onlinepersona,

Why? What would be the problem?

On linux, you’re probably using LUKS. That has a header with the keys at the beginning of each encrypted volume. If those keys (or key if you only have one) is corrupted and you don’t have a backup of that, you’re fucked.

The next problem is that data recovery tools mostly don’t support decryption. They scan regions or the entire drive for recognizable things like partition headers, partition tables, file types, etc. if those are encrypted, well…

If you are able to decrypt a partition, then it might work as it will show up like any other device in /dev/mapper/ and you could do recovery /dev/mapper/HDD. However, I have no idea what data corruption does to encryption algorithms. If one part of what is being decrypted is faulty, what does that do to the entire thing?
This mostly comes from a lack of knowledge on my part. IIRC encryption depends on hashsums -> if you change what’s being decrypted/encrypted, the entire hashsum is incorrect and thus all the data shouldn’t be able to be decrypted. But I might be wrong - I’ll gladly be wrong on this.

Anti Commercial-AI license

  • All
  • Subscribed
  • Moderated
  • Favorites
  • selfhosted@lemmy.world
  • DreamBathrooms
  • magazineikmin
  • Durango
  • ngwrru68w68
  • rosin
  • Youngstown
  • osvaldo12
  • cubers
  • slotface
  • InstantRegret
  • tester
  • kavyap
  • thenastyranch
  • khanakhh
  • JUstTest
  • mdbf
  • modclub
  • everett
  • cisconetworking
  • GTA5RPClips
  • Leos
  • ethstaker
  • tacticalgear
  • normalnudes
  • anitta
  • provamag3
  • megavids
  • lostlight
  • All magazines