<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Encryption on Sebastian Spicker</title>
    <link>https://sebastianspicker.github.io/tags/encryption/</link>
    <description>Recent content in Encryption on Sebastian Spicker</description>
    <image>
      <title>Sebastian Spicker</title>
      <url>https://sebastianspicker.github.io/og-image.png</url>
      <link>https://sebastianspicker.github.io/og-image.png</link>
    </image>
    <generator>Hugo -- 0.160.0</generator>
    <language>en</language>
    <lastBuildDate>Wed, 28 Jan 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://sebastianspicker.github.io/tags/encryption/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Your Encryption Keys Are in Virginia: On BitLocker, the FBI, and Why European Universities Need Sovereign Software</title>
      <link>https://sebastianspicker.github.io/posts/public-money-public-code/</link>
      <pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate>
      <guid>https://sebastianspicker.github.io/posts/public-money-public-code/</guid>
      <description>Microsoft confirmed this week that it hands BitLocker encryption keys to the FBI on receipt of a valid legal order. Windows 11 uploads them to your Microsoft account by default, without asking. For European universities that handle research data, student records, and HR information under GDPR, this is not an abstract concern. It is a structural problem. The answer is not a technical workaround. It is sovereign, publicly funded, openly licensed software — and a principle that the EU has articulated but not consistently practised: public money, public code.</description>
      <content:encoded><![CDATA[<h2 id="the-story">The Story</h2>
<p>Last week Microsoft confirmed, in response to reporting by TechCrunch and
others, that it had handed BitLocker recovery keys for three laptops to
the FBI following a valid court order. The underlying case was a fraud
investigation in Guam. The laptops were encrypted with BitLocker — the
full-disk encryption built into Windows, which many institutions and
individuals rely on as their primary protection against unauthorised
data access.</p>
<p>The mechanism is simple and was not widely known. When you set up a
modern Windows device and sign in with a Microsoft account, BitLocker
automatically uploads your recovery key to Microsoft&rsquo;s cloud. No
prominent notification. No opt-in. The key sits there, associated with
your account, accessible to Microsoft. When a US court issues a lawful
order, Microsoft complies. Redmond confirmed this is policy, not an
exception.</p>
<p>Bruce Schneier&rsquo;s <a href="https://www.schneier.com/blog/archives/2026/02/microsoft-is-giving-the-fbi-bitlocker-keys.html">response</a>
was characteristically direct: &ldquo;The lesson here is that if you have
access to keys, eventually law enforcement is going to come.&rdquo; Jennifer
Granick at the ACLU called remote key storage in this configuration
&ldquo;quite dangerous,&rdquo; particularly given that the same mechanism is
available to any government that can issue a Microsoft-compatible legal
order — not only the US Department of Justice.</p>
<p>That last point is the one European institutions should be reading
carefully.</p>
<hr>
<h2 id="why-this-is-a-european-problem">Why This Is a European Problem</h2>
<p>The CLOUD Act — the US Clarifying Lawful Overseas Use of Data Act,
passed in 2018 — allows US law enforcement to compel US-based companies
to produce data held on servers anywhere in the world. If your
university stores its BitLocker recovery keys in a Microsoft account,
and Microsoft is a US company, the geographic location of the servers
those keys sit on does not limit a US court&rsquo;s reach. The keys are in
Virginia, legally, wherever the hardware is.</p>
<p>This is not speculation. It is the explicit structure of US digital law.
The European Court of Justice has repeatedly ruled that certain US
surveillance frameworks are incompatible with GDPR — the invalidation
of Privacy Shield in <em>Schrems II</em> (2020) being the most prominent
example. But court rulings about data transfer frameworks do not
automatically change the operational reality for an institution whose
laptops are running Windows with default settings.</p>
<p>European universities hold exactly the kinds of data that make this
a real rather than a theoretical concern:</p>
<ul>
<li><strong>Research data</strong>: medical studies, clinical trials, interviews with
human subjects, social science datasets — all subject to strict
ethical and legal protections</li>
<li><strong>Student records</strong>: academic performance, personal circumstances,
disciplinary proceedings</li>
<li><strong>HR data</strong>: employment contracts, salary records, health information,
union activity — particularly sensitive under German and EU labour
law</li>
<li><strong>Correspondence and draft documents</strong>: research in progress, grant
applications, peer review material</li>
</ul>
<p>If the disk holding any of this is encrypted with BitLocker, and the
recovery key has been uploaded to a Microsoft account by default, the
encryption provides less protection than it appears to. The key is
accessible to a foreign state with a court order. That state is not
party to GDPR.</p>
<hr>
<h2 id="the-structural-problem">The Structural Problem</h2>
<p>The BitLocker story is one instance of a larger pattern. It is not that
Microsoft behaved unusually or maliciously — it complied with a lawful
order in its home jurisdiction, as it is legally required to do. The
problem is structural: <strong>when an institution depends on a closed-source,
US-headquartered platform for its critical infrastructure, the
institution has delegated control over its own data to an entity whose
legal obligations lie elsewhere.</strong></p>
<p>This applies beyond encryption. It applies to email (Exchange Online,
Outlook), document storage (SharePoint, OneDrive), communication
(Teams), identity management (Azure Active Directory), and any service
that runs through a Microsoft account or Azure tenant. For each of these:
the data is subject to Microsoft&rsquo;s terms, and Microsoft is subject to
US law.</p>
<p>The same argument applies, with different specifics, to Google Workspace
and any other US-headquartered platform. The issue is not that these
companies are bad actors. It is that their legal accountability and the
legal accountability of European public institutions point in
incompatible directions, and the institutions mostly have not noticed.</p>
<hr>
<h2 id="what-sovereign-software-looks-like">What Sovereign Software Looks Like</h2>
<p>The alternative is not paranoia and air-gapped servers. It is a
coherent strategy for institutional digital infrastructure that is
based on software the institution controls.</p>
<p>In Germany, this conversation has a name and a project. <strong>OpenDesk</strong>
— developed under the aegis of the federal and state governments —
is a stack of open-source tools (Nextcloud, Collabora Online, Matrix/
Element, Jitsi, Keycloak, Open-Xchange) assembled into an integrated
workspace alternative to Microsoft 365. The <em>Souveräner Arbeitsplatz</em>
(sovereign workspace) concept behind it is exactly what the BitLocker
story illustrates: if the software is open, the keys stay in your
institution, and no foreign court can reach them via a warrant served
on a US company.</p>
<p>Several German states and federal agencies have been piloting OpenDesk.
The city of Munich&rsquo;s earlier experiment with Linux (LiMux) and its
eventual rollback to Windows is the cautionary tale here — not because
open source failed, but because the transition was not supported
seriously enough over time, and the incumbent vendor&rsquo;s lobbying was.
The BitLocker story is a reminder of what is at stake in that political
negotiation.</p>
<p>The FSFE&rsquo;s <strong>&ldquo;Public Money? Public Code!&rdquo;</strong> campaign has articulated
the principle cleanly: software developed with public funding should
be released as open-source software. The argument is not only about
freedom as an abstract value. It is about the practical consequence of
being locked into a proprietary platform: your institution loses the
ability to audit what the software does, to modify it to meet your
requirements, to host it where your data protection law applies, and to
switch providers without losing access to your own data.</p>
<hr>
<h2 id="what-i-do-and-why">What I Do, and Why</h2>
<p>I work at a publicly funded institution. The software I build for
institutional contexts — campus infrastructure, workforce management,
archival systems, alert systems — is public.</p>
<p>Not because I am ideologically committed to open source as a movement,
but because the alternative is incoherent. If I build tooling for a
university with public funds and keep it closed, I have produced a
private asset with public money, duplicated by every institution that
builds the same thing independently, inspectable by nobody, and
ultimately dependent on my continued willingness to maintain it or
hand it over. None of those outcomes serve the institutions I am
building for.</p>
<p>Here is what that looks like in practice:</p>
<p><strong><a href="https://github.com/sebastianspicker/zammad-ticket-archiver">zammad-ticket-archiver</a></strong> —
automated archival of Zammad support tickets as cryptographically
signed PDFs, with RFC 3161 timestamps for non-repudiation. Built for
institutions that need legally defensible audit trails of their
helpdesk operations. The signing infrastructure is self-hosted; no
external party holds the keys.</p>
<p><strong><a href="https://github.com/sebastianspicker/alarm-broker">alarm-broker</a></strong> —
a silent panic alarm broker for campus facilities. Receives emergency
triggers from hardware devices (Yealink keys), distributes
notifications via Zammad, SMS, and Signal, with acknowledgment
tracking and escalation scheduling. Runs locally, logs to
self-hosted PostgreSQL; no external dependency for the alarm path.</p>
<p><strong><a href="https://github.com/sebastianspicker/campus-app-kit">campus-app-kit</a></strong> —
a React Native / Expo starter for university mobile applications,
with a pluggable Node.js backend designed for institutional data
sources (room booking, events, schedules). The architecture separates
institution-specific connectors (which institutions keep private) from
the shared foundation (which is public). Any university can take it
and build on it without starting from scratch.</p>
<p><strong><a href="https://github.com/sebastianspicker/cueq">cueq</a></strong> — an integrated
workforce management system for German universities under TV-L
(the collective agreement for public sector employees in the German
states). Handles time recording, shift planning, absence management,
payroll export, and GDPR-compliant audit trails. Built around NestJS
and Next.js, with a PostgreSQL backend and Honeywell terminal
integration. The HR data stays on the institution&rsquo;s own infrastructure.</p>
<p>These are all boring. They are not research contributions; they are
plumbing. But plumbing is what holds institutions together, and the
question of who controls the plumbing — and under whose legal
jurisdiction — is exactly the question the BitLocker story makes
visible.</p>
<hr>
<h2 id="the-principle">The Principle</h2>
<p>Public money, public code. If an institution funded by public money
develops software for its own operations, that software should be
released under an open licence, inspectable, forkable, and deployable
by any institution with the same needs.</p>
<p>The corollary: institutions funded by public money should prefer
software that is itself openly licensed, auditable, and deployable
on infrastructure the institution controls. Not as a blanket ban on
proprietary tools where they are genuinely the best option, but as a
starting presumption that shifts the burden of justification.</p>
<p>The BitLocker story is not a story about Microsoft doing something
wrong. It is a story about the logical consequence of a procurement
decision that was made without asking &ldquo;and what happens when a US
court sends a subpoena?&rdquo; That question was available in 2018 when the
CLOUD Act passed, in 2020 when <em>Schrems II</em> was decided, and before
both. It is still available now, for every institution that has not
yet asked it.</p>
<hr>
<p><em>The FSFE &ldquo;Public Money? Public Code!&rdquo; campaign is at
<a href="https://publiccode.eu/">publiccode.eu</a>. The OpenDesk project is at
<a href="https://opendesk.de/">opendesk.de</a>. The original TechCrunch reporting
on the BitLocker handover is at
<a href="https://techcrunch.com/2026/01/23/microsoft-gave-fbi-a-set-of-bitlocker-encryption-keys-to-unlock-suspects-laptops-reports/">techcrunch.com</a>.</em></p>
]]></content:encoded>
    </item>
  </channel>
</rss>
