I believe that we are talking about this reception . The method consists in switching between two partition tables, each of which has one partition. In one of them, when creating the file system, a section received a large sequence of "broken blocks" at the input, bypassing the location of the section from the second table.
On the flash drive, only one of these two is visible at a time, switching occurs by ... rewriting the partition table.

It is assumed that in the normal state the flash drive contains a partition table, from which only the file system with the "green" space is visible. When "quietly and quietly", you can write another partition table (using a tip to keep it in the last sector of the disk, you just need to bypass it with other tools) and thereby gain access to the "secret partition", losing access to the main one. Having done the job, you can return the original partition table back by returning the flash drive to its normal state.
What file systems will be on the external and internal partitions is completely unimportant (as long as the file system is able to bypass the "bad" blocks). Windows can easily see both partitions provided that the partition table is rewritten (and the operating system is aware of this fact) and a compatible file system on them (for example, FAT32). That is, if you forget to return the original partition table to its place, Windows in this case will successfully see the secret partition.
This section should not be made large because the “bad blocks” within the file system are usually listed as “always busy” in all sorts of graphical tools. So if the disk is empty (there are no files and folders, including hidden ones), and a significant amount of space is occupied on it (much more than on the disk of the whole “raw place” minus the FS structure), then this may be a signal that that the disk has a similar thing.