Imho, in the best case, when he would be able to reestablish the
cryptomapping (manually or by havina luks header at hand) he might have
a loss of parts of the original filesystem and/or filedata - it strongly
depends of course ...
But it certainly is a rather tricky task .... If he doesn't have the MK
at hand and only the passphrase from the keyslot, it probably boils down
to a complete loss.
Heinz Diehl schrieb:
On 12.08.2010, Arno Wagner wrote:
That is untrue.
http://support.microsoft.com/kb/302686
A Windows Format/Quick Format does not blank the disk
Yes, but since the old filesystem was not NTFS and is LUKS/dmcrypt encrypted,
all the files are gone now. That was what I meant.
ext2/ext3 for example have backup superblock copies distributed over
the disk and recovery of all files/directories except those located at the
start are quite possible with e2fsck after FAT formatting. Some
recoverz should be possible after NTFS formatting.
As far as I understand, the crypto layer on the now NTFS formatted filesystem
is no longer active, making it impossible to use any data recovery on it.
What am I missing?
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt