- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
As you're referring to two links in which I participate as help (I wrote the article at the vimalin site and I am /u/dfguidance at reddit), a few notes.
The data on the disk isn't encrypted so -at least in theory- you should be to get the VM(s?) back to work. The descriptor files describing those virtual disks however are.
How did you configure the virtual disk on the VM you need back?
Note that my article points to a few threads that describe how users recovered their VM. Not destructive, unless you mean it will drop the vTPM itself (yes it will, no way around that AFAIK).
PS: I don't know where the password was saved in the experimental vTPM feature. But even if it was in the keychain then I think it would still be inaccessible and you are still at the same stage unless you saved the keychain in iCloud.
--
Wil
| More info at vimalin.com | Twitter @wilva