Restore Your LUKS-Encrypted LMDE 6 or Debian-based system with Timeshift
If you're using LMDE, Linux Mint, or Ubuntu with full-disk LUKS encryption and backing up with Timeshift, this guide is for that day your system breaks, your drive dies, or your laptop disappears. Here's how to bring everything back—with encryption, system settings, and sanity intact.
Before You Begin: Back Up Personal Files!
If you have important personal data not included in your Timeshift snapshots (like documents, photos, or anything in /home), salvage and back it up now before continuing.
If you’ve already done that—or can’t—read on.
Step-by-Step Restore Process
1. Fresh Install on Target Drive
- Boot from your Live LMDE USB.
- Install LMDE 6, selecting LVM with full-disk encryption (LUKS) mimicking your old setup.
- After installation, boot into the new system once to verify it works, then shut it down.
2. Boot Back Into Live USB
- Plug in your backup drive and unlock it if it’s encrypted.
3. Launch Timeshift & Start Restore
- Open Timeshift from the menu (LMDE includes it).
- Select your snapshot → click Restore.
Target Device Selection
/→ Select the encrypted root partition from your fresh install. Timeshift will ask for your encryption passphrase. Click the refresh button to display the LVM volume (e.g.,vg-rootordm-2 ext4). This is typically slightly smaller than the full size of your drive./boot→ Set to “Keep on root device”/home→ Set to “Keep on root device” (unless restoring separately)
4. Configure Bootloader (Advanced)
Click Advanced, then:
Reinstall GRUB2 → Select the small, unencrypted boot partition Update initramfs → Leave unchecked Update GRUB menu → Make sure this is checked
Let Timeshift restore your system.
If You Restored to the Same Drive
Great! Just reboot — you’re done.
Restoring to a Different Drive?
Your new disk will have a different LUKS UUID than your old one. The restored system still points to the old UUID in /etc/crypttab, which means it won’t boot unless you update it.
Step 1: Find the Correct Partition
lsblk
Look for your new encrypted LUKS partition, like /dev/sda5 or /dev/nvme0n1p3.
Step 2: Get the New UUID
Replace sdX with the correct device name:
sudo cryptsetup luksUUID /dev/sdX
Step 3: Update crypttab
Mount your restored system:
sudo cryptsetup luksOpen /dev/sdX mycrypt
sudo vgchange -ay
sudo mount /dev/mapper/<your-root-volume> /mnt
Edit the crypttab file:
sudo nano /mnt/etc/crypttab
Replace the old UUID with the new one from step 2.
Step 4: Update GRUB
sudo mount --bind /dev /mnt/dev
sudo mount --bind /proc /mnt/proc
sudo mount --bind /sys /mnt/sys
sudo chroot /mnt
update-grub
exit