There is no easy way to decrypt without rclone and you would need the exact same information to do so (password1 and password2/salt). It is therefore far easiest to use rclone.
You don’t need rclone.conf, but you do need all the information to rebuild the exact same crypt remote, that is something like this:
[myEncryptedRemote]
type = crypt
remote = myRemote:encryptedFolder
password = ObfuscatedPassword1
password2 = ObfuscatedPassword2
filename_encryption = standard
directory_name_encryption = true
You can either enter this directly in the rclone.conf file or you can use rclone config to create the entry (in this case you use your clear text passwords).
It really depends on whether you have saved your passwords in clear text or obfuscated. I am sure @asdffdsa will guide you to the right choice once you get to it.
if you run a command such as rclone lsd gdrive: -R
this will list all the folders in the drive, can you find the top level folder containing the crypted folders.
we will need that to setup the crypted remote.
2 .create a remote inside the rclone.conf file itself, without using rclone config
it should look something like this, just paste the obfuscated password as is.
and make sure, the filename and directory settings are the same as before.
[gcrypt]
type = crypt
remote = gdrive:backups/wsl/node3
filename_encryption = standard
directory_name_encryption = true
password = obfuscated.password.01
password2 = obfuscated.password.02
thanks, but I'm a little confused. Are you mentioning obfuscated passwords, because of the post above (deleted it) or is there no way to regenerate them from the original passwords? It's important, because I don't have the obfuscated passwords, but I hope that they could be generated? or do they change on each run of rclone config?