Hard Drive Recovery - Slug

User uses his/her private key to decrypt the FEK that is stored in the DDF. The FEK then decrypts the file and is available for use by the user. File Recovery. The following figure illustrates how an encrypted file is recovered in EFS [7]. The recovery agent uses his/her private key to … ................
................