How to Bypass BitLocker Recovery Key on Windows 11

Jul. 10, 2024



On a clean installation of theWindows 11 24H2build, Microsoft enables BitLocker encryption by default. Lately, many laptop makers have started enabling BitLocker to protect user data in case of theft. Many users are unaware of it, leading to data loss. The system asks the user to enter the BitLocker recovery key on the blue screen. So if you are wondering whether you can bypass the BitLocker Recovery key on Windows 11, you have come to the right place.

Windows 11 doesn’t let you bypass BitLocker encryption without the recovery key. Since BitLocker encryption is attested and stored on the hardwareTPM chip, it’s not easy to tamper it. Nevertheless, there are some ways you can use to unlock your computer and move past the BitLocker recovery key screen. These methods can help you retrieve some or all of the data from your Windows PC.

Method 1: Look For the Recovery Key in Your Microsoft Account

Method 1: Look For the Recovery Key in Your Microsoft Account

You might not be aware, but if you are signed in with a Microsoft account on your Windows PC, your BitLocker key is automatically saved to your Microsoft account. Here are the steps to locate it.

BitLocker encryption also allows users to save the recovery key on other drives or an external USB flash drive. You might have saved it on your PC or a thumb drive, you just have to look for it. Here are the steps to follow.

If you have not been able to find the BitLocker recovery key from your Microsoft account or other drives, you can, at least, recover data from other drives. BitLocker usually encrypts the C drive, so other drives are accessible through the recovery menu. Follow the instructions below.

If none of the methods worked, and you have recovered some of the data from other drives, you have no other options, but to reinstall Windows 11. Sadly, this means all your data will be lost. You can read our detailedPerform a clean Windows 11 installguide to learn more.

While there is no easy way to tamper with the TPM chip,stacksmashingon YouTube, a security researcher has demonstrated a way to hack the TPM chip and intercept the recovery key. It requires advanced security knowledge, hardware understanding, and a purpose-made Raspberry Pi Pico to intercept the recovery key between the TPM chip and the CPU during the boot process.

Again, if the TPM chip is incorporated inside the CPU (called fTPM) then you can’t intercept it. Anyway, those who are interested in this solution, can go through it. Finally, if you have any questions, let us know in the comments below.

Passionate about Windows, ChromeOS, Android, security and privacy issues. Have a penchant to solve everyday computing problems.