Note to users who created volumes with 1. 17 version of VeraCrypt or earlier:
To avoid hinting whether your volumes contain a hidden volume or not , or if you depend on plausible deniability when using hidden volumes / OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1. 18 a version of VeraCrypt.
1.(October 6) th, 2019):
- All OSs:
- Increase password maximum length to 128 bytes in UTF-8 encoding for non-system volumes.
- Add option to use legacy maximum password length (64) instead of new one for compatibility reasons.
- Use Hardware RNG based on CPU timing jitter “Jitterentropy” by Stephan Mueller as a good alternative to CPU RDRAND (http://www.chronox.de/jent.html)
- Speed optimization of XTS mode on 64 – bit machine using SSE2 (up to 10% faster).
- Fix detection of CPU features AVX2 / BMI2. Add detection of RDRAND / RDSEED CPU features. Detect Hygon CPU as AMD one.
- Windows:
- Implement RAM encryption for keys and passwords using ChaCha 12 cipher, t1ha non-cryptographic fast hash and ChaCha 20 based CSPRNG.
- Available only on 64 – bit machines.
- Disabled by default. Can be enabled using option in UI.
- Less than 10% overhead on modern CPUs.
- Side effect: Windows Hibernate is not possible if VeraCrypt System Encryption is also being used.
- Mitigate some memory attacks by making VeraCrypt applications memory inaccessible to non-admin users ( based on KeePassXC implementation)
- New security features:
- Erase system encryption keys from memory during shutdown / reboot to help mitigate some cold boot attacks
- Add option when system encryption is used to erase all encryption keys from memory when a new device is connected to the system.
- Add new driver entry point that can be called by applications to erase encryption keys from memory in case of emergency.
- MBR Bootloader: dynamically determine boot loader memory segment instead of hardcoded values (proposed by Neos 6464)
- MBR Bootloader: workaround for issue affecting creation of hidden OS on some SSD drives.
- Fix issue related to Windows Update breaking VeraCrypt UEFI bootloader.
- Several enhancements and fixes for EFI bootloader:
- Implement timeout mechanism for password input. Set default timeout value to 3 minutes and default timeout action to “shutdown”.
- Implement new actions “shutdown” and “reboot” for EFI DcsProp config file.
- Enhance Rescue Disk implementation of restoring VeraCrypt loader.
- Fix ESC on password prompt during Pre-Test not starting Windows.
- Add menu entry in Rescue Disk that enables starting original Windows loader.
- Fix issue that was preventing Streebog hash from being selected manually during Pre-Boot authentication.
- If “VeraCrypt” folder is missing from Rescue Disk, it will boot PC directly from bootloader stored on hard drive
- This makes it easy to create a bootable disk for VeraCrypt from Rescue Disk just by removing / renaming its “VeraCrypt” folder.
- Add option (disabled by default) to use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available.
- Add mount option (both UI and command line) that allows mounting a volume without attaching it to the specified drive letter.
- Update libzip to version 1.5.2
- Do not create uninstall shortcut in startmenu when installing VeraCrypt. (by Sven Strickroth) ***************
- Enable selection of Quick Format for file containers creation. Separate Quick Format and Dynamic Volume options in the wizard UI.
- Fix editor of EFI system encryption configuration file not accepting ENTER key to add new lines.
- Avoid simultaneous calls of favorites mounting, for example if corresponding hotkey is pressed multiple times.
- Ensure that only one thread at a time can create a secure desktop.
- Resize some dialogs in Format and Mount Options to fix some text truncation issues with non-English languages.
- Fix high CPU usage when using favorites and add switch to disable periodic check on devices to reduce CPU load.
- Minor UI changes.
- Updates and corrections to translations and documentation.
- MacOSX:
- Add check on size of file container during creation to ensure it’s smaller than available free disk space. Add CLI switch –no-size-check to disable this check.
- Linux:
- Make CLI switch –import-token-keyfiles compatible with Non-Interactive mode.
- Add check on size of file container during creation to ensure it’s smaller than available free disk space. Add CLI switch –no-size-check to disable this check.
1. 23 – Hotfix-2(October 8th, 2018):
- Windows:
- Fix low severity vulnerability inherited from TrueCrypt that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes).
- Reported by Tim Harrison.
- Disable quick format when creating file containers from command line. Add / quick switch to enable it in this case if needed.
- Add / nosizecheck switch to disable checking container size against available free space during its creation.
- This enables to workaround a bug in Microsoft Distributed File System (DFS).
- Fix low severity vulnerability inherited from TrueCrypt that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes).
1. 23(September 12th, 2018):
- Windows:
- VeraCrypt is now compatible with default EFI SecureBoot configuration for system encryption.
- Fix EFI system encryption issues on some machines (e.g. HP, Acer).
- Support EFI system encryption on Windows LTSB.
- Add compatibility of system encryption with Windows 10 upgrade using ReflectDrivers mechanism
- Make EFI Rescue Disk decrypt partition correctly when Windows Repair overwrites first partition sector.
- Add Driver option in the UI to explicitly allow Windows 8.1 and Windows 10 defragmenter to see VeraCrypt encrypted disks.
- Add internal verification of binaries embedded signature to protect against some types to tampering attacks.
- Fix Secure Desktop not working for favorites set to mount at logon on Windows 10 under some circumstances.
- when Secure Desktop is enabled, use it for Mount Options dialog if it is displayed before password dialog.
- when extracting files in Setup or Portable mode, decompress zip files docs.zip and Languages.zip in order to have ready to use configuration.
- Display a balloon tip warning message when text pasted to password field is longer than maximum length and so it will be truncated.
- Implement language selection mechanism at the start of the installer to make easier for international users.
- Add check on size of file container during creation to ensure it’s smaller than available free disk space.
- Fix buttons at the bottom not shown when user sets a large system font under Window 7.
- Fix compatibility issues with some disk drivers that don’t support IOCTL_DISK_GET_DRIVE_GEOMETRY_EX ioctl.
- MacOSX:
- Support pasting values to password fields using keyboard (CMD V and CMD A now working properly ).
- Add CheckBox in mount option dialog to force the use of embedded backup header during mount.
- When performing backup of volume header, automatically try to use embedded backup header if using the main header fails.
- Implement benchmarking UI for Hash and PKCS-5 PRF algorithms.
- Linux:
- Don’t allow waiting dialog to be closed before the associated operation is finished. This fix a crash under Lubuntu 16. 04.
- Add CheckBox in mount option dialog to force the use of embedded backup header during mount.
- When performing backup of volume header, automatically try to use embedded backup header if using the main header fails.
- Implement benchmarking UI for Hash and PKCS-5 PRF algorithms.
- Remove limitation of hidden volume protection on disk with sector size larger than 512 bytes.
1. 22(March 30th, 2018):
- All OSs:
- SIMD speed optimization for Kuznyechik cipher implementation (up to 2x speedup).
- Add 5 new cascades of cipher algorithms: Camellia-Kuznyechik, Camellia-Serpent, Kuznyechik-AES, Kuznyechik-Serpent-Camellia and Kuznyechik-Twofish.
- Windows:
- MBR Bootloader: Fix failure to boot hidden OS on some machines.
- MBR Bootloader: Reduce CPU usage during password prompt.
- Security enhancement: Add option to block TRIM command for system encryption on SSD drives.
- Implement TRIM support for non-system SSD drives and add option to enable it (TRIM is disabled by default for non-system volumes).
- Better fix for “Parameter Incorrect” issues during EFI system encryption in some machines.
- Driver: remove unnecessary dependency to wcsstr which can cause issues on some machines.
- Driver: Fix “Incorrect Parameter” error when mounting volumes on some machines.
- Fix failure to mount system favorites during boot on some machines.
- Fix current application losing focus when VeraCrypt is run in command line with / quit / silent switches.
- Fix some cases of external applications freezing during mount / dismount.
- Fix rare cases of secure desktop for password dialog not visible which caused UI to block.
- Update libzip to version 1.5.0 that include fixes for some security issues.
- Extend Secure Desktop feature to smart card PIN entry dialog.
- Fix truncated license text in installer wizard.
- Add portable package that allows extracting binaries without asking for admin privileges.
- Simplify format of language XML files.
- Workaround for cases where password dialog doesn’t get keyboard focus if Secure Desktop is not enabled.
- Linux:
- Fix failure to install GUI version under recent versions of KDE.
- Fix wxWidgets assertion failed when backing up / restoring volume header.
- MacOSX:
- Fix issue preventing some local help files from opening in the browser.
1. 21(July 9th, 2017):
- All OSs:
- Fix 1. 20 regression crash when running on CPU not supporting extended features.
- Windows:
- Fix 1. 20 regression that caused PIM value stored in favorites to be ignored during mount.
- Fix 1. 20 Regression that causes system favorites not to mount in some cases.
- Fix some cases of “Parameter Incorrect” error during EFI system encryption wizard.
- Install PDF documents related to EFI system encryption configuration for advanced users:
- disk_encryption_v1_2.pdf related to EFI hidden OS and full fisk encryption
- dcs_tpm_owner _ 02 .pdf related to TPM configuration for EFI system encryption.
- Add support for building on FreeBSD.
1. 20(June 29th, 2017):
- All OSs:
- Use 64 -bit optimized assembly implementation of Twofish and Camellia by Jussi Kivilinna.
- Camellia 2.5 faster when AES-NI supported by CPU. 30% faster without it.
- Use optimized implementation for SHA – 512 / SHA 256.
- (% speedup on) – bit systems.
- Deploy local HTML documentation instead of User Guide PDF.
- Change links in UI from ones on Codeplex to ones hosted at veracrypt.fr
- Security: build binaries with support for Address Space Layout Randomization (ASLR).
- Use 64 -bit optimized assembly implementation of Twofish and Camellia by Jussi Kivilinna.
- Windows:
- Several fixes and modifications for EFI System Encryption:
- Fix bug in EFI system decryption using EFI Rescue Disk
- Add support for TPM 1.2 and TPM 2.0 (experimental) through DCS low level configuration.
- Add Support for EFI full disk encryption and hidden OS using manual procedure (not exposed in UI).
- Several fixes and modifications for EFI System Encryption:
- Enable using Secure Desktop for password entry. Add preferences option and command line switch (/ secureDesktop) to activate it.
- Use default mount parameters when mounting multiple favorites with password caching.
- Enable specifying PRF and TrueCryptMode for favorites.
- Preliminary driver changes to support EFI hidden OS functionality.
- Fix Streebog not recognized by / hash command line.
- Add support for ReFS filesystem on Windows 10 when creating normal volumes
- Fix high CPU usage when favorite configured to mount with VolumeID on arrival.
- Use CHM file for User Guide instead of PDF.
- Fix false warning in case of EFI system encryption about Windows not installed on boot drive.
- Enhancements to driver handling of various disk IOCTL.
- Enhancements to EFI bootloader. Add possibility to manually edit EFI configuration file.
- Driver Security: Use enhanced protection of NX pool under Windows 8 and later.
- Reduce performance impact of internal check for disconnected network drives.
- Minor fixes.
- OSX 10 .7 or newer is required to run VeraCrypt.
- Make VeraCrypt default handler of .hc & .tc files.
- Add custom VeraCrypt icon to .hc and .tc files in Finder.
- Check TrueCryptMode in password dialog when opening container file with .tc extension.
- Check TrueCryptMode in password dialog when opening container file with .tc extension.
- Fix executable stack in resulting binary which was caused by crypto assembly files missing the GNU-stack note.
1. 19 ((October)th, 2016):
- All OSs:
- Fix issues raised by Quarkslab audit.
- Remove GOST 89 encryption algorithm.
- Make PBKDF2 and HMAC code clearer and easier to analyze.
- Add test vectors for Kuznyechik.
- Update documentation to warn about risks of using command line switch ”tokenpin”.
- Use SSE2 optimized Serpent algorithm implementation from Botan project (2.5 times faster on -bit platforms).
- Fix issues raised by Quarkslab audit.
- Windows:
- Fix keyboard issues in EFI Boot Loader.
- Fix crash on 32 – bit machines when creating a volume that uses Streebog as PRF.
- Fix false positive detection of Evil-Maid attacks in some cases (eg hidden OS creation )
- Fix failure to access EFS data on VeraCrypt volumes under Windows 10.
- Fix wrong password error in the process of copying hidden OS.
- Fix issues raised by Quarkslab audit:
- Fix leak of password length in MBR bootloader inherited from TrueCrypt.
- EFI bootloader: Fix various leaks and erase keyboard buffer after password is typed.
- Use libzip library for handling zip Rescue Disk file instead of vulnerable XUnzip library.
- Support EFI system encryption for 32 – bit Windows.
- Perform shutdown instead of reboot during Pre-Test of EFI system encryption to detect incompatible motherboards .
- Minor GUI and translations fixes.
- MacOSX:
- Remove dependency to MacFUSE compatibility layer in OSXFuse.
1. (a) ***** (August 17 (th) , 2016):
- All OSs:
- Support Japanese encryption standard Camellia, including for Windows system encryption (MBR & EFI).
- Support Russian encryption and hash standards Kuznyechik, Magma and Streebog, including for Windows EFI system encryption.
- Fix TrueCrypt vulnerability allowing detection of hidden volumes presence (reported by Ivanov Aleksey Mikhailovich, alekc 96 [at] mail dot ru)
- To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes / OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1. 18 a version of VeraCrypt.
- Windows:
- Support EFI Windows system encryption (limitations: no hidden os, no boot custom message)
- Enhanced protection against dll hijacking attacks.
- Fix boot issues on some machines by increasing required memory by 1 KiB
- Add benchmarking of hash algorithms and PRF with PIM (including for pre-boot).
- Move build system to Visual C 2010 for better stability.
- Workaround for AES-NI support under Hyper-V on Windows Server 2008 R2 .
- Correctly remove driver file veracrypt.sys during uninstall on Windows 64 – bit.
- Implement passing smart card PIN as command line argument (/ tokenpin) when explicitly mounting a volume.
- When no drive letter specified, choose A: or B: only when no other free drive letter is available.
- Reduce CPU usage caused by the option to disable use of disconnected network drives.
- Add new volume ID mechanism to be used to identify disks / partitions instead of their device name.
- Add option to avoid PIM prompt in pre-boot authentication by storing PIM value unencrypted in MBR.
- Add option and command line switch to hide waiting dialog when performing operations.
- Add checkbox in “VeraCrypt Format” wizard GUI to skip Rescue Disk verification during system encryption procedure.
- Allow files drag-n-drop when VeraCrypt is running as elevated process.
- Minor GUI and translations fixes.
- Linux:
- Fix mount issue on Fedora 23.
- Fix mount failure when compiling source code using gcc 5.x.
- Adhere to XDG Desktop Specification by using XDG_CONFIG_HOME to determine location of configuration files.
- MacOSX:
- Solve compatibility issue with newer versions of OSXFuse.
1. 17 (February 13th, 2016):
- All OSs:
- Support UNICODE passwords: all characters are now accepted in passwords (except Windows system encryption)
- Cut mount / boot time by half thanks to a clever optimization of key derivation (found byXavier de Carné de Carnavalet)
- Optimize Whirlpool PRF speed by using assembly (25% speed gain compared to previous code).
- Add support for creating exFAT volumes.
- Add GUI indicator for the amount of randomness gathered using mouse movement.
- Include new icons and graphics contributed byAndreas Becker(http://www.andreasbecker.de)
- Windows:
- Fix dll hijacking issue affecting installer that allows code execution with elevation of privilege (CVE – 2016 – 1281). Reported by Stefan Kanthak (http://home.arcor.de/skanthak/)
- Sign binaries using both SHA-1 and SHA – 256 to follow new Microsoft recommendations.
- Solve issues under Comodo / Kaspersky when running an application from a VeraCrypt volume (Reported and fixed by Robert Geisler).
- Bootloader: Protect password / PIM length by filling the fields to maximum length with ‘* ‘after ENTER
- Solve issue with system favorites not being able to be mounted to drive A:
- Solve lost focus issues for after displaying the waiting dialog
- Solve rare issue where some partitions where asscoiated with wrong disk the “Select Device” dialog.
- Implement PIM caching, for both system encryption and normal volumes. Add option to activate it.
- Don’t try mounting using cached passwords if password and / or keyfile are specified in the command line.
- Internal rewrite to make VeraCrypt native UNICODE application.
- Workaround to avoid false positive detection by some anti-virus software.
- Hide disconnected network drives in the list of available drives. Add option to make them available for mounting.
- Solve issue that caused in some cases configuration and history XML files to be updated even when not needed.
- Fix leak of path of selected keyfiles in RAM.
- Fix TB unit can’t be deselected in VeraCryptExpander.
- Add Alt i keyboard shortcut for “Use PIM” checkbox in GUI.
- Minor GUI and translations fixes.
- Linux / MacOSX:
- Fix issue of –stdin option not handling correctly passwords that contain a space character (reported and fixed by Codeplex user horsley 1953).
- Fix issue creating volumes using command line with a filesystem other than FAT.
- Support K / M / G / T suffixes for –size switch to indicate unit to use for size value.
1. (October 7th, 2015):
- Windows:*****
- Modify patch for CVE – 2015 – 7358 vulnerability to solve side effects on Windows while still making it very hard to abuse drive letter handling.
- Fix failure to restore volume header from an external file in some configurations.
- Add option to disable “Evil Maid” attack detection for those encountering false positive cases ( eg FLEXnet / Adobe issue).
- By default, don’t try to mount using empty password when default keyfile configured or keyfile specified in command line. Add option to restore the old behavior.
- If mounting using empty password is needed, explicitly specify so in the command line using: / p “”
1. ((September 26th, 2015):
- Windows:
- Fix two TrueCrypt vulnerabilities reported by James Forshaw (Google Project
Zero)- CVE – 2015 – 7358(critical): Local Elevation of Privilege on Windows by
abusing drive letter handling. - CVE – 2015 – 7359: Local Elevation of Privilege on Windows caused by
incorrect Impersonation Token Handling.
- CVE – 2015 – 7358(critical): Local Elevation of Privilege on Windows by
- Fix regression in mounting of favorite volumes at user logon.
- Fix display of some Unicode languages (e.g. Chinese) in formatting wizard.
- Set keyboard focus to PIM field when “Use PIM” is checked.
- Allow Application key to open context menu on drive letters list
- Support specifying volumes size in TB in the GUI (command line already supports this)
- Fix two TrueCrypt vulnerabilities reported by James Forshaw (Google Project
1. 14(September 16th, 2015):
- All OSs:
- Mask and unmask PIM value in GUI and bootloader like the password.
- Windows:
- Solve Rescue Disk damaged error when using cascade ciphers and SHA 256 for system encryption.
- Solve option “Cache password in drive memory” always disabled even if checked in preferences.
- Solve UI language change not taken into account for new install unless a preference is changed.
- Implement creating file containers using command line.
- Driver: disable support of IOCTL_STORAGE_QUERY_PROPERTY by default and add option to enable it.
- Driver: Support returning StorageDeviceProperty when queried through IOCTL_STORAGE_QUERY_PROPERTY.
- Support setting volume label in Explorer through mount option or favorite label value.
- Fix for Hot Keys assignment dialog issue where OEM – 233 is always displayed and can’t be changed.
- Always copy both 32 – bit and 64 – bit executable binaries during install and in Traveler Disk Setup.
- Traveler Disk will again use 32 – bit exe by default while also offering 64 – bit exe.
- On Windows 64 – bit, 32 – bit exe files are now available (eg if needed to use 32 – bit PKCS # 11 dll)
- Include Volume Expander in Traveler Disk Setup.
- Don’t offer creating a restore point if it is disabled in Windows.
- Add possibility to verify a Rescue Disk ISO image file.
- Minors fixes in the installer, GUI and driver.
- Linux:
- Support supplying password using stdin in non interactive mode (contributed byLouisTakePILLz)
- Example:
veracrypt -t $ {IMAGE_PATH} $ {MOUNT_PATH} --mount --non-interactive --stdin
- Example:
- Support supplying password using stdin in non interactive mode (contributed byLouisTakePILLz)
1. 13(August 9th, 2015):
- Windows:
- Solve TOR crashing when run from a VeraCrypt volume.
1. 12(August 5th, 2015):
- All OSs:
- Implement “Dynamic Mode” by supporting a Personal Iterations Multiplier (PIM). See documentation for more information.
- Windows:
- Detect Boot Loader tampering (“Evil Maid” attacks) for system encryption and propose recovery options.
- Fix buffer overrun issue and other memory related bugs when parsing language XML files.
- Fix wrongly reported bad sectors by chkdsk caused by a bug in IOCTL_DISK_VERIFY handling.
- Fix privacy issue caused by configuration and history files being updated whenever VeraCrypt is used (reported by Liran Elharar)
- Fix system favorites not always mounting after cold start.
- Solve installer error when updating VeraCrypt on Windows 10.
- Implement decryption of non-system partition / drive.
- Include 64 – bit exe files in the installer and deploy them on 64 – bit machines for better performances.
- Allow using drive letters A: and B: for mounting volumes
- Make command line argument parsing more strict and robust (eg / lz rejected, must be / lz)
- Add possibility to show system encryption password in Windows GUI and bootloader
- Solve “Class Already exists” error that was happening for some users.
- Solve some menu items and GUI fields not translatable
- Make volumes correctly report Physical Sector size to Windows.
- Correctly detect switch user / RDP disconnect operations for autodismount on session locked.
- Add manual selection of partition when resuming in-place encryption.
- Add command line option (/ cache f) to temporarily cache password during favorites mounting.
- Add waiting dialog for Auto-Mount Devices operations to avoid freezing GUI.
- Add extra information to displayed error message in order to help analyze reported issues.
- Disable menu entry for changing system encryption PRF since it’s not yet implemented.
- Fix failure to change password when UAC required (inherited from TrueCrypt)
- Minor fixes and changes (see Git history for more details)
- Linux:
- Solve installer issue under KDE when xterm not available
- Fix warnings on about / LegalNotice dialogs when wxWidgets linked dynamically (N / A for official binary)
- Support hash names with ‘-‘ in command line (sha – 256, sha – 512 and ripemd – 160)
- Remove “–current-hash” switch and add “–new-hash “to be more coherent with existing switches.
- When only keyfile specified in command line, don’t try to mount using empty password .
- If mounting using empty password is needed, explicitly specify so using: -p “”
(1.0f-2) (April 5th, 2015):
- All OSs:
- Mounting speed improvement, up to 20% quicker on 64 – bit (contributed by Nils Maier)
- Add option to set default hash / TrueCryptMode used for mounting volumes.
- Use TrueCryptMode / Hash specified in command line in password dialog.
- Windows:
- Solve CryptAcquireContext vulnerability reported by Open Crypto Audit Phase II.
- Proper handling of random generator failures. Inform user in such cases.
- TrueCrypt Mode related changes:
- Support mounting TrueCrypt system partition (no conversion yet)
- Support TrueCrypt volumes as System Favorites.
- Correct displaying wrong TrueCrypt mode in volume properties when SHA – 256 is used.
- Solve PIN BLOCKED issue with smart cards in a special case.
- Correctly handle file access errors when mounting containers.
- Solve several issues reported by the Static Code Analysis too Coverity.
- Bootloader: Add “Verifying Password …” message.
- When UAC prompt fails (for example timeout), offer the user to retry the operation .
- Uninstall link now open the standard “Add / Remove Programs” window.
- On uninstall, remove all VeraCrypt references from registry and disk.
- Included VeraCryptExpander in the Setup.
- Add option to temporary cache password when mounting multiple favorites.
- Minor fixes and enhancements (see git history for more information)
- MacOSX:
- Solve issue volumes not auto-dismounting when quitting VeraCrypt.
- Solve issue VeraCrypt window not reopening by clicking dock icon.
- Linux / MacOSX:
- Solve preferences dialog not closing when clicking on the ‘X’ icon.
- Solve read-only issue when mounting non-FAT volumes in some cases.
- Support opening / exploring mounted volumes on desktops other than Gnome / KDE.
- Solve various installer issues when running on less common configurations
- Minor fixes (see git history for more information)
1.0f-1(January 4th, 2015)
- All OSs:
- Add support for old TrueCrypt 6.0.
- Change naming of cascades algorithms in GUI for a better description.
- Linux / MacOSX:
- Make cancel button of the preference dialog working.
- Solve impossibility to enter a one digit size for the volume.
- Add wait dialog to the benchmark calculation.
- Windows:
- Add TrueCrypt mode to the mounted volume information.
- For Windows XP, correct the installer graphical artefacts.
1.0f(December 30, 2014)
- All OSs:
- Add support for mounting TrueCrypt volumes.
- Add support for converting TrueCrypt containers and non-system partitions.
- Add support for SHA – 256 for volume encryption.
- Make SHA – 512 the default key derivation algorithm and change the order of preference of derivation algorithms: SHA – 512 ->Whirlpool ->SHA – 256 ->RIPEMD 160
- Deprecate RIPEMD 160 for non -system encryption.
- Speedup mount operation by enabling choice of correct hash algorithm.
- Display a wait dialog during lengthy operations to avoid freezing the GUI.
- Implement creation of multiple keyfiles at once, with predefined or random size.
- Always display random gathering dialog before performing sensitive operations.
- Links in the application now points to the online resources on Codeplex
- First version of proper VeraCrypt User Guide
- MacOSX:
- Implement support for hard drives with a large sector size (>512).
- Link against new wxWidgets version 3.0.2.
- Solve truncated text in some Wizard windows.
- Linux:
- Add support of NTFS formatting of volumes.
- Correct issue on opening of the user guide PDF.
- Better support for hard drives with a large sector size (>512).
- Link against new wxWidgets version 3.0.2.
- Windows:
- Security: fix vulnerability in bootloader detected by Open Crypto Audit and make it more robust.
- Add support for SHA – 256 in system boot encryption.
- Various optimizations in bootloader.
- Complete fix of ShellExecute security issue.
- Kernel driver: check that the password length received from bootloader is less or equal to 64.
- Correct a random crash when clicking the link for more information on keyfiles
- Implement option to auto-dismount when user session is locked
- Add self-test vectors for SHA – 256
- Modern look-and-feel by enabling visual styles
- few minor fixed.
1.0e(September 4, 2014)
- Improvements and bug fixes:
- Correct most of the security vulnerabilities reported by the Open Crypto Audit Project.
- Correct security issues detected by Static Code Analysis, mainly under Windows.
- Correct issue of unresponsiveness when changing password / key file of a volume. Reduce overall time taken for creating encrypted volume / partition.
- Minor improvements and bug fixes (look at git history for more details).
- Improvements and bug fixes:
- Correct issue while creating hidden operating system.
- Minor improvements and bug fixes.
GIPHY App Key not set. Please check settings