How to recover data from an encrypted IBM Thinkpad T61 by TPM?

Posted on 2012-12-20
Last Modified: 2013-01-11
How to recover data from an encrypted IBM Thinkpad T61 by TPM?

My graphics card has gone out on my laptop and with some other motherboard issues that cannot be repaired.

My data is encrypted by the on-board TPM device on the motherboard.  How can I recover my data from my hard drive?
Question by:cmleavitt
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 47

Expert Comment

ID: 38710961
If the drive cannot be oved to another identical machine for decryption - then forget about the data. That was the idea of this encryption that nobody gets to it if the machine is stolen.

Author Comment

ID: 38710979
I've installed the hard drive into a T60 model and it is prompting me for the encryption password in which I don't have.
LVL 47

Expert Comment

ID: 38711031
Haven't you used thenpassword on old machine? I assume it is hdd password or does it come before Windows loads?
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  


Author Comment

ID: 38711095
Comes on before windows loads
LVL 47

Accepted Solution

noxcho earned 500 total points
ID: 38711195
Look here, there are more links in google which say how to get over it. But they are all on your own risk.
LVL 55

Expert Comment

ID: 38713943

Please tell us, which encryption software or encr. method utilised the tpm to encrypt.
Did you start it in windows or how did you trigger encryption?

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question