@@ -19,7 +19,7 @@ comparison:
19
19
header : |
20
20
<div class="inline-flex flex-col-reverse gap-2 items-center">
21
21
<span class="font-normal">VeraCrypt</span>
22
- <img class="max-w-16 h-12" src="/img/comparisons/veracrypt-logo.svg">
22
+ <img class="max-w-16 h-12" src="/img/comparisons/veracrypt-logo.svg" aria-hidden="true" >
23
23
</div>
24
24
footer : |
25
25
<a class="btn btn-outline-primary w-full px-2 md:px-4 py-1 md:py-1" href="/comparisons/veracrypt-alternative/" data-umami-event="comparisons-veracrypt-cta">Full Comparison</a>
@@ -101,13 +101,13 @@ It is designed to encrypt local and external drives, allowing users to secure en
101
101
<th class="font-h3 font-normal text-left text-xs lg:text-sm leading-relaxed p-2 lg:p-4">
102
102
<div class="inline-flex flex-col-reverse gap-2 items-center">
103
103
<span class="font-headline font-bold text-primary">CRYPTOMATOR</span>
104
- <img class="max-w-16 h-12" src="/img/logo.svg">
104
+ <img class="max-w-16 h-12" src="/img/logo.svg" aria-hidden="true" >
105
105
</div>
106
106
</th>
107
107
<th class="font-h3 font-normal text-left text-xs lg:text-sm leading-relaxed p-2 lg:p-4">
108
108
<div class="inline-flex flex-col-reverse gap-2 items-center">
109
109
<span class="font-normal">VeraCrypt</span>
110
- <img class="max-w-16 h-12" src="/img/comparisons/veracrypt-logo.svg">
110
+ <img class="max-w-16 h-12" src="/img/comparisons/veracrypt-logo.svg" aria-hidden="true" >
111
111
</div>
112
112
</th>
113
113
</tr>
@@ -162,7 +162,7 @@ VeraCrypt offers more customization and greater control over encryption, but thi
162
162
163
163
Both tools use AES-256 as their primary algorithm, which is widely considered one of the most secure encryption standards.
164
164
165
- VeraCrypt also allows the use of other algorithms such as:
165
+ VeraCrypt also allows the use of other algorithms, such as:
166
166
167
167
- Serpent
168
168
- Twofish
0 commit comments