Microsoft Teams Qustion

You can join a Teams meeting anytime, from any device, without signing into a Teams account.

If you’re having trouble joining a Teams meeting, try I can’t join a Teams meeting.

Important:  For some meetings, admin settings prevent unverified people from joining the meeting. Depending on the meeting, you may have to enter a one-time passcode sent to your email or create a Teams account.DesktopMobile

Join the meeting before it starts to test your setup from the pre-join screen. From there, you can enter the meeting up to 15 minutes before its start time to troubleshoot or see how Teams works. Meeting participants and organizers will be notified when you enter the meeting.

To join a Teams meeting without signing into an account: 

  1. Open the meeting invite and select the link next to Join or Click here to join the meeting.
  2. When prompted, select Continue on this browser or Join on the Teams app. You don’t need to install the Teams app to join the meeting.
    • You can join Teams for web on Microsoft Edge or Google Chrome. You may be prompted to give Teams access to your mic and camera. When you select Allow, you can always turn off your mic and camera once you join the meeting. 
  3. Select Join now.
    • In meetings where admin settings prevent unverified people from joining, you’ll be prompted to enter your email address. Enter your email address and select Next. Enter your password if you already have a Microsoft account or select Send code and enter the one-time passcode sent to your email if you don’t have an account. Once verified, select Join now

Note: People who are signed in will have access to more meeting features than those who aren’t signed in.​​​​​​​

If you enter the meeting lobby, wait for someone in the meeting to admit you. If no one admits you within 30 minutes, you’ll be removed from the lobby. If that happens, you can try rejoining.

Depending on how you joined the meeting, other participants will see a label next to your name. If you joined:

  • without entering your email address, everyone will see Unverified next to your name.
  • using a one-time code sent to your email, everyone will see Email verified next to your name.
  • with your Microsoft account, everyone will see External next to your name.

Organizer’s view

If you’re the meeting organizer, we’ll alert you when someone is waiting in the lobby.

Select Admit to let them right into the meeting, or View lobby to see a list of everyone in the lobby and admit or deny them. 

Note: Anyone who doesn’t have a Teams account and joins the meeting without entering a one-time passcode sent to their email will be labeled Unverified. Anyone who doesn’t have a Teams account and joins the meeting after entering a one-time passcode sent to their email will be labeled Email verified. To learn more about people with guest access, see Work with external guests.

I can’t join a meeting in Microsoft Teams

If you can’t immediately join a Teams meeting, there are several possible reasons:

  • You’re waiting in the lobby: Some organizers might place attendees in a lobby before admitting them into the meeting. Wait for someone to admit you, or reach out to the organizer directly to be let in.
  • Your internet browser isn’t supported: Teams doesn’t currently support Safari for Mac. If you’re joining a Teams meeting from the web, try joining from Microsoft Edge, Google Chrome, or other supported browsers.
  • Your internet connectivity is low: If your internet connection is low, you may not be able to join a Teams meeting right away. Try waiting for your connection to improve, joining from your supported mobile device, or reaching out to your internet provider.
  • Security policies for the meeting are preventing you from joining: If a meeting organizer enables end-to-end encryption for a meeting, you might have limited access to join. Try reaching out to the organizer to be let in.

In Teams, you might receive a message about why you’re unable to enter a meeting. Here are the different messages you might encounter and how to resolve them.

“Sign in to join this meeting”

UI

If you see this message, the meeting doesn’t allow people to join unless they’re signed in with a Teams work or school account. You might need to take extra steps to join:

  • If you’re joining from a meeting link or as an anonymous user, make sure you’re signed into your Teams work or school account.
  • If you’re the meeting organizer and want people to be able to join your meeting without signing in, contact your IT admin (learn more here). Changes from your IT admin may take up to 24 hours to take effect.

“Sign in with a different account to join this meeting”

UI

If you see this message, the policies set by your or the meeting organizer’s org prevent you from accessing the meeting. You might need to take extra steps to join:

  • Make sure you’re signed into the account the invite was originally sent to.
  • If you’re the meeting organizer and you want to allow people from other orgs to join your meeting, contact your IT admin (learn more here). Changes from your IT admin may take up to 24 hours to take effect.

“This meeting is locked.”

After a meeting starts, organizers can lock the meeting to prevent new participants from entering.

Reach out to the meeting organizer to let them know you’re having trouble joining. If they unlock it, you can try joining again.

“Your organizational policy does not allow you to join this meeting”

You can’t join because the organizer has enabled end-to-end encryption for their meeting. Contact the organizer to let them know you’re having trouble joining.

“The meeting lobby is full right now.”

If the lobby is full, wait a few minutes before trying to join again. You may be able to enter if other attendees join the meeting or leave the lobby. For more on lobby settings, see Using the lobby in Teams meetings.

“Sorry, no one has responded to your request to join.”

If you get this message after 30 minutes of waiting, your request has timed out.

  • Check to make sure you’re joining from the correct meeting link and try again.
  • Reach out to the meeting organizer to make sure your request is seen.

Using the lobby in Microsoft Teams meetings

Use the meeting lobby in Teams meetings to keep people from directly entering a meeting when they join. Organizers, co-organizers, and presenters will be notified when people enter the lobby and can let them into the meeting.

In this Section

Lobby settings

Each meeting defaults to the lobby settings set by your IT admin but you can change them before or during the meeting. You might not be able to change some settings if your meeting uses a template or sensitivity label.

Choose who can bypass the lobby

As the meeting organizer, you get to decide who gets into your meetings directly, and who should wait for someone to let them in.

If you choose to have people wait, you (and anyone else allowed to admit people) will see a list of people in the lobby. From there you can choose whether to admit or deny them.

Who can bypass the lobby?What happensRecommended when…
Only organizers and co-organizersAs the meeting organizer, you and any co-organizers can get into the meeting directly. Everyone else will wait in the lobby.You want everyone else to wait in the lobby until you’re ready to admit them.
People who were invited*Anyone who receives the invitation, including those to whom it is forwarded, will join the meeting directly.People without a Teams account won’t bypass the lobby. Additionally, distribution lists up to 10,000 users are supported. If you don’t want people to forward the invite to others, turn off Allow Forwarding in the invitation.You want a specific, limited group of people who were invited via their Teams accounts to join the meeting directly, and everyone else to wait in the lobby.
People in my orgOnly people within your org can get into your meeting directly. Everyone else will wait in the lobby.You want all guests and external people to wait in the lobby so you can approve them one by one.
People in my org and guestsPeople in your org and people with guest access can get into your meeting directly.You want all external people (anyone outside your org, except guests) to wait in the lobby so you can approve them one by one.
People in my org, trusted orgs, and guestsAnyone from your organization and organizations with which your IT admin has set up a connection, or anyone joining as a guest, will be able to bypass the lobby.You want some external people (e.g., people joining without a Teams account and people from organizations with which your IT admin did not set up a connection) to wait in the lobby so you can approve them one by one.
EveryoneAnyone who has access to the meeting link gets into the meeting directly, including people who call in.Depending on the meeting policy set up by your IT admin, people joining without a Teams account,people from untrusted organizations, and people dialing in may be placed in the lobby until someone from your organization or a trusted organization joins the meeting, even if the Everyone option is selected.You don’t want anyone to wait in the lobby. You want everyone to be able to join your meetings without specific approval.

* For channel meetings, only those channel members who are directly invited can bypass the lobby.

Change lobby settings

You can change lobby settings before, during, or after a meeting (in the case of a meeting series). The changes will only apply to the meeting you change them in unless the meeting is part of a series. Then, changes will be applied to all future meetings in that series. To change default lobby settings, contact your IT admin.

Before a meeting

Before a meeting

New calendar

To change lobby settings before a meeting:

  1. Select Calendar Teams Calendar tab icon in Teams.
  2. Double-click an event.
  3. Select EditEdit icon.
    • If you double-clicked an instance of a meeting series, select whether you want to edit This eventThis and all following events, or All events in the series.
  4. Select Meeting options Settings button​​​​​​​.
  5. In Meeting accessMeeting access icon in Microsoft Teams:
    • Choose an option from the Who can bypass the lobby? dropdown menu.
    • Turn the People dialing in can bypass the lobby toggle on or off.
    • Choose who can let people into the meeting from the Who can admit from the lobby dropdown menu.
  6. Select Save.

To learn more about the new Teams calendar, see Get started with the new calendar in Microsoft Teams.

During a Meeting

During a meeting

If you change lobby settings during a meeting, people waiting in the lobby will still be there.

Select Save.

Select More actions  > Settings Settings button> Meeting options Meeting options icon in your meeting controls.

In SecurityPrivacy settings button:

Choose an option from the Who can bypass the lobby? dropdown menu.

Turn the People dialing in can bypass the lobby toggle on or off, if available.

Choose who can let people into the meeting from the Who can admit from the lobby dropdown menu.

Manage the lobby

During a meeting, people you designated to manage the lobby can admit or deny entrance to the meeting.

Who can manage the lobby

The meeting organizer, co-organizer(s), and presenter(s) can manage the lobby. If you’re the organizer, choose which of those roles can manage the lobby during that specific meeting. You can also make someone a co-organizer or presenter by changing their meeting role.

To change who can manage the lobby:

  1. Select Calendar Teams Calendar tab icon in Teams.
  2. Double-click an event.
  3. Select EditEdit icon.
    • If you double-clicked an instance of a meeting series, select whether you want to edit This eventThis and all following events, or All events in the series.
  4. Select Meeting options Settings button.
  5. In Meeting access Meeting access icon in Microsoft Teams, choose who can let people into the meeting from the Who can admit from the lobby dropdown menu.
  6. Select Save.

To learn more about the new Teams calendar, see Get started with the new calendar in Microsoft Teams.

Admit or deny participants

During the meeting, people managing the lobby can see a list of participants waiting to get into the meeting and choose whether to admit or deny them.

To admit or deny participants:

  1. Select People People or Show Participants button in your meeting window.
  2. Under Waiting in the lobby:
    • Select the check mark next to someone’s name to admit them.
    • Select the X next to someone’s name to deny them.
    • Select Admit all to let everyone in from the lobby.

Back to Lobby Section

Lobby notifications

People managing the lobby will receive notifications that people are waiting in the lobby. In the notifications, select View lobby to go right to the lobby or Mute these notifications Icon to snooze or mute in Microsoft Teams​​​​​​​ to turn the notifications off.

Screenshot of a lobby notification highlighting the “Mute these notifications” icon.

Select Undo to turn the notifications back on.

Turn off the lobby for a meeting

If you want everyone to join your meeting directly, set Who can bypass the lobby? to Everyone. This change will apply to that meeting and future meetings if it’s part of a meeting series. Contact your IT admin if you want to change this setting for all the future meetings you organize.

Note: If anonymous participants join first, they’ll wait in the lobby. They’ll be let into the meeting automatically after someone from your org, a trusted org, or a guest user joins. Contact your IT admin to allow anonymous participants to start meetings.

You can also remove people or lock your meeting.

To remove people from the meeting:

  1. Select People People or Show Participants button in your meeting window.
  2. Hover over the name of the person you want to remove.
  3. Select More options  > Remove from meeting.

Applies To

Try it!

Guests have similar capabilities to team members and can participate in meetings, chats, and work on documents.

  1. In a team, select More options>Add member.
  2. Enter the guest’s email. You can add as many guests as you need.
    • If needed, it’s best to change their display name now.
  3. When ready, select Add and guests will be sent an email invitation they need to accept to begin.

A guest will have the label “Guest” attached to their name in Microsoft Teams. You can also check the top of any channel to see how many guests are in it. 

To share files, use the Files tab and folders since document links may not work with guests. 

Note: Before guests can join a team, an admin must enable guest access in Teams. If you can’t add a guest, check with your admin.

Zero Day

Microsoft patches zero-day, other vulnerabilities

Microsoft patches zero-day, other vulnerabilities

Microsoft issued 71 patches for December Patch Tuesday to address vulnerabilities including a zero-day bug in the Windows Common Log File System, which is under active exploit and could enable system-level privileges. Other critical vulnerabilities include a remote code execution flaw in Windows Lightweight Directory Access Protocol and one in Hyper-V that could allow code execution on the host operating system.

Full Story: Dark Reading (12/10) 

Your Identity

How to rebuild your identity after a job loss

A job loss can take a toll on identity, says Jeffrey Anvari-Clark, a professor of social work at the University of North Dakota, noting that processing this grief is crucial for moving forward. Michelle, a federal worker affected by layoffs, is navigating this identity loss by considering new career paths aligned with her values, illustrating the importance of constructing a new identity post-job loss.

Full Story: National Public Radio (4/28) 

My advice is always to look for and find a new job before you get to the point where you could loose your current position.

Offboarding Remote workers

Offboarding remote workers is not as easy as it seems, so here is an article from Forbes for some things to consider when offboarding remote workers

Companies often overlook offboarding of remote employees, leading to data breaches and potential legal issues, writes Brandon Batchelor of ReadyCloud, an ecommerce CRM. Common mistakes include failing to recover equipment, not rescinding software access, poor internal communication and ignoring the emotional aspects of offboarding.

Full Story: Forbes (tiered subscription model) (5/5) 

Considering some of the above issues involved, one really has to wonder if the correct analysis of the risks of remote workers has been done and are worth the initial savings involved.

The question’s are who are they, who and where do they live, who are their partners, what additional software is installed on their devices, what AI features are they using that could compromise your security and credibility.

Many cases of remote worker fraud have been recorded.

Advanced Google Search’s

46 Advanced search commands for Google search operators

By Chima Mmeje — April 23, 2025.

We’ve simplified complex commands into clear, actionable insights, ensuring you can apply them immediately. Each operator includes:

  • What it does: A concise explanation.
  • Working status: Is the operator still functional?
  • Example: Ready-to-use search strings for real-world tasks.

List of working Google search operators

You can find all of the major organic search operators below, broken up into three categories: “Basic”, “Advanced”, and “Unreliable”. Basic search operators are operators that modify standard textsearches.

Search operatorWhat it doesExample
” “Forces exact-match searches.“nikola tesla”
ORSearches for results related to X or Y, not necessarily both.tesla OR edison
|Functions identically to “OR.”tesla | edison
()Groups operators to control the order of execution.(tesla OR edison) alternating current
Excludes terms from search results.tesla -motors
*Acts as a wildcard for matching any word or phrase.tesla “rock * roll”
#..#Searches within a range of numbers.tesla announcement 2015..2017
$Searches for specific prices.tesla deposit $1000
Searches for prices in euros.€9.99 lunch deals
inConverts units.250 kph in mph
define:Searches for the definition of a word or phrase.define:telescope
filetype:Searches for specific types of files.“tesla announcements” filetype:pdf
ext:Same as filetype, searching for specific file extensions.powershell ext:pdf
site:Searches within a specific website.site:goodwill.org
intitle:Searches only within page titles.intitle:”tesla vs edison”
allintitle:Searches for every term following “allintitle” within page titles.allintitle: tesla vs edison
inurl:Looks for words or phrases within a URL.tesla announcements inurl:2024
allinurl:Searches the URL for every term following “allinurl.”allinurl: amazon field-keywords nikon
intext:Searches for words or phrases within the body text of a document.intext:”orbi vs eero vs google wifi”
allintext:Searches the body text for every term following “allintext.”allintext: orbi eero google wifi
AROUND(X)Finds terms within X words of each other in a text.tesla AROUND(3) edison
weather:Searches for the weather in a specified location.weather:New Jersey
stocks:Searches for stock information using a ticker symbol.stocks:nvidia
map:Forces Google to show map results for a location.map:Manhattan
movie:Searches for information about a specific movie.movie:Oppenheimer
source:Searches for news from a specific source.deepseek source:cnn
before:Searches for results before a specific date.Microsoft before:2010-05-08
after:Searches for results after a specific date.Microsoft after:2010-05-08

List of unreliable search operators

Search operatorWhat it doesExample
#..#Searches within a range of numbers.logitech keyboard $50..$60
inanchor:Searches for pages with backlinks containing specific anchor text.inanchor:tesla announcements
allinanchor:Searches for pages with backlinks containing multiple words in their anchor text.allinanchor: tesla announcements
daterange:Searches for results from a specific date range. It can be inconsistent and requires Julian dates.tesla announcements daterange:2457663-2457754
loc:Finds results from a specified area.loc:”Silicon Valley” Microsoft
location:Finds news from a specific location.location:”London” Salesforce
AROUND(X)Find terms within X words of each other in a text.tesla AROUND(3) edison
related:Find sites related to a specified domain.related:nytimes.com

List of deprecated search operators dropped by Google

Search operatorWhat it doesExample
~Include synonyms. It seems to be unreliable, and synonym inclusion is the default now. Deprecated in 2013~cars
“+”Force exact match on a single phrase. Deprecated with the launch of Google+. Dropped in 2011+cars
inpostauthor:Searches for posts by a specific author. Deprecated in 2013inpostauthor:”Tom Capper”
allinpostauthor:Same as inpostauthor, but it applies to all terms following it.allinpostauthor:Tom Capper
inposttitle:Searches for posts with specific words in the title.inposttitle:apple iphone
link:Searches for pages linking to a specific URL or domain.link:microsoft.com
info:Searches for information about a specific page or website. Deprecated in 2017info:Amazon.com
id:Same as info, searches for information about a specific page.id:openai.com
phonebook:Searches for someone’s phone number. Deprecated in 2010phonebook:Jeff Bezos
#Searches for hashtags on the discontinued Google+. Deprecated with the sunsetting of Google+#NFL
cache:Find the most recent cache of a webpage. Discontinued in 2024cache:microsoft.com

OneNote

Get the most out of OneNote with these little-known features

Hi, Microsoft 365 Insiders! I’m Gokul Subramaniam, and I’m a Product Manager on the OneNote team. If you’re a OneNote fan, you’re aware of the many ways it can streamline and boost note-taking and content generation. But even the most experienced OneNote users among us might not be benefitting from all it has to offer, which is why we’ve singled out some of our favorite features that you may not be aware of – or wish existed but didn’t know they already did. Check them out, supercharge your productivity, and let us know what you think!

Clip web content with Web Clipper

With OneNote Web Clipper, you can easily capture and save online materials directly into your OneNote notebooks, saving you time manually copying information and allowing you to preserve the content in its original form. By simply adding the OneNote Web Clipper extension to your preferred browser, you can instantly begin clipping articles, recipes, YouTube videos, or other types of web pages, and neatly organize them into your notes for reference later.

A screenshot of Web Clipper clipping a video about Microsoft Copilot prompts.

Save and showcase files with print to OneNote

The print to OneNote feature enables you to send any type of file, including documents, spreadsheets, emails, drawings or diagrams, web pages, and PDFs, directly to a OneNote notebook as a printout. This can be particularly useful for students saving lecture notes, professionals archiving important reports or correspondences, and anyone else wanting to keep a digital copy of physical documents for easy access and annotation. Simply select Print on the file, and then choose OneNote (Desktop) or OneNote (Desktop) – Protected in the Printer list to add it as an image in your chosen notebook or page.

A screenshot of someone saving the Microsoft 365 Insider Blog page to OneNote in the print screen.

Availability: This feature is only available to OneNote on Windows users.

Recover lost or important edits with version history

Made a mistake or written over crucial content in OneNote? You can restore previous versions of your notes, ensuring that all important information is not lost for good. Perhaps most crucially, this feature gives you peace of mind that should someone else have access to your notebook and make edits, you can still go back to earlier versions if you don’t like what they’ve added. Try it out the next time you want to track progress on a school essay, or revisit old versions of a work project, or revert back to an earlier draft. Under History, you can locate a version of your notebook based on timeframe or author, view all previous page versions, and delete certain versions you no longer need.

A moving image of someone looking at Page Versions of a OneNote notebook about a Montana camping trip.

Availability: This feature is only available to OneNote on Windows, OneNote for Mac, and OneNote for the web users.

Store and revert deleted information with Recycle Bin

The Recycle Bin in OneNote is a feature that temporarily stores deleted notes and sections, allowing users to recover content that’s valuable or has been accidentally removed. Items in the Recycle Bin can be restored to a specific location in your notebook or permanently deleted, providing an additional layer of security against unintentional data loss. For instance, you can bring back mistakenly deleted project plans, or pull out discarded meeting notes, from the last 60 days.

A zoomed in screenshot of the Notebook Recycle Bin button in OneNote.

Availability: This feature is only available to OneNote on Windows, OneNote for Mac, and OneNote for the web users.

Quick machine Recovery

New features gradually being rolled out to the Beta Channel with toggle on*

Introducing quick machine recovery

Quick machine recovery (QMR), part of the Windows Resiliency Initiative announced at Ignite 2024 is now available in the latest Windows Insider Preview build. This feature, when enabled, addresses widespread boot issues on Windows 11 devices by automatically detecting and applying fixes directly from the Windows Recovery Environment (WinRE) thereby reducing the system downtime and manual intervention. When a critical boot failure occurs, the device enters WinRE, connects to the network, and sends diagnostic data to Microsoft, which can then deploy targeted remediations via Windows Update. IT admins are encouraged to enable, customize, or test this feature, which is enabled by default for home users. Windows Insiders can start testing it today and provide feedback via Feedback Hub to refine the feature further. In the Feedback Hub app on your Windows device, select Recovery and Uninstall > Quick Machine Recovery. Keep an eye out for a test remediation package coming your way in the next few days, allowing you to experience the quick machine recovery in action.

Microsoft Word

Find and Replace content in a word document:

On the “Home” Tab in the “Editing” section, click the down arrow and select either Find or Replace.

The Find or Replace Navigation will open in the left section of the document.

Type the required content to find in the search box and the results will show

If you selected Replace: The Find and Replace search box will display in a window. Fill in the Find What text in the firsts box and what you want to replace it with in the “Replace with:” dialogue box. Select either “Replace” aor “Replace All“. You will see that the R in Replace and the A in “Repalace All” is under lined so you can use those characters on the keyboard, without having to click on the buttons. If you choose “Replace” you can then click “F” to find the next instance without replacing the instance to skip some choices.

To open the “Find” or “Replace” sections use the keyboard shortcut sequence: CTL F to Find and CTL H to Replace or type “Find” or “Replace” in the Tell me what you want to do Search feature in Ribbon.

I hope that this tip will help you

Backdoors

Fact or fiction

Below is what AI has to say about built in back doors:

While it is not accurate to say that most software has backdoors built into them, there are numerous instances where backdoors have been discovered or intentionally included in software and hardware systems. Backdoors can be defined as mechanisms that allow bypassing normal authentication or encryption to gain access to a closed system. These can be created intentionally by developers, inserted by malicious actors, or result from poor coding practices.

Some notable examples include:

  • Microsoft: Has included backdoors in its disk encryption, allowing for remote data extraction.
  • Apple: Has the capability to remotely extract some data from iPhones for state purposes, although this has reportedly improved with iOS 8.2
  • BMW: Implements a backdoor in car software to enable or disable features like heated seats, even in used cars.
  • Xiaomi: Some of its phones contain a backdoor that can activate political censorship features.
  • Tesla: Sells software features that require a backdoor for activation, which is considered unjust.
  • Adobe: Has licensed its Flash Player to a Chinese company that bundles it with spyware and a backdoor.
  • Samsung: Has included a backdoor in some of its TVs that allows for remote bricking.
  • Wavelink and JetStream Routers: Have universal backdoors that allow unauthenticated users to control the routers and connected devices.
  • Kindle: Contains a universal back door, in addition to its book eraser feature.
  • Kia Cars: Were built with a backdoor that allowed the company to locate and control the cars, which was later exploited by a security flaw.

Tech companies and privacy advocates have been resistant to adding backdoors due to concerns about user privacy and the potential for these backdoors to be exploited by malicious actors. The inclusion of backdoors can weaken the security of devices and software, making them more vulnerable to attacks.

In summary, while backdoors are a significant concern in the tech industry, it is not accurate to generalize that most software includes them. However, the presence of backdoors in various systems highlights the ongoing debate and challenges surrounding software security and privacy.

End AI report:

So my question has to be with so many known instances, what make you or I think that the rest of the software does not have backdoors that have not yet been discovered?

So a specific follow up question to the AI: Tell me more about the encryption backdoor created by the 3 letter agency

The history of encryption backdoors and their impact, particularly involving three-letter agencies like the NSA, spans several decades and has significant implications for both national security and individual privacy.

Early 1990s: Clipper Chip

  • Clipper Chip: In the early 1990s, the National Security Agency (NSA) attempted to introduce the Clipper chip, a chipset designed to provide a backdoor for law enforcement to access encrypted communications. The chip was met with strong opposition from technologists and civil liberties advocates due to concerns over privacy and security. Despite efforts to promote its adoption, the Clipper chip was ultimately abandoned by 1996 due to its technical flaws and widespread criticism.23

2000s: NSA’s Bullrun Program

  • Bullrun Program: Following the Clipper chip, the NSA initiated a secret program called Bullrun to crack encryption standards. This program involved creating backdoors by compromising the software used to generate random numbers in encryption algorithms and gaining access to encrypted communications through hacking. The New York Times revealed in 2013 that by 2006, the NSA had gained access to the communications of several foreign entities, including airlines, travel reservation systems, and government departments.23

2013: Snowden Leaks

  • Snowden Leaks: In 2013, Edward Snowden leaked documents that exposed the extent of the NSA’s surveillance activities, including the use of backdoors. One significant revelation was the NSA’s influence on the Dual EC DRBG random number generator, which contained a backdoor allowing the NSA to break encryption. This backdoor was known to be insecure and slow, yet RSA Security continued to use it until 2013, leading to a loss of credibility and customers.34

2014-2015: Stronger Encryption and Law Enforcement Backlash

  • Apple and Google: In response to the Snowden revelations, Apple and Google strengthened their encryption in 2014, making it so that they could not bypass it even with a warrant. This move was met with strong condemnation from law enforcement officials, including FBI Director James Comey, who argued that end-to-end encryption hinders law enforcement’s ability to collect electronic evidence.235

2016: San Bernardino Case

  • San Bernardino Shooting: The FBI’s attempt to force Apple to unlock the iPhone of Syed Farook, one of the shooters in the San Bernardino attack, brought the encryption debate to the forefront. The FBI sought to compel Apple to create a custom version of its operating system to bypass security features, which Apple refused, citing privacy and security concerns.26

2020-2025: Ongoing Debates and Legislation

  • EARN IT Act: In 2020, the EARN IT Act was introduced, which aimed to create a commission to develop “best practice” guidelines for technology providers to follow in order to maintain immunity from liability for child sexual abuse material. This act has been criticized for potentially undermining encryption.3
  • French Rejection: In March 2025, the French National Assembly rejected a proposal that would have forced messaging platforms to allow hidden access to private conversations, marking a significant victory for digital rights and privacy.3

Impact

  • Cybersecurity Risks: Encryption backdoors create significant cybersecurity risks. They can be exploited by malicious actors, leading to an increase in cybercrimes and the creation of a black market for exploits.56
  • Trust and Business Impact: The revelation of backdoors has damaged trust in U.S. technology companies, leading to a loss of business and a reluctance among international customers to use American tech products.46
  • Privacy Concerns: Backdoors undermine the privacy of individuals, leaving them exposed to surveillance by governments and malicious actors. This has far-reaching implications for personal and national security.56

The ongoing debate over encryption backdoors highlights the tension between national security and individual privacy, with significant implications for both the public and the tech industry.

Absolute Home & Office: Provides security solutions that both locate and recover lost or stolen devices, including PCs, Macs, iPhones, iPads, and Android devices. Their patented Persistence technology can survive a factory reset or hard wipe, and they have an Investigations Team with over 45,000 devices recovered in 120+ countries

Absolute Home & Office is a comprehensive security solution designed to protect your devices and data. Here are the key features and services it offers:

  • Device Tracking and Recovery: Absolute Home & Office can help you locate your lost or stolen device using a combination of GPS, Wi-Fi, and IP geolocation technology. The service claims to recover 3 out of 4 reported stolen devices on average.
  • Remote Lock and Wipe: The LOCK feature allows you to remotely freeze your device at the touch of a button. Additionally, you can remotely and permanently delete sensitive files and personal information from your device to protect against identity theft.
  • Persistent Security: Built into the BIOS or firmware during the manufacturing process, Absolute Home & Office provides a security solution that can withstand a factory reset, installation of a new OS, or even a complete hard drive replacement.
  • Investigations Team: Absolute Home & Office has a dedicated Investigations Team that works with law enforcement agencies to locate and recover your stolen device. They provide support and coordination to help you get your device back.
  • Guaranteed Recovery: With the Premium license, if Absolute Home & Office is unable to recover your stolen device within 60 days, they will pay up to $1,000 for a replacement.
  • Compatibility: The software is pre-installed in some devices from manufacturers like Acer, Asus, Fujitsu, Panasonic, Toshiba, Dell, HP, and Lenovo. For Apple devices, it can be installed on the hard drive, but it will not be as persistent if the hard drive is replaced or reformatted.
  • Customer Support: Absolute Home & Office offers customer support through their website, including a contact form, telephone support, and a theft reporting process. They also provide detailed installation and usage instructions.

These features make Absolute Home & Office a robust solution for protecting your devices and data, providing peace of mind in case of loss or theft.

As can be seen from the above “Absolute Home & Security” is build into most motherboards, so what prevents this code being used against the legal owner? This is a question that you have to answer.

And Finally, the cherry on top:

Key Vulnerabilities in Hard Disk Firmware

  1. Pre-installed Backdoors:
    • Issue: Some hard disk drives come with pre-installed backdoors that can be exploited to gain unauthorized access.
    • Example: Kaspersky Lab discovered that the Equation Group (believed to be linked to the NSA) had developed methods to hide malware in the firmware of hard drives from multiple manufacturers[1].
  2. Unauthenticated Firmware Updates:
    • Issue: Many hard disk drives allow firmware updates without proper authentication, making it possible for attackers to install malicious firmware.
    • Example: Samsung SSDs were found to have a vulnerability that allowed unauthenticated firmware updates, which could be exploited to install malicious code[2].
  3. Self-Encrypting Drives (SEDs):
    • Issue: Vulnerabilities in key management can allow attackers to bypass encryption and access data.
    • Example: Researchers discovered that several SEDs from major manufacturers had vulnerabilities in their key management processes, allowing attackers to bypass encryption and access data[3].
  4. Firmware Rootkits:
    • Issue: Firmware rootkits can persist even after reformatting and OS reinstallation, making them particularly dangerous.
    • Example: The Stuxnet worm included a component that infected the firmware of industrial control systems, allowing it to persist and spread[4].

The malware or backdoor was found on drives from multiple manufacturers including Western Digital, Hitachi, Seagate, Samsung, Toshiba, and IBM

InfoPath

Microsoft InfoPath is now obsolte and Power Apps is the recomended Replacement.

Microsoft InfoPath a forms generator for SharePoint or desktop is being phased out and has been replaced by other Microsoft products such as SharePoint Lists, Flow, and PowerApps.

PowerApps, in particular, is highlighted as a superior replacement due to its ability to build new business applications quickly and efficiently. Microsoft announced the discontinuation of InfoPath on January 31, 2014, and PowerApps was introduced as the replacement in late 2016.

Power Apps is a suite of tools within the Microsoft Power Platform designed to help users create custom business applications without extensive coding knowledge. It includes services, connectors, and a data platform that enables rapid development of applications tailored to specific business needs.

Users can build various types of apps, such as canvas apps, model-driven apps, and cards, using Power Apps Studio, which provides a user-friendly interface similar to building a slide deck in Microsoft PowerPoint. These apps can be accessed from any device, including mobile phones and tablets, and can run offline, syncing data when a connection is re-established.

Power Apps integrates with other Microsoft services like Azure, Dynamics 365, and Teams, as well as third-party applications, allowing for seamless data connectivity and automation. It also supports custom code development and provides a low-code programming language called Power Fx, which can be used across the Power Platform.

Power Apps Studio supports a wide range of controls, including forms, buttons, date pickers, text inputs, rectangles, text boxes, and vertical galleries, among others. These controls help you create interactive and functional apps tailored to your business needs.

For those experiencing performance issues with Power Apps Studio, switching to Microsoft Edge as your browser is highly recommended, as it can significantly improve the performance and reduce lag.

Microsoft PowerApps Studio Desktop was deprecated in favor of the web studio experience. The web studio offers a more up-to-date and feature-rich environment for creating canvas apps, surpassing the capabilities of the desktop app in both features and performance. As of June 1, 2018 the desktop app’s authoring experience was deprecated.

Power Apps basic Tutorial