Restore Your LUKS-Encrypted LMDE 6 or Debian-based system with Timeshift

If you're using LMDE, Linux Mint, or Ubuntu with full-disk LUKS encryption and backing up with Timeshift, this guide is for that day your system breaks, your drive dies, or your laptop disappears. Here's how to bring everything back—with encryption, system settings, and sanity intact.


Before You Begin: Back Up Personal Files!

If you have important personal data not included in your Timeshift snapshots (like documents, photos, or anything in /home), salvage and back it up now before continuing.

If you’ve already done that—or can’t—read on.


Step-by-Step Restore Process

1. Fresh Install on Target Drive

2. Boot Back Into Live USB

3. Launch Timeshift & Start Restore

Target Device Selection

4. Configure Bootloader (Advanced)

Click Advanced, then:

Reinstall GRUB2 → Select the small, unencrypted boot partition Update initramfs → Leave unchecked Update GRUB menu → Make sure this is checked

Let Timeshift restore your system.


If You Restored to the Same Drive

Great! Just reboot — you’re done.


Restoring to a Different Drive?

Your new disk will have a different LUKS UUID than your old one. The restored system still points to the old UUID in /etc/crypttab, which means it won’t boot unless you update it.

Step 1: Find the Correct Partition

lsblk

Look for your new encrypted LUKS partition, like /dev/sda5 or /dev/nvme0n1p3.

Step 2: Get the New UUID

Replace sdX with the correct device name:

sudo cryptsetup luksUUID /dev/sdX

Step 3: Update crypttab

Mount your restored system:

sudo cryptsetup luksOpen /dev/sdX mycrypt
sudo vgchange -ay
sudo mount /dev/mapper/<your-root-volume> /mnt

Edit the crypttab file:

sudo nano /mnt/etc/crypttab

Replace the old UUID with the new one from step 2.

Step 4: Update GRUB

sudo mount --bind /dev /mnt/dev
sudo mount --bind /proc /mnt/proc
sudo mount --bind /sys /mnt/sys
sudo chroot /mnt
update-grub
exit

All Done — Reboot!