Skip to main contentSkip to navigation
Lab Operational Since: 17 Years, 5 Months, 15 DaysFacility Status: Fully Operational & Accepting New Cases
Rossmann Repair Group logo - data recovery and MacBook repair

Microsoft Surface Data Recovery

We accept all Microsoft Surface models for data recovery. Surface storage architecture varies by generation. Legacy models (Pro 5 through 7, Laptop 1 and 2, Surface Go) use soldered eMMC or NVMe storage, which requires board-level repair and a longer turnaround than standard SSD recovery. The Surface Pro 4 has a removable M.2 2280 NVMe drive, though accessing it requires risky screen removal. Modern models (Pro 7+, 8, 9, X, Laptop 3+, Laptop Studio) use removable M.2 2230 NVMe drives accessible via an SSD door. In all cases, BitLocker encryption tied to the onboard TPM means the decryption key is bound to the motherboard. When the mainboard fails, data recovery requires component-level board repair to restore TPM and storage controller functionality, or the BitLocker recovery key.

Louis Rossmann
Written by
Louis Rossmann
Founder & Chief Technician
Updated April 2026
15 min read

Why Is Microsoft Surface Data Recovery Different?

Surface data recovery is different because BitLocker encryption, enabled by default on most Surface configurations, binds the decryption key to the TPM chip on that specific board. Even if the SSD is removable, reading it in another system produces only encrypted ciphertext without the TPM or the BitLocker recovery key. This is the same hardware encryption binding seen on Self-Encrypting Drives, but managed by the TPM rather than the SSD controller's fused key. Storage architecture also varies by generation.

Legacy Surface devices (Pro 5 through 7, Laptop 1 and 2, Go series) solder their storage directly to the mainboard. The Surface Pro 4 has a removable M.2 2280 drive, though accessing it requires screen removal. Newer models (Pro 7+, 8, 9, X, Laptop 3+, Laptop Studio) use removable M.2 2230 NVMe drives accessible via a dedicated SSD door. The table below shows how recovery approach differs across these generations.

Surface GenerationStorage TypeRecovery Approach
Soldered (Pro 5-7, Laptop 1-2, Go)Soldered eMMC or NVMeBoard-level repair; longer turnaround
Pro 4Removable M.2 2280 NVMeScreen removal required to access SSD
Modern (Pro 7+, 8, 9, X, Laptop 3+, Studio)Removable M.2 2230 NVMeSSD door access; standard recovery timeline if TPM intact

This architecture mirrors the challenge posed by Apple T2/M-series Macs, where the Secure Enclave holds the encryption key. On Surface devices, the TPM serves the same role. If the TPM is intact and the board can be repaired to a bootable state, BitLocker unlocks transparently and data can be imaged.

If the TPM itself is destroyed, the only alternative is the BitLocker recovery key (stored in a Microsoft account, Active Directory, or printed at setup time).

Recovery requires the same board-level microsoldering capability used for Apple devices: identifying failed components using FLIR thermal imaging and bench power supply analysis, then replacing shorted ICs, corroded traces, or failed power delivery components to restore system boot.

What Storage Does Each Surface Model Use?

Each Surface generation uses a different storage configuration, which determines whether the SSD can be removed, what NVMe controller it contains, & how the recovery proceeds. Removable M.2 2230 drives follow standard NVMe SSD recovery pricing starting at From $200. Soldered storage requires board-level repair.

ModelStorage TypeCommon ControllerRemovable?Access Method
Surface Pro 3mSATAVaries (legacy)Yes (glued)Full disassembly; screen removal
Surface Pro 4M.2 2280 NVMeSamsung PM951YesScreen removal required
Surface Pro 5/6/7Soldered BGA NVMeVaries by configNoBoard-level repair only
Surface Pro 7+/8/9M.2 2230 NVMeSamsung PM991/PM991a, Kioxia BG4/BG5, SK Hynix BC711, WD SN530YesSSD door beneath kickstand (Torx T3)
Surface Pro 10/11M.2 2230 NVMeVaries by configYesSSD door beneath kickstand (Torx T3)
Surface Pro XM.2 2230 NVMeKioxia BG4, WD SN530YesSSD door beneath kickstand (SIM tool or press dimple)
Surface Laptop 1/2Soldered NVMeVariesNoKeyboard deck removal (ultrasonically welded Alcantara)
Surface Laptop 3+M.2 2230 NVMeSamsung PM991, SK Hynix BC711, WD SN530YesKeyboard deck removal
Surface Go 1/2/3Soldered eMMC (64GB) or NVMeVariesNoFull teardown; board-level repair only
Surface Go 4Soldered UFS 3.1Samsung/SK Hynix/Kioxia UFSNoFull teardown; UFS protocol differs from NVMe
Surface Laptop Studio 1/2M.2 2230 NVMeVaries by configYesBottom panel removal

The Torx T3 screw on newer models strips if you use a standard Torx driver instead of the security (3IP) variant. On Surface Pro 7+ & later, Wi-Fi models use a magnetic SSD access door with a press dimple, while LTE/5G variants require a SIM eject tool.

The Surface Go 4 is a special case: it uses soldered UFS 3.1 (Universal Flash Storage) instead of NVMe. UFS communicates over the SCSI protocol rather than PCIe, so standard NVMe recovery tools & adapters don't apply. Recovery from a failed Surface Go 4 requires board-level repair of the original mainboard, or BGA desoldering of the UFS chip & reading it through a UFS-specific protocol adapter. BitLocker encryption still binds to the TPM, adding the same decryption constraint as NVMe models.

Multi-Chip Storage Configurations

Higher-capacity Surface models use multiple NAND packages arranged in a configuration similar to JBOD (Just a Bunch of Disks). The storage controller stripes data across these packages, and the logical volume must be reassembled from all physical chips in the correct order with the correct interleaving parameters when reconstructing data from a failed board.

In most cases, board repair that restores the original storage controller eliminates the need for manual multi-chip reconstruction. The controller handles the interleaving and volume assembly natively.

Multi-chip reconstruction becomes necessary only in chip-off scenarios on unencrypted Surface configurations, which are uncommon in modern devices.

What Are Common Microsoft Surface Failure Modes?

The most common Surface failures that require data recovery are liquid damage to the mainboard, failed power delivery to the storage controller, BitLocker lockout after component failure, and SSD controller failure on soldered NVMe storage. Each failure mode has a distinct diagnostic and recovery path.

  • Liquid damage to mainboard: Surface tablets are not sealed against liquid ingress. Spills corrode board traces and short power rails. Ultrasonic cleaning followed by component-level repair of damaged circuits.
  • Failed power delivery to storage controller: A blown PMIC or shorted capacitor on the storage power rail kills access to the NAND while the rest of the board may still partially function. FLIR thermal imaging locates the fault.
  • BitLocker lockout after component failure: If a board component fails in a way that disrupts the TPM's boot measurement chain, BitLocker triggers recovery mode. Without the recovery key, the system will not decrypt. Board repair that restores the original boot path allows BitLocker to unlock normally if the TPM is intact.
  • SSD controller failure on soldered NVMe: The storage controller fails but the NAND retains data. Same recovery path as other firmware corruption cases, complicated by the soldered form factor and TPM-bound encryption.

How Does BitLocker TPM Recovery Work on Surface Devices?

BitLocker on Surface devices uses TPM 2.0 to seal the Volume Master Key (VMK) against specific Platform Configuration Register (PCR) measurements. When the board boots normally, the TPM validates the boot chain & releases the VMK without user input. A hardware failure that changes those measurements locks the volume.

All Surface Pro 4 and newer models ship with TPM 2.0. The Surface Pro 3 uses TPM 1.2, which has a different sealing mechanism but the same general encryption binding. BitLocker binds the VMK to PCR 7 (Secure Boot state) and PCR 11 (BitLocker access control). PCR 11 locks after the boot handoff completes, preventing runtime modifications from unsealing the key.

Board Repair as Decryption Path

Board-level repair restores the original TPM boot measurement chain. When the repaired board powers on with the same Secure Boot configuration, the TPM unseals the VMK automatically & BitLocker decrypts without prompting for a recovery key. The repair doesn't bypass encryption; it restores the conditions under which the TPM releases the key normally.

We locate the failed component using FLIR thermal imaging, replace the shorted PMIC or voltage regulator with a Hakko FM-2032 on an FM-203 base station, & verify the board reaches POST. Once the TPM validates the boot chain, BitLocker unlocks & we image the volume to a target drive.

When TPM Is Destroyed

If the TPM chip is physically destroyed (cracked BGA, burned traces), the sealed VMK is gone. The 48-digit BitLocker recovery key stored in a Microsoft account, Azure Active Directory, or printed on paper at setup time is the only remaining decryption path. Without that key, the data on the NAND is AES-256 ciphertext with no viable attack.

BitLocker Recovery Mode Triggers

Common triggers that alter PCR measurements and force BitLocker into recovery mode on Surface devices:

  • Windows Update or Surface firmware update that modifies the UEFI bootloader
  • Changing Secure Boot settings in UEFI (enabling or disabling)
  • Replacing or reflowing the TPM chip during board repair without preserving the original chip
  • Swapping the M.2 2230 SSD between two different Surface boards (TPM mismatch)
  • Battery disconnection or CMOS reset that clears UEFI state

Why Do Surface SSDs Fail from Power Loss?

Most M.2 2230 SSDs in Surface devices are DRAM-less designs that rely on Host Memory Buffer (HMB) to borrow system RAM for their flash translation layer (FTL) cache. An abrupt power loss during Connected Standby or shutdown corrupts the HMB cache before the controller flushes it to NAND, causing FTL corruption that makes the drive unreadable.

The M.2 2230 form factor packs the controller IC & NAND packages onto a 30mm PCB. That density creates thermal constraints that limit the controller's power envelope. DRAM-less controllers like the Samsung Pablo (PM991/PM991a), Kioxia BG4, SK Hynix BC711, & WD SN530 skip the dedicated DRAM cache to meet those thermal & size limits. They use HMB instead: the controller borrows a small region of the host system's DDR4/DDR5 RAM to cache the FTL mapping table.

HMB works well during normal operation. The failure mode appears during power transitions. Surface devices use Connected Standby (Modern Standby) instead of traditional S3 sleep, keeping the SSD controller in a low-power active state. If the battery dies or the system crashes during this state, the HMB region in system RAM is lost before the controller can commit the updated FTL map back to NAND.

The result: the drive enters a BSY state, reports 0MB capacity, or disappears from the PCIe bus entirely. The NAND still holds the data, but the FTL mapping that tells the controller where each file's pages are physically stored is corrupted or incomplete. Consumer software can't see a drive in BSY state.

Because modern Surface devices use proprietary OEM controllers (Samsung Pablo, SK Hynix BC711, Kioxia BG4) that currently lack PC-3000 SSD firmware support, FTL corruption from power loss often requires component-level board repair to resolve the underlying power delivery fault rather than firmware-level FTL reconstruction. If the controller itself is intact and only the FTL mapping is corrupted, the prognosis depends on the specific controller family. Circuit board repair for NVMe drives runs $600–$900.

Surface NVMe Controller Families and Recovery Constraints

Surface devices use proprietary OEM NVMe controllers rather than the common Phison or Silicon Motion controller families found in retail SSDs. PC-3000 SSD currently lacks firmware utility modules for these OEM controllers, which limits firmware-level FTL reconstruction. Recovery for Surface drives with controller or firmware failures relies on component-level board repair to restore the original controller to a functional state.

Samsung PM991 / PM991a (Pablo Controller)

The Samsung PM991 & PM991a (MZ-9LQ series) use Samsung's in-house Pablo controller. PC-3000 SSD does not currently support firmware reconstruction for the Pablo architecture. Recovery for PM991 drives with firmware corruption depends on component-level board repair to restore the controller to a bootable state.

The Pablo controller implements AES-256 hardware encryption. The encryption key is fused to the controller silicon. If the controller is dead, desoldering the NAND packages yields only ciphertext. Chip-off NAND extraction is not viable on PM991/PM991a drives; the original controller must be revived through component-level repair for the data to be readable.

Kioxia BG4 / BG5

Kioxia BG4 (KBG40 series, 96-layer BiCS FLASH) & BG5 drives use Kioxia's proprietary in-house controller. These are not rebranded Phison controllers, so standard PC-3000 Phison utilities cannot communicate with them. Firmware-level FTL recovery is currently unsupported for this controller family.

BG4 & BG5 also implement hardware encryption. The same rule applies as with Samsung: the original controller must function for decrypted data access. Board-level repair is the primary recovery path.

SK Hynix BC711

The SK Hynix BC711 (HFM256/HFM512 series) uses SK Hynix's proprietary controller with Pyrite security standard support. PC-3000 SSD does not currently support SK Hynix controllers due to their complex internal architecture, so firmware diagnostics and FTL repair are not available for this family. Recovery depends on restoring the original controller via board repair.

Western Digital SN530

The WD SN530 (SDBPTPZ series) uses WD's proprietary controller architecture. Like the other OEM controllers on this page, it lacks PC-3000 SSD firmware support. FTL corruption on the SN530 typically presents as the drive appearing in BIOS with 0MB capacity, or cycling between detected & undetected states. If the controller dies or the FTL corrupts beyond what board repair can resolve, recovery options are limited.

ARM-Based Surface Devices (Pro X, Pro 11)

The Surface Pro X (Qualcomm SQ1/SQ2) & Surface Pro 11 (Snapdragon X Elite) use ARM processors but the same M.2 2230 NVMe storage as Intel models. At the hardware level, the NVMe protocol is identical. A removed M.2 2230 drive reads the same in any NVMe adapter regardless of whether the host CPU was ARM or Intel.

The difference appears at the logical layer. The Windows installation on an ARM Surface is compiled for ARM64. Standard x86 WinPE recovery USBs won't boot these devices. On-device diagnostic imaging requires an ARM64-specific recovery image from Microsoft matched to the device's serial number. For lab recovery, this distinction doesn't matter: we image the drive at the block level using hardware tools that operate below the OS layer.

Why Chip-Off Doesn't Work on Most Surface Devices

Chip-off NAND extraction is not a viable recovery path for Surface devices that use BitLocker with TPM binding. Desoldering the BGA NAND packages from a soldered Surface Pro 5, 6, or 7 mainboard yields raw flash pages encrypted with AES-256. The decryption key lived in the TPM on the original board, not in the NAND.

On models with removable M.2 2230 drives, chip-off is equally constrained. The OEM controllers (Samsung Pablo, Kioxia, SK Hynix) implement always-on hardware encryption at the controller level. The encryption key is fused to the controller die. Even if you desolder the NAND from the M.2 module & read it in a programmer, every page is AES-256 ciphertext tied to that specific controller chip.

Chip-off on a Surface device would only produce readable data if three conditions are met: (1) the Surface was configured without BitLocker, (2) the SSD controller doesn't implement hardware encryption, & (3) the NAND interleaving parameters can be reconstructed. In practice, all three conditions failing simultaneously is rare on any Surface manufactured after 2017.

Board-level repair remains the primary recovery path. Reviving the original controller preserves the encryption chain, & a functional TPM can unseal the BitLocker key automatically once the board reaches POST. This avoids the encryption wall entirely.

Surface Data Recovery Terminology

TPM (Trusted Platform Module)
A dedicated security chip on the Surface mainboard that stores BitLocker's Volume Master Key. TPM 2.0 seals the key against Platform Configuration Register (PCR) measurements of the boot chain. If the PCR values change due to hardware failure or UEFI modification, the TPM refuses to release the key & BitLocker prompts for the 48-digit recovery key.
M.2 2230
A physical form factor for NVMe SSDs: 22mm wide, 30mm long. Surface Pro 7+ & newer use this format, accessible via an SSD door beneath the kickstand. Smaller than the M.2 2280 standard used in most laptops & desktops, which limits the available controller & NAND configurations to DRAM-less designs.
Host Memory Buffer (HMB)
An NVMe feature that allows DRAM-less SSDs to borrow a small region of the host system's RAM for flash translation layer (FTL) caching. Surface M.2 2230 drives use HMB because the 30mm PCB doesn't have room for a dedicated DRAM chip. An abrupt power loss during Connected Standby corrupts the HMB cache, causing FTL mapping failures that make the drive unreadable.
Connected Standby (Modern Standby)
A power state that keeps the SSD controller in a low-power active mode instead of traditional S3 sleep. The controller remains powered & maintains its HMB allocation in system RAM. If the battery dies or the system crashes in this state, the HMB region is lost before the controller can flush the FTL map back to NAND, resulting in drive firmware corruption.
BGA (Ball Grid Array)
The soldering method used to attach NAND flash packages & controllers to the SSD's PCB. BGA chips sit on an array of solder balls rather than through-hole or edge pins. Removing a BGA chip requires hot air rework at controlled temperatures using an Atten 862 or Zhuo Mao rework station to avoid thermal damage to the NAND die inside the package.

How Hard Is It to Open a Surface Device?

Surface disassembly difficulty varies from a single Torx T3 screw on newer Pro models to destructive teardown on legacy devices. The risk of cracking the display or destroying the keyboard deck is why professional lab service matters for Surface recovery.

Low Risk: SSD Access Door Models

Surface Pro 7+, 8, 9, 10, 11, & Pro X have an SSD access door beneath the kickstand. Wi-Fi models use a magnetic cover with a press dimple. LTE/5G models require a SIM eject tool. One Torx T3 (3IP) screw secures the drive, & the M.2 2230 module pulls out at a 15-degree angle to avoid snapping the connector pins. No screen removal required.

Medium Risk: Keyboard Deck Removal

Surface Laptop 3 & newer models require removing the keyboard deck to access the M.2 2230 slot. This involves prying up a magnetically attached deck & disconnecting ribbon cables. Manageable in a lab setting, but not a DIY-friendly procedure.

Surface Laptop 1 & 2 are a different story. Microsoft ultrasonically welded the Alcantara keyboard deck to the chassis. Accessing the internals destroys the deck permanently. The soldered storage on these models means there's no removable SSD to extract even if you do get inside.

High Risk: Screen Removal Models

Surface Pro 4, 5, 6, & 7 require removing the adhesive-bonded display glass to access internals. The glass panel is fragile & frequently cracks during removal. For Pro 5, 6, & 7 with soldered storage, opening the device doesn't even provide a removable SSD; you're opening it for board-level repair access.

Full Teardown: Surface Go

All Surface Go models require a full teardown to reach the mainboard. Storage is soldered (64GB eMMC on base configs, NVMe on higher-spec models). Recovery on the Go series is board-level repair only, with no option to extract a removable drive.

Can Software Recover Data from a Surface SSD?

Software tools like Disk Drill, EaseUS, PhotoRec, & R-Studio work when the Surface SSD is physically healthy, recognized by the operating system, & the issue is a logical failure: accidental deletion (with TRIM disabled), partition table corruption, or a formatted volume. Beyond that, software can't help.

Software recovery hits a wall on Surface devices for three reasons. First, BitLocker encryption means the software needs the unlocked volume to work; if the TPM won't release the key & you don't have the recovery key, the software sees only ciphertext. Second, if the NVMe controller is dead (drive not detected in BIOS), software has nothing to connect to. Third, TRIM is enabled by default on Windows 10 & 11; deleted files on a Surface SSD are unmapped and the controller's garbage collection reclaims the NAND blocks within seconds to minutes. Once the blocks are reclaimed, no software and no lab can recover the data.

Lab recovery addresses physical failures that software can't reach: dead controllers, corrupted firmware, FTL corruption from power loss, & failed PMICs that prevent the drive from powering on. Because Surface OEM controllers currently lack PC-3000 SSD firmware support, recovery for these physical failures relies on component-level board repair to restore the original controller. Circuit board repair on NVMe drives runs $600–$900.

Rush Service and Donor Drive Costs

Standard Surface recovery timelines range from 3-5 business days (simple copy) to 4-8 weeks (NAND swap). A +$100 rush fee to move to the front of the queue moves your device to the front of the queue for faster turnaround.

Circuit board repair & NAND swap tiers may require a donor drive: a matching M.2 2230 NVMe SSD used for its PCB or NAND configuration. A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers. NAND swap cases ($1,200–$2,500) require a 50% deposit before work begins, because the donor drive is consumed during the process.

How Much Does Microsoft Surface Data Recovery Cost?

Surface recovery follows the standard SSD recovery pricing tiers. Evaluation is free, and a firm quote is provided before any work begins. No data recovered means no charge. Call (512) 212-9111 with questions.

Simple Copy

Low complexity

Your NVMe drive works, you just need the data moved off it

$200

3-5 business days

Functional drive; data transfer to new media

Rush available: +$100

File System Recovery

Low complexity

Your NVMe drive isn't showing up, but it's not physically damaged

From $250

2-4 weeks

File system corruption. Visible to recovery software but not to OS

Starting price; final depends on complexity

Circuit Board Repair

Medium complexity

Your NVMe drive won't power on or has shorted components

$600–$900

3-6 weeks

PCB issues: failed voltage regulators, dead PMICs, shorted capacitors

May require a donor drive (additional cost)

Firmware Recovery

Medium complexityMost Common

Your NVMe drive is detected but shows the wrong name, wrong size, or no data

$900–$1,200

3-6 weeks

Firmware corruption: ROM, modules, or system files corrupted

Price depends on extent of bad areas in NAND

PCB / NAND Swap

High complexity

Your NVMe drive's circuit board is severely damaged and requires NAND chip transplant to a donor PCB

$1,200–$2,500

4-8 weeks

NAND swap onto donor PCB. Precision microsoldering and BGA rework required

50% deposit required; donor drive cost additional

50% deposit required

Hardware Repair vs. Software Locks

Our "no data, no fee" policy applies to hardware recovery. We do not bill for unsuccessful physical repairs. If we replace a hard drive read/write head assembly or repair a liquid-damaged logic board to a bootable state, the hardware repair is complete and standard rates apply. If data remains inaccessible due to user-configured software locks, a forgotten passcode, or a remote wipe command, the physical repair is still billable. We cannot bypass user encryption or activation locks.

No data, no fee. Free evaluation and firm quote before any paid work. Full guarantee details. NAND swap requires a 50% deposit because donor parts are consumed in the attempt.

Rush fee: +$100 rush fee to move to the front of the queue.

Donor drives: A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers.

Target drive: The destination drive we copy recovered data onto. You can supply your own or we provide one at cost plus a small markup. All prices are plus applicable tax.

Estimate Your Surface Recovery Cost

Select your symptoms and drive type for a preliminary cost range. Final pricing comes after a free evaluation.

1
2
3

What type of SSD do you have?

This determines the recovery method and pricing.

Not sure which type you have? Call (512) 212-9111 and we can help identify it.

Frequently Asked Questions

Can you recover data from a dead Surface Pro?
It depends on the failure mode. If the mainboard has failed but the storage controller and TPM are intact, board-level repair can restore enough functionality for the system to decrypt and serve the data. If the TPM chip is destroyed and BitLocker was enabled, the data is unrecoverable without the BitLocker recovery key.
Does BitLocker prevent data recovery on Surface devices?
BitLocker encryption ties the decryption key to the TPM chip on the motherboard. If the TPM is functional and the board can be repaired to boot state, the system decrypts automatically. If the TPM is destroyed, recovery requires the BitLocker recovery key (typically stored in a Microsoft account or Active Directory). Without either path, the data is encrypted ciphertext with no viable decryption.
Can the SSD be removed from a Surface tablet?
It depends on the model. Surface Pro 5 through 7, Laptop 1 and 2, and Go series have soldered storage that cannot be removed. Surface Pro 4 has a removable M.2 2280 NVMe drive, though accessing it requires screen removal. Modern models (Pro 7+, 8, 9, X, Laptop 3+) use standard M.2 2230 NVMe drives accessible via a dedicated SSD door. However, even on models with removable storage, BitLocker encryption binds the decryption key to the original TPM. Removing the SSD and reading it in another system yields only encrypted data. Recovery requires either repairing the original board to unlock via TPM, or having the BitLocker recovery key.
Is the SSD soldered in my Surface model?
Storage varies by generation. Surface Pro 3 uses a removable mSATA drive glued in place. Surface Pro 4 has an M.2 2280 NVMe slot, though accessing it requires screen removal. Surface Pro 5, 6, and 7 solder NVMe storage directly to the mainboard with no removal path. Surface Pro 7+ and newer (8, 9, 10, 11, X) have a user-accessible SSD door beneath the kickstand secured with a single Torx T3 screw. Surface Laptop 1 and 2 solder storage to the board; Laptop 3 and newer use removable M.2 2230. Surface Go models solder either 64GB eMMC or NVMe storage to the mainboard.
Why is BitLocker asking for a recovery key after my Surface stopped working?
BitLocker on Surface devices binds the Volume Master Key to TPM PCR measurements, specifically PCR 7 (Secure Boot state) and PCR 11 (BitLocker access control). If a hardware failure, firmware update, or UEFI change alters those measurements, the TPM refuses to unseal the key and BitLocker prompts for the 48-digit recovery key. Board-level repair that restores the original boot measurement chain allows the TPM to unseal the key automatically. If the TPM chip itself is damaged, only the recovery key from a Microsoft account or Active Directory will decrypt the volume.
Can I put my Surface SSD in another computer to recover data?
Yes, for models with removable M.2 2230 drives (Pro 7+, 8, 9, X, Laptop 3+). The drive physically fits any M.2 2230 NVMe slot or adapter. But BitLocker encryption prevents you from reading the data. The TPM in the original Surface held the decryption key, and a different computer's TPM won't match. You'll need the 48-digit BitLocker recovery key to unlock the volume. Without that key, the data is AES-256 encrypted ciphertext. If you don't have the recovery key, board-level repair of the original Surface to restore TPM functionality is the only decryption path.
What NVMe controllers are used in Surface devices?
Most Surface devices ship with DRAM-less M.2 2230 NVMe SSDs. Common controllers include the Samsung Pablo (found in PM991 and PM991a drives), Kioxia BG4 and BG5, SK Hynix BC711, and Western Digital SN530. These are all proprietary OEM controllers that currently lack PC-3000 SSD firmware support, so recovery relies on board-level repair to restore the original controller. The Samsung Pablo controller uses AES-256 hardware encryption, so chip-off on a failed Samsung PM991 yields only ciphertext; the original controller must be revived.
How long does Surface data recovery take?
Timeline depends on the failure type. A simple data copy from a healthy removable SSD takes 3-5 business days. File system recovery runs 2-4 weeks. Circuit board repair or firmware recovery takes 3-6 weeks. NAND swap cases run 4-8 weeks. A +$100 rush fee to move to the front of the queue is available to move ahead in the queue.
Does the Surface Pro X use the same SSD as Intel Surface models?
The Surface Pro X (SQ1/SQ2, Qualcomm-based) uses standard M.2 2230 NVMe drives, typically Kioxia BG4 or WD SN530. The SSD door access method is the same as other modern Surface Pro models. The ARM processor doesn't change the storage architecture or recovery approach. BitLocker still binds to the TPM, and the NVMe controller is the same OEM silicon found in Intel variants. Recovery procedures are identical regardless of the CPU platform.
My Surface won't turn on after getting wet. Can the data be recovered?
Liquid damage on a Surface mainboard corrodes traces & shorts power rails. The SSD's data is intact on the NAND; the failure is in the board's power delivery to the storage controller and TPM. Board-level repair starts with ultrasonic cleaning to remove corrosion, then component-level diagnosis using FLIR thermal imaging to locate shorted ICs. If the TPM and storage controller can be restored, BitLocker decrypts normally and the data can be imaged. Circuit board repair runs $600–$900. If the TPM is corroded beyond repair, the BitLocker recovery key is the only decryption path.
Can I recover data from a Surface with a cracked screen?
A cracked screen alone doesn't affect data access. If the board still boots, connect an external monitor via USB-C or Surface Dock and copy your files directly. If the board doesn't boot (the screen crack was caused by a drop that also damaged internal components), the recovery depends on which components failed. A drop-damaged mainboard with a functional TPM and storage controller can often be repaired at the board level to restore data access.

Surface not booting?

We accept all Surface models. Free evaluation. Board-level repair for encrypted Surface storage. No data, no fee.

(512) 212-9111Mon-Fri 10am-6pm CT
No diagnostic fee
No data, no fee
4.9 stars, 1,837+ reviews