Incorrect. You probably did not notice that your TC volume was using HMAC-RIPEMD-160 Hash Algorithm. Users on the forum reported successfully converting their TC volumes to VC using the documentation. See link below. If the volume that was converted from TC to VC still used the HMAC-RIPEMD-160 Hash Algorithm that (as per the documentation you refer to) is no longer supported, to me (seen from a UX standpoint) that amounts to "VC can no longer read volumes that were originally created in TrueCrypt...
I have the same problem. I'm using Veracrypt 1.26.18. I tried both quick and full format. Creating encrypted partitions with ext4 file systems appears to be broken in this version. However, I have found a workaround: using an ext3 file system works. It's not ideal but for now it will serve me. I'm using the GUI version because of its option to use random mouse movements for stronger cryptographic security; no idea how to do that with the command line version. Also, I have noticed that since support...
Creating encrypted partitions with ext4 file system appears broken
I have the same problem. I'm using Veracrypt 1.26.18. I tried both quick and full format. Creating encrypted partitions with ext4 file systems appears to be broken in this version. However, I have found a workaround: using an ext3 file system works. It's not ideal but for now it will serve me. I'm using the GUI version because of its option to use random mouse movements for stronger cryptographic security; no idea how to do that with the command line version. Also, I have noticed that since support...
Two years ago, on my Ubuntu laptop, I created a Veracrypt volume, added a key file, and now mount it automatically with: echo "" | sudo veracrypt -t /dev/sda4 /data --pim=0 --keyfiles=/path/to.keyfile --protect-hidden=no > /dev/null I'm now trying to do the same thing on my Lubuntu laptop which (unlike the above Ubuntu laptop) has logical volumes, so the above would become: echo "" | sudo veracrypt -t /dev/mapper/lubuntu--vg-data /data --pim=0 --keyfiles=/path/to.keyfile --protect-hidden=no > /dev/null...
Option to exclude directories