I did the following steps.
mv ~/.local/share/keyrings/login.keyring ~/.local/share/keyrings/login.keyring.bakup- Reboot computer
- Choose
advanced options->recovery->boot as root
This got me to root terminal. Password was not required.
Now I can do whatever I want, e.i. format the disk. Or I can do better. I've created a new unwanted_user and added it to sudoers group. Moved the keyring from login.keyring.bakup to login.keyring, while keeping permissions. Rebooted Ubuntu one more time. I could have installed SSH-server, connect to this computer from a remote location, do my stuff, cleanup logs and delete the unwanted_user.
Sure, an admin in a government security office would lock his computer, notice that the computer is now at a login screen, check logs, have surveillance cameras, etc.
But what if I am a layman, hiding my private documents in a folder, owned by root? Anyone familiar with Linux can repeat these steps. Is this a feature or a bug. Can I disable this unwanted keyring service? I've uninstalled the seahorse, but the same steps worked again.