dev/sda2 - my newly created swap partitionĬopying data from encrypted root filesystemīoot from a live CD. dev/sda3 - clean non-encrypted EXT4 partition NOTE: Whenever I say, I mean /dev/sda1 - boot partition Migrating FDE installation to unencrypted partition Bear in mind that I am not Linux specialist, so it may be not the best solution. The data would still be encrypted although the encryption would be useless since the key can be trivially guessed.īelow it's my solution that worked. However, this does not disable the encryption. Maybe you can go further and supress to (now useless) passphrase prompt. Then decrypting only requires to press Enter. PS: Chances are that you can change the encryption passphrase, possibly to an empty string. For a new users, this is the quickest and safest option. If possible, it's best to avoid this time consuming and error-prone procedure. Finally, make sure that the new file system is properly recognized by the boot loader and mount -a before rebooting. Then, remove the encrypted container, and recreate the file system without encryption. You'd have to move the whole file system (or all files) to another partition (with enough free space) or external HDD. With some knowledge about how Linux systems work, it can be done.
![can crypto locker mount a hard drive can crypto locker mount a hard drive](https://img.bhs4.com/d2/f/d2fd663320503a09003954cc41c0b9484a0d8a82_large.jpg)
There is no simple method or tool to undo this. (There's more than one way to do this, but I'll keep the answer general.) The encryption is handled by an extra software layer between the file system and the physical hard drive, not the file system itself.
#Can crypto locker mount a hard drive full#
on the text console before the login screen is displayed), this indicates that a full disk encryption method was used. If Ubuntu asks for an encryption passphrase during boot (i.e.