Skip to main contentSkip to navigation
Rossmann Repair Group logo - data recovery and MacBook repair

Chromebook Data Recovery

Local File Recovery from Dead, Water-Damaged, and Broken Chromebooks

ChromeOS encrypts user data with a key bound to the motherboard's TPM or Titan C chip. When a Chromebook dies, the eMMC storage cannot be removed and plugged into another machine. We recover Chromebook data by repairing the logic board to restore the hardware decryption path, or by imaging the eMMC through ISP test points.

No Data, No Charge. Free evaluation for all Chromebook models.

Louis Rossmann
Written by
Louis Rossmann
Founder & Chief Technician
Updated March 2026
9 min read

How Chromebook Data Recovery Works

Chromebooks store user data on a soldered eMMC chip. Unlike a laptop with a removable SSD, the storage is permanently attached to the motherboard. ChromeOS also encrypts user files using a key that is partially stored in a dedicated security chip (TPM or Google Titan C) on the same board. If the Chromebook stops working, recovering local files requires accessing the eMMC through the original hardware.

Our recovery process addresses both the physical access problem and the encryption problem. We either repair the logic board so it can boot far enough to decrypt and transfer files, or we connect directly to the eMMC chip via ISP (In-System Programming) to image the raw storage. If the user provides their Google account password, we can decrypt the recovered image and extract their files.

What Data Is Stored Locally on a Chromebook?

Many Chromebook users assume all their data lives in Google Drive. Several categories of data are stored only on the local eMMC chip and are lost if the device dies without a backup.

Downloads Folder

Files saved from the browser, email attachments opened locally, and any file the user manually downloaded. This folder does not sync to Google Drive unless the user explicitly moves files there.

Linux (Crostini) Files

Chromebooks with Linux enabled run a full Debian container. All files inside the Linux environment, including code repositories, databases, configuration files, and installed applications, are stored on the eMMC. These files exist outside of Google's cloud sync.

Android App Data

Apps installed from the Google Play Store store their local data on the eMMC. Game progress, offline documents from third-party apps, and app-specific databases do not sync to Google Drive.

Offline Google Docs

Google Docs, Sheets, and Slides pinned for offline access are cached locally. If the Chromebook dies during an editing session, unsaved changes exist only on the eMMC until they sync back to Drive.

Browser Data

Bookmarks, saved passwords, and browsing history that are not synced to Chrome Sync remain on the local device. Users who disabled Chrome Sync have all browser state stored exclusively on the eMMC.

Camera and Screenshots

Photos taken with the Chromebook's camera and screenshots are saved to the Downloads folder by default. Users who never moved these to Google Drive will lose them if the Chromebook fails.

Common Chromebook Failures That Require Data Recovery

Chromebook failures fall into categories that determine the recovery approach. The eMMC chip itself rarely fails; the motherboard components around it are the usual point of failure.

Dead Board (No Power)

The Chromebook will not turn on at all. No charging light, no screen activity. Common causes include a failed power management IC (PMIC), shorted capacitors on the main power rail, or a dead charging IC. Education fleet Chromebooks from Lenovo (100e, 300e), HP (Chromebook 11), and Dell (Chromebook 3100) are prone to PMIC failures after 2-3 years of daily use.

Recovery approach: ISP access to image the eMMC, or board repair to restore power rails and boot the device far enough to decrypt and transfer files.

Liquid Damage

Water, coffee, or other liquids short components on the motherboard. Corrosion spreads across the PCB and can damage voltage regulators, the SoC, and the eMMC power supply lines. School Chromebooks are frequently damaged by spilled drinks or rain exposure in student backpacks.

Recovery approach: Ultrasonic cleaning of the board, followed by component-level diagnosis. If the eMMC and TPM chip survived, we repair the damaged power delivery components and boot the device to decrypt and extract data.

"Chrome OS Is Missing or Damaged"

This error appears when the ChromeOS kernel or root partition is corrupted, often due to eMMC wear-out or a failed OS update. The user data on the stateful partition may still be intact. Do not use the Chromebook Recovery Utility; it reinstalls ChromeOS by wiping the entire eMMC, destroying user data in the process.

Recovery approach: ISP access to image the eMMC before any OS reinstallation. We mount the stateful partition (ext4) from the raw image and extract the user directory. If the partition table is corrupted, we locate ext4 superblocks through hex analysis and reconstruct the layout.

eMMC Wear-Out

Chromebook eMMC chips use TLC NAND rated for 1,500 to 3,000 program/erase cycles. Education Chromebooks with 32 GB or 64 GB storage that are filled near capacity experience accelerated wear because the controller has fewer spare blocks for wear leveling. Symptoms include progressively slower performance, random freezes, and eventually failure to boot.

Recovery approach: ISP with multiple read passes, skipping and retrying failed sectors. If the eMMC controller is non-responsive, chip-off BGA recovery with raw NAND reading and ECC reconstruction via PC-3000 Flash.

What Not to Do With a Failing Chromebook

Several common troubleshooting steps destroy Chromebook data. If local files matter, avoid these actions before contacting a recovery specialist:

  1. Do not use the Chromebook Recovery Utility. It reinstalls ChromeOS by wiping the eMMC. Google designed it to restore a bootable OS, not to preserve user data.
  2. Do not enable Developer Mode. Toggling Developer Mode triggers a Powerwash that formats the stateful partition and destroys the encryption keys for user data. This is irreversible.
  3. Do not Powerwash the device. A Powerwash is a factory reset that erases all local user data and regenerates encryption keys. Data erased by Powerwash cannot be recovered.
  4. Do not repeatedly force-restart. Each power cycle on a Chromebook with a worn eMMC risks further corruption to the Flash Translation Layer. If the device is not booting, additional restart attempts make recovery harder.

What to Do Instead

  • Power off the Chromebook and stop using it
  • Note the exact model number (on the bottom label or in Settings)
  • Record what happened before the failure (spill, drop, update, etc.)
  • Have the Google account password ready (needed for decryption)
  • Ship the complete Chromebook via our mail-in process

Chromebook Recovery Pricing

Chromebook recovery uses the same pricing tiers as SSD and flash media recovery. The cost depends on the failure type and recovery method required, not the Chromebook brand or storage capacity. No diagnostic fee.

Service TierPriceDescription
Simple CopyLow complexity$200

Your drive works, you just need the data moved off it

Functional drive; data transfer to new media

Rush available: +$100

File System RecoveryLow complexityFrom $250

Your drive isn't showing up, but it's not physically damaged

File system corruption. Visible to recovery software but not to OS

Starting price; final depends on complexity

Circuit Board RepairMedium complexity – PC-3000 required$600–$900

Your drive won't power on or has shorted components

PCB issues: failed voltage regulators, dead PMICs, shorted capacitors

May require a donor drive (additional cost)

Firmware RecoveryMedium complexity – PC-3000 required$900–$1,200

Your drive is detected but shows the wrong name, wrong size, or no data

Firmware corruption: ROM, modules, or system files corrupted

Price depends on extent of bad areas in NAND

Advanced Board RebuildHigh complexity – precision microsoldering and BGA rework$1,200–$1,500

Your drive's circuit board is severely damaged and requires advanced micro-soldering

Advanced component repair. Micro-soldering to revive native logic board or utilize specialized vendor protocols

50% deposit required upfront; donor drive cost additional

Hardware Repair vs. Software Locks

Our "no data, no fee" policy applies to hardware recovery. We do not bill for unsuccessful physical repairs. If we replace a hard drive read/write head assembly or repair a liquid-damaged logic board to a bootable state, the hardware repair is complete and standard rates apply. If data remains inaccessible due to user-configured software locks, a forgotten passcode, or a remote wipe command, the physical repair is still billable. We cannot bypass user encryption or activation locks.

All tiers: Free evaluation and firm quote before any paid work. No data, no fee on all tiers (advanced board rebuild requires a 50% deposit because donor parts are consumed in the attempt).

Target drive: The destination drive we copy recovered data onto. You can supply your own or we provide one at cost. All prices are plus applicable tax.

Data Recovery Standards & Verification

Our Austin lab operates on a transparency-first model. We use industry-standard recovery tools, including PC-3000 and DeepSpar, combined with strict environmental controls to make sure your hard drive is handled safely and properly. This approach allows us to serve clients nationwide with consistent technical standards.

Open-drive work is performed in a ULPA-filtered laminar-flow bench, validated to 0.02 µm particle count, verified using TSI P-Trak instrumentation.

Transparent History

Serving clients nationwide via mail-in service since 2008. Our lead engineer holds PC-3000 and HEX Akademia certifications for hard drive firmware repair and mechanical recovery.

Media Coverage

Our repair work has been covered by The Wall Street Journal and Business Insider, with CBC News reporting on our pricing transparency. Louis Rossmann has testified in Right to Repair hearings in multiple states and founded the Repair Preservation Group.

Aligned Incentives

Our "No Data, No Charge" policy means we assume the risk of the recovery attempt, not the client.

LR

Louis Rossmann

Louis Rossmann's well trained staff review our lab protocols to ensure technical accuracy and honest service. Since 2008, his focus has been on clear technical communication and accurate diagnostics rather than sales-driven explanations.

We believe in proving standards rather than just stating them. We use TSI P-Trak instrumentation to verify that clean-air benchmarks are met before any drive is opened.

See our clean bench validation data and particle test video

ChromeOS Storage Architecture

Partition Layout

ChromeOS formats the eMMC using a GUID Partition Table (GPT) with up to 12 partitions. The layout includes two kernel partitions (KERNEL-A and KERNEL-B), two read-only root filesystems (ROOT-A and ROOT-B), and one writable stateful partition (STATE). User data lives exclusively on the STATE partition, which is formatted as ext4. The dual-kernel and dual-root design allows ChromeOS to apply updates to the inactive set and swap on reboot; this is irrelevant to data recovery because user files are never stored on kernel or root partitions.

Encryption: dm-crypt, fscrypt, and Hardware Key Binding

ChromeOS protects user data through the cryptohome system. Older Chromebooks (pre-2018) used ecryptfs to encrypt individual files. Modern Chromebooks use ext4-native encryption (fscrypt) combined with dm-crypt for full-partition encryption of the stateful partition.

The encryption key is derived from two inputs: the user's Google account password and a high-entropy hardware secret stored in the TPM (Trusted Platform Module) or Google's custom Titan C / Cr50 security chip. The hardware secret cannot be extracted from the TPM; it can only be used by the TPM on the original board. This means a raw dump of the eMMC chip, taken via chip-off without the original board's TPM, produces encrypted data that cannot be decrypted without brute-forcing the hardware key component.

For data recovery, this means the most reliable path is repairing the original logic board so that the TPM can participate in key derivation. If the board is repairable, we boot ChromeOS far enough for cryptohome to mount the user's vault, then transfer files off the device. If board repair is not possible but ISP imaging succeeds, we can attempt offline decryption with the user's password, but this only works on older devices that usedecryptfs without hardware key binding.

ISP Recovery on Chromebook Boards

ISP (In-System Programming) connects directly to the eMMC chip's signal lines through test points on the Chromebook's PCB. We locate the CLK (clock), CMD (command), DAT0 through DAT7 (8-bit data bus), VCC (3.3V core power), VCCQ (1.8V or 3.3V I/O power), and GND pads using board schematics or by tracing signals from the eMMC BGA footprint.

An ISP adapter provides regulated power directly to the eMMC chip, bypassing the dead host board's power circuitry. The adapter sends standard MMC read commands to the eMMC controller. If the controller responds, we image the chip sector by sector using PC-3000 Flash. The resulting image contains the full GPT layout, including the encrypted stateful partition.

ISP is the preferred method because it avoids the thermal stress of desoldering and preserves the chip for reinstallation. On Chromebooks where the eMMC controller is healthy but the host SoC or PMIC is dead, ISP produces a complete image of a typical 64 GB eMMC. Transfer speed depends on the bus width available at the test points; 1-bit DAT0 reads are slower but reliable over flying wires, while chip-off with a shielded BGA socket enables full 8-bit bus speeds.

Chip-Off BGA Recovery

When ISP fails because the eMMC controller is locked or the test points are damaged, we desolder the BGA eMMC package. The board is preheated to 150°C to reduce thermal gradient stress, then a focused hot-air nozzle at 260-280°C melts the solder balls. The chip is lifted, cleaned, and placed in a BGA-to-socket adapter matched to the 153-ball or 169-ball pinout.

PC-3000 Flash communicates with the eMMC controller through the socket adapter. If the controller responds, imaging proceeds normally. If the controller is dead, raw NAND reading bypasses the controller entirely. Raw reading requires identifying the eMMC manufacturer (Samsung, Toshiba/Kioxia, SK Hynix, or Micron) and applying the correct ECC algorithm (BCH or LDPC) and XOR descrambling pattern to reconstruct the logical data from physical NAND pages.

eMMC vs. NVMe in Newer Chromebooks

Premium Chromebooks (Google Pixelbook Go, HP Elite Dragonfly Chromebook, Framework Chromebook) use NVMe SSDs instead of eMMC. NVMe Chromebooks follow the same ChromeOS encryption model (TPM + user password), but the storage interface and recovery tooling differ. NVMe drives use PCIe lanes and the NVMe command set rather than the MMC protocol. Recovery of NVMe Chromebooks uses our SSD recovery process with PC-3000 SSD or PC-3000 Portable III. If the NVMe drive is removable (M.2 2242 or 2280), it can be read in another machine; however, the encrypted data still requires the original board's TPM for decryption.

One additional consideration for NVMe Chromebooks: if files were deleted (emptied from Trash) before the device failed, the NVMe controller executes TRIM commands that zero out the underlying flash blocks. Deleted files on an NVMe Chromebook are not recoverable through any method.

Common eMMC Chips in Chromebooks

Chromebook OEMs source eMMC from four primary manufacturers. PC-3000 Flash includes recovery profiles for each controller family:

  • Samsung (KLMAG, KLMBG series): Found in Samsung Chromebooks and many HP models. Samsung eMMC controllers use LDPC ECC and respond reliably to MMC commands via ISP.
  • Toshiba/Kioxia (THGBMHG, THGBMDG series): Common in Acer Chromebooks and budget HP models. Firmware lockouts on Toshiba eMMC can sometimes be resolved through vendor-specific MMC commands during ISP sessions.
  • SK Hynix (H26M, H26T series): Used in Lenovo Chromebooks and Dell education models. Known for FTL inconsistency after power loss during garbage collection, causing boot loops. ISP with vendor commands can force the controller to rebuild its tables.
  • Micron (MTFC series): Found in ASUS Chromebooks and some Dell models. Micron eMMC uses a controller with similarities to their SSD line. PC-3000 Flash handles chip-off recovery with Micron-specific ECC profiles.

Chromebook Data Recovery: Common Questions

Can you recover data from a completely dead Chromebook?
If the Chromebook's motherboard is dead but the eMMC storage chip is intact, we recover data through ISP (In-System Programming) by connecting to the chip's data lines via test points on the board. If the TPM/Titan C security chip is needed for decryption, we repair the logic board first to restore the hardware decryption path. Chip-off is a last resort when ISP fails and the board cannot be repaired.
Is data on a Chromebook encrypted?
ChromeOS encrypts user data in the /home/chronos/user directory using dm-crypt and fscrypt. The encryption key is derived from the user's Google account password combined with a hardware secret stored in the TPM or Titan C chip on the motherboard. This hardware binding means the data can only be decrypted on the original board (or a repaired version of it) with the correct Google account password.
What data is actually stored locally on a Chromebook?
The Downloads folder, Linux (Crostini) container files, Android app data from the Play Store, offline-cached Google Docs, and any browser data not synced to Chrome Sync are stored locally on the eMMC chip. Google Drive files that were pinned for offline use also have local copies. If the Chromebook dies, all of this local data is inaccessible without board-level recovery.
Will enabling Developer Mode erase my data?
Toggling Developer Mode triggers a Powerwash that wipes the stateful partition and destroys the cryptographic keys protecting user data. Data erased through a Developer Mode transition is not recoverable. If your Chromebook is malfunctioning, do not enable Developer Mode before consulting a recovery specialist.
Can you recover data from school-issued or enterprise Chromebooks?
Enterprise-enrolled Chromebooks managed through Google Admin Console may have additional security policies. If the school or organization's IT admin can provide enrollment credentials or temporarily unenroll the device, recovery of local data follows the same process as consumer Chromebooks. We coordinate with school IT departments on access requirements.
How much does Chromebook data recovery cost?
Chromebook recovery uses the same pricing tiers as SSD and flash media recovery. Simple data transfer from a functional eMMC starts at $200. Board repair to restore the hardware decryption path ranges from $600 to $900. Firmware-level recovery is $900 to $1,200. Advanced chip-off with NAND reconstruction is $1,200 to $1,500. No diagnostic fee, and no charge if we cannot recover your data.
Should I use the Chromebook Recovery Utility?
The Chromebook Recovery Utility reinstalls ChromeOS by wiping the entire eMMC, including user data. Do not use it if your goal is to recover local files. It is designed to restore a bootable OS, not to preserve data. If your Chromebook shows 'Chrome OS is missing or damaged,' contact us before running any recovery utility.
How long does Chromebook data recovery take?
Standard turnaround is 3 to 5 business days. Chromebook eMMC chips have small capacities (32 GB to 128 GB), so imaging is fast once access is established. Most of the time is spent on board diagnostics and, if needed, microsoldering to restore the hardware decryption path through the TPM/Titan C chip.

Need Recovery for Other eMMC or Flash Devices?

Chromebooks use eMMC, but the same storage technology appears in tablets, budget laptops, smart TVs, and IoT devices. For non-Chromebook eMMC recovery, see our dedicated eMMC data recovery page. For removable SSDs, see SSD recovery.

Chromebook not turning on?

Free evaluation. No data, no charge. Ship the complete Chromebook; we handle the rest.