you could in theory grab the EPT's with SBFS.exe, and that will give you within 90 sectors the current crypt point of the drive? Of course, SafeTech using VFD will know where things left off, and will continue from that point.
V5 of course it's much easier - the exact regions which are encrypted are displayed in the disk information. 4.x unfortunately is thebest part of 10 years old now and does not have such sophistication.
This sounds interesting. I am thinking that by repeating a decrypt using VFD, it may continue from where it left off (assuming that it was cancelled cleanly and there isn't a second problem here which was causing the exceptionally long estimated decrypt progress time on the first attempt).
I'm interested in the effect a few encrypted sectors has on a disk. Is it sometimes possible that, even with a few hundred encrypted sectors, it may be possible to slave a drive and read and move files from the file system, or does every sector has to have it's integrity before you stand any chance of viewing the Windows File system?
it's certainly possible - if you have bad sectors on a disk, the disk just stalls for a bit while it tries to read them - the OS etc does not know (or care) about such things, it's entirely up to the disk itself.
Depending on what's good and bad, you may loose a file, or the whole file system might be corrupt - there are plenty of tools though to help rescue files from a failing drive.
In an earlier thread I just read, where a SafeTech decryption was interrupted by a power fail but the user repeated the decryption process (thus double decrypting some sectors) you recommended re-encrypting the drive using the SDB file and to work out how far the first decryption got to by a "binary-chop inspection". What is this?