The EFS fix seems to only have partially fixed the problem.
Accessing files is now possible again, so I can move them around and all.
I can also encrypt files newly with EFS and they work fine.
But all my old files that were previously inaccessible (and remained so for the months while the EFS access was broken) now simply contain gibberish! Do you have any idea why this happens? The integrity of my files is at stake here... :(
Last edit: Natanji 2016-10-17
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
@Natanji:
I didn't have this EFS problem with old files during my tests. Just to clairy: you are able to copy and read newly created EFS files but existing EFS files have a bad content?
Are able to access you disk from another version of Windows to do tests?
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Windows EFI: don't use optimized Serpent implementation for EFI bootloader because lack of C++ support in EDKII framework
Does this mean that if you use Serpent for system encryption algorithm that you will not get the performance optimized Serpent once your PC boots-up?
If using system encryption algorithm Serpent, will mounting other volumes using Serpent after the PC boots-up or using System Favorites result in using the slower Serpent implementation?
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
The lack of Serpent optimization applies only to the EFI bootloader which handles on the fly decryption/encryption until Windows starts (it takes only few seconds).
Once Windows starts, VeraCrypt driver takes over EFI bootloader and so optimized Serpent implementation is used.
Basically, when running VeraCrypt on 64-bit Windows, Linux and MacOSX, users will notice a 2.5x speed gain.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
For Windows, dismount any non-system encrypted volumes, download 1.19 and install. You will be prompted to reboot your system after installation. Do not defer the reboot!
Re-encryption is needed only if you were using GOST89 cipher. No re-encryption is needed otherwise.
For system encryption, you will need to create a new Rescue Disk (zip for EFI and ISO for MBR) in order to have a Rescue Disk that uses the updated boot components.
Last edit: Enigma2Illusion 2016-10-20
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
https://sourceforge.net/projects/veracrypt/files/VeraCrypt%201.19/
NOTE: Removal of GOST89 (Magma) encryption algorithm. You can read the reasons at the link below.
https://veracrypt.codeplex.com/discussions/658561
The EFS fix seems to only have partially fixed the problem.
Accessing files is now possible again, so I can move them around and all.
I can also encrypt files newly with EFS and they work fine.
But all my old files that were previously inaccessible (and remained so for the months while the EFS access was broken) now simply contain gibberish! Do you have any idea why this happens? The integrity of my files is at stake here... :(
Last edit: Natanji 2016-10-17
@Natanji:
I didn't have this EFS problem with old files during my tests. Just to clairy: you are able to copy and read newly created EFS files but existing EFS files have a bad content?
Are able to access you disk from another version of Windows to do tests?
Yes, exactly: newly created EFS files seem to be fine and their content shows up as it should, but the previously existing ones have bad content now.
I could put my disk into a second computer, sure - what am I supposed to do there though, exactly?
Does this mean that if you use Serpent for system encryption algorithm that you will not get the performance optimized Serpent once your PC boots-up?
If using system encryption algorithm Serpent, will mounting other volumes using Serpent after the PC boots-up or using System Favorites result in using the slower Serpent implementation?
The lack of Serpent optimization applies only to the EFI bootloader which handles on the fly decryption/encryption until Windows starts (it takes only few seconds).
Once Windows starts, VeraCrypt driver takes over EFI bootloader and so optimized Serpent implementation is used.
Basically, when running VeraCrypt on 64-bit Windows, Linux and MacOSX, users will notice a 2.5x speed gain.
Release notes missed the following:
Last edit: Enigma2Illusion 2016-10-17
The speed gain is not much (between 10% and 20% depending on CPU), that's why it was not mentionned.
It seems the source tarballs are also double gzipped, thus a normal
tar xfwon't do as you have to firstgunzipit once.@Unit193: Indeed, there was an issue while creating the tar.gz from sources. The zip file is OK. Unfortunately, we'll have to live with it.
How do I upgrade Veracrypt without data loss? Shall I decrypt my disk, delete veracrypt old version 1.18a and install 1.19?
For Windows, dismount any non-system encrypted volumes, download 1.19 and install. You will be prompted to reboot your system after installation. Do not defer the reboot!
EDIT:
https://veracrypt.codeplex.com/discussions/658844#post1486502
Last edit: Enigma2Illusion 2016-10-20