When you mount a VeraCrypt volume, the unencrypted files are made available to the operating system, and as a consequence, they are potentially available to malware as well.
1 Like
When you mount a VeraCrypt volume, the unencrypted files are made available to the operating system, and as a consequence, they are potentially available to malware as well.