Chromebook Data Recovery
Local File Recovery from Dead, Water-Damaged, and Broken Chromebooks
ChromeOS encrypts user data with a key bound to the motherboard's TPM or Titan C chip. When a Chromebook dies, the eMMC storage cannot be removed and plugged into another machine. We recover Chromebook data by repairing the logic board to restore the hardware decryption path, or by imaging the eMMC through ISP test points.
No Data, No Charge. Free evaluation for all Chromebook models.

How Chromebook Data Recovery Works
Chromebooks store user data on a soldered eMMC chip. Unlike a laptop with a removable SSD, the storage is permanently attached to the motherboard. ChromeOS also encrypts user files using a key that is partially stored in a dedicated security chip (TPM or Google Titan C) on the same board. If the Chromebook stops working, recovering local files requires accessing the eMMC through the original hardware.
Our recovery process addresses both the physical access problem and the encryption problem. We either repair the logic board so it can boot far enough to decrypt and transfer files, or we connect directly to the eMMC chip via ISP (In-System Programming) to image the raw storage. If the user provides their Google account password, we can decrypt the recovered image and extract their files.
What Data Is Stored Locally on a Chromebook?
Many Chromebook users assume all their data lives in Google Drive. Several categories of data are stored only on the local eMMC chip and are lost if the device dies without a backup.
Downloads Folder
Files saved from the browser, email attachments opened locally, and any file the user manually downloaded. This folder does not sync to Google Drive unless the user explicitly moves files there.
Linux (Crostini) Files
Chromebooks with Linux enabled run a full Debian container. All files inside the Linux environment, including code repositories, databases, configuration files, and installed applications, are stored on the eMMC. These files exist outside of Google's cloud sync.
Android App Data
Apps installed from the Google Play Store store their local data on the eMMC. Game progress, offline documents from third-party apps, and app-specific databases do not sync to Google Drive.
Offline Google Docs
Google Docs, Sheets, and Slides pinned for offline access are cached locally. If the Chromebook dies during an editing session, unsaved changes exist only on the eMMC until they sync back to Drive.
Browser Data
Bookmarks, saved passwords, and browsing history that are not synced to Chrome Sync remain on the local device. Users who disabled Chrome Sync have all browser state stored exclusively on the eMMC.
Camera and Screenshots
Photos taken with the Chromebook's camera and screenshots are saved to the Downloads folder by default. Users who never moved these to Google Drive will lose them if the Chromebook fails.
Common Chromebook Failures That Require Data Recovery
Chromebook failures fall into categories that determine the recovery approach. The eMMC chip itself rarely fails; the motherboard components around it are the usual point of failure.
Dead Board (No Power)
The Chromebook will not turn on at all. No charging light, no screen activity. Common causes include a failed power management IC (PMIC), shorted capacitors on the main power rail, or a dead charging IC. Education fleet Chromebooks from Lenovo (100e, 300e), HP (Chromebook 11), and Dell (Chromebook 3100) are prone to PMIC failures after 2-3 years of daily use.
Recovery approach: ISP access to image the eMMC, or board repair to restore power rails and boot the device far enough to decrypt and transfer files.
Liquid Damage
Water, coffee, or other liquids short components on the motherboard. Corrosion spreads across the PCB and can damage voltage regulators, the SoC, and the eMMC power supply lines. School Chromebooks are frequently damaged by spilled drinks or rain exposure in student backpacks.
Recovery approach: Ultrasonic cleaning of the board, followed by component-level diagnosis. If the eMMC and TPM chip survived, we repair the damaged power delivery components and boot the device to decrypt and extract data.
"Chrome OS Is Missing or Damaged"
This error appears when the ChromeOS kernel or root partition is corrupted, often due to eMMC wear-out or a failed OS update. The user data on the stateful partition may still be intact. Do not use the Chromebook Recovery Utility; it reinstalls ChromeOS by wiping the entire eMMC, destroying user data in the process.
Recovery approach: ISP access to image the eMMC before any OS reinstallation. We mount the stateful partition (ext4) from the raw image and extract the user directory. If the partition table is corrupted, we locate ext4 superblocks through hex analysis and reconstruct the layout.
eMMC Wear-Out
Chromebook eMMC chips use TLC NAND rated for 1,500 to 3,000 program/erase cycles. Education Chromebooks with 32 GB or 64 GB storage that are filled near capacity experience accelerated wear because the controller has fewer spare blocks for wear leveling. Symptoms include progressively slower performance, random freezes, and eventually failure to boot.
Recovery approach: ISP with multiple read passes, skipping and retrying failed sectors. If the eMMC controller is non-responsive, chip-off BGA recovery with raw NAND reading and ECC reconstruction via PC-3000 Flash.
What Not to Do With a Failing Chromebook
Several common troubleshooting steps destroy Chromebook data. If local files matter, avoid these actions before contacting a recovery specialist:
- Do not use the Chromebook Recovery Utility. It reinstalls ChromeOS by wiping the eMMC. Google designed it to restore a bootable OS, not to preserve user data.
- Do not enable Developer Mode. Toggling Developer Mode triggers a Powerwash that formats the stateful partition and destroys the encryption keys for user data. This is irreversible.
- Do not Powerwash the device. A Powerwash is a factory reset that erases all local user data and regenerates encryption keys. Data erased by Powerwash cannot be recovered.
- Do not repeatedly force-restart. Each power cycle on a Chromebook with a worn eMMC risks further corruption to the Flash Translation Layer. If the device is not booting, additional restart attempts make recovery harder.
What to Do Instead
- ✓Power off the Chromebook and stop using it
- ✓Note the exact model number (on the bottom label or in Settings)
- ✓Record what happened before the failure (spill, drop, update, etc.)
- ✓Have the Google account password ready (needed for decryption)
- ✓Ship the complete Chromebook via our mail-in process
Chromebook Recovery Pricing
Chromebook recovery uses the same pricing tiers as SSD and flash media recovery. The cost depends on the failure type and recovery method required, not the Chromebook brand or storage capacity. No diagnostic fee.
| Service Tier | Price | Description |
|---|---|---|
| Simple CopyLow complexity | $200 | Your drive works, you just need the data moved off it Functional drive; data transfer to new media Rush available: +$100 |
| File System RecoveryLow complexity | From $250 | Your drive isn't showing up, but it's not physically damaged File system corruption. Visible to recovery software but not to OS Starting price; final depends on complexity |
| Circuit Board RepairMedium complexity – PC-3000 required | $600–$900 | Your drive won't power on or has shorted components PCB issues: failed voltage regulators, dead PMICs, shorted capacitors May require a donor drive (additional cost) |
| Firmware RecoveryMedium complexity – PC-3000 required | $900–$1,200 | Your drive is detected but shows the wrong name, wrong size, or no data Firmware corruption: ROM, modules, or system files corrupted Price depends on extent of bad areas in NAND |
| Advanced Board RebuildHigh complexity – precision microsoldering and BGA rework | $1,200–$1,500 | Your drive's circuit board is severely damaged and requires advanced micro-soldering Advanced component repair. Micro-soldering to revive native logic board or utilize specialized vendor protocols 50% deposit required upfront; donor drive cost additional |
Hardware Repair vs. Software Locks
Our "no data, no fee" policy applies to hardware recovery. We do not bill for unsuccessful physical repairs. If we replace a hard drive read/write head assembly or repair a liquid-damaged logic board to a bootable state, the hardware repair is complete and standard rates apply. If data remains inaccessible due to user-configured software locks, a forgotten passcode, or a remote wipe command, the physical repair is still billable. We cannot bypass user encryption or activation locks.
All tiers: Free evaluation and firm quote before any paid work. No data, no fee on all tiers (advanced board rebuild requires a 50% deposit because donor parts are consumed in the attempt).
Target drive: The destination drive we copy recovered data onto. You can supply your own or we provide one at cost. All prices are plus applicable tax.
Data Recovery Standards & Verification
Our Austin lab operates on a transparency-first model. We use industry-standard recovery tools, including PC-3000 and DeepSpar, combined with strict environmental controls to make sure your hard drive is handled safely and properly. This approach allows us to serve clients nationwide with consistent technical standards.
Open-drive work is performed in a ULPA-filtered laminar-flow bench, validated to 0.02 µm particle count, verified using TSI P-Trak instrumentation.
Transparent History
Serving clients nationwide via mail-in service since 2008. Our lead engineer holds PC-3000 and HEX Akademia certifications for hard drive firmware repair and mechanical recovery.
Media Coverage
Our repair work has been covered by The Wall Street Journal and Business Insider, with CBC News reporting on our pricing transparency. Louis Rossmann has testified in Right to Repair hearings in multiple states and founded the Repair Preservation Group.
Aligned Incentives
Our "No Data, No Charge" policy means we assume the risk of the recovery attempt, not the client.
Technical Oversight
Louis Rossmann
Louis Rossmann's well trained staff review our lab protocols to ensure technical accuracy and honest service. Since 2008, his focus has been on clear technical communication and accurate diagnostics rather than sales-driven explanations.
We believe in proving standards rather than just stating them. We use TSI P-Trak instrumentation to verify that clean-air benchmarks are met before any drive is opened.
See our clean bench validation data and particle test videoChromeOS Storage Architecture
Partition Layout
ChromeOS formats the eMMC using a GUID Partition Table (GPT) with up to 12 partitions. The layout includes two kernel partitions (KERNEL-A and KERNEL-B), two read-only root filesystems (ROOT-A and ROOT-B), and one writable stateful partition (STATE). User data lives exclusively on the STATE partition, which is formatted as ext4. The dual-kernel and dual-root design allows ChromeOS to apply updates to the inactive set and swap on reboot; this is irrelevant to data recovery because user files are never stored on kernel or root partitions.
Encryption: dm-crypt, fscrypt, and Hardware Key Binding
ChromeOS protects user data through the cryptohome system. Older Chromebooks (pre-2018) used ecryptfs to encrypt individual files. Modern Chromebooks use ext4-native encryption (fscrypt) combined with dm-crypt for full-partition encryption of the stateful partition.
The encryption key is derived from two inputs: the user's Google account password and a high-entropy hardware secret stored in the TPM (Trusted Platform Module) or Google's custom Titan C / Cr50 security chip. The hardware secret cannot be extracted from the TPM; it can only be used by the TPM on the original board. This means a raw dump of the eMMC chip, taken via chip-off without the original board's TPM, produces encrypted data that cannot be decrypted without brute-forcing the hardware key component.
For data recovery, this means the most reliable path is repairing the original logic board so that the TPM can participate in key derivation. If the board is repairable, we boot ChromeOS far enough for cryptohome to mount the user's vault, then transfer files off the device. If board repair is not possible but ISP imaging succeeds, we can attempt offline decryption with the user's password, but this only works on older devices that usedecryptfs without hardware key binding.
ISP Recovery on Chromebook Boards
ISP (In-System Programming) connects directly to the eMMC chip's signal lines through test points on the Chromebook's PCB. We locate the CLK (clock), CMD (command), DAT0 through DAT7 (8-bit data bus), VCC (3.3V core power), VCCQ (1.8V or 3.3V I/O power), and GND pads using board schematics or by tracing signals from the eMMC BGA footprint.
An ISP adapter provides regulated power directly to the eMMC chip, bypassing the dead host board's power circuitry. The adapter sends standard MMC read commands to the eMMC controller. If the controller responds, we image the chip sector by sector using PC-3000 Flash. The resulting image contains the full GPT layout, including the encrypted stateful partition.
ISP is the preferred method because it avoids the thermal stress of desoldering and preserves the chip for reinstallation. On Chromebooks where the eMMC controller is healthy but the host SoC or PMIC is dead, ISP produces a complete image of a typical 64 GB eMMC. Transfer speed depends on the bus width available at the test points; 1-bit DAT0 reads are slower but reliable over flying wires, while chip-off with a shielded BGA socket enables full 8-bit bus speeds.
Chip-Off BGA Recovery
When ISP fails because the eMMC controller is locked or the test points are damaged, we desolder the BGA eMMC package. The board is preheated to 150°C to reduce thermal gradient stress, then a focused hot-air nozzle at 260-280°C melts the solder balls. The chip is lifted, cleaned, and placed in a BGA-to-socket adapter matched to the 153-ball or 169-ball pinout.
PC-3000 Flash communicates with the eMMC controller through the socket adapter. If the controller responds, imaging proceeds normally. If the controller is dead, raw NAND reading bypasses the controller entirely. Raw reading requires identifying the eMMC manufacturer (Samsung, Toshiba/Kioxia, SK Hynix, or Micron) and applying the correct ECC algorithm (BCH or LDPC) and XOR descrambling pattern to reconstruct the logical data from physical NAND pages.
eMMC vs. NVMe in Newer Chromebooks
Premium Chromebooks (Google Pixelbook Go, HP Elite Dragonfly Chromebook, Framework Chromebook) use NVMe SSDs instead of eMMC. NVMe Chromebooks follow the same ChromeOS encryption model (TPM + user password), but the storage interface and recovery tooling differ. NVMe drives use PCIe lanes and the NVMe command set rather than the MMC protocol. Recovery of NVMe Chromebooks uses our SSD recovery process with PC-3000 SSD or PC-3000 Portable III. If the NVMe drive is removable (M.2 2242 or 2280), it can be read in another machine; however, the encrypted data still requires the original board's TPM for decryption.
One additional consideration for NVMe Chromebooks: if files were deleted (emptied from Trash) before the device failed, the NVMe controller executes TRIM commands that zero out the underlying flash blocks. Deleted files on an NVMe Chromebook are not recoverable through any method.
Common eMMC Chips in Chromebooks
Chromebook OEMs source eMMC from four primary manufacturers. PC-3000 Flash includes recovery profiles for each controller family:
- Samsung (KLMAG, KLMBG series): Found in Samsung Chromebooks and many HP models. Samsung eMMC controllers use LDPC ECC and respond reliably to MMC commands via ISP.
- Toshiba/Kioxia (THGBMHG, THGBMDG series): Common in Acer Chromebooks and budget HP models. Firmware lockouts on Toshiba eMMC can sometimes be resolved through vendor-specific MMC commands during ISP sessions.
- SK Hynix (H26M, H26T series): Used in Lenovo Chromebooks and Dell education models. Known for FTL inconsistency after power loss during garbage collection, causing boot loops. ISP with vendor commands can force the controller to rebuild its tables.
- Micron (MTFC series): Found in ASUS Chromebooks and some Dell models. Micron eMMC uses a controller with similarities to their SSD line. PC-3000 Flash handles chip-off recovery with Micron-specific ECC profiles.
Chromebook Data Recovery: Common Questions
Can you recover data from a completely dead Chromebook?
Is data on a Chromebook encrypted?
What data is actually stored locally on a Chromebook?
Will enabling Developer Mode erase my data?
Can you recover data from school-issued or enterprise Chromebooks?
How much does Chromebook data recovery cost?
Should I use the Chromebook Recovery Utility?
How long does Chromebook data recovery take?
Need Recovery for Other eMMC or Flash Devices?
Chromebooks use eMMC, but the same storage technology appears in tablets, budget laptops, smart TVs, and IoT devices. For non-Chromebook eMMC recovery, see our dedicated eMMC data recovery page. For removable SSDs, see SSD recovery.
Need Recovery for Other Devices?
ISP and chip-off recovery for all eMMC devices
NVMe, SATA, and M.2 solid state drive recovery
Soldered SSD recovery for T2 and Apple Silicon Macs
2.5-inch HDD recovery for older laptops
Board-level NAND recovery for iPads
BitLocker, FileVault, LUKS, and hardware encryption recovery
Complete service catalog
Chromebook not turning on?
Free evaluation. No data, no charge. Ship the complete Chromebook; we handle the rest.