Thus it is easy for anyone to audit my build process. Moreover, I have provided checksums (MD5, SHA256 and BLAKE2) which you can use to verify that the results of the above four procedures agree. Reading my Dockerfile and performing similar commands, you can build the executable on your host system. VeraCrypt is software for establishing and maintaining an on-the-fly-encrypted volume (data. ![]() You can build the Dockerfile yourself, and producing the executable on your own hardware. Free disk encryption software based on TrueCrypt. You can download an image from Docker Hub containing the executable as the result of an automated build of my Dockerfile. You can simply download the resulting executable. To remedy this situation, I created a Dockerfile called docker-build-veracrypt which generates a reproducible build of the VeraCrypt executable, directly from the publicly available source code of VeraCrypt and wxWidgets on GitHub. ![]() ![]() All of the other answers rely on trusting somebody to compile VeraCrypt for you, with no possibility to check whether or not the executable has been tampered with.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |