Veracrypt decrypts disks by creating a virtual unit with a letter from an encrypted volume path, eg: \Device\Harddisk0\Partition1 becomes F: which give access to the decrypted data. However if it's an ext4 filesystem, F: can't be read by Windows anyway.
Would it be possible for Ext4Fsd to then mount the drive by its letter instead of only allowing mounting from device paths? That is: veracrypt reads \Device\Harddisk0\Partition1 and creates F: decrypted, then Ext4Fsd reads F: and creates G: which can be used.
Does this make some sense at least?
Edit: I can see that Veracrypt also creates device paths like \Device\VeraCryptVolumeA for the decrypted partitions, so it should be possible to mount that if Ext4Fsd's Mount.exe allowed passing the full device path and not just the hard disk and partition numbers.
Veracrypt decrypts disks by creating a virtual unit with a letter from an encrypted volume path, eg:
\Device\Harddisk0\Partition1
becomesF:
which give access to the decrypted data. However if it's an ext4 filesystem,F:
can't be read by Windows anyway.Would it be possible for Ext4Fsd to then mount the drive by its letter instead of only allowing mounting from device paths? That is: veracrypt reads
\Device\Harddisk0\Partition1
and createsF:
decrypted, then Ext4Fsd readsF:
and createsG:
which can be used.Does this make some sense at least?
Edit: I can see that Veracrypt also creates device paths like
\Device\VeraCryptVolumeA
for the decrypted partitions, so it should be possible to mount that if Ext4Fsd'sMount.exe
allowed passing the full device path and not just the hard disk and partition numbers.