Deciphering assembly from encrypted hard drives, partitions, folders or separate files is always the second stage of whole data recovery process from failed device, such as hard drive or RAID array. The first and foremost stage that must be taken care of is the repairing damaged hard drive or performing the low-level scan and then, reading any remaining data from the disk platters or memory chips for solid-state drives into the raw data image.
That raw data image is to be transferred to the new hard drive to work with it on logical recovery level, as if with the original device. The chance of successful decoding data recovery depends not only on extent of image integrity, but also on some other factors, such as the type of encrypting software used, availability user’s login information, passwords, key-files, keys, and how that information is critical to access to data. We have to emphasize that not all encrypted software programs are data-recovery-industry-friendly, and for some individuals who have lost the access to the enciphered information, it might be really frustrating to find out that about it. Not to mention, that some of them are too vulnerable to any sorts of corruption, others do not provide any supporting drivers or utilities access to access to recovered image even with legitimate user’s credentials.
At the moment the raw image is transferred to new hard drive, you, as the owner of encrypted data, have two options to go with. The first one is to use that cloned hard drive (as most possible close replica of original failed device). You will need to use do-it-yourself programs from encrypted software developer and their technical support team must help you with it. Another option, we perform the full recovering process, and then provide you with a recovery report, containing the list of deciphered files and folders. This option involves supplying us as much information as possible about the name and version of encrypted data software, the passwords, logins, key files, backup keys etc., just anything that have a slightest relation to the data encryption. As of today, we guarantee the good recovery results for TrueCrypt volumes and PointSec Encrypted hard drives. Other encrypted technologies are also supported. Currently, we do not support SafeBoot Encryption due to the fact the developer company is failed to cooperate with the data recovery specialists (see the first option above).
Note about Credentials for TrueCrypt Data Recovery
TrueCrypt volume can be recovered only if you provide passwords. If the Keyfile was used for extra protection, you must provide or indicate the name and path of it on the hard drive. Other optional, but useful info for our technicians would be the name of your TrueCrypt volume file, path (location of file), approximate size and date of the file creation or its last writing to volume. If a backup volume header file has been made, we’ll need to know its name and path, too.
How can I check if my encrypted files were recovered?
What is your guarantee…
No questions will be asked if you are not satisfied with the recovery report.
That is Data-R-US way to say "no data no charge". As, we really mean it.