ako sa d\u00e1 prelomi\u0165 \u0161ifrovanie? <\/h2>\n\n\n\n<p>Met\u00f3da obch\u00e1dzania \u0161ifrovania sa naz\u00fdva aj <a href=\"https:\/\/www.tomshardware.com\/software\/windows\/bitlocker-key-sniffing-is-still-possible-on-modern-windows-11-laptops-with-discrete-tpm-modules\">BitLocker sniffing<\/a> pod\u013ea zabudovan\u00e9ho \u0161ifrovacieho n\u00e1stroja v\u00a0syst\u00e9me Windows, BitLocker. D\u00e1ta z\u00a0\u010dipu TPM s\u00fa vystaven\u00e9 na\u00a0komunika\u010dnej zbernici, a\u00a0ak nie\u010do pou\u017e\u00edva \u010dip TPM, je mo\u017en\u00e9 potom tak\u00e9to \u00fadaje v\u00a0ur\u010ditom okamihu po\u010das procesu de\u0161ifrovania odhali\u0165. M\u00f4\u017ee k\u00a0tomu d\u00f4js\u0165 na\u00a0star\u0161\u00edch po\u010d\u00edta\u010doch, najm\u00e4 t\u00fdch, ktor\u00e9 nemaj\u00fa modul TPM integrovan\u00fd v\u00a0procesore.<\/p>\n\n\n\n<p>Zneu\u017eitie n\u00e1stroja BitLocker spo\u010d\u00edva v&nbsp;tom, \u017ee sa popri TPM nepou\u017e\u00edva heslo ani \u017eiadna in\u00e1 sekund\u00e1rna met\u00f3da overovania. V&nbsp;pr\u00edpade uvedenom vo&nbsp;videu sa po\u010d\u00edta\u010d automaticky spust\u00ed len s&nbsp;modulom TPM, ktor\u00fd poskytuje pr\u00edstup k&nbsp;\u0161ifrovaciemu k\u013e\u00fa\u010du disku (zn\u00e1memu aj ako hlavn\u00fd k\u013e\u00fa\u010d zv\u00e4zku \u2013 VMK). Pri zapnut\u00ed po\u010d\u00edta\u010da n\u00e1stroj BitLocker automaticky pou\u017eije \u010dip TPM na&nbsp;de\u0161ifrovanie k\u013e\u00fa\u010da VMK a&nbsp;takmer okam\u017eite sa spust\u00ed prihlasovanie do&nbsp;syst\u00e9mu Windows. K\u013e\u00fa\u010d VMK je teda vystaven\u00fd na&nbsp;komunika\u010dnej zbernici, ke\u010f sa syst\u00e9m sp\u00fa\u0161\u0165a.<\/p>\n\n\n\n<p>Jednoducho povedan\u00e9, komunik\u00e1cia medzi \u010dipom TPM a&nbsp;procesorom po\u010d\u00edta\u010da je po\u010das jeho sp\u00fa\u0161\u0165ania nechr\u00e1nen\u00e1, \u010do znamen\u00e1, \u017ee \u0161ifrovac\u00ed k\u013e\u00fa\u010d m\u00f4\u017ee pre\u010d\u00edta\u0165 niekto, kto sleduje sign\u00e1l medzi modulom TPM a&nbsp;procesorom, \u010do sa d\u00e1 urobi\u0165 pomocou lacn\u00e9ho n\u00e1stroja a&nbsp;<a href=\"https:\/\/www.techopedia.com\/definition\/2137\/firmware\">firmv\u00e9ru<\/a>.<\/p>\n\n\n\n<p>Osoby zbehl\u00e9 v\u00a0oblasti kybernetickej bezpe\u010dnosti vedia, \u017ee v\u00a0niektor\u00fdch pr\u00edpadoch m\u00f4\u017eu \u00fatoky typu \u201eman-in-the-middle\u201c zachyt\u00e1va\u0165 internetov\u00e9 pripojenie\/bluetooth\/sign\u00e1l RFID pri snahe niekam alebo k\u00a0nie\u010domu sa pripoji\u0165. D\u00e1tov\u00fd tok m\u00f4\u017ee by\u0165 po\u010das prenosu k\u00a0prij\u00edma\u010du odhalen\u00fd, pokia\u013e nie je pou\u017eit\u00e1 nejak\u00e1 forma dodato\u010dn\u00e9ho zabezpe\u010denia, ako napr\u00edklad pou\u017e\u00edvanie siete VPN po\u010das pripojenia k\u00a0verejnej sieti Wi-Fi, ktor\u00e1 zaist\u00ed chr\u00e1nen\u00e9 skryt\u00e9 pripojenie. Na\u00a0zamaskovanie prenosu \u00fadajov preto treba prida\u0165 \u010fal\u0161iu vrstvu zabezpe\u010denia.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Je \u0161ifrovanie dostato\u010dn\u00e9? <\/h2>\n\n\n\n<p>T\u00e1to nov\u00e1 inform\u00e1cia je ve\u013emi zauj\u00edmav\u00e1, najm\u00e4 preto, \u017ee pou\u017e\u00edvanie bezpe\u010dnostn\u00e9ho modulu alebo \u010dipu TPM je teraz po\u017eiadavkou opera\u010dn\u00e9ho syst\u00e9mu Windows&nbsp;11, a&nbsp;preto mnoh\u00e9 star\u0161ie procesory, ktor\u00e9 t\u00fato po\u017eiadavku nemuseli sp\u013a\u0148a\u0165, mali <a href=\"https:\/\/www.theverge.com\/2021\/6\/29\/22555371\/microsoft-windows-11-cpu-support-hardware-requirements-tpm-response\">zak\u00e1zan\u00e9<\/a> in\u0161talova\u0165 opera\u010dn\u00fd syst\u00e9m.<\/p>\n\n\n\n<p>Ot\u00e1zkou nie je, \u010di je \u0161ifrovanie dostato\u010dnou motiv\u00e1ciou na&nbsp;to, aby niekto chcel ma\u0165 najnov\u0161ie funkcie opera\u010dn\u00e9ho syst\u00e9mu, ide sk\u00f4r o&nbsp;fakt, \u017ee doposia\u013e sa pova\u017eovalo za&nbsp;ukazovate\u013e zv\u00fd\u0161en\u00e9ho zabezpe\u010denia. V&nbsp;s\u00favislosti s&nbsp;BitLocker sniffingom sa v\u0161ak zd\u00e1, \u017ee \u0161ifrovanie m\u00f4\u017ee by\u0165 len \u010fal\u0161ou zbyto\u010dnou bezpe\u010dnostnou funkciou&#8230; \u010di nie?<\/p>\n\n\n\n<p>Pravdou je, \u017ee \u0161ifrovanie je nevyhnutn\u00fdm \u2013 nie, povinn\u00fdm \u2013 bezpe\u010dnostn\u00fdm opatren\u00edm pre ka\u017ed\u00e9ho pou\u017e\u00edvate\u013ea, ktor\u00fd mus\u00ed zaisti\u0165 ochranu a&nbsp;bezpe\u010dn\u00e9 ulo\u017eenie svojich d\u00e1t s&nbsp;cie\u013eom obmedzi\u0165 potenci\u00e1lny pr\u00edstup k&nbsp;nim aj po&nbsp;odcudzen\u00ed zariadenia. Navy\u0161e ako dodato\u010dn\u00e1 ochrann\u00e1 vrstva s\u0165a\u017euje aktivity \u00fato\u010dn\u00edkov, ke\u010f\u017ee predl\u017euje dobu potrebn\u00fa na&nbsp;potenci\u00e1lne naru\u0161enie zabezpe\u010denia a&nbsp;pracovn\u00edkom reaguj\u00facim na&nbsp;incidenty poskytuje viac \u010dasu.<\/p>\n\n\n\n<p>Bezpe\u010dnostn\u00e1 strat\u00e9gia ka\u017edej spolo\u010dnosti mus\u00ed zah\u0155\u0148a\u0165 \u0161ifrovanie, ktor\u00e9 sa vy\u017eaduje aj z&nbsp;h\u013eadiska dodr\u017eiavania s\u00faladu s&nbsp;nariadeniami a&nbsp;poistenia kybernetick\u00fdch riz\u00edk, kde je trendom <a href=\"https:\/\/www.securitymagazine.com\/articles\/100118-report-business-see-rise-in-cyber-insurance-costs-and-requirements\">ka\u017edoro\u010dn\u00e9 navy\u0161ovanie po\u017eiadaviek<\/a>.<\/p>\n\n\n\n<p>Odpove\u010f na\u00a0polo\u017een\u00fa ot\u00e1zku teda znie: nie, samotn\u00e9 \u0161ifrovanie nesta\u010d\u00ed, lebo na\u00a0to, aby ak\u00e1ko\u013evek strat\u00e9gia fungovala proti \u0161kodliv\u00fdm hrozb\u00e1m, je potrebn\u00fdch viacero bezpe\u010dnostn\u00fdch vrstiev. Ide v\u0161ak o\u00a0nevyhnutnos\u0165, ktor\u00fa musia firmy pou\u017e\u00edva\u0165 na\u00a0zaistenie lep\u0161ej ochrany. \u0160ifrovanie nemus\u00ed by\u0165 jedinou bezpe\u010dnostnou vrstvou a\u00a0existuj\u00fa sp\u00f4soby, ako ho chr\u00e1ni\u0165 aj pred technikou sniffingu.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Najsilnej\u0161ou zbra\u0148ou s\u00fa vrstvy<\/h2>\n\n\n\n<p>Bol to Shrek, kto povedal, \u017ee zlobri maj\u00fa vrstvy ako cibule? Podobne ako zlobri, aj \u00faspe\u0161n\u00e9 bezpe\u010dnostn\u00e9 aplik\u00e1cie a&nbsp;opatrenia s\u00fa viacvrstvov\u00e9. Platforma <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/protect-platform\/\">ESET PROTECT<\/a> je tak\u00fdmto pr\u00edkladom, ke\u010f\u017ee sama osebe obsahuje nieko\u013eko vrstiev technol\u00f3gi\u00ed na&nbsp;ochranu pred hrozbami, \u010di u\u017e ide o&nbsp;zero-day hrozby, ktor\u00e9 nikdy neuzreli svetlo sveta, alebo zn\u00e1my malv\u00e9r sna\u017eiaci sa \u010do najlep\u0161ie vyhn\u00fa\u0165 detekcii prostredn\u00edctvom techn\u00edk na&nbsp;jej obch\u00e1dzanie.<\/p>\n\n\n\n<p>Spolo\u010dnos\u0165 ESET dok\u00e1\u017ee zaru\u010di\u0165 lep\u0161ie \u0161ifrovanie aj v\u010faka jednoduchej vrstve \u2013 heslu. M\u00f4\u017ee sa to zda\u0165 ako banalita, ale ide o&nbsp;ve\u013emi \u00fa\u010dinn\u00fd prostriedok, ktor\u00fd je obsiahnut\u00fd aj v&nbsp;rie\u0161eniach <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/sifrovanie\/#full-disk-encryption\">ESET Full Disk Encryption (EFDE)<\/a> a&nbsp;<a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/sifrovanie\/#endpoint-encryption\">ESET Endpoint Encryption (EEE)<\/a>. Poskytuje ochranu pred technikami, ako je napr\u00edklad BitLocker sniffing, ktor\u00e1 sa spolieha na&nbsp;nechr\u00e1nen\u00fa komunik\u00e1ciu medzi <a href=\"https:\/\/www.tomshardware.com\/software\/windows\/bitlocker-key-sniffing-is-still-possible-on-modern-windows-11-laptops-with-discrete-tpm-modules\">diskr\u00e9tnym \u010dipom TPM a&nbsp;procesorom<\/a>. Ak\u00e9ko\u013evek sekund\u00e1rne overenie, ku&nbsp;ktor\u00e9mu d\u00f4jde pred spusten\u00edm procesu, tak zabr\u00e1ni verejn\u00e9mu vystaveniu \u0161ifrovacieho k\u013e\u00fa\u010da.<\/p>\n\n\n\n<p>Pri be\u017enej prev\u00e1dzke s\u00a0rie\u0161en\u00edm EFDE a\u00a0EEE sa od\u00a0pou\u017e\u00edvate\u013ea pri spusten\u00ed po\u010d\u00edta\u010da vy\u017eaduje zadanie hesla. Heslo sa v\u00a0podstate pou\u017e\u00edva v\u00a0spojen\u00ed s\u00a0in\u00fdmi \u00fadajmi a\u00a0\u0161ifrovan\u00edm TPM na\u00a0de\u0161ifrovanie k\u013e\u00fa\u010da VMK. Bez pou\u017e\u00edvate\u013esk\u00e9ho hesla teda nie je mo\u017en\u00e9 z\u00edska\u0165 spr\u00e1vny k\u013e\u00fa\u010d VMK. \u00c1no, v\u00a0ur\u010ditom okamihu bud\u00fa d\u00e1ta de\u0161ifrovan\u00e9 modulom TPM vidite\u013en\u00e9; nie v\u0161ak bez znalosti hesla pou\u017e\u00edvate\u013ea.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u00da\u010dinn\u00e9 \u0161ifrovanie, bezpe\u010dn\u00e9 syst\u00e9my<\/h2>\n\n\n\n<p>Kybernetick\u00e1 bezpe\u010dnos\u0165 sa bude musie\u0165 v\u017edy vyv\u00edja\u0165, rovnako ako hrozby. Niekedy v\u0161ak jednoduch\u00e9 bezpe\u010dnostn\u00e9 opatrenia m\u00f4\u017eu znamena\u0165 ve\u013ea.<\/p>\n\n\n\n<p>Hesl\u00e1 boli v\u017edy prvou l\u00edniou obrany proti vonkaj\u0161\u00edm naru\u0161eniam (ke\u010f\u017ee z\u00edskanie pr\u00edstupu k&nbsp;jedn\u00e9mu \u00fa\u010dtu m\u00f4\u017ee vyvola\u0165 re\u0165azov\u00fa reakciu) a&nbsp;v&nbsp;bud\u00facnosti sa pravdepodobne tento fakt nezmen\u00ed.<\/p>\n\n\n\n<p>Je potrebn\u00e9 pripomen\u00fa\u0165, \u017ee nie je spr\u00e1vne vybera\u0165 si slab\u00e9 hesl\u00e1 ani pou\u017e\u00edva\u0165 jedno heslo vo\u00a0v\u0161etk\u00fdch \u00fa\u010dtoch alebo pri \u0161ifrovan\u00ed. Naopak, v\u017edy dbajte na\u00a0dodr\u017eiavanie z\u00e1sad kybernetickej bezpe\u010dnosti. V\u00a0pr\u00edpade firiem vo\u00a0v\u0161eobecnosti zv\u00e1\u017ete, ak\u00fa \u00farove\u0148 zabezpe\u010denia vy\u017eadujete, preto\u017ee u\u017e jeden produkt alebo dodato\u010dn\u00e9 bezpe\u010dnostn\u00e9 opatrenie, napr\u00edklad siln\u00e9 heslo pre n\u00e1stroj na\u00a0\u0161ifrovanie, m\u00f4\u017ee ma\u0165 z\u00e1sadn\u00fd v\u00fdznam.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rie\u0161enie bezpe\u010dnostnej diery je na\u0161\u0165astie pomerne jednoduch\u00e9 a\u00a0nestoj\u00ed to\u013eko, ko\u013eko by st\u00e1lo \u00fapln\u00e9 naru\u0161enie bezpe\u010dnosti.<\/p>\n","protected":false},"author":8,"featured_media":5928,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[102],"tags":[],"class_list":["post-5926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybernews"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker? | ESET<\/title>\n<meta name=\"description\" content=\"Hoci bolo \u0161ifrovanie \u010dasto prezentovan\u00e9 ako \u00fa\u010dinn\u00fd n\u00e1stroj na\u00a0ochranu \u00fadajov, teraz sa zd\u00e1, \u017ee aj ono m\u00e1 svoje nedostatky.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker? | ESET\" \/>\n<meta property=\"og:description\" content=\"Hoci bolo \u0161ifrovanie \u010dasto prezentovan\u00e9 ako \u00fa\u010dinn\u00fd n\u00e1stroj na\u00a0ochranu \u00fadajov, teraz sa zd\u00e1, \u017ee aj ono m\u00e1 svoje nedostatky.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-04T11:54:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker?\",\"datePublished\":\"2024-06-04T11:54:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/\"},\"wordCount\":1273,\"publisher\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization\"},\"image\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1.jpg\",\"articleSection\":[\"Cybernews\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/\",\"name\":\"Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker? | ESET\",\"isPartOf\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1.jpg\",\"datePublished\":\"2024-06-04T11:54:39+00:00\",\"description\":\"Hoci bolo \u0161ifrovanie \u010dasto prezentovan\u00e9 ako \u00fa\u010dinn\u00fd n\u00e1stroj na\u00a0ochranu \u00fadajov, teraz sa zd\u00e1, \u017ee aj ono m\u00e1 svoje nedostatky.\",\"breadcrumb\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#primaryimage\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1.jpg\",\"contentUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"BVF sifrovanie ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#website\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker? | ESET","description":"Hoci bolo \u0161ifrovanie \u010dasto prezentovan\u00e9 ako \u00fa\u010dinn\u00fd n\u00e1stroj na\u00a0ochranu \u00fadajov, teraz sa zd\u00e1, \u017ee aj ono m\u00e1 svoje nedostatky.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/","og_locale":"sk_SK","og_type":"article","og_title":"Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker? | ESET","og_description":"Hoci bolo \u0161ifrovanie \u010dasto prezentovan\u00e9 ako \u00fa\u010dinn\u00fd n\u00e1stroj na\u00a0ochranu \u00fadajov, teraz sa zd\u00e1, \u017ee aj ono m\u00e1 svoje nedostatky.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2024-06-04T11:54:39+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1.jpg","type":"image\/jpeg"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"6 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker?","datePublished":"2024-06-04T11:54:39+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/"},"wordCount":1273,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1.jpg","articleSection":["Cybernews"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/","name":"Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker? | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1.jpg","datePublished":"2024-06-04T11:54:39+00:00","description":"Hoci bolo \u0161ifrovanie \u010dasto prezentovan\u00e9 ako \u00fa\u010dinn\u00fd n\u00e1stroj na\u00a0ochranu \u00fadajov, teraz sa zd\u00e1, \u017ee aj ono m\u00e1 svoje nedostatky.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1.jpg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/06\/Secure-encryption_1200x628-no-text-1.jpg","width":1200,"height":628,"caption":"BVF sifrovanie ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/ako-zabranit-prelomeniu-nastroja-na-sifrovanie-bitlocker\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Ako zabr\u00e1ni\u0165 prelomeniu n\u00e1stroja na\u00a0\u0161ifrovanie BitLocker?"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=5926"}],"version-history":[{"count":1,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5926\/revisions"}],"predecessor-version":[{"id":5929,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5926\/revisions\/5929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/5928"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=5926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=5926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=5926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}