Bypassing Screenshares with Whiteout (Method 2, VeraCrypt)
Bypassing Screenshares with Whiteout (Method 2, VeraCrypt)**Should you not have a USB to use with Whiteout to bypass screenshares, there is an alternate method that will also work to hide Whiteout. This method uses Veracrypt, a free and open-source encryption software that, among other things, allows you to create a hidden volume. This volume can be mounted at any non-occupied drive letter, and has a inner "shell", and outer "shell". Both of these have their own passwords. Both of these shells are able to contain different files, while still being the same container file that VeraCrypt is able to mount. Hidden volumes are indistinguishable from normal VeraCrypt volumes, making banning for this method non-viable (doesn't mean it won't happen, it just shouldn't as people legitimately use VeraCrypt on a daily basis.) Outlined below are steps for hiding Whiteout in a VeraCrypt hidden volume. While there are many variations on this method that will also work, I find this method to be the simplest method involving VeraCrypt. Step 1: Download and Install VeraCrypt To use this method, you need VeraCrypt. Download it here. Choose the installer:
Click through the setup, until you're able to launch VeraCrypt and get to this menu:
Step 2: Create a Hidden Volume Now that you have VeraCrypt installed, you can create a hidden volume. Click the "Volumes" tab, then press "Create New Volume". You will see this window appear:
Hit "Next". Select "Hidden VeraCrypt volume" on the next page:
Hit "Next". Continue with the default selection of "Normal mode" on the next page:
Then hit "Next". The next step of the volume creation will ask you where you'd like to put your container file:
I recommend you put the file somewhere that would make sense, and name it something inconspicuous/personal. Something like "Family Photos", or "Childhood Pictures", you get the idea. As always, a name that is unique to you that you can explain when asked is always best. After hitting "Next", you will see this window appear:
Hit "Next". The defaults on this page are fine.
Press "Next" again. You will see a window appear with size options:
This is configuring the size of the "outer" shell. This is the shell that you will have mounted when screenshared. As such, you should keep several files in this that are legitimate. Photos, an legitimate executable with the same name as the Whiteout executable, ect. I will explain what to put in what shell later on. I typically make my outer shell 1GB. Once you've selected a size, press "Next".
Input a password for the outer shell. Doesn't need to be complex, but it can't be the same as the inner shell. For this tutorial, I will be using "password" as my password. Once you have set a password, you will need to generate randomness to seed the key generation:
Move your mouse around over the window a little, then press "Format". Once completed, you will see this window:
Simply hit "Next". The next step is to create the "inner", hidden shell:
Press "Next to do so. Make your settings look like this, then hit "Next".
Select the size for the inner shell (doesn't need to be large, just big enough for the Whiteout executable), then press "Next":
The next requires you to select the password for the hidden shell. I will be using "password123" as my password.
Press "Next" once you've selected your password. Like before, move your mouse over the window a bit, then press "Format". Once it has finished formatting, you will see this screen:
You have now successfully created a hidden VeraCrypt volume, and may proceed to the next step. Step 3: Setting up the Hidden (Inner Shell) Volume Now that you've got a hidden VeraCrypt volume, it's time to set up Whiteout inside of it. To do this, mount the volume you just created by selecting a drive letter in the main VeraCrypt GUI, then pressing the "Select File" button:
A file explorer will open. Navigate to where you saved the hidden volume you created in step two, then select it and press "Open". Once selected, press the "Mount" button in the VeraCrypt GUI:
It will ask you to input a password:
Input the password you created for the hidden volume. For this tutorial, I set this password to "password123". Once entered, hit "OK". After it successfully mounts the volume, open a File Explorer and navigate to the mount. In my case, I mounted it on P:\
Open an incognito browser, and download the Whiteout executable into this folder. Once downloaded, you must rename it. What you set the name as is entirely dependent on your setup. For this tutorial, I'm going to call it "AnyDesk.exe". You must name it the name of a legitimate (non-cheat) executable file that you also have. AnyDesk works fine for this, because it's a standalone executable people launch and download often-- especially in a screenshare. Be creative though, as I've given this example in this tutorial, screenshare staff will know what to be suspicious of. By coming up with your own ideas and methods, you can avoid that. Note: In hindsight, having AnyDesk in a volume called "family photos" is a bit odd, but you get the idea. This only really matters if you're also going to be manually screenshared. Otherwise, this method bypasses all automated tools just fine. Step 4: Setting up the Outer Volume This is the volume that you will have mounted when you're screenshared. It will have the legitimate executable file that is named the same thing as the executable in the hidden volume. Unmount the hidden volume by opening the VeraCrypt GUI, and pressing "Dismount" with the volume selected.
Press "Mount", and you will be met with the password input prompt like before. We're mounting the outer volume, which I set to "password". It is important that you mount this at the same drive letter as the hidden one! I chose P:\. Once mounted, navigate to the P:\ drive. You will see that AnyDesk.exe is not in it anymore, meaning you've mounted the outer volume successfully. Put some files in this outer shell, some actual family photos, or other "private" things. I do not recommend putting actual private things in there, as a screenshare staff will likely look at this. Here is where you also put your legitimate, non-whiteout executable file. In my case, this is the actual AnyDesk. Note: It is important that you do not put this file in a subfolder! For example P:\Downloads\AnyDesk.exe. You may do this only if the same folder structure exists in the hidden volume as well. The paths must match.
You are now set up, and may dismount the outer volume. Step 5: Reboot To avoid leaving traces of moving all these files around and such, reboot your computer.
Launching WhiteoutNow that you're all set up, you can actually use Whiteout. Do the following steps **before opening Minecraft**. Whiteout will wait for Minecraft to open, and inject once it is. Step 1: Mount the Hidden Volume Select a drive letter, and mount the hidden volume (the one with the Whiteout executable in it). Once mounted, launch Whiteout:
Go back to the VeraCrypt GUI and dismount the hidden volume. VeraCrypt will warn you that you're unmounting a volume being used by an application, and if you'd like to forcefully dismount anyway:
Press "Yes", and the volume will dismount. Whiteout will function just fine regardless. Step 2: Mount the Outer Volume Now you must mount the outer volume. Select the same drive letter you mounted the hidden volume on, then mount it. This is the volume with the actual AnyDesk.exe (in my case). Step 3: Launch Minecraft Congratulations, you've successfully set up Whiteout to bypass should you get screenshared. Cheat like you normally would. If screenshared, simply destruct Whiteout and you will bypass.