February 18th, 2014, 17:50
February 18th, 2014, 22:19
February 18th, 2014, 23:40
HaQue wrote:SSD drives do not need a Clean Room, just a clean room.
SSD drives don't get bad sectors either, they have no physical sectors. They have Blocks, and they get bad blocks, and pages of data. To recover data, common method is to de-solder all the NAND chips, read them in a reader, and use software to reconstruct th data in relation to what the controller did. Wear levelling algorithms and bad block management are a couple of the technologies you have to deal with. Some are further complicated by other things such as proprietary technology that "no-one" else is privvy to, XORing the data and/or service area etc etc. if a NAND has some bad blocks, then it is possible that nothing will ever read those blocks.
If the drive is failing, then you might get your data back, but the drive will be toast. A regular filesystem might be easily recoverable, as you can often afford to live with a few dead files due to bad blocks or whatever the result of the coniption the controller had ... but encrypted partitions usually need the whole thing sound and thats a much biger challenge.
Did you manage to get an image?
Is it a true SSD or a HYbrid.
I confess i am not sure your nick is descriptive, and I wonder why they will let you try and get your data back, but not send to a DR company that would have more stringent privacy procedures in place than an individual.
February 19th, 2014, 0:25
February 19th, 2014, 0:37
HaQue wrote:would have thought if you were able to decrypt the image, then you shouldnt have lost anything. I am thinking similar to a corrupt zip file.
February 19th, 2014, 0:43
HaQue wrote:would have thought if you were able to decrypt the image, then you shouldnt have lost anything. I am thinking similar to a corrupt zip file. I will admit that I dont deal with encryption in relation to recovering data, so I might be assuming things that arent true.
Bad blocks are usually managed quite well by the controller firmware, so you shouldnt have to worry about them. Even if there were data in them, you arent going to do much with it.
Your images you have are logical. these in no way shape or form are anywhere near close to a physical dump(image I guess) of the chips. There is likely 16 or so chips, each with 1 - 4 Banks, and data mix, wear levelling. Imagine getting 16 books (part odd a 16 set encyclopedia *google it young ones it is like wikipedia, but made of paper!)) Now tear the pages out and put them in a few piles, now shuffle them, now get random sentences and make a list of alternate spots on "spare" pages to replace ones that were not printed well. now you come close to what an SSD is like. Add encryption if you arent confused enough
If you can access the logical part of the disk, the physical part of the SSD itself isnt really an issue.
I would use GetDataBack, but I havent used R-Studio so I don't know the comparison.
It will be good to hear how you go, good luck !
February 19th, 2014, 23:00
February 19th, 2014, 23:22
February 20th, 2014, 11:53
labtech wrote:If you have the ability, I would suggest comparing the encrypted copy vs. decrypted copy in a hex viewer to ensure that the drive decrypted successfully. Winhex is an example.
Note: typically, IT departments do not have advanced data recovery knowledge. Typically, they have a rough understanding of file system along with a couple of software utilities used on the device to scan for data. That's about it in a nutshell. With respect to other IT areas, IT does not equal data recovery.
February 20th, 2014, 12:06
HaQue wrote:shame that your best option, a reputable DR Firm that has SSD experience, has been ruled out.
February 20th, 2014, 13:08
HDDWizard wrote:b) when I give them back the laptop and SSD to troubleshoot, I want to my have my own image/clone I can work off of, in case they can't do anything or make it worse and lose my data.
April 15th, 2015, 3:39
April 15th, 2015, 14:57
Powered by phpBB © phpBB Group.