Skip to main contentSkip to navigation
Rossmann Repair Group logo - data recovery and MacBook repair

Chip-Off NAND Data Recovery

Chip-off recovery physically desolders the NAND flash memory chips from an SSD's circuit board using BGA rework equipment, then reads raw hex data directly from each chip. This bypasses the failed controller entirely. It is the last-resort method used when the controller is physically destroyed and firmware tools like the PC-3000 cannot establish communication. For non-encrypted drives, the raw NAND data must then be reconstructed by reverse-engineering the controller's data interleaving pattern, ECC algorithms, and block mapping. There is a critical limitation: modern drives with hardware encryption store the encryption key in the controller's secure enclave. Apple T2/M-series, Samsung 980/990 Pro (Elpis/Pascal controllers), and most modern NVMe drives implement AES-256 encryption with keys bound to the specific controller silicon. If the controller is destroyed, the keys are gone and chip-off returns only encrypted ciphertext. For these drives, recovery requires restoring the original controller's functionality through board-level repair or firmware intervention, not transplanting NAND to a different controller. We use Hakko microsoldering stations and BGA rework for the physical extraction process.

Louis Rossmann
Written by
Louis Rossmann
Founder & Chief Technician
Updated April 2026
18 min read

What Is Chip-Off Data Recovery and When Is It Necessary?

Chip-off data recovery physically removes NAND flash memory chips from the SSD circuit board and reads them on a dedicated chip reader, bypassing the controller. It is the last resort when the controller is destroyed beyond repair and cannot respond to any diagnostic commands.

This is not the first option. Firmware corruption recovery using the PC-3000 and board-level controller repair via Hakko microsoldering are always attempted before chip-off. These methods preserve the original controller and, critically, any encryption keys stored inside it. Chip-off is only used when the controller silicon is cracked, burned, or otherwise unable to power on.

Chip-off is destructive. The NAND chips are permanently removed from the board. The drive cannot be reassembled or returned to service afterward. Once the chips are desoldered, there is no going back to controller-based recovery. This is why we exhaust all other options first.

How Does the BGA Rework Process Work?

BGA rework uses controlled heat profiles to desolder NAND packages from the PCB without thermal damage to the silicon die. Each chip is then read individually, and the raw data is reconstructed by decoding the controller's interleaving and error correction algorithms.

  1. 01

    NAND Identification

    NAND flash chips are identified and cataloged on the PCB. Manufacturer, part number, die configuration, and number of chips are recorded. This determines the correct reader adapter and decoding parameters.

  2. 02

    Underfill Removal & Controlled Desoldering

    Some SSD manufacturers apply epoxy underfill adhesive beneath NAND BGA packages to improve shock resistance. This adhesive bonds the chip to the PCB & must be softened or chemically dissolved before desoldering can begin. Attempting to desolder a chip through cured underfill rips the copper pads off the PCB & fractures the silicon die.

    After underfill is cleared, the Zhuo Mao BGA rework station heats each NAND package at precise temperature profiles to melt the solder balls without exceeding the thermal limits of the silicon die. Overheating destroys the NAND. Underheating tears pads from the PCB. Both are irreversible.

  3. 03

    Raw NAND Reading

    Cleaned chips are placed in a chip reader (PC-3000 Flash reader or equivalent). Raw hex data is dumped from each chip. This data is scrambled; it is not a readable file system.

  4. 04

    Interleaving and ECC Reconstruction

    The controller's specific data interleaving pattern (how it striped data across multiple chips) must be reverse-engineered. ECC (Error Correction Code) algorithms are applied to correct corrupted pages. The Flash Translation Layer and block mapping are reconstructed manually.

  5. 05

    File System Extraction

    Once the logical data layout is rebuilt, the file system is extracted and verified against expected directory structures. Files are delivered on your choice of return media.

Why Chip-Off Fails on Modern Encrypted Drives?

Hardware encryption renders chip-off useless when the controller holding the decryption key is destroyed. The NAND contents are AES-256 ciphertext. Without the key from the controller's secure enclave, brute-forcing the encryption is computationally infeasible with any current or foreseeable technology.

Apple T2 and M-Series Macs
All NAND data is hardware-encrypted with a key stored in the Secure Enclave on the T2 chip or M-series SoC. The SSD storage is soldered to the logic board. If the controller (or the entire SoC) is destroyed, the encryption key is gone. Chip-off returns only encrypted garbage. For details on recovery options that preserve the controller, see our Apple T2 chip data recovery and M-series soldered NAND recovery pages.
Samsung NVMe (980 Pro, 990 Pro)
Samsung's Elpis (980 Pro) and Pascal (990 Pro) controllers implement AES-256 hardware encryption by default, even without a user-set password. The Media Encryption Key lives in the controller's secure enclave. If the controller is destroyed, the key is gone and the NAND contents are unreadable ciphertext.
Where Chip-Off Works
Older SATA SSDs without hardware encryption, USB flash drives, SD cards, microSD cards, and some budget NVMe drives that do not implement hardware encryption. On these devices, chip-off produces unencrypted raw data that can be reconstructed into a usable file system.

If your drive uses controller-bound encryption (Apple T2/M-Series, Samsung Elpis/Pascal, most modern NVMe) and the controller is destroyed, the data is unrecoverable. The encryption key dies with the controller. The only path is restoring the original controller through board-level electrical repair or firmware intervention.

Chip-Off vs. Controller Repair: Which Do We Try First?

Controller repair is always attempted first. PC-3000 firmware recovery and board-level microsoldering preserve the original controller and its encryption keys. Chip-off is destructive, requires more labor, and cannot recover data from encrypted drives at all. We escalate to chip-off only after confirming the controller cannot be revived.

The escalation path for every SSD that arrives at our lab follows a strict order. First, we attempt firmware corruption recovery using the PC-3000 to communicate with the controller in technological mode. If the controller responds, we recover data without touching the hardware.

If the controller does not respond, we move to board-level repair: Hakko microsoldering to replace burned voltage regulators, rework cold solder joints on the controller BGA, or replace passive components. The goal is to restore enough controller functionality for PC-3000 access. If the controller silicon itself is cracked or burned through, and the drive does not use hardware encryption, chip-off is the final option.

We will tell you before starting chip-off if the drive uses hardware encryption. If it does, and the controller is beyond repair, we will tell you the data is unrecoverable rather than charge you for work that cannot succeed.

When Is Chip-Off the Only Recovery Option?

Chip-off becomes the only recovery option when an unencrypted SSD's controller is physically destroyed beyond any firmware or board-level repair. Four specific failure modes push a case past PC-3000 Technological Mode & Hakko microsoldering into chip-off territory: dead controller silicon, catastrophic PCB fracture, advanced liquid corrosion, & fire damage.

On encrypted drives, none of these scenarios lead to chip-off. If the controller holding the AES-256 key is beyond repair, the data is unrecoverable by any method. Chip-off on an encrypted SSD produces ciphertext with no key to decrypt it.

Dead Controller Silicon (Cracked, Burned, or Electrically Destroyed)
The controller IC is physically destroyed. A cracked BGA die, a burned-through package from voltage surge, or an electrical overstress event that fused internal traces. No SRAM loader, no firmware tool, & no Hakko microsoldering fix can communicate with dead silicon. If the drive used an unencrypted controller (Phison PS3111, SM2246EN, JMF670H), chip-off extracts raw NAND data directly.
Catastrophic PCB Fracture from Impact
Drop damage, crush force, or vehicular impact that severed copper traces between the controller & NAND across the multi-layer PCB. If the NAND BGA packages aren't physically cracked (NAND silicon is more resilient to blunt impact than the thin FR-4 substrate), they can be desoldered & read. PCB trace repair isn't feasible when fractures span multiple internal copper layers. See our physical damage recovery page for the full triage process.
Advanced Galvanic Corrosion from Liquid Exposure
Prolonged liquid contact (saltwater is the worst case) corrodes BGA solder joints under the controller. Ultrasonic cleaning can restore mild corrosion, but advanced galvanic damage eats through the copper pad stack beneath the controller BGA. When cleaning & board repair fail to restore continuity between the controller & its NAND bus, chip-off extracts the memory packages before corrosion reaches them. Time matters: corrosion migrates from the controller toward the NAND over days to weeks.
Fire Damage to Controller & Passive Components
Fire destroys the controller IC & passive components (capacitors, resistors, voltage regulators) at temperatures above 300°C. NAND packages, rated for reflow at 245°C peak, can survive brief fire exposure if the heat didn't reach the reflow threshold for the BGA solder. A charred PCB with intact NAND packages is a candidate for chip-off extraction, provided the drive used an unencrypted controller.

In every scenario above, chip-off is ONLY viable on unencrypted drives. If the destroyed controller held an AES-256 key fused to its silicon (Samsung Elpis/Pascal, Phison E12+, SM2259+, any modern NVMe), the data dies with the controller. No lab can change that.

Why Does DIY Chip-Off Fail?

Home chip-off attempts destroy the NAND silicon before any data can be read. The procedure requires a PC-3000 Flash reader, a Zhuo Mao BGA rework station with thermocouple-controlled profiles, BGA stencils matched to the chip's ball pitch, & controller-specific reconstruction software. The equipment alone costs over $10,000.

A consumer heat gun can't hold the 1.5 to 2.0°C/s ramp rate that SAC305 solder requires. It overshoots the 245°C peak within seconds, cracking the NAND die through thermal shock. One wrong temperature profile, & the only copy of your data is gone permanently.

Even if the chip survives extraction, the raw hex dump isn't readable. The controller's XOR scrambling keys, interleaving pattern, & FTL mapping must be reverse-engineered before a single file appears. PC-3000 Flash includes controller-specific modules for Phison and Silicon Motion reconstruction. Without that software, a raw NAND dump is noise.

Budget NAND Programmers Can't Reconstruct SSD Data

Forum posts recommend budget IC programmers (XGecu T48, TL866II+) for chip-off attempts. These devices cost under $200 & can read raw binary data from an unencrypted NAND or eMMC chip. The read step works. The reconstruction step doesn't.

A budget programmer dumps a binary blob with no understanding of the controller's XOR scrambling, interleaving order, or ECC algorithm. PC-3000 Flash includes controller-family-specific reconstruction modules that decode these parameters automatically for supported legacy flash families (older Phison and Silicon Motion controllers). A generic programmer produces a raw hex file that looks like random noise. The read hardware isn't the bottleneck; the reconstruction software is.

How Much Does Chip-Off Recovery Cost?

Chip-off is the most expensive recovery tier. The range is $1,200–$1,500, depending on the number of NAND chips, the controller's interleaving complexity, and the time required for data reconstruction. 50% deposit required. No data, no charge still applies. You receive a firm quote after a free evaluation.

Chip-off recovery: $1,200–$1,500. 50% deposit required. Free evaluation, firm quote, no data = no charge.

The cost is higher than firmware-level or controller repair recovery because chip-off requires physical desoldering, individual chip reading, interleaving reconstruction, and manual FTL rebuilding. A 4-chip SSD takes less time than a 16-chip enterprise drive with a complex striping pattern.

Chip-Off Pricing in Context

Recovery MethodWhen UsedSATA SSD PriceNVMe Price
Firmware RecoveryController alive but firmware corrupted; PC-3000 Technological Mode$600–$900$900–$1,200
Board RepairDead PMIC, shorted capacitor, or failed voltage regulator; Hakko microsoldering$450–$600$600–$900
Chip-Off / NAND SwapController destroyed on unencrypted drive; BGA rework & raw NAND reading$1,200–$1,500$1,200–$2,500

A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers. +$100 rush fee to move to the front of the queue.

See our full SSD data recovery page for all pricing tiers & process details. Call (512) 212-9111 for a free evaluation.

BGA Thermal Profile for NAND Package Extraction

Lead-free BGA NAND packages use SAC305 solder (96.5% tin, 3% silver, 0.5% copper) with a solidus temperature of 217°C and a liquidus of 220°C. Extracting the chip requires a multi-stage thermal profile that raises the PCB temperature gradually to prevent thermal shock, die delamination, and the “popcorn effect” where trapped moisture causes catastrophic package cracking.

Heating a NAND package directly with a hot air gun without preheating the substrate creates a steep thermal gradient between the chip and the surrounding PCB. This differential warps the board, tears solder pads, and can fracture the silicon die internally. The Zhuo Mao BGA rework station used in our lab applies controlled bottom-side IR preheat to the entire PCB while the top-side nozzle targets only the NAND package. The Atten 862 hot air station handles smaller packages and precision touchup work.

Lead-Free NAND Extraction Thermal Profile

StageTarget TemperatureRamp RateDwell TimePurpose
Preheat60°C to 120°C1.0 to 1.5°C/s45 to 60 secondsRemoves moisture from PCB substrate. Prevents thermal shock and board warpage.
Soak150°C to 190°C1.5 to 2.0°C/s60 to 90 secondsActivates flux. Removes oxides from BGA solder ball surfaces. Equalizes temperature across the package.
Reflow235°C to 245°C~2.0°C/s12 to 18 secondsExceeds SAC305 liquidus (220°C). Time Above Liquidus must be minimized to prevent NAND die heat damage.
CoolingBelow 180°C-2.0 to -3.0°C/sControlled descentPrevents rapid contraction that causes internal package stress fractures.

Temperature is measured via thermocouple at the solder joint under the BGA package, not at the nozzle exhaust. Nozzle readings do not reflect actual joint temperature and are unreliable for process control.

Atten 862 for Smaller Packages & Precision Touchup

The Zhuo Mao handles full-size BGA-152 & BGA-132 NAND packages on standard 2.5" SATA SSD boards. Smaller packages need different tooling. TSOP-48 chips on older USB flash drives, single-chip NAND packages on compact M.2 drives, & monolithic devices with exposed test pads all sit close to neighboring components that can't tolerate the Zhuo Mao's broader heat zone.

The Atten 862 hot air station addresses this gap. Its smaller nozzle diameter concentrates airflow on the target package without heating adjacent ICs or capacitors. Adjustable airflow rate (measured in liters per minute) prevents the thin M.2 PCB substrate from flexing during localized heating. After initial extraction on the Zhuo Mao, the Atten 862 handles precision touchup: cleaning residual solder from exposed PCB pads, reflowing stray solder bridges, & prepping the pad field for inspection under the stereomicroscope before the chip moves to the reader.

NAND Chip Reballing After Extraction

Extracted BGA NAND chips can't go straight into a reader socket. The desoldering process leaves irregular solder residue on the chip's ball pads: flattened remnants, bridged contacts, & oxidized surfaces that prevent reliable electrical connection with the PC-3000 Flash reader's ZIF socket pins.

Pad cleaning comes first. A Hakko FM-2032 iron with a fine chisel tip & copper solder wick removes residual solder from each pad. Chemical flux residue is washed off with isopropyl alcohol under the stereomicroscope. Clean, flat copper pads are the starting point for fresh solder ball placement.

Reballing uses a laser-cut stainless steel BGA stencil matched to the chip's ball pitch (typically 1.0mm for BGA-152 and BGA-132 NAND packages). The stencil aligns over the cleaned pads, solder paste is applied through the apertures, & a controlled reflow at 235 to 245°C forms uniform spherical contacts. The result: a chip with consistent solder ball geometry that seats cleanly in the reader's ZIF adapter.

The Multiboard carrier approach skips reballing entirely. Instead of restoring the BGA ball grid, the chip is soldered directly to a disposable carrier board that plugs into the PC-3000 Flash reader. Soldered connections provide higher signal integrity than ZIF socket contact, which matters on TLC & QLC NAND with tight read voltage margins. The tradeoff: each carrier is single-use.

NAND Reader Hardware and Chip Package Adapters

After extraction, each NAND chip connects to a PC-3000 Flash reader through package-specific adapters. The chip package determines which adapter is required: TSOP-48 uses a ZIF socket, LGA-52 uses dedicated land grid adapter plates, and BGA-152/132 chips can use either specialized ZIF socket adapters or be soldered to disposable Multiboard carrier modules for maximum signal integrity.

The PC-3000 Flash reader is purpose-built for raw NAND access. Unlike the PC-3000 SSD module (which communicates with controllers via SATA or NVMe protocol), the Flash reader bypasses the controller entirely and communicates directly with the NAND silicon through the chip's native ONFI or Toggle interface.

TSOP-48 (Thin Small Outline Package, 48 pins)
Found in older USB flash drives, SD cards, and lower-capacity SATA SSDs. The rectangular package has pins exposed along two edges. Adapters use a ZIF (Zero Insertion Force) socket: the chip slides in without soldering. This is the simplest package to interface with the reader.
BGA-152 and BGA-132 (Ball Grid Array)
The standard package on modern SATA and NVMe SSDs. Solder balls are arranged in a grid under the chip with no externally accessible pins. The PC-3000 Flash supports these chips via a specialized BGA-152/132 ZIF socket adapter (non-destructive) or via Multiboard Adapter modules where the chip is soldered to a disposable carrier board. Soldered Multiboard connections provide higher signal integrity than ZIF sockets, which matters for reading TLC and QLC NAND with tight voltage margins.
LGA-52 (Land Grid Array, 52 pads)
A flat-pad package (typically 14x18mm or 12x17mm) found in some compact flash storage devices. Requires a dedicated adapter plate with spring-loaded contact pins that press against the flat copper lands on the chip underside.

The Multiboard approach protects the primary PC-3000 Flash reader from repeated heat exposure. Each carrier board is inexpensive and disposable: the chip is soldered to the carrier, read, and the carrier is discarded. This prevents thermal fatigue damage to the reader's main board.

ONFI and Toggle DDR Interface Configuration

NAND chips communicate through one of two competing interface protocols, and the PC-3000 Flash reader must be configured for the correct one before reading begins. Wrong protocol selection produces garbage data or no response at all.

ONFI (Open NAND Flash Interface) is used by Micron, Intel, & SK Hynix. It runs in synchronous mode with a free-running clock signal that coordinates data transfers between the reader & the chip. Toggle DDR, developed by Samsung & Kioxia (formerly Toshiba), takes an asynchronous approach: a data strobe signal triggers reads on both rising & falling edges, doubling throughput without a dedicated clock line.

PC-3000 Flash identifies the protocol from the NAND chip's ID bytes during the READ ID command (0x90). The engineer confirms the setting against the chip's part number markings before starting a full dump. On a 16-chip SSD with 512GB of raw capacity, an incorrect protocol setting wastes hours of read time producing unusable output. Getting it right the first time is a basic competency check for any chip-off lab.

Multi-Die NAND Packages: Stacked Dies Inside a Single BGA Chip

A single BGA-152 NAND package can contain 4, 8, or 16 individual silicon dies stacked & wire-bonded inside one physical component. Reading the package as a single entity yields only a fraction of the data. The PC-3000 Flash reader must address each internal die separately through Chip Enable (CE) signal multiplexing.

SSD manufacturers stack dies to increase capacity without enlarging the package footprint. A 1TB SSD with four BGA-152 packages may contain 16 dies total (four per package). From the outside, each package looks identical. The die count is encoded in the chip's ID bytes, which the PC-3000 Flash reads during the initial READ ID command (0x90). The engineer cross-references the part number markings against the manufacturer's datasheet to confirm the target count before starting extraction.

Per the ONFI specification, each die inside a multi-die package is assigned to a Chip Enable (CE_n) signal or a Logical Unit Number (LUN). CE_n signals act as hardware select lines: asserting CE0_n activates the first die, CE1_n the second, & so on. When multiple dies share a single CE line, they're addressed by LUN identifiers through the ONFI command set. The PC-3000 Flash software must be configured with the correct number of CE targets & LUN topology. Misconfiguring this produces a partial dump that covers some dies but misses others entirely.

Multi-die packages also complicate reconstruction. SSD controllers interleave data across dies within the same package (die interleaving) to boost write throughput. The raw dump from each die contains fragments of the same logical file striped across multiple targets. The reconstruction software must de-interleave these fragments in the correct die order to produce a coherent disk image. Getting the die sequence wrong produces a file system where directory structures appear intact but file contents are scrambled.

How Is Raw NAND Data Reconstructed After Chip-Off?

Raw NAND data is not a readable file system. The controller applied error correction codes (ECC), data scrambling via XOR transforms, and proprietary interleaving before writing to the NAND. Chip-off recovery must reverse all three transformations to reconstruct usable data from the raw hex dump.

BCH vs. LDPC Error Correction

NAND flash cells degrade with each program/erase cycle. Electrons leak from floating gates, and read operations disturb adjacent cells. Controllers append ECC data to the spare area (Out-Of-Band region) of every NAND page to detect and correct bit errors before the host sees the data.

BCH (Bose-Chaudhuri-Hocquenghem)
The standard ECC algorithm for SLC and MLC NAND. BCH uses algebraic hard-decision decoding: each cell is read as binary 1 or 0. During chip-off recovery, the BCH polynomial can be detected from the raw dump and applied to correct bit errors. PC-3000 Flash supports automated BCH correction.
LDPC (Low-Density Parity-Check)
Required for TLC and QLC NAND where the raw bit error rate exceeds BCH's correction capacity. LDPC uses soft-decision decoding: instead of reading a simple 1 or 0, the controller takes multiple voltage measurements per cell to estimate the probability of the bit state. Chip-off recovery loses the controller's hardware LDPC engine. Reconstructing LDPC corrections from a raw hard-decision dump is computationally intensive and may require the original controller's read-retry voltage offset tables to decode heavily degraded pages.

Page Scrambling and XOR Key Extraction

Flash controllers scramble all data before writing it to NAND. This is not encryption; it is a data-integrity measure that prevents adjacent cells from holding identical charge states (which accelerates charge leakage). The controller generates a pseudo-random key and XORs it with the user data. Recovery requires XORing the raw dump with the same key to reverse the transformation.

XOR keys can be extracted by finding NAND regions the operating system filled with logical zeros (0x00). Since 0x00 XOR Key = Key, zero-filled regions store the pure scrambling key. NAND reconstruction tools scan physical dumps for repeating vertical bit patterns with distinctive geometric shapes (triangles, diagonals), which indicate an extractable XOR key.

Recovering Corrupted XOR Keys from Degraded NAND

On degraded NAND, the zero-filled regions used for XOR key extraction contain bit errors. A corrupted XOR key applied to the raw dump produces partially descrambled data: some pages decode cleanly while others remain noise. The fix is a bitwise majority vote across multiple key samples.

The engineer locates three or more separate NAND blocks known to contain zero-fill patterns (typically found at the end of the user partition or in unwritten spare capacity). Each block stores its own copy of the XOR key, but each copy has different random bit flips from NAND cell degradation. PC-3000 Flash compares these samples bit by bit. For each bit position, the tool takes the majority value across all samples: if two out of three copies read “1” at position N, the correct key bit is “1.” Random bit errors don't cluster at the same positions across physically separate blocks, so the majority vote cancels them out & produces a clean key.

Dynamic XOR keys (used by Phison & newer Silicon Motion controllers) add a complication: the key changes per virtual block based on a static base key combined with a page-address-dependent seed. The majority-vote process must first isolate the static base component, then identify the dynamic seed generation algorithm. On controllers where the seed is derived from the block address, the engineer can predict the per-block key once the base key is clean. On controllers with cryptographically derived seeds, the base key alone isn't enough; the seed algorithm must be reverse-engineered from known plaintext patterns in the NAND service area.

Read Retry and Voltage Calibration on Degraded NAND

When NAND cells wear out, default read voltages produce uncorrectable bit errors. The chip reader must iterate through voltage offset tables to find threshold boundaries that separate valid cell states from noise. During chip-off, this calibration happens manually because the original controller's tuning data is gone.

A healthy TLC cell stores 3 bits across 8 voltage levels separated by defined margins. After thousands of program/erase cycles, electrons leak from charge storage layers & those margins shrink. The default reference voltages that cleanly distinguished L0 from L1 now sit in the overlap zone between adjacent states. QLC is worse: 16 voltage levels per cell with tighter margins from day one.

PC-3000 Flash addresses this with configurable read-retry offset tables. The engineer shifts reference voltages in small increments (typically 50mV to 100mV steps), re-reads the page at each offset, & evaluates the ECC correction result. A working controller does this automatically using calibration data stored in its SRAM. During chip-off, that calibration data doesn't exist. The engineer tests voltage offsets empirically, page by page, until the error rate drops below the LDPC correction threshold. On a 1TB TLC drive with degraded NAND, this process can add days to the reconstruction timeline.

Controller-Specific Scrambling Patterns

Silicon Motion controllers typically use a static XOR key applied cyclically across blocks. The key length often corresponds to the block size (e.g., 128 pages), and the same key repeats for every block on the chip. Phison controllers use dynamic XOR: each virtual block gets a unique key generated from a static base key combined with a dynamic seed. The dynamic component must be identified and stripped before the static key can be applied. SandForce controllers (SF-2281) combine real-time DuraWrite data compression with hardware encryption bound to the controller silicon (marketed as AES-256, though Intel discovered a silicon-level bug in 2012 that reduced effective strength to AES-128). Regardless of key length, the encryption key is fused to the controller die, making chip-off recovery infeasible when the controller is dead.

3D NAND Extraction: Layer Variation and Vertical Crosstalk

Modern SSDs use 3D NAND that stacks memory cells vertically in 128 to 232+ layers. Chip-off on 3D NAND is harder than on older planar (2D) NAND because error rates aren't uniform across the vertical stack. Each layer can need different read-retry voltage offsets.

Planar NAND spreads cells across a flat silicon surface. Every cell sits at the same distance from the substrate, experiences the same manufacturing conditions, & degrades at roughly the same rate. 3D NAND changes that. Cells at the bottom of a 176-layer stack are formed earlier in the deposition process than cells at the top. Process variation between layers creates non-uniform threshold voltage distributions: bottom-layer cells may read cleanly at the default reference voltage while top-layer cells in the same block produce uncorrectable errors.

Vertical crosstalk compounds the problem. Adjacent cells stacked along the Z-axis interfere with each other's stored charge. Programming a cell on layer 140 shifts the threshold voltage of the cell on layer 141 through capacitive coupling. Most 3D NAND architectures use Charge Trap Flash (CTF), which stores electrons in a silicon nitride insulator layer rather than the conductive polysilicon floating gate used in planar NAND. Some manufacturers (Intel, Micron) retained floating gate designs for multiple 3D NAND generations. CTF traps charge locally, which reduces lateral cell-to-cell interference but doesn't eliminate vertical coupling between stacked layers.

During chip-off, this means the PC-3000 Flash reader can't apply a single voltage offset table across the entire chip. The engineer tests read-retry parameters per block region, adjusting for layer-dependent variation. A 1TB 3D TLC chip with 176 layers takes measurably longer to dump cleanly than a 256GB planar MLC chip of the same physical package size.

How Is the Flash Translation Layer Rebuilt from Raw NAND?

After correcting bit errors and reversing scrambling, the raw data is readable but fragmented across thousands of physical blocks in non-sequential order. The Flash Translation Layer (FTL) maps logical addresses to physical NAND locations. When the controller dies, its FTL mapping tables (stored in volatile RAM) are lost. Recovery rebuilds this mapping from metadata embedded in each NAND page's spare area.

NAND flash cannot overwrite data in place. Every update writes to a new empty block and marks the old block obsolete. Over the lifetime of an SSD, a single logical sector may exist in dozens of physical locations. The controller's FTL maintained a real-time index of which physical copy was current. Without the controller, that index is gone.

When the controller is alive but its firmware is corrupted, PC-3000 can reconstruct the FTL through firmware-level recovery without ever desoldering a chip. Chip-off FTL reconstruction is the manual, from-scratch version of the same process. For a full overview of all SSD data recovery methods & pricing tiers, see the flagship service page.

Spare Area (OOB) Metadata and Sequence Numbers

Each NAND page contains a main data area (4KB, 8KB, or 16KB depending on the NAND generation) plus a smaller spare area, also called the Out-Of-Band (OOB) region. Controllers write metadata to this spare area on every page program operation: the Logical Page Number (the host address this physical page represents), block validity flags, and a sequence number that records the write order.

Sequence numbers are the key to reconstruction. When multiple physical pages claim the same logical address, the page with the highest sequence number is the most recent valid copy. Recovery tools parse the entire spare area dataset (which can span tens of gigabytes on large SSDs), extract the sequence numbers, and programmatically build a reverse mapping table that recreates the FTL. This table converts the fragmented physical dump into a linear disk image that a file system parser can mount.

Factory and Runtime Bad Block Handling

NAND flash chips ship from the factory with defective blocks. Per the ONFI specification, factory bad blocks are marked with a non-0xFF byte in the spare area of either the first or the last page of each bad block. The controller skips them during normal operation & maintains a factory defect map in its internal tables. During chip-off, those internal tables are gone.

PC-3000 Flash scans the spare area of every block in the raw dump to rebuild the bad block table from scratch. Factory markers (written by the NAND fabricator) must be distinguished from runtime bad blocks (blocks that failed during the drive's operational life & were remapped by the controller). Including a factory bad block in the reconstructed image corrupts the output. Excluding a runtime-remapped block that still holds valid data loses user files. The engineer cross-references block erase counts & ECC error rates per block to classify each marked block correctly.

Chip-Off Reconstruction Complexity by NAND Type

NAND TypeBits per CellECC RequiredReconstruction Difficulty
SLC1BCH (low redundancy)Low. Reliable page structures, minimal bit errors, straightforward FTL patterns.
MLC2BCH (moderate)Moderate. Shared-page programming and interleaving add complexity. Bit errors common but correctable.
TLC3LDPC (high redundancy)High. Requires LDPC soft-decision data that chip-off cannot capture. Severe read-disturb and complex wear-leveling fragmentation.
QLC4LDPC (maximum)Very high. 16 voltage levels per cell with tight margins. Pseudo-SLC cache areas require separate mapping and logical merging by FTL timestamps.

How Does Controller Architecture Affect Chip-Off Reconstruction?

Chip-off reconstruction difficulty varies by controller family because each manufacturer implements FTL structures, XOR scrambling, & page mapping differently. The same physical extraction process yields raw NAND data, but the reconstruction software & parameter sets needed to reassemble that data into a readable file system change depending on who made the controller.

PC-3000 Flash includes controller-specific reconstruction modules. The engineer selects the correct module, loads the chip dump, & configures the block size, page size, XOR key type, & spare area format for that controller family. Getting these parameters wrong produces garbage output even when the raw dump is clean.

Phison (PS3111)
Phison stores FTL journal logs in the NAND service area rather than in dedicated DRAM. If those journal blocks are corrupted or erased, the engineer must scan every die to extract page-level metadata (LBA tags & sequence numbers) from the OOB spare areas & reconstruct the translator from scratch. The PS3111 is DRAM-less; its entire FTL lives in TLC NAND, which makes it vulnerable to corruption from P/E cycle exhaustion. Dynamic XOR scrambling on Phison generates a unique key per virtual block from a static base key combined with a dynamic seed. Both components must be identified before the data unscrambles.
Silicon Motion (SM2246EN, SM2258)
SMI uses a page mapping mode FTL with a well-defined mapping table stored in designated service blocks. The logical page number translates to a physical page number through a relatively standardized index. Static XOR keys are indexed by block size & repeat cyclically across the NAND. This cyclical pattern makes SMI reconstruction more predictable than Phison. The SM2246EN silicon supports AES encryption, but many budget drives (early Crucial & ADATA models) shipped with this feature disabled by the vendor, making those specific drives viable for chip-off extraction.
Maxio (SATA Variants)
Maxio SATA controllers (MAS0902A, MAS1102) use dynamic XOR scrambling that changes the key per page based on block address & page offset. PC-3000 Flash does not have a dedicated Maxio reconstruction module for raw NAND chip-off. Recovery from Maxio-based drives requires the original controller to be alive; PC-3000 SSD connects via SATA and uses Technological Mode to force the controller to decrypt its own data. Modern NVMe variants (MAP1602A) fuse AES-256 keys to the controller silicon, blocking chip-off entirely. If the Maxio controller is dead and board repair cannot revive it, the data is unrecoverable.
Samsung (Proprietary Controllers)
Samsung designs its own controllers (Phoenix, Elpis, Pascal) with no published FTL documentation. The block management scheme & page mapping structure differ from every other controller family. Chip-off on older unencrypted Samsung SSDs (pre-850 EVO era, before always-on encryption became standard) requires reverse-engineering Samsung-specific page markers & spare area formats that aren't shared with any other manufacturer. All Samsung NVMe drives (980 Pro, 990 Pro, 990 EVO) implement always-on AES-256 encryption, blocking chip-off entirely.
Controller FamilyXOR TypeFTL StorageChip-Off Complexity
Phison (PS3111)Dynamic (base + seed)NAND service area (DRAM-less)High. Two-component key extraction required.
Silicon Motion (SM2246EN/SM2258)Static (block-indexed)Dedicated service blocksModerate. Predictable cyclical patterns.
Maxio (SATA variants)Dynamic (page-level)NAND with vendor-specific layoutNot viable. No PC-3000 Flash module exists. Requires live controller via PC-3000 SSD.
Samsung (proprietary)Proprietary (undocumented)Proprietary block managementVery high. No published documentation. Reverse-engineering required.

Controller identification happens during the initial evaluation. We check the markings on the controller IC, cross-reference the drive model number against our internal database, & confirm the encryption status before quoting a price. This step is free & takes minutes. It determines whether chip-off is even worth attempting on a given drive.

How Are Monolithic Flash Devices Recovered?

Monolithic flash devices fuse the controller, NAND memory, and passive components into a single silicon package encased in epoxy. Standard BGA desoldering is not possible because there are no separate chips to remove. Recovery requires physically exposing internal test pads and discovering the proprietary pinout using a logic analyzer.

MicroSD cards, many modern SD cards, and compact USB flash drives use monolithic construction. The entire device is a single piece of molded plastic with no visible components. Monolithic NAND recovery is the most labor-intensive form of chip-off because every step, from physical access to signal identification, requires manual reverse-engineering specific to that device.

Exposing Internal Test Pads

The outer epoxy layer must be carefully removed to expose microscopic copper test pads on the silicon die surface. Technicians use fine-grit abrasives or fiberglass pens under a stereomicroscope. The goal is to remove enough material to expose the pads without grinding through the copper traces or the silicon itself. Removing too much material destroys the pads permanently. Removing too little leaves an insulating layer that prevents electrical contact.

Pinout Discovery via Logic Analyzer

Manufacturers do not publish pinout documentation for monolithic test pads. The technician discovers which pad corresponds to which NAND signal by probing with a logic analyzer while the device powers on. A standard 8-bit NAND interface requires identifying data lines D0 through D7, Command Latch Enable (CLE), Address Latch Enable (ALE), Write Enable (/WE), Read Enable (/RE), Chip Enable (/CE), and Ready/Busy (R/B).

The identification process captures the device's initialization sequence. When the device powers up, the controller issues a READ ID command (0x90) to the NAND die. The logic analyzer shows CLE going high while /WE pulses and 0x90 appears on the data bus. ALE goes high, address 0x00 is written, and /RE pulses as the chip transmits its manufacturer ID. By matching these signal patterns to physical pads, the technician maps the complete pinout.

PC-3000 Flash Spider Board Connection

After pinout discovery, the monolithic die connects to the PC-3000 Flash reader via the Spider Board adapter. The Spider Board has adjustable microscopic needle probes positioned under a stereomicroscope. Each needle is lowered onto a specific test pad. The Spider Board software assigns NAND signal names (ALE, CLE, D0 through D7) to individual needles, establishing a clean electrical connection without soldering to pads that are fractions of a millimeter wide.

eMMC and UFS Extraction from Mobile and IoT Devices

eMMC (embedded MultiMediaCard) & UFS (Universal Flash Storage) are NAND flash chips soldered directly to device mainboards in smartphones, drones, dashcams, & IoT hardware. When the device's application processor is destroyed but the flash chip survives, chip-off extraction recovers the stored data.

The physical extraction process uses the same Zhuo Mao BGA rework station, but eMMC & UFS packages are smaller (typically 11.5x13mm or 11x13mm BGA). eMMC communicates through a parallel MMC interface; UFS uses a serial MIPI M-PHY link with dedicated Tx/Rx lanes. PC-3000 Flash includes dedicated eMMC reading modes that handle the MMC protocol directly, bypassing the dead application processor.

Encryption is the barrier here, too. Most modern mobile SoCs (Qualcomm Snapdragon, Apple A-series, Samsung Exynos) encrypt eMMC & UFS storage with keys bound to the processor's secure enclave. If the SoC is destroyed, chip-off produces ciphertext. eMMC extraction is viable only on devices without full-disk encryption or where the encryption key can be recovered from a functioning processor. For full SSD data recovery pricing & methods, see the flagship service page.

eMMC chips use two common BGA package standards: BGA-153 (153-ball, defined by JEDEC MO-276) & BGA-169 (169-ball). Both packages support eMMC 5.1 and the HS400 interface mode (200 MHz, DDR) through an identical inner ball matrix that includes the Data Strobe (DS) pin required for HS400. The 16 additional balls on BGA-169 are outer-perimeter mechanical support pads, not signal pins. The PC-3000 Flash reader has dedicated eMMC reading modes for both package types, using BGA-to-board adapter plates sized for each ball count & pitch. The reader communicates directly through the MMC protocol at the speed the chip supports, bypassing the dead application processor entirely.

Which SSD Controllers Block Chip-Off Recovery?

Always-on AES-256 encryption in modern SSD controllers has made chip-off obsolete for most drives manufactured after 2015. The controller generates a Media Encryption Key (MEK) during manufacturing, fuses it into OTP memory on the controller die, & encrypts every NAND write transparently. Desoldering the NAND yields only ciphertext.

The table below maps specific controller families to their encryption status & chip-off viability. This isn't a marketing classification; it's based on the controller's silicon architecture. A controller either has hardware encryption fuses or it doesn't.

Encrypted Controllers: Chip-Off Returns Ciphertext

ControllerInterfaceEncryptionMEK LocationChip-Off Viable?
Silicon Motion SM2259/XTSATA 6Gb/sAES-256 (always-on)Controller siliconNo
Silicon Motion SM2262/ENPCIe Gen3 x4AES-256 (always-on)Controller siliconNo
Silicon Motion SM2264PCIe Gen4 x4AES-128/256 (always-on)Controller siliconNo
Phison E12 (PS5012)PCIe Gen3 x4AES-256, TCG OpalOTP fusesNo
Phison E16 (PS5016)PCIe Gen4 x4AES-256OTP fusesNo
Phison E18 (PS5018)PCIe Gen4 x4AES-XTS 256OTP fusesNo
Marvell 88SS1074SATA 6Gb/sAES-256 (always-on)Controller siliconNo
Marvell 88SS1084/1100PCIe Gen3 x4AES-256Controller siliconNo
Realtek RTS5762/5763DLPCIe Gen3 x4AES-256Controller siliconNo
Samsung Elpis/PascalPCIe Gen4 x4AES-256 (Class 0)Fused to controllerNo
WD/SanDisk proprietaryPCIe Gen3/4AES-256 (always-on)Proprietary enclaveNo

Unencrypted Controllers: Chip-Off Is Viable

ControllerInterfaceEncryptionCommon DrivesChip-Off Viable?
Phison S11 (PS3111)SATA 6Gb/sNoneKingston A400, PNY CS900Yes (LDPC complexity)
Silicon Motion SM2246ENSATA 6Gb/sAES supported but often vendor-disabledEarly Crucial, ADATAYes, if vendor disabled AES (BCH, lower complexity)
JMicron JMF670HSATA 6Gb/sNoneOlder budget SSDsYes

The MEK is generated once during manufacturing & burned into One-Time Programmable (OTP) fuses or a secure enclave on the controller die. Even without a user password set, every byte written to NAND passes through the AES engine. Moving NAND chips to a donor controller with a different MEK produces encrypted garbage; the donor's key can't decrypt data encrypted by the original.

Even on unencrypted controllers like the Phison S11, chip-off is a last resort. The S11's LDPC error correction & complex XOR scrambling make reconstruction labor-intensive. PC-3000 Technological Mode (SRAM loader injection) is always preferred because it keeps the controller's hardware ECC engine in the loop, decoding pages that a raw chip reader can't correct.

How Does Board-Level Repair Enable Encrypted SSD Recovery?

Board-level microsoldering is the prerequisite for recovering data from any encrypted SSD with a dead controller. The original controller must boot because the AES-256 decryption key is fused to its silicon. Replacing the controller destroys the key. Repairing the controller preserves it.

Most SSD “deaths” aren't controller failures. They're failures in the power delivery circuit surrounding the controller: a shorted PMIC, a blown capacitor, or a cracked voltage regulator. The controller IC itself is often intact. The diagnostic workflow below identifies the failed component before power is applied, preventing cascading damage to an already fragile board.

Pre-Power Diagnostic & Repair Workflow

  1. FLIR thermal imaging for fault localization. Before applying power, the board is briefly energized through a current-limited bench supply while a FLIR thermal camera identifies hotspots. A shorted PMIC or tantalum capacitor draws excess current & produces a visible thermal signature within seconds. This pinpoints the failed component without risking further damage.
  2. Hakko FM-2032 microsoldering for component replacement. The failed PMIC, capacitor, or voltage regulator is removed & replaced using a Hakko FM-2032 iron on an FM-203 base station. On SATA SSDs, PMICs are typically 3mm x 3mm QFN packages; on NVMe M.2 drives, voltage regulators can be sub-2mm. SATA SSD board repair runs $450–$600. NVMe board repair runs $600–$900.
  3. Zhuo Mao BGA rework for controller reflow or reball. If the controller IC has cold solder joints (intermittent detection, works after heating), a Zhuo Mao BGA rework station reflows or reballs the controller's BGA connections. This restores electrical contact without destroying the OTP fuses holding the MEK. Temperature profiles follow the same SAC305 parameters used for NAND extraction, but with lower peak temperatures (230 to 235°C) to avoid disturbing adjacent components.
  4. PC-3000 SSD imaging through the restored controller. Once the controller boots, PC-3000 SSD connects via SATA or NVMe protocol & images the drive sector-by-sector. The controller's AES engine decrypts data in real-time during the imaging process. No key extraction is needed; the controller handles decryption transparently, the same way it did when the drive was healthy.

This is not chip-off. The controller stays in place. The encryption chain is preserved. The controller's hardware LDPC engine handles soft-decision decoding during imaging, producing clean data that a raw chip reader can't match. Board repair preserves everything chip-off destroys.

SSD data recovery is board repair. The Hakko FM-2032 & Zhuo Mao rework station aren't separate services from data recovery; for encrypted drives, they are the recovery tool. No other path exists when the controller's power circuit fails & the AES key is locked inside the silicon.

PC-3000 Technological Mode: The Alternative to Chip-Off

When an SSD powers on but won't mount (reports 0 bytes, enters BSY state, or identifies as “SATAFIRM S11”), the controller is alive but its firmware is corrupted. PC-3000 SSD bypasses the corrupted firmware by injecting a custom microcode loader into the controller's volatile SRAM, giving it just enough logic to read raw NAND without executing the damaged code.

Technological Mode is the reason professional labs rarely need chip-off on modern SSDs. The controller is alive; its firmware isn't. Injecting a temporary loader into SRAM sidesteps the corruption without touching the NAND physically. Firmware-level recovery using PC-3000 runs $600–$900 for SATA SSDs & $900–$1,200 for NVMe; chip-off costs $1,200–$1,500. The price difference reflects the labor difference.

SRAM Loader Injection Workflow

  1. Halt the boot sequence. PC-3000 issues vendor-specific ATA or NVMe commands to stop the controller from loading its corrupted firmware modules. This prevents the controller from executing destructive operations like TRIM, garbage collection, or a factory reset that some controllers trigger on boot failure.
  2. Inject the SRAM loader. A proprietary microcode payload is written into the controller's volatile SRAM. This loader gives the controller minimal read logic: enough to address NAND pages & return raw data through the SATA or NVMe interface. The loader doesn't touch the corrupted firmware stored in NAND; it runs entirely from volatile memory & disappears on power cycle.
  3. Scan NAND for surviving metadata. PC-3000 reads raw NAND pages through the loader, scanning for page headers, spare area metadata, wear-level counters, & sequence numbers. It builds a virtual LBA-to-PBA mapping in host RAM, reconstructing the Flash Translation Layer without relying on the drive's corrupted FTL tables.
  4. Image with real-time AES decryption. Because the original controller handles every read operation, data passes through the controller's hardware AES engine & is decrypted in real-time during imaging. The encryption key never leaves the controller. The host receives plaintext data directly.

Professional labs prefer Technological Mode over chip-off even on unencrypted drives. The controller's hardware LDPC engine stays in the loop, performing soft-decision decoding that chip-off can't replicate. A raw chip reader does hard-decision reads (binary 1 or 0); the controller does multi-pass voltage sweeps across TLC & QLC cells to calculate bit probabilities. On a worn drive with high bit error rates, that difference determines whether pages decode cleanly or return corrupted data.

SATAFIRM S11 Firmware Corruption on Phison PS3111

The Phison PS3111-S11 controller powers a large share of budget SATA SSDs: Kingston A400, PNY CS900, Patriot Burst, & dozens of OEM variants. When the S11's FTL corrupts from sudden power loss, the controller enters ROM mode & reports its identity as “SATAFIRM S11” with 0-byte capacity. The drive appears in BIOS but is inaccessible.

DIY forums recommend flashing the controller with Phison's MPTool utility. Don't. MPTool reinitializes the controller's firmware from scratch, which overwrites the FTL mapping tables. Once the FTL is gone, the link between logical addresses & physical NAND locations is destroyed. The data is still on the NAND cells, but no tool can reassemble it without the mapping.

PC-3000's Phison utility injects an SRAM loader that reads the S11's NAND without touching the corrupted FTL. The loader accesses raw pages, extracts surviving metadata from spare areas, & rebuilds the address mapping in host memory. Because the S11 doesn't implement hardware encryption, the data on the NAND is plaintext. Recovery runs $600–$900; chip-off on the same drive costs $1,200–$1,500 & takes 2 to 4 weeks longer.

Estimate Your Chip-Off Recovery Cost

Select your symptoms and drive type for a preliminary cost range. Final pricing comes after a free evaluation.

1
2
3

What type of SSD do you have?

This determines the recovery method and pricing.

Not sure which type you have? Call (512) 212-9111 and we can help identify it.

Frequently Asked Questions

What is chip-off NAND data recovery?
Chip-off recovery physically removes the NAND flash memory chips from an SSD's circuit board using BGA rework equipment, then reads the raw data directly from each chip. It is the last-resort method used when the controller is destroyed beyond repair and firmware tools like the PC-3000 cannot establish communication.
Does chip-off work on encrypted SSDs?
No. For Apple T2/M-Series, the encryption key is in the dead silicon. For Samsung 980/990 Pro and other NVMe drives with always-on AES-256 hardware encryption, the Media Encryption Key is bound to the original controller's secure enclave. Transplanting NAND to a different controller yields only ciphertext because the donor controller has a different silicon key. The only viable path is restoring the original controller through board-level repair or firmware intervention. If the controller silicon is dead, the keys are lost and the data is unrecoverable. Any lab claiming they can read encrypted NAND on a donor controller is misrepresenting the technology.
How much does chip-off recovery cost?
Chip-off NAND recovery runs $1,200–$1,500 depending on the number of NAND chips, the controller's interleaving complexity, and reconstruction time. 50% deposit required. No data, no charge still applies. You receive a firm quote after a free evaluation.
When should I choose chip-off vs controller repair?
You do not choose. We always attempt PC-3000 firmware recovery and board-level controller repair first because these methods preserve the controller and its encryption keys. Chip-off is only used when the controller is completely unrecoverable and the drive does not use hardware encryption. It is destructive; the drive cannot be reassembled afterward.
Can data be recovered from a physically broken USB flash drive?
Yes, provided the NAND memory chip inside the drive is intact. The data lives on the NAND silicon, not the USB connector or PCB traces. If the connector is snapped or the board is cracked but the NAND chip is undamaged, chip-off extraction removes the memory chip and reads it on a PC-3000 Flash reader. Monolithic USB drives (where controller and NAND are fused into one package) require a more complex extraction using exposed test pads and a Spider Board adapter. USB flash drive chip-off costs $1,200–$1,500.
What is monolithic NAND recovery?
Monolithic recovery extracts data from flash devices where the controller and NAND memory are fused into a single silicon package. MicroSD cards, SD cards, and compact USB drives commonly use this construction. There are no separate chips to desolder. The outer epoxy is mechanically removed to expose internal test pads, a logic analyzer identifies the proprietary pinout by capturing initialization signals, and the PC-3000 Flash Spider Board adapter connects to the NAND die via adjustable needle probes.
What makes chip-off reconstruction harder on TLC and QLC NAND?
TLC stores 3 bits per cell across 8 voltage levels and QLC stores 4 bits per cell across 16 voltage levels. Both require LDPC error correction, which uses soft-decision decoding: the controller reads the probability of each bit state via multiple voltage measurements. Chip-off recovery bypasses the controller and can only perform hard-decision reads (binary 1 or 0), losing the probability data LDPC needs. This makes TLC and QLC reconstruction computationally harder than SLC or MLC, where simpler BCH codes correct errors from a hard-decision raw dump.
How long does chip-off NAND recovery take?
Chip-off recovery takes 4 to 8 weeks depending on NAND complexity. A 4-chip SATA SSD with BCH error correction and a known interleaving pattern reconstructs faster than a 16-chip enterprise drive with LDPC and dynamic XOR scrambling. Monolithic devices add time for epoxy removal and pinout discovery. Rush service is available: +$100 rush fee to move to the front of the queue.
Which SSD controllers allow chip-off recovery?
Only older controllers where the vendor disabled hardware encryption. The Phison PS3111-S11 (Kingston A400, PNY CS900) lacks hardware encryption entirely. The Silicon Motion SM2246EN silicon supports AES, but many budget drives shipped with encryption disabled by the vendor. The JMicron JMF670H also lacks encryption. All modern SSD controllers, both NVMe (Phison E12 and later, Silicon Motion SM2262 and later, Samsung Elpis/Pascal, Realtek RTS5762 and later) and late-generation SATA (SM2259 and later, Marvell 88SS1074 and later), encrypt NAND with AES-256 keys fused to the controller silicon. Chip-off on encrypted drives yields only ciphertext. Encryption status must be confirmed per-drive during evaluation.
Can data be recovered from a dead SSD controller?
On drives where hardware encryption is absent or vendor-disabled (older SATA SSDs with Phison PS3111-S11, some SM2246EN variants, JMicron JMF670H), yes. Chip-off extracts raw NAND data from the memory chips, bypassing the dead controller entirely. On encrypted drives (Samsung 980/990 Pro, Apple T2/M-series, Phison E12+, SM2259+, Maxio MAP1602A), no. The AES-256 decryption key is fused to the controller silicon. A dead controller means a dead key. The only recovery path for encrypted drives is board-level microsoldering to revive the original controller's power circuit. Board repair runs $450–$600 for SATA SSDs and $600–$900 for NVMe.
What happens to my SSD after chip-off recovery?
Chip-off is destructive. The NAND chips are permanently desoldered from the circuit board. The drive cannot be reassembled or returned to service afterward. We return the extracted NAND chips and the original PCB to you along with the recovered data on your choice of media. The SSD itself is non-functional after chip-off and cannot be used again.
What is SATAFIRM S11 and can chip-off fix it?
SATAFIRM S11 is the factory fallback identifier for SSDs using the Phison PS3111-S11 controller (Kingston A400, PNY CS900, Patriot Burst). It appears when the Flash Translation Layer corrupts, usually from sudden power loss. The drive reports 0-byte capacity. Chip-off is technically possible because the S11 lacks hardware encryption, but PC-3000 Technological Mode recovery via SRAM loader injection is faster, cheaper ($600–$900 vs. $1,200–$1,500), and non-destructive. Chip-off is only used if the S11 controller silicon is physically destroyed.
Why can't I move NAND chips to a donor SSD controller?
Two reasons. First, modern controllers encrypt all NAND writes with an AES-256 Media Encryption Key fused to the original controller's silicon. A donor controller has a different key and cannot decrypt the NAND contents. Second, even on unencrypted drives, the donor controller lacks the original drive's firmware adaptives: the specific wear-leveling maps, defect lists, and FTL configuration tailored to that NAND's physical degradation pattern. A transplanted NAND paired with foreign firmware produces corrupted or incomplete data.
Does chip-off work differently on 3D NAND versus older planar NAND?
Yes. 3D NAND stacks memory cells vertically in 128 to 232+ layers, creating non-uniform error rates across the vertical stack. Each layer may need different read-retry voltage offsets during raw NAND reading because manufacturing process variation causes bottom-layer cells to behave differently from top-layer cells. Planar NAND has uniform error characteristics across the die. Most 3D NAND architectures use Charge Trap Flash (silicon nitride insulator), though some manufacturers (Intel, Micron) used floating gate designs for multiple 3D NAND generations. Both architectures exhibit retention and read disturb behaviors distinct from planar memory. The engineer must manually test read-retry voltage offsets across different block regions to account for layer-dependent variation, adding time to the reconstruction process.
Can data be recovered from eMMC or UFS chips in phones and IoT devices?
Yes, if the flash chip is physically intact and the data isn't encrypted by the device's processor. eMMC and UFS chips are embedded flash memory soldered to device mainboards in smartphones, drones, dashcams, and IoT devices. If the application processor is destroyed but the flash chip survives, it can be desoldered using BGA rework and read on a PC-3000 Flash reader. The same encryption limitation applies: if the device's SoC encrypted the storage with a key bound to its secure enclave (Qualcomm, Apple, Samsung processors all do this), chip-off returns ciphertext with no key to decrypt it. eMMC/UFS extraction where viable falls under the chip-off tier at $1,200–$1,500.
Can I do chip-off data recovery at home?
No. Chip-off requires a PC-3000 Flash reader (thousands of dollars), a BGA rework station with controlled thermal profiles, BGA stencils matched to the chip's ball pitch, and controller-specific NAND reconstruction software. A standard heat gun overheats the silicon die within seconds, cracking the NAND and destroying data permanently. Even with the correct equipment, the raw hex dump requires reverse-engineering the controller's XOR scrambling keys and FTL mapping to produce a readable file system. This is not a DIY procedure.
What is the difference between chip-off data recovery and chip-off forensics?
Both use the same physical extraction process: BGA desoldering, NAND reading on a PC-3000 Flash reader, and raw dump reconstruction. The difference is what happens after the raw dump. Data recovery reconstructs a usable file system and delivers working files (photos, documents, databases). Chip-off forensics, used by law enforcement and legal proceedings, preserves the entire raw binary image including deleted fragments, obsolete NAND blocks, and metadata timestamps for chain-of-custody evidence. We perform data recovery. For forensic extraction with court-admissible chain-of-custody documentation, contact a digital forensics laboratory.
Can chip-off recover deleted files from an SSD?
On unencrypted drives where TRIM has not executed, some deleted files may survive in obsolete NAND blocks. Flash memory uses wear-leveling, so a deleted file's physical NAND blocks aren't immediately erased; they're marked obsolete and wait for garbage collection. A raw chip-off dump reads all physical blocks including obsolete ones, sometimes recovering file fragments that software tools can't see because the FTL no longer maps to those blocks. On drives where TRIM has executed (the default on Windows 7+ and macOS 10.6.8+), the controller has already zeroed those blocks and the data is physically gone. Chip-off can't reverse TRIM. On encrypted drives, deleted or not, chip-off returns only ciphertext.
What is the difference between chip-off and JTAG extraction?
JTAG (Joint Test Action Group) probes designated test access ports on the PCB to read memory non-invasively through the device's debug interface. The chip stays soldered to the board. Chip-off physically desolders the NAND chip from the PCB and reads it on a separate chip reader. JTAG is less risky because the board isn't altered, but it only works when the debug interface is accessible and the processor can still execute commands. Chip-off works when the controller or processor is destroyed, but it is destructive and the drive can't be reassembled. For SSDs, we attempt non-destructive diagnostic access through PC-3000 Technological Mode (which injects an SRAM loader via vendor-specific commands, not JTAG) before escalating to chip-off.
How do stacked-die NAND packages affect chip-off recovery?
Modern BGA-152 NAND packages can contain 4, 8, or 16 individual silicon dies stacked and wire-bonded inside a single physical package. A chip that looks like one component may hold 16 separate memory targets. The PC-3000 Flash reader addresses each die through Chip Enable (CE) signals per the ONFI specification. Failing to configure the correct number of CE targets during the read produces only a fraction of the drive's data. The engineer identifies the die count from the chip's ID bytes and part number markings before starting the dump.

How to Ship Your SSD for Chip-Off Evaluation

Don't power on the drive. Every power cycle on a failing SSD risks firmware self-destruct sequences, TRIM execution on corrupted mapping tables, or further controller degradation. Remove it from the computer & ship it unpowered.

  1. Wrap the bare drive in an anti-static bag. M.2 NVMe drives fit in a small USPS flat-rate box or a padded FedEx envelope.
  2. Surround the drive with foam or bubble wrap. Avoid loose packing peanuts; they shift during transit & leave the drive unprotected against impact.
  3. Ship to our Austin, TX lab. Call (512) 212-9111 if you need the mailing address or have questions about packaging.
  4. Evaluation is free. We call you with a firm quote before any work begins. If chip-off isn't viable (encrypted controller, cracked NAND), we tell you that instead of charging for work that can't succeed.

Contact us for shipping labels & drop-off instructions.

Data Handling During Chip-Off Recovery

Chip-off recovery involves direct contact with raw NAND storage. Your SSD stays in our Austin lab throughout the process. All NAND reads and reassembly happen on air-gapped workstations with no network access. Recovered data is delivered on encrypted external media, and working copies are purged after you confirm receipt.

NDAs are available on request. Full data security details cover our chain-of-custody, encryption, and erasure protocols.

Data Recovery Standards & Verification

Our Austin lab operates on a transparency-first model. We use industry-standard recovery tools, including PC-3000 and DeepSpar, combined with strict environmental controls to make sure your hard drive is handled safely and properly. This approach allows us to serve clients nationwide with consistent technical standards.

Open-drive work is performed in a ULPA-filtered laminar-flow bench, validated to 0.02 µm particle count, verified using TSI P-Trak instrumentation.

Transparent History

Serving clients nationwide via mail-in service since 2008. Our lead engineer holds PC-3000 and HEX Akademia certifications for hard drive firmware repair and mechanical recovery.

Media Coverage

Our repair work has been covered by The Wall Street Journal and Business Insider, with CBC News reporting on our pricing transparency. Louis Rossmann has testified in Right to Repair hearings in multiple states and founded the Repair Preservation Group.

Aligned Incentives

Our "No Data, No Charge" policy means we assume the risk of the recovery attempt, not the client.

We believe in proving standards rather than just stating them. We use TSI P-Trak instrumentation to verify that clean-air benchmarks are met before any drive is opened.

See our clean bench validation data and particle test video

SSD controller destroyed?

Free evaluation. We will tell you honestly whether chip-off can recover your data. No data, no fee.

(512) 212-9111Mon-Fri 10am-6pm CT
No diagnostic fee
No data, no fee
4.9 stars, 1,837+ reviews