I recommend using the cloudflare.com client certificate feature, which can block malicious commits based on the certificate.
I'm using Portable Mode to release, brand new catalog, I'm sure there is no confusion with the old version.
I found that the veracrypt.sys veracrypt-x64.sys released by 1.26.14 is still 1.26.13 It is recommended to add the version verification of file attributes
可以参考其它虚拟磁盘格式,例如VMDK、VHDX
Do you plan to implement decimal points in the next version? https://sourceforge.net/p/veracrypt/discussion/features/thread/fefca6baa7/
It looks like it will have to be combined with other steganography tools, the embedding method is only good for simply avoiding detection. @jertzukka
1, after embedding the hidden volume, I viewed the hexadecimal data and did not find any obvious anomalies in the data pattern (I'm using VeraCrypt 1.26.12) 2, download the file, is directly access to the disk, so it will overwrite the data left in the disk (hidden volume can be plausibly denied, even if the data pattern is abnormal) 3, if you find a suitable encrypted file extension, such as encrypted zip, encrypted gho backup, etc. (embedded hidden volume will be more reasonable?)
The file volume does not have a recognizable header that matches the suffix, which is suspicious in itself Hide the volume and write it to normal files, which is easier to deceive detection Disguise as downloading an incomplete file, which is more reasonable (with a recognizable header) For these reasons, I recommend adding this feature (although I can do it with other tools) @idrassi