
And it seems, each encryption key is preserved.
that it’s possible to extract the encryption key the Fairphone used to encrypt the adoptable storage.Īgain, I tried to get information about this on the web. that the dd command was correct and did not produce corrupt imagesįrom the web I got that one might want to use gddrescue for andoptable storages. Unfortunately, the phone told me the card was broken. Then I had the idea to let the phone use the old microSD card again as adoptable storage, shut down the phone, then restore the dded images and boot the phone with the old card and the restored data. I used Linux and dd (without any specific options) to write images of both partitions in img files (again I had some luck, the card has only 8GB). I know now this means, the card is encrypted and was used as adoptable storage. Without success, there are two partitions “android_meta” and “android_expand” on the card which can’t be read. So I switched cards again, but the Fairphone didn’t recognize the old one. And then realized that the recently shot photos disappeared (luckily, I had the “old” microSD card only some weeks in place). So I inserted the new card, attached it as adoptable storage. Just plain format and after executing it, SD-card remains as portable storage. I was convinced that this old card was not in use. Cannot find format as internal in order to achieve encryption of SD-card.
I got a new microSD card and was so enthusiastic about it that I replaced the old card without saving my data.