Very interesting blog on privacy engineering, once more well worth reading and digesting.
An interesting introductory post. I hope (and look forward to) the series brings enlightenment to what otherwise might be considered buzzword bingo.
This is also the case when you make changes to your system’s hardware software, firmware or firmware that BitLocker finds an untrustworthy attempt or attack. aka.ms/recoverykeyfaq