New VeraCrypt Version Released

Discussion in 'privacy technology' started by JRViejo, Oct 17, 2016.

  1. guest

    guest Guest

    Data will be stored encrypted and the encryption is done on-the-fly.
     
  2. brians08

    brians08 Registered Member

    Joined:
    Apr 27, 2008
    Posts:
    102
    To clarify, data is always encrypted on the disk. When data is read into memory it is decrypted and when data is written to disk it is encrypted. This is the definition of on the fly encryption.
    There are many ways for system encryption to "go wrong" so make backups of critical data!
    I encourage you to read the VeraCrypt documentation. It is very well written and explains all the "under the hood" stuff plus there are details on how to recover when something goes wrong.
     
  3. lucd

    lucd Registered Member

    Joined:
    Jan 30, 2018
    Posts:
    782
    Location:
    Island of Woman
    Any advice on what to avoid to prevent my data being easily decrypted? I've heard of dangers of hyberfil.sys so I deleted that long ago.


    secondly would you use PIM in my case? My vera password is not too hard (12+ char.) I want basic protection and fastest boot possible
     
    Last edited: May 21, 2019
  4. brians08

    brians08 Registered Member

    Joined:
    Apr 27, 2008
    Posts:
    102
    The answer to your question is not simple. First, I am pretty sure that hyberfil.sys is encrypted as part of the system. However, if you have multiple disks and/or partitions, you would need to make sure pagefiles are not being written to unencrypted areas.
    First, you need to figure out how to use a longer password. 12 chars. is just not enough. You can add PIM but note that VC already increases the PIM for short passwords. Again, read the manual. All this and more is in there.
     
  5. guest

    guest Guest

    VeraCrypt v1.24 Beta 6 (October 3, 2019)
    Website
    Announcement
    Download (SourceForge)
    Changes between 1.24 Beta 5 and 1.24 Beta 6:
    • Windows:
      • Implement RAM encryption for keys and passwords using ChaCha12 cipher, t1ha non-cryptographic fast hash and ChaCha20 based CSPRNG.
        • Available only on 64-bit machines.
        • Disabled by default. Can be enabled using option in UI.
        • Less than 10% overhead on modern CPUs.
        • Side effect: Windows Hibernate is not possible.
      • Several enhancements and fixes for EFI bootloader:
        • Implement timeout mechanism for password input. Set default timeout value to 3 minutes and default timeout action to "shutdown".
        • Implement new actions "shutdown" and "reboot" for EFI DcsProp config file.
        • Enhance Rescue Disk implementation of restoring VeraCrypt loader.
        • Fix ESC on password prompt during Pre-Test not starting Windows.
        • Add menu entry in Rescue Disk that enables starting original Windows loader.
        • Fix issue that was preventing Streebog hash from being selected manually during Pre-Boot authentication.
      • If "VeraCrypt" folder is missing from Rescue Disk, it will boot PC directly from bootloader stored on hard drive
        This makes it easy to create a bootable disk for VeraCrypt from Rescue Disk just by removing/renaming its "VeraCrypt" folder.
      • Resize some dialogs in Format and Mount Options to to fix some text truncation issues with non-English languages.
      • Fix high CPU usage when using favorites and add switch to disable periodic check on devices to reduce CPU load.
      • Minor UI changes.
      • Updates and corrections to translations and documentation.
    • MacOSX:
      • Add check on size of file container during creation to ensure it's smaller than available free disk space. Add CLI switch --no-size-check to disable this check.
    • Linux:
      • Make CLI switch --import-token-keyfiles compatible with Non-Interactive mode.
      • Add check on size of file container during creation to ensure it's smaller than available free disk space. Add CLI switch --no-size-check to disable this check.
     
  6. guest

    guest Guest

    VeraCrypt v1.24 Released (October 6, 2019)
    Website
    Announcement
    Download / Download (SourceForge)
    Release Notes
    1.24 released October 6, 2019

    Changes between 1.23-Hotfix-2 and 1.24 (6 October 2019) :
    • All OSs:
      • Increase password maximum length to 128 bytes in UTF-8 encoding for non-system volumes.
      • Add option to use legacy maximum password length (64) instead of new one for compatibility reasons.
      • Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to CPU RDRAND (http://www.chronox.de/jent.html)
      • Speed optimization of XTS mode on 64-bit machine using SSE2 (up to 10% faster).
      • Fix detection of CPU features AVX2/BMI2. Add detection of RDRAND/RDSEED CPU features. Detect Hygon CPU as AMD one.
    • Windows:
      • Implement RAM encryption for keys and passwords using ChaCha12 cipher, t1ha non-cryptographic fast hash and ChaCha20 based CSPRNG.
        • Available only on 64-bit machines.
        • Disabled by default. Can be enabled using option in UI.
        • Less than 10% overhead on modern CPUs.
        • Side effect: Windows Hibernate is not possible if VeraCrypt System Encryption is also being used.
      • Mitigate some memory attacks by making VeraCrypt applications memory inaccessible to non-admin users (based on KeePassXC implementation)
      • New security features:
        • Erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks
        • Add option when system encryption is used to erase all encryption keys from memory when a new device is connected to the system.
        • Add new driver entry point that can be called by applications to erase encryption keys from memory in case of emergency.
      • MBR Bootloader: dynamically determine boot loader memory segment instead of hardcoded values (proposed by neos6464)
      • MBR Bootloader: workaround for issue affecting creation of hidden OS on some SSD drives.
      • Fix issue related to Windows Update breaking VeraCrypt UEFI bootloader.
      • Several enhancements and fixes for EFI bootloader:
        • Implement timeout mechanism for password input. Set default timeout value to 3 minutes and default timeout action to "shutdown".
        • Implement new actions "shutdown" and "reboot" for EFI DcsProp config file.
        • Enhance Rescue Disk implementation of restoring VeraCrypt loader.
        • Fix ESC on password prompt during Pre-Test not starting Windows.
        • Add menu entry in Rescue Disk that enables starting original Windows loader.
          • Fix issue that was preventing Streebog hash from being selected manually during Pre-Boot authentication.
          • If "VeraCrypt" folder is missing from Rescue Disk, it will boot PC directly from bootloader stored on hard drive
            * This makes it easy to create a bootable disk for VeraCrypt from Rescue Disk just by removing/renaming its "VeraCrypt" folder.
      • Add option (disabled by default) to use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available.
      • Add mount option (both UI and command line) that allows mounting a volume without attaching it to the specified drive letter.
      • Update libzip to version 1.5.2
      • Do not create uninstall shortcut in startmenu when installing VeraCrypt. (by Sven Strickroth)
      • Enable selection of Quick Format for file containers creation. Separate Quick Format and Dynamic Volume options in the wizard UI.
      • Fix editor of EFI system encryption configuration file not accepting ENTER key to add new lines.
      • Avoid simultaneous calls of favorites mounting, for example if corresponding hotkey is pressed multiple times.
      • Ensure that only one thread at a time can create a secure desktop.
      • Updates and corrections to translations and documentation.
      • Resize some dialogs in Format and Mount Options to to fix some text truncation issues with non-English languages.
      • Fix high CPU usage when using favorites and add switch to disable periodic check on devices to reduce CPU load.
      • Minor UI changes.
    • MacOSX:
      • Add check on size of file container during creation to ensure it's smaller than available free disk space. Add CLI switch --no-size-check to disable this check.
    • Linux:
      • Make CLI switch --import-token-keyfiles compatible with Non-Interactive mode.
      • Add check on size of file container during creation to ensure it's smaller than available free disk space. Add CLI switch --no-size-check to disable this check.
     
  7. guest

    guest Guest

    VeraCrypt v1.24-Hotfix-1-Preview (October 20, 2019)
    Website
    Announcement
    Download (SourceForge)
    Changes between 1.24 and 1.24-Hotfix1-Preview (20 October 2019) :
    • Windows:
      • Fix 1.24 regression that caused system favorites not to mount at boot if VeraCrypt freshly installed.
      • Make VeraCrypt Expander able to resume expansion of volumes whose previous expansion was aborted before it finishes.
      • Add several robustness checks and validation in case of system encryption to better handle some corner cases.
      • Minor UI and documentation changes.
    • MacOSX:
      • Fix some devices and partitions not showing in the device selection dialog under OSX 10.13 and newer.
      • Fix keyboard tab navigation between password fields in "Volume Password" page of volume creation wizard.
      • Support APFS filesystem for creation volumes.
      • Support Dark Mode.
    • Linux:
      • Workaround gcc 4.4.7 bug under CentOS 6 that caused VeraCrypt built under CentOS 6 to crash when Whirlpool hash is used.
      • Fix "incorrect password attempt" written to /var/log/auth.log when mounting volumes.
      • Fix dropping file in UI not showing its correct path , specifically under GTK-3.
     
    Last edited by a moderator: Oct 27, 2019
  8. guest

    guest Guest

    VeraCrypt v1.24-Hotfix1 Released (October 27, 2019)
    Website
    Announcement
    Download / Download (SourceForge)
    Release Notes
    Changes between 1.24 and 1.24-Hotfix1 (27 October 2019) :
    • Windows:
      • Fix 1.24 regression that caused system favorites not to mount at boot if VeraCrypt freshly installed.
      • Fix failure to encrypt system if the current Windows username contains a Unicode non-ASCII character.
      • Make VeraCrypt Expander able to resume expansion of volumes whose previous expansion was aborted before it finishes.
      • Add several robustness checks and validation in case of system encryption to better handle some corner cases.
      • Add "Quick Expand" option to VeraCrypt Expander to accelarate the expansion of large file containers.
      • Minor UI and documentation changes.
    • Linux:
      • Workaround gcc 4.4.7 bug under CentOS 6 that caused VeraCrypt built under CentOS 6 to crash when Whirlpool hash is used.
      • Fix "incorrect password attempt" written to /var/log/auth.log when mounting volumes.
      • Fix dropping file in UI not showing its correct path , specifically under GTK-3.
      • Add missing JitterEntropy implementation.
    • MacOSX:
      • Fix some devices and partitions not showing in the device selection dialog under OSX 10.13 and newer.
      • Fix keyboard tab navigation between password fields in "Volume Password" page of volume creation wizard.
      • Add missing JitterEntropy implementation.
      • Support APFS filesystem for creation volumes.
      • Support Dark Mode.
     
  9. guest

    guest Guest

  10. guest

    guest Guest

    VeraCrypt v1.24-Update2-RC (December 12, 2019)
    Website
    Announcement
    Download (SourceForge)
    Changes between 1.24-Hotfix1 and 1.24-Update2-RC (12 December 2019) :
    • All OSes:
      • clear AES key from stack memory when using non-optimized implementation. Doesn't apply to VeraCrypt official build (Reported and fixed by Hanno Böck)
      • Update Jitterentropy RNG Library to version 2.2.0
      • Start following IEEE 1541 agreed naming of bytes (KiB, MiB, GiB, TiB, PiB).
      • Various documentation enhancements.
    • Windows:
      • Fix possible local privilege escalation vulnerability during execution of VeraCrypt Expander (CVE-2019-19501)
      • MBR bootloader:
        • workaround for SSD disks that don't allow write operations in BIOS mode with buffers less than 4096 bytes.
        • Don't restore MBR to VeraCrypt value if it is coming from a loader different from us or different from Microsoft one.
      • EFI bootloader:
        • Fix "ActionFailed" not working and add "ActionCancelled" to customize handling of user hitting ESC on password prompt
        • Fix F5 showing previous password after failed authentication attempt. Ensure that even wrong password value are cleared from memory.
      • Fix multi-OS boot compatibility by only setting VeraCrypt as first bootloader of the system if the current first bootloader is Windows one.
      • Add new registry flags for SystemFavoritesService to control updating of EFI BIOS boot menu on shutdown.
      • Allow system encrypted drive to be mounted in WindowsPE even if changing keyboard layout fails (reported and fixed by Sven Strickroth)
      • Enhancements to the mechanism preserving file timestamps, especially for keyfiles.
      • Fix RDRAND instruction not detected on AMD CPUs.
      • Detect cases where RDRAND is flawed (e.g. AMD Ryzen) to avoid using it if enabled by user.
      • Don't write extra 0x00 byte at the end of DcsProp file when modifying it through UI
      • Reduce memory usage of IOCTL_DISK_VERIFY handler used in disk verification by Windows.
      • Add switch /FastCreateFile for VeraCrypt Format.exe to speedup creation of large file container if quick format is selected.
      • Fix the checkbox for skipping verification of Rescue Disk not reflecting the value of /noisocheck switch specified in VeraCrypt Format command line.
      • check "TrueCrypt Mode" in password dialog when mounting a file container with .tc extension
      • Update XML languages files.
    • Linux:
      • Fix regression causing admin password to be requested too many times in some cases
      • Fix off by one buffer overflow in function Process::Execute (Reported and fixed by Hanno Böck)
      • Make sure password gets deleted in case of internal error when mounting volume (Reported and fixed by Hanno Böck)
      • Fix passwords using Unicode characters not recognized in text mode.
      • Fix failure to run VeraCrypt binary built for console mode on headless machines.
      • Add switch to force the use of legacy maximum password length (64 UTF8 bytes)
      • Add CLI switch (--use-dummy-sudo-password) to force use of old sudo behavior of sending a dummy password
      • During uninstall, output error message to STDERR instead of STDOUT for better compatibility with package managers.
      • Make sector size mismatch error when mounting disks more verbose.
      • Speedup SHA256 in 64-bit mode by using assembly code.
    • MacOSX:
      • Add switch to force the use of legacy maximum password length (64 UTF8 bytes)
      • Fix off by one buffer overflow in function Process::Execute (Reported and fixed by Hanno Böck)
      • Fix passwords using Unicode characters not recognized in text mode.
      • Make sector size mismatch error when mounting disks more verbose.
      • Speedup SHA256 in 64-bit mode by using assembly code.
      • Link against latest wxWidgets version 3.1.3
     
  11. guest

    guest Guest

    VeraCrypt v1.24 Update 2 Released (December 12, 2019)
    Website
    Announcement
    Download / Download (SourceForge)
    Release Notes
    1.24 Update 2 released December 12, 2019
    • All OSes:
      • clear AES key from stack memory when using non-optimized implementation. Doesn't apply to VeraCrypt official build (Reported and fixed by Hanno Böck)
      • Update Jitterentropy RNG Library to version 2.2.0
      • Start following IEEE 1541 agreed naming of bytes (KiB, MiB, GiB, TiB, PiB).
      • Various documentation enhancements.
    • Windows:
      • Fix possible local privilege escalation vulnerability during execution of VeraCrypt Expander (CVE-2019-19501)
      • MBR bootloader:
        • workaround for SSD disks that don't allow write operations in BIOS mode with buffers less than 4096 bytes.
        • Don't restore MBR to VeraCrypt value if it is coming from a loader different from us or different from Microsoft one.
      • EFI bootloader:
        • Fix "ActionFailed" not working and add "ActionCancelled" to customize handling of user hitting ESC on password prompt
        • Fix F5 showing previous password after failed authentication attempt. Ensure that even wrong password value are cleared from memory.
      • Fix multi-OS boot compatibility by only setting VeraCrypt as first bootloader of the system if the current first bootloader is Windows one.
      • Add new registry flags for SystemFavoritesService to control updating of EFI BIOS boot menu on shutdown.
      • Allow system encrypted drive to be mounted in WindowsPE even if changing keyboard layout fails (reported and fixed by Sven Strickroth)
      • Enhancements to the mechanism preserving file timestamps, especially for keyfiles.
      • Fix RDRAND instruction not detected on AMD CPUs.
      • Detect cases where RDRAND is flawed (e.g. AMD Ryzen) to avoid using it if enabled by user.
      • Don't write extra 0x00 byte at the end of DcsProp file when modifying it through UI
      • Reduce memory usage of IOCTL_DISK_VERIFY handler used in disk verification by Windows.
      • Add switch /FastCreateFile for VeraCrypt Format.exe to speedup creation of large file container if quick format is selected.
      • Fix the checkbox for skipping verification of Rescue Disk not reflecting the value of /noisocheck switch specified in VeraCrypt Format command line.
      • check "TrueCrypt Mode" in password dialog when mounting a file container with .tc extension
      • Update XML languages files.
    • Linux:
      • Fix regression causing admin password to be requested too many times in some cases
      • Fix off by one buffer overflow in function Process::Execute (Reported and fixed by Hanno Böck)
      • Make sure password gets deleted in case of internal error when mounting volume (Reported and fixed by Hanno Böck)
      • Fix passwords using Unicode characters not recognized in text mode.
      • Fix failure to run VeraCrypt binary built for console mode on headless machines.
      • Add switch to force the use of legacy maximum password length (64 UTF8 bytes)
      • Add CLI switch (--use-dummy-sudo-password) to force use of old sudo behavior of sending a dummy password
      • During uninstall, output error message to STDERR instead of STDOUT for better compatibility with package managers.
      • Make sector size mismatch error when mounting disks more verbose.
      • Speedup SHA256 in 64-bit mode by using assembly code.
    • MacOSX:
      • Add switch to force the use of legacy maximum password length (64 UTF8 bytes)
      • Fix off by one buffer overflow in function Process::Execute (Reported and fixed by Hanno Böck)
      • Fix passwords using Unicode characters not recognized in text mode.
      • Make sector size mismatch error when mounting disks more verbose.
      • Speedup SHA256 in 64-bit mode by using assembly code.
      • Link against latest wxWidgets version 3.1.3
     
  12. guest

    guest Guest

    Linux
    VeraCrypt v1.24 Update 3 Released (December 21, 2019)
    Website
    Download / Download (SourceForge)
    Release Notes
     
  13. guest

    guest Guest

    VeraCrypt v1.24 Update 4 Released (January 23, 2020)
    Website
    Announcement
    Download / Download (SourceForge)
    Release Notes
    1.24-Update4 (January 23rd, 2020):
    • Windows:
      • Fix regression in Expander and Format when RAM encryption is enable that was causing volume headers to be corrupted.
      • Fix failure of Screen Readers (Accessibility support) to read UI by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed.
      • Fix side effects related to the fix for CVE-2019-19501 which caused links in UI not to open.
      • Add switch /signalExit to support notifying WAITFOR Windows command when VeraCrypt.exe exits if /q was specified in CLI (cf documentation for usage).
      • Don't display mount/dismount examples in help dialog for command line in Format and Expander.
      • Documentation and translation updates.
    • Linux:
      • Fix regression that limited the size available for hidden volumes created on disk or partition.
    • MacOSX:
      • Fix regression that limited the size available for hidden volumes created on disk or partition.
     
  14. guest

    guest Guest

  15. guest

    guest Guest

    VeraCrypt v1.24 Update 5 Released (March 9, 2020)
    Website
    Download / Download (SourceForge)
    Release Notes
    1.24-Update5 (March 9th, 2020):
    • Windows:
      • Optimize performance for CPUs that have more than 64 logical processors (contributed by Sachin Keswani from AMD)
      • Support specifying keyfiles (both in tokens and in filesystem) when creating file containers using command line (switches /keyfile, /tokenlib and /tokenpin supported in VeraCrypt Format)
      • Fix leak of keyfiles path and name after VeraCrypt process exits.
      • Add CLI switch /secureDesktop to VeraCrypt Format.
      • Update libzip to version 1.6.1
      • Minor UI fixes
     
  16. guest

    guest Guest

    VeraCrypt v1.24 Update 6 Released (March 10, 2020)
    Website
    Announcement
    Download / Download (SourceForge)
    Release Notes
     
  17. Surt

    Surt Registered Member

    Joined:
    Jan 23, 2019
    Posts:
    471
    Location:
    USA
    I run VeraCrypt as a portable for my containers and use the .hc file extension for the container files. Been doing that since VC came out and prior to that, the .tc extension in TrueCrypt going on years and years.

    VeraCrypt not being "installed" on my new desktop PC, having to manually associate .hc with VeraCrypt-x64.exe was necessary in Win10's wonderful 48-screen-deep "Choose default apps by file type" wasted space desolate Settings GUI .

    Except, I got an "error while parsing command line" dialogue upon attempting to open a container.

    In NirSoft's FileTypesMan I discovered that a "%1" had been appended to the command for some reason.
    hc4WS.jpg
    In removing that, VeraCrypt opens for the .hc file as expected, with the drive letter and file path already waiting on just a Mount button click, eminently convenient. History not needed...
    hc4WS2.jpg
    This is posted within Public Services for VeraCrypt Users© guidelines.
     
    Last edited: Apr 27, 2020
  18. guest

    guest Guest

    VeraCrypt v1.24 Update 7 Preview 07-22 Released (July 22, 2020)
    Website
    Download (SourceForge)
    Changes between 1.24-Update6 and 1.24-Update7-Preview-7-22 (22 July 2020) :

    - All OSes:
    * Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume
    * Fix random crash in 32-bit builds when using Streebog.
    * Enable FIPS mode in JitterEntropy random generator.
    * Minor code cleanup

    - Windows:
    * Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled
    * Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.
    * Support password drag-n-drop from external applications (e.g. KeePass) to password UI fields which is more secure than using clipboard.
    * Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entring power saving mode more reliable.
    * Avoid displaying waiting dialog when /silent specified for "VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT.
    * Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
    * Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
    * Don't allow to encrypt the system drive if it is already encrypted by BitLocker.
    * Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.
    * Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.
    * Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.
    * Update translations.

    - Linux/MacOSX:
    * Force reading of at least 32 bytes from /dev/random before allowing it to fail gracefully
    * Allow choosing a filesystem other than FAT for Outer volume but display warning about risks of such choice. Implement an estimation of maximum possible size of hidden volume in this case.
    * Erase sensitive memory explicitly instead of relying on the compiler not optimizing calls to method Memory::Erase.
     
  19. guest

    guest Guest

    VeraCrypt v1.24 Update 7 Preview 08-03 Released (August 3, 2020)
    Website
    Download (SourceForge)
    (changes compared to 1.24-Update7-Preview-7-22:
    * Update Beginner's Tutorial in documentation to use "MyVolume.hc" instead of "My Volume" for file container name in order to avoid confusion about nature of file nature.
    * Fix UI for blocking TRIM in system encryption not working in MBR boot mode. Don't allow a directory path to be entered for the file container to be created in Format wizard.
    * Don't try to use fix for CVE-2019-19501 if Windows Shell has been modified or is not runnng since there is no reliable way to fix it in such non standard configuation.
    * MBR bootloader: fix incorrect compressed data size passed to decompressor in boot sector.
    * Update libzip to latest version 1.7.3.
    )

    Changes between 1.24-Update6 and 1.24-Update7-Preview-8-3 (3 August 2020) :

    - All OSes:
    * Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume
    * Fix random crash in 32-bit builds when using Streebog.
    * Enable FIPS mode in JitterEntropy random generator.
    * Update Beginner's Tutorial in documentation to use "MyVolume.hc" instead of "My Volume" for file container name in order to avoid confusion about nature of file nature.
    * Minor code cleanup

    - Windows:
    * Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled
    * Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.
    * Fix UI for blocking TRIM in system encryption not working in MBR boot mode.
    * Support password drag-n-drop from external applications (e.g. KeePass) to password UI fields which is more secure than using clipboard.
    * Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entring power saving mode more reliable.
    * Avoid displaying waiting dialog when /silent specified for "VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT.
    * Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
    * Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
    * Don't allow to encrypt the system drive if it is already encrypted by BitLocker.
    * Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.
    * Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.
    * Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.
    * Don't allow a directory path to be entered for the file container to be created in Format wizard.
    * Don't try to use fix for CVE-2019-19501 if Windows Shell has been modified or is not running since there is no reliable way to fix it in such non standard configuation.
    * MBR bootloader: fix incorrect compressed data size passed to decompressor in boot sector.
    * Update libzip to latest version 1.7.3.
    * Update translations.

    - Linux/MacOSX:
    * Force reading of at least 32 bytes from /dev/random before allowing it to fail gracefully
    * Allow choosing a filesystem other than FAT for Outer volume but display warning about risks of such choice. Implement an estimation of maximum possible size of hidden volume in this case.
    * Erase sensitive memory explicitly instead of relying on the compiler not optimizing calls to method Memory::Erase.
    * Update wxWidgets for static builds to version 3.0.5.
     
  20. guest

    guest Guest

    VeraCrypt v1.24 Update 7 Preview 8-5 Released (August 5, 2020)
    Website
    Download (SourceForge)
     
  21. guest

    guest Guest

    VeraCrypt v1.24 Update 7 Released (August 7, 2020)
    Website
    Announcement
    Download / Download (SourceForge)
    Release Notes
    1.24 Update 7 released August 7, 2020
    • All OSes:
      • Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume.
      • Fix random crash in 32-bit builds when using Streebog.
      • Enable FIPS mode in JitterEntropy random generator.
      • Update Beginner's Tutorial in documentation to use "MyVolume.hc" instead of "My Volume" for file container name in order to avoid confusion about nature of file nature.
      • Minor code cleanup.
    • Windows:
      • Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled.
      • Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.
      • Fix UI for blocking TRIM in system encryption not working in MBR boot mode.
      • Support password drag-n-drop from external applications (e.g. KeePass) to password UI fields which is more secure than using clipboard.
      • Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entring power saving mode more reliable.
      • Avoid displaying waiting dialog when /silent specified for "VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT.
      • Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
      • Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
      • Don't allow to encrypt the system drive if it is already encrypted by BitLocker.
      • Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.
      • Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.
      • Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.
      • Don't allow a directory path to be entered for the file container to be created in Format wizard.
      • Don't try to use fix for CVE-2019-19501 if Windows Shell has been modified or is not running since there is no reliable way to fix it in such non standard configuation.
      • MBR bootloader: fix incorrect compressed data size passed to decompressor in boot sector.
      • Add warning message when typed password reaches maximum length during the system encryption wizard.
      • Fix wrong error message when UTF-8 encoding of entered password exceeds the maximum supported length.
      • Update libzip to latest version 1.7.3.
      • Update translations.
    • Linux/MacOSX:
      • Force reading of at least 32 bytes from /dev/random before allowing it to fail gracefully.
      • Allow choosing a filesystem other than FAT for Outer volume but display warning about risks of such choice. Implement an estimation of maximum possible size of hidden volume in this case.
      • Erase sensitive memory explicitly instead of relying on the compiler not optimizing calls to method Memory::Erase.
      • Add support for Btrfs filesystem when creating volumes (Linux Only).
      • Update wxWidgets for static builds to version 3.0.5.
     
  22. mantra

    mantra Registered Member

    Joined:
    Jan 25, 2005
    Posts:
    6,181
    hi @mood
    there are 2 versions for the first time,arent' they ?
    one for winows 8 and 10 , a second for xp ,vista and windows 7
    i guess it's only for this feature
    i don't use mordern standby , seeing i use a portable version do you think can i use the windows 8 and above on my w7 ?
    thanks
     
  23. guest

    guest Guest

    The only difference between the standard and the "Legacy"-version is the digital signature of the executables.
    To not run into issues better use the Legacy verson on Windows 7 and earlier (as already mentioned on the website)
     
  24. guest

    guest Guest

  25. guest

    guest Guest

    Some future changes:
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.