Changes between 1.24-Update6 and 1.24-Update7 (7 August 2020) :
- All OSes:
* Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume
* Fix random crash in 32-bit builds when using Streebog.
* Enable FIPS mode in JitterEntropy random generator.
* Update Beginner's Tutorial in documentation to use "MyVolume.hc" instead of "My Volume" for file container name in order to avoid confusion about nature of file nature.
* Minor code cleanup
- Windows:
* Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled
* Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.
* Fix UI for blocking TRIM in system encryption not working in MBR boot mode.
* Support password drag-n-drop from external applications (e.g. KeePass) to password UI fields which is more secure than using clipboard.
* Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entring power saving mode more reliable.
* Avoid displaying waiting dialog when /silent specified for "VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT.
* Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
* Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
* Don't allow to encrypt the system drive if it is already encrypted by BitLocker.
* Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.
* Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.
* Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.
* Don't allow a directory path to be entered for the file container to be created in Format wizard.
* Don't try to use fix for CVE-2019-19501 if Windows Shell has been modified or is not running since there is no reliable way to fix it in such non standard configuation.
* MBR bootloader: fix incorrect compressed data size passed to decompressor in boot sector.
* Add warning message when typed password reaches maximum length during the system encryption wizard.
* Fix wrong error message when UTF-8 encoding of entered password exceeds the maximum supported length.
* Update libzip to latest version 1.7.3.
* Update translations.
- Linux/MacOSX:
* Force reading of at least 32 bytes from /dev/random before allowing it to fail gracefully
* Allow choosing a filesystem other than FAT for Outer volume but display warning about risks of such choice. Implement an estimation of maximum possible size of hidden volume in this case.
* Erase sensitive memory explicitly instead of relying on the compiler not optimizing calls to method Memory::Erase.
* Add support for Btrfs filesystem when creating volumes (Linux Only).
* Update wxWidgets for static builds to version 3.0.5.
VeraCrypt Files
Open source disk encryption with strong security for the Paranoid
Brought to you by:
idrassi