Release Notes.html 68 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137
  1. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
  2. "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
  3. <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
  4. <head>
  5. <meta http-equiv="content-type" content="text/html; charset=utf-8" />
  6. <title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
  7. <meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
  8. <meta name="keywords" content="encryption, security"/>
  9. <link href="styles.css" rel="stylesheet" type="text/css" />
  10. </head>
  11. <body>
  12. <div>
  13. <a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
  14. </div>
  15. <div id="menu">
  16. <ul>
  17. <li><a href="Home.html">Home</a></li>
  18. <li><a href="/code/">Source Code</a></li>
  19. <li><a href="Downloads.html">Downloads</a></li>
  20. <li><a class="active" href="Documentation.html">Documentation</a></li>
  21. <li><a href="Donation.html">Donate</a></li>
  22. <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
  23. </ul>
  24. </div>
  25. <div>
  26. <p>
  27. <a href="Documentation.html">Documentation</a>
  28. <img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
  29. <a href="Release%20Notes.html">Version History</a>
  30. </p></div>
  31. <div class="wikidoc">
  32. <h1>Release Notes</h1>
  33. <p>
  34. <strong>Note to users who created volumes with 1.17 version of VeraCrypt or earlier: </strong><br/>
  35. <span style="color:#ff0000;">To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes/OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1.18a version of VeraCrypt.</span></li>
  36. </p>
  37. <p><strong style="text-align:left">1.26.17</strong> (November 24<sup>th</sup>, 2024):</p>
  38. <ul>
  39. <li><strong>All OSes:</strong>
  40. <ul>
  41. <li>Added support for SHA-256 x86 intrinsic to enhance the performance of PBKDF2-HMAC-SHA256.</li>
  42. <li>Updated translations</li>
  43. </ul>
  44. </li>
  45. <li><strong>Windows:</strong>
  46. <ul>
  47. <li>Dropped support for Windows 32-bit.</li>
  48. <li>Set Windows 10 May 2020 Update (version 2004) as the minimum supported version.</li>
  49. <li>Fixed driver deadlock under low-memory scenarios caused by re-entrant IRP completions.</li>
  50. <li>Fixed failed EFI detection on some PCs where the BootOrder variable is not defined (proposed by @kriegste, GH #360).</li>
  51. <li>Fixed "Access Denied" error when updating VeraCrypt using EXE setup following a Windows upgrade.</li>
  52. <li>Fixed various issues affecting the EFI system encryption configuration editor.</li>
  53. <li>Replaced the deprecated CryptGenRandom with BCryptGenRandom for generating secure random bytes.</li>
  54. </ul>
  55. </li>
  56. <li><strong>Linux:</strong>
  57. <ul>
  58. <li>Fixed an assertion issue with the wxWidgets library included in Ubuntu.</li>
  59. <li>Improved directory-opening logic by prioritizing xdg-open and adding fallback mechanisms.</li>
  60. </ul>
  61. </li>
  62. <li><strong>macOS:</strong>
  63. <ul>
  64. <li>Disabled screen capture by default. Added the --allow-screencapture CLI switch to enable it if needed.</li>
  65. </ul>
  66. </li>
  67. </ul>
  68. <p><strong style="text-align:left">1.26.15</strong> (September 2<sup>nd</sup>, 2024):</p>
  69. <ul>
  70. <li><strong>Windows:</strong>
  71. <ul>
  72. <li>Fix MSI install/uninstall issues:
  73. <ul>
  74. <li>Fixed error 1603 returned by MSI silent install when REBOOT=ReallySuppress is specified and a reboot is required.</li>
  75. <li>Fixed missing documentation and language files from the MSI package.</li>
  76. <li>Fixed MSI not installing new documentation and language files when upgrading from an EXE-based installation.</li>
  77. <li>Fixed installation folder not being removed after MSI uninstall in some cases.</li>
  78. </ul>
  79. </li>
  80. <li>Fix regression during UEFI system decryption that caused the bootloader to persist.</li>
  81. </ul>
  82. </li>
  83. </ul>
  84. <p><strong style="text-align:left">1.26.14</strong> (August 25<sup>th</sup>, 2024):</p>
  85. <ul>
  86. <li><strong>All OSes:</strong>
  87. <ul>
  88. <li>Update translations and documentation</li>
  89. <li>Implement language selection settings in non-Windows versions.</li>
  90. <li>Make codebase compatible with wxWidgets 3.3 in non-Windows versions.</li>
  91. <li>Implement detection of volumes affected by XTS master key vulnerability and warn user about it.</li>
  92. <li>Update mount failure error messages to mention removal of TrueCrypt support and old algorithms.</li>
  93. </ul>
  94. </li>
  95. <li><strong>Windows:</strong>
  96. <ul>
  97. <li>Better fix for Secure Desktop issues under Windows 11 22H2
  98. <ul>
  99. <li>IME is now disabled in Secure Desktop because it is known to cause issues</li>
  100. </ul>
  101. </li>
  102. <li>VeraCrypt Expander: Fix expansion of volumes on disks with a sector size different from 512 (by skl0n6)</li>
  103. <li>Fix writing wrong EFI System Encryption Advanced Options to registry</li>
  104. <li>Don't close Setup when exiting VeraCrypt process through system tray Exit menu</li>
  105. <li>Fix failure to format some disks (e.g. VHDX) caused by virtual partition offset not 4K aligned</li>
  106. <li>Fallback to absolute positioning when accessing disks if relative positioning fails</li>
  107. <li>Update zlib to version 1.3.1</li>
  108. </ul>
  109. </li>
  110. <li><strong>Linux:</strong>
  111. <ul>
  112. <li>Focus PIM field when selected (#1239)</li>
  113. <li>Fix generic installation script on Konsole in Wayland (#1244)</li>
  114. <li>Added the ability to build using wolfCrypt as the cryptographic backend. Disabled by default. (Contributed by wolfSSL, GH PR #1227)</li>
  115. <li>Allows GUI to launch in a Wayland-only environment (GH #1264)</li>
  116. <li>CLI: Don't initially re-ask PIM if it was already specified (GH #1288)</li>
  117. <li>CLI: Fix incorrect max hidden volume size for file containers (GH #1338))</li>
  118. <li>Enhance ASLR security of generic installer binaries by adding linked flag for old GCC version (reported by @morton-f on Sourceforge)</li>
  119. </ul>
  120. </li>
  121. <li><strong>macOS:</strong>
  122. <ul>
  123. <li>Fix corrupted disk icon in main UI (GH #1218)</li>
  124. <li>Fix near zero width PIM input box and simplify wxTextValidator logic (GH #1274)</li>
  125. <li>Use correct Disk Utility location when "check filesystem" is ran (GH #1273)</li>
  126. <li>Add support for FUSE-T as an alternative to MacFUSE (GH #1055)</li>
  127. </ul>
  128. </li>
  129. <li><strong>FreeBSD:</strong>
  130. <ul>
  131. <li>Fix privilege escalation prompts not showing up (GH #1349)</li>
  132. <li>Support automatic detection and mounting of ext2/3/4, exFAT, NTFS filesystems (GH #1350)</li>
  133. <li>Use correct Disk Utility location when "check filesystem" is ran (GH #1273)</li>
  134. </ul>
  135. </li>
  136. </ul>
  137. <p><strong style="text-align:left">1.26.7</strong> (October 1<sup>st</sup>, 2023):</p>
  138. <ul>
  139. <li><strong>All OSes:</strong>
  140. <ul>
  141. <li>Security: Ensure that XTS primary key is different from the secondary key when creating volumes
  142. <ul>
  143. <li>Issue unlikely to happen thanks to random generator properties but this check must be added to prevent attacks</li>
  144. <li>Reference: CCSS,NSA comment at page 3: <a href="https://csrc.nist.gov/csrc/media/Projects/crypto-publication-review-project/documents/initial-comments/sp800-38e-initial-public-comments-2021.pdf">https://csrc.nist.gov/csrc/media/Projects/crypto-publication-review-project/documents/initial-comments/sp800-38e-initial-public-comments-2021.pdf</a></li>
  145. </ul>
  146. </li>
  147. <li>Remove TrueCrypt Mode support. Version 1.25.9 can be used to mount or convert TrueCrypt volumes.</li>
  148. <li>Complete removal of RIPEMD160 and GOST89 algorithms. Legacy volumes using any of them cannot be mounted by VeraCrypt anymore.</li>
  149. <li>Add support for BLAKE2s as new PRF algorithm for both system encryption and standard volumes.</li>
  150. <li>Introducing support for EMV banking smart cards as keyfiles for non-system volumes.
  151. <ul>
  152. <li>No need for a separate PKCS#11 module configuration.</li>
  153. <li>Card PIN isn't required.</li>
  154. <li>Generates secure keyfile content from unique, encoded data present on the banking card.</li>
  155. <li>Supports all EMV standard-compliant banking cards.</li>
  156. <li>Can be enabled in settings (go to Settings->Security Tokens).</li>
  157. <li>Developed by a team of students from the <a href="https://www.insa-rennes.fr">Institut national des sciences appliquées de Rennes</a>.</li>
  158. <li>More details about the team and the project are available at <a href="https://projets-info.insa-rennes.fr/projets/2022/VeraCrypt/index_en.html">https://projets-info.insa-rennes.fr/projets/2022/VeraCrypt/index_en.html</a>.</li>
  159. </ul>
  160. </li>
  161. <li>When overwriting an existing file container during volume creation, add its current size to the available free space</li>
  162. <li>Add Corsican language support. Update several translations. </li>
  163. <li>Update documentation</li>
  164. </ul>
  165. </li>
  166. <li><strong>Windows:</strong>
  167. <ul>
  168. <li>Officially, the minimum supported version is now <strong>Windows 10</strong>. VeraCrypt may still run on Windows 7 and Windows 8/8.1, but no active tests are done on these platforms.</li>
  169. <li>EFI Bootloader:
  170. <ul>
  171. <li>Fix bug in PasswordTimeout value handling that caused it to be limited to 255 seconds.</li>
  172. <li>Rescue Disk: enhance "Boot Original Windows Loader" by using embedded backup of original Windows loader if it is missing from disk</li>
  173. <li>Addition of Blake2s and removal of RIPEMD160 & GOST89</li>
  174. </ul>
  175. </li>
  176. <li>Enable memory protection by default. Add option under Performance/Driver Configuration to disable it if needed.
  177. <ul>
  178. <li>Memory protection blocks non-admin processes from reading VeraCrypt memory</li>
  179. <li>It may block Screen Readers (Accessibility support) from reading VeraCrypt UI, in which case it can be disabled</li>
  180. <li>It can be disabled by setting registry value "VeraCryptEnableMemoryProtection" to 0 under "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt"</li>
  181. </ul>
  182. </li>
  183. <li>Add process mitigation policy to prevent VeraCrypt from being injected by other processes</li>
  184. <li>Minor enhancements to RAM Encryption implementation</li>
  185. <li>Fix Secure Desktop issues under Windows 11 22H2</li>
  186. <li>Implement support for mounting partially encrypted system partitions.</li>
  187. <li>Fix false positive detection of new device insertion when Clear Encryption Keys option is enable (System Encryption case only)</li>
  188. <li>Better implementation of Fast Create when creating file containers that uses UAC to request required privilege if not already held</li>
  189. <li>Allow choosing Fast Create in Format Wizard UI when creating file containers</li>
  190. <li>Fix formatting issues during volume creation on some machines.</li>
  191. <li>Fix stall issue caused by Quick Format of large file containers</li>
  192. <li>Add dropdown menu to Mount button to allow mounting without using the cache.</li>
  193. <li>Possible workaround for logarithmic slowdown for Encrypt-In-Place on large volumes.</li>
  194. <li>Make Expander first check file existence before proceeding further</li>
  195. <li>Allow selecting size unit (KB/MB/GB) for generated keyfiles</li>
  196. <li>Display full list of supported cluster sizes for NTFS, ReFS and exFAT filesystems when creating volumes</li>
  197. <li>Support drag-n-drop of files and keyfiles in Expander.</li>
  198. <li>Implement translation of Expander UI</li>
  199. <li>Replace legacy file/dir selection APIs with modern IFileDialog interface for better Windows 11 compatibility</li>
  200. <li>Enhancements to dependency dlls safe loading, including delay loading.</li>
  201. <li>Remove recommendation of keyfiles files extensions and update documentation to mention risks of third-party file extensions.</li>
  202. <li>Add support for more language in the setup installer</li>
  203. <li>Update LZMA library to version 23.01</li>
  204. <li>Update libzip to version 1.10.1 and zlib to version 1.3</li>
  205. </ul>
  206. </li>
  207. <li><strong>Linux:</strong>
  208. <ul>
  209. <li>Fix bug in Random generator on Linux when used with Blake2s that was triggering a self test failure.</li>
  210. <li>Modify Random Generator on Linux to exactly match official documentation and the Windows implementation.</li>
  211. <li>Fix compatibility issues with Ubuntu 23.04.</li>
  212. <li>Fix assert messages displayed when using wxWidgets 3.1.6 and newer.</li>
  213. <li>Fix issues launching fsck on Linux.</li>
  214. <li>Fix privilege escalation prompts being ignored.</li>
  215. <li>Fix wrong size for hidden volume when selecting the option to use all free space.</li>
  216. <li>Fix failure to create hidden volume on a disk using CLI caused by wrong maximum size detection.</li>
  217. <li>Fix various issues when running in Text mode:
  218. <ul>
  219. <li>Don't allow selecting exFAT/BTRFS filesytem if they are not present or not compatible with the created volume.</li>
  220. <li>Fix wrong dismount message displayed when mounting a volume.</li>
  221. <li>Hide PIM during entry and re-ask PIM when user entered a wrong value.</li>
  222. <li>Fix printing error when checking free space during volume creation in path doesn't exist.</li>
  223. </ul>
  224. </li>
  225. <li>Use wxWidgets 3.2.2.1 for static builds (e.g. console only version)</li>
  226. <li>Fix compatibility of generic installers with old Linux distros</li>
  227. <li>Update help message to indicate that when cascading algorithms they must be separated by dash</li>
  228. <li>Better compatibility with building under Alpine Linux and musl libc</li>
  229. </ul>
  230. </li>
  231. <li><strong>macOS:</strong>
  232. <ul>
  233. <li>Fix issue of VeraCrypt window becoming unusable in use cases involving multiple monitors and change in resolution.</li>
  234. </ul>
  235. </li>
  236. </ul>
  237. <p><strong style="text-align:left">1.25.9</strong> (February 19<sup>th</sup>, 2022):</p>
  238. <ul>
  239. <li><strong>All OSes:</strong>
  240. <ul>
  241. <li>Update translations (Chinese, Dutch, French, German, Turkish).</li>
  242. </ul>
  243. </li>
  244. <li><strong>Windows:</strong>
  245. <ul>
  246. <li>Make MSI installer compatible with system encryption.</li>
  247. <li>Set minimum support for MSI installation to Windows 7.</li>
  248. <li>Fix failure to create Traveler Disk when VeraCrypt is installed using MSI.</li>
  249. <li>Don't cache the outer volume password when mounting with hidden volume protection if wrong hidden volume password was specified.</li>
  250. <li>Reduce the size of EXE installers by almost 50% by using LZMA compression instead of DEFLATE.</li>
  251. <li>Fix double-clicking mounted drive in VeraCrypt UI not working in some special Windows configurations.</li>
  252. <li>Add registry key to fix BSOD during shutdown/reboot on some machines when using system encryption.
  253. <ul>
  254. <li>Under "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt", create a REG_DWORD value named "VeraCryptEraseKeysShutdown".</li>
  255. <li>Setting this registry value to 0 disables erasing system encryption keys which is the cause of BSOD during shutdown on some machines.</li>
  256. </ul>
  257. </li>
  258. </ul>
  259. </li>
  260. <li><strong>Linux:</strong>
  261. <ul>
  262. <li>Fix hidden volume settings not correctly displayed when enabling hidden volume protection in mount options window.</li>
  263. <li>Fix generic Linux installer overwriting /usr/sbin if it is a symlink.</li>
  264. <li>Fix crash when building with _GLIBCXX_ASSERTIONS defined.</li>
  265. <li>Enable building from source without AES-NI support.</li>
  266. </ul>
  267. </li>
  268. <li><strong>MacOSX:</strong>
  269. <ul>
  270. <li>Fix hidden volume settings not correctly displayed when enabling hidden volume protection in mount options window.</li>
  271. </ul>
  272. </li>
  273. </ul>
  274. <p><strong style="text-align:left">1.25.7</strong> (January 7<sup>th</sup>, 2022):</p>
  275. <ul>
  276. <li><strong>All OSes:</strong>
  277. <ul>
  278. <li>Update translations.</li>
  279. </ul>
  280. </li>
  281. <li><strong>Windows:</strong>
  282. <ul>
  283. <li>Restore support of Windows Vista, Windows 7 and Windows 8/8.1.
  284. <ul>
  285. <li>Windows 7 support requires that either KB3033929 or KB4474419 is installed.</li>
  286. <li>Windows Vista support requires that either KB4039648 or KB4474419 is installed.</li>
  287. </ul>
  288. </li>
  289. <li>MSI installation only: Fix double-clicking .hc file container inserting %1 instead of volume name in path field.</li>
  290. <li>Advanced users: Add registry settings to control driver internal encryption queue to allow tuning performance for SSD disks and having better stability under heavy load.
  291. <ul>
  292. <li>Under registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt:
  293. <ul>
  294. <li>VeraCryptEncryptionFragmentSize (REG_DWORD): size of encryption data fragment in KiB. Default is 256. Maximum is 2048.</li>
  295. <li>VeraCryptEncryptionIoRequestCount (REG_DWORD): maximum number of parallel I/O requests. Default is 16. Maximum is 8192.</li>
  296. <li>VeraCryptEncryptionItemCount (REG_DWORD): maximum number of encryption queue items processed in parallel. Default as well as maximum is half of VeraCryptEncryptionIoRequestCount.</li>
  297. </ul>
  298. </li>
  299. <li>The triplet (FragmentSize=512, IoRequestCount=128, ItemCount=64) is an example of parameters that enhance sequential read speed on some SSD NVMe systems.</li>
  300. <li>Fix truncate text in installer for some languages.</li>
  301. </ul>
  302. </li>
  303. </ul>
  304. <li><strong>MacOSX:</strong>
  305. <ul>
  306. <li>Fix resource files inside VeraCrypt application bundle (e.g. HTML documentation, languages XML files) being world-writable. (Reported by Niall O'Reilly)</li>
  307. </ul>
  308. </li>
  309. </ul>
  310. <p><strong style="text-align:left">1.25.4</strong> (December 3<sup>rd</sup>, 2021):</p>
  311. <ul>
  312. <li><strong>All OSes:</strong>
  313. <ul>
  314. <li>Speed optimization of Streebog.</li>
  315. <li>Update translations.</li>
  316. </ul>
  317. </li>
  318. <li><strong>Windows:</strong>
  319. <ul>
  320. <li>Add support for Windows on ARM64 (e.g. Microsoft Surface Pro X) but system encryption not yet supported.</li>
  321. <li>Add MSI installer for silent mode deployment (ACCEPTLICENSE=YES must be set in msiexec command line).
  322. <ul>
  323. <li>For now, MSI installer cannot be used if system partition is encrypted with VeraCrypt</li>
  324. <li>MSI installer requires Windows 10 or newer</li>
  325. </ul>
  326. </li>
  327. <li>Drop support of Windows Vista, Windows 7, Windows 8 and Windows 8.1 because of new requirement for driver code signing.</li>
  328. <li>Reduce time of mount when PRF auto-detection is selected.</li>
  329. <li>Fix potential memory corruption in driver caused by integer overflow in IOCTL_STORAGE_MANAGE_DATA_SET_ATTRIBUTES (reported by Ilja van Sprundel).</li>
  330. <li>Replace insecure wcscpy/wcscat/strcpy runtime functions with secure equivalents.</li>
  331. <li>Changes to EFI bootloader:
  332. <ul>
  333. <li>Fix memory leak in some cases caused by wrong check of pointer for calling MEM_FREE</li>
  334. <li>Clear bootParams variable that may contain sensitive information when halting the system in case of fatal error</li>
  335. <li>Add option "KeyboardInputDelay" in DcsProp to control the minimum delay supported between two key strokes</li>
  336. </ul></li>
  337. <li>Try to workaround Windows Feature Updates issues with system encryption by fixing of bootloader and SetupConfig.ini when system resumes or when session is opened/unlocked</li>
  338. <li>Fix failure to load local HTML documentation if application running with administrative privileges</li>
  339. <li>Fix freeze when password dialog displayed in secure desktop and try to access token keyfiles protected by PIN</li>
  340. <li>Fix failure to launch keyfile generator in secure desktop mode</li>
  341. <li>Block Windows from resizing system partition if it is encrypted</li>
  342. <li>Add keyboard shortcut to "TrueCrypt mode" in the mount dialog.</li>
  343. </ul>
  344. </li>
  345. <li><strong>MacOSX:</strong>
  346. <ul>
  347. <li>Native support of Apple Silicon M1.</li>
  348. <li>Drop official support of Mac OS X 10.7 Lion and Mac OS X 10.8 Mountain Lion.</li>
  349. <li>Add UI language support using installed XML files. Language is automatically detected using "LANG" environment variable</li>
  350. <li>Add CLI switch (--size=max) and UI option to give a file container all available free space on the disk where it is created.</li>
  351. <li>Return error if unknown filesystem value specified in CLI --filesystem switch instead of silently skipping filesystem creation.</li>
  352. </ul>
  353. </li>
  354. <li><strong>Linux:</strong>
  355. <ul>
  356. <li>Add UI language support using installed XML files. Language is automatically detected using "LANG" environment variable</li>
  357. <li>Compatiblity with with pam_tmpdir.</li>
  358. <li>Display icon in notification area on Ubuntu 18.04 and newer (contibuted by https://unit193.net/).</li>
  359. <li>Add CLI switch (--size=max) and UI option to give a file container all available free space on the disk where it is created.</li>
  360. <li>Return error if unknown filesystem value specified in CLI --filesystem switch instead of silently skipping filesystem creation.</li>
  361. </ul>
  362. </li>
  363. <li><strong>FreeBSD:</strong>
  364. <ul>
  365. <li>Make system devices work under FreeBSD</li>
  366. <li>Add CLI switch (--size=max) and UI option to give a file container all available free space on the disk where it is created.</li>
  367. <li>Return error if unknown filesystem value specified in CLI --filesystem switch instead of silently skipping filesystem creation.</li>
  368. </ul>
  369. </li>
  370. <li><strong>OpenBSD:</strong>
  371. <ul>
  372. <li>Add basic support of OpenBSD</li>
  373. <li>Add CLI switch (--size=max) and UI option to give a file container all available free space on the disk where it is created.</li>
  374. <li>Return error if unknown filesystem value specified in CLI --filesystem switch instead of silently skipping filesystem creation.</li>
  375. </ul>
  376. </li>
  377. </ul>
  378. <p><strong style="text-align:left">1.24-Update8</strong> (November 28<sup>th</sup>, 2020):</p>
  379. <ul>
  380. <li><strong>MacOSX:</strong>
  381. <ul>
  382. <li>Fix compatibility issues with macOS Big Sur, especially on Apple Silicon M1 with macFUSE 4.0.x.</li>
  383. </ul>
  384. </li>
  385. </ul>
  386. <p><strong style="text-align:left">1.24-Update7</strong> (August 7<sup>th</sup>, 2020):</p>
  387. <ul>
  388. <li><strong>All OSes:</strong>
  389. <ul>
  390. <li>Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume</li>
  391. <li>Fix random crash in 32-bit builds when using Streebog.</li>
  392. <li>Enable FIPS mode in JitterEntropy random generator.</li>
  393. <li>Update Beginner's Tutorial in documentation to use "MyVolume.hc" instead of "My Volume" for file container name in order to avoid confusion about nature of file nature.</li>
  394. <li>Minor code cleanup</li>
  395. </ul>
  396. </li>
  397. <li><strong>Windows:</strong>
  398. <ul>
  399. <li>Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled</li>
  400. <li>Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.</li>
  401. <li>Fix UI for blocking TRIM in system encryption not working in MBR boot mode.</li>
  402. <li>Support password drag-n-drop from external applications (e.g. KeePass) to password UI fields which is more secure than using clipboard.</li>
  403. <li>Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entring power saving mode more reliable.</li>
  404. <li>Avoid displaying waiting dialog when /silent specified for "VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT.</li>
  405. <li>Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.</li>
  406. <li>Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.</li>
  407. <li>Don't allow to encrypt the system drive if it is already encrypted by BitLocker.</li>
  408. <li>Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.</li>
  409. <li>Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.</li>
  410. <li>Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.</li>
  411. <li>Don't allow a directory path to be entered for the file container to be created in Format wizard.</li>
  412. <li>Don't try to use fix for CVE-2019-19501 if Windows Shell has been modified or is not running since there is no reliable way to fix it in such non standard configuation.</li>
  413. <li>MBR bootloader: fix incorrect compressed data size passed to decompressor in boot sector.</li>
  414. <li>Add warning message when typed password reaches maximum length during the system encryption wizard.</li>
  415. <li>Fix wrong error message when UTF-8 encoding of entered password exceeds the maximum supported length.</li>
  416. <li>Fix crash when using portable 32-bit "VeraCrypt Format.exe" to create hidden volume on a 64-bit machine where VeraCrypt is already installed.</li>
  417. <li>Update libzip to latest version 1.7.3.</li>
  418. <li>Update translations.</li>
  419. </ul>
  420. </li>
  421. <li><strong>Linux/MacOSX:</strong>
  422. <ul>
  423. <li>Force reading of at least 32 bytes from /dev/random before allowing it to fail gracefully</li>
  424. <li>Allow choosing a filesystem other than FAT for Outer volume but display warning about risks of such choice. Implement an estimation of maximum possible size of hidden volume in this case.</li>
  425. <li>Erase sensitive memory explicitly instead of relying on the compiler not optimizing calls to method Memory::Erase.</li>
  426. <li>Add support for Btrfs filesystem when creating volumes (Linux Only).</li>
  427. <li>Update wxWidgets for static builds to version 3.0.5.</li>
  428. </ul>
  429. </li>
  430. </ul>
  431. <p><strong style="text-align:left">1.24-Update6 </strong>(March 10<sup>th</sup>, 2020):</p>
  432. <ul>
  433. <li><strong>Windows:</strong>
  434. <ul>
  435. <li>Fix PIM label text truncation in password dialog</li>
  436. <li>Fix wrong language used in installer if user selects a language other than English and then selects English before clicking OK on language selection dialog.</li>
  437. </ul>
  438. </li>
  439. </ul>
  440. <p><strong style="text-align:left">1.24-Update5 </strong>(March 9<sup>th</sup>, 2020):</p>
  441. <ul>
  442. <li><strong>Windows:</strong>
  443. <ul>
  444. <li>Optimize performance for CPUs that have more than 64 logical processors (contributed by Sachin Keswani from AMD)</li>
  445. <li>Support specifying keyfiles (both in tokens and in filesystem) when creating file containers using command line (switches /keyfile, /tokenlib and /tokenpin supported in VeraCrypt Format)</li>
  446. <li>Fix leak of keyfiles path and name after VeraCrypt process exits.</li>
  447. <li>Add CLI switch /secureDesktop to VeraCrypt Format.</li>
  448. <li>Update libzip to version 1.6.1</li>
  449. <li>Minor UI fixes</li>
  450. </ul>
  451. </li>
  452. </ul>
  453. <p><strong style="text-align:left">1.24-Update4 </strong>(January 23<sup>rd</sup>, 2020):</p>
  454. <ul>
  455. <li><strong>Windows:</strong>
  456. <ul>
  457. <li>Fix regression in Expander and Format when RAM encryption is enable that was causing volume headers to be corrupted.</li>
  458. <li>Fix failure of Screen Readers (Accessibility support) to read UI by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed.</li>
  459. <li>Fix side effects related to the fix for CVE-2019-19501 which caused links in UI not to open.</li>
  460. <li>Add switch /signalExit to support notifying <a href="https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/waitfor" target="_blank">WAITFOR</a> Windows command when VeraCrypt.exe exits if /q was specified in CLI (cf documentation for usage).</li>
  461. <li>Don't display mount/dismount examples in help dialog for command line in Format and Expander.</li>
  462. <li>Documentation and translation updates.</li>
  463. </ul>
  464. </li>
  465. <li><strong>Linux:</strong>
  466. <ul>
  467. <li>Fix regression that limited the size available for hidden volumes created on disk or partition.</li>
  468. </ul>
  469. </li>
  470. <li><strong>MacOSX:</strong>
  471. <ul>
  472. <li>Fix regression that limited the size available for hidden volumes created on disk or partition.</li>
  473. </ul>
  474. </li>
  475. </ul>
  476. <p><strong style="text-align:left">1.24-Update3 </strong>(December 21<sup>nd</sup>, 2019):</p>
  477. <ul>
  478. <li><strong>Linux:</strong>
  479. <ul>
  480. <li>Fix console-only build to remove dependency on GTK that is not wanted on headless servers.</li>
  481. </ul>
  482. </li>
  483. </ul>
  484. <p><strong style="text-align:left">1.24-Update2 </strong>(December 16<sup>th</sup>, 2019):</p>
  485. <ul>
  486. <li><strong>All OSes:</strong>
  487. <ul>
  488. <li>clear AES key from stack memory when using non-optimized implementation. Doesn't apply to VeraCrypt official build (Reported and fixed by Hanno Böck)</li>
  489. <li>Update Jitterentropy RNG Library to version 2.2.0</li>
  490. <li>Start following IEEE 1541 agreed naming of bytes (KiB, MiB, GiB, TiB, PiB).</li>
  491. <li>Various documentation enhancements.</li>
  492. </ul>
  493. </li>
  494. <li><strong>Windows:</strong>
  495. <ul>
  496. <li>Fix possible local privilege escalation vulnerability during execution of VeraCrypt Expander (CVE-2019-19501)</li>
  497. <li>MBR bootloader:
  498. <ul>
  499. <li>workaround for SSD disks that don't allow write operations in BIOS mode with buffers less than 4096 bytes.</li>
  500. <li>Don't restore MBR to VeraCrypt value if it is coming from a loader different from us or different from Microsoft one.</li>
  501. </ul>
  502. </li>
  503. <li>EFI bootloader:
  504. <ul>
  505. <li>Fix "ActionFailed" not working and add "ActionCancelled" to customize handling of user hitting ESC on password prompt</li>
  506. <li>Fix F5 showing previous password after failed authentication attempt. Ensure that even wrong password value are cleared from memory.</li>
  507. </ul>
  508. </li>
  509. <li>Fix multi-OS boot compatibility by only setting VeraCrypt as first bootloader of the system if the current first bootloader is Windows one.</li>
  510. <li>Add new registry flags for SystemFavoritesService to control updating of EFI BIOS boot menu on shutdown.</li>
  511. <li>Allow system encrypted drive to be mounted in WindowsPE even if changing keyboard layout fails (reported and fixed by Sven Strickroth)</li>
  512. <li>Enhancements to the mechanism preserving file timestamps, especially for keyfiles.</li>
  513. <li>Fix RDRAND instruction not detected on AMD CPUs.</li>
  514. <li>Detect cases where RDRAND is flawed (e.g. AMD Ryzen) to avoid using it if enabled by user.</li>
  515. <li>Don't write extra 0x00 byte at the end of DcsProp file when modifying it through UI</li>
  516. <li>Reduce memory usage of IOCTL_DISK_VERIFY handler used in disk verification by Windows.</li>
  517. <li>Add switch /FastCreateFile for VeraCrypt Format.exe to speedup creation of large file container if quick format is selected.</li>
  518. <li>Fix the checkbox for skipping verification of Rescue Disk not reflecting the value of /noisocheck switch specified in VeraCrypt Format command line.</li>
  519. <li>check "TrueCrypt Mode" in password dialog when mounting a file container with .tc extension</li>
  520. <li>Update XML languages files.</li>
  521. </ul>
  522. </li>
  523. <li><strong>Linux:</strong>
  524. <ul>
  525. <li>Fix regression causing admin password to be requested too many times in some cases</li>
  526. <li>Fix off by one buffer overflow in function Process::Execute (Reported and fixed by Hanno Böck)</li>
  527. <li>Make sure password gets deleted in case of internal error when mounting volume (Reported and fixed by Hanno Böck)</li>
  528. <li>Fix passwords using Unicode characters not recognized in text mode.</li>
  529. <li>Fix failure to run VeraCrypt binary built for console mode on headless machines.</li>
  530. <li>Add switch to force the use of legacy maximum password length (64 UTF8 bytes)</li>
  531. <li>Add CLI switch (--use-dummy-sudo-password) to force use of old sudo behavior of sending a dummy password</li>
  532. <li>During uninstall, output error message to STDERR instead of STDOUT for better compatibility with package managers.</li>
  533. <li>Make sector size mismatch error when mounting disks more verbose.</li>
  534. <li>Speedup SHA256 in 64-bit mode by using assembly code.</li>
  535. </ul>
  536. </li>
  537. <li><strong>MacOSX:</strong>
  538. <ul>
  539. <li>Add switch to force the use of legacy maximum password length (64 UTF8 bytes)</li>
  540. <li>Fix off by one buffer overflow in function Process::Execute (Reported and fixed by Hanno Böck)</li>
  541. <li>Fix passwords using Unicode characters not recognized in text mode.</li>
  542. <li>Make sector size mismatch error when mounting disks more verbose.</li>
  543. <li>Speedup SHA256 in 64-bit mode by using assembly code.</li>
  544. <li>Link against latest wxWidgets version 3.1.3</li>
  545. </ul>
  546. </li>
  547. </ul>
  548. <p><strong style="text-align:left">1.24-Hotfix1 </strong>(October 27<sup>rd</sup>, 2019):</p>
  549. <ul>
  550. <li><strong>Windows:</strong>
  551. <ul>
  552. <li>Fix 1.24 regression that caused system favorites not to mount at boot if VeraCrypt freshly installed.</li>
  553. <li>Fix failure to encrypt system if the current Windows username contains a Unicode non-ASCII character.</li>
  554. <li>Make VeraCrypt Expander able to resume expansion of volumes whose previous expansion was aborted before it finishes.</li>
  555. <li>Add "Quick Expand" option to VeraCrypt Expander to accelarate the expansion of large file containers.</li>
  556. <li>Add several robustness checks and validation in case of system encryption to better handle some corner cases.</li>
  557. <li>Minor UI and documentation changes.</li>
  558. </ul>
  559. </li>
  560. <li><strong>Linux:</strong>
  561. <ul>
  562. <li>Workaround gcc 4.4.7 bug under CentOS 6 that caused VeraCrypt built under CentOS 6 to crash when Whirlpool hash is used.</li>
  563. <li>Fix "incorrect password attempt" written to /var/log/auth.log when mounting volumes.</li>
  564. <li>Fix dropping file in UI not showing its correct path , specifically under GTK-3.</li>
  565. <li>Add missing JitterEntropy implementation/</li>
  566. </ul>
  567. </li>
  568. <li><strong>MacOSX:</strong>
  569. <ul>
  570. <li>Fix some devices and partitions not showing in the device selection dialog under OSX 10.13 and newer.</li>
  571. <li>Fix keyboard tab navigation between password fields in "Volume Password" page of volume creation wizard.</li>
  572. <li>Add missing JitterEntropy implementation/</li>
  573. <li>Support APFS filesystem for creation volumes.</li>
  574. <li>Support Dark Mode.</li>
  575. </ul>
  576. </li>
  577. </ul>
  578. <p><strong style="text-align:left">1.24 </strong>(October 6<sup>th</sup>, 2019):</p>
  579. <ul>
  580. <li><strong>All OSs:</strong>
  581. <ul>
  582. <li>Increase password maximum length to 128 bytes in UTF-8 encoding for non-system volumes.</li>
  583. <ul>
  584. <li>Add option to use legacy maximum password length (64) instead of new one for compatibility reasons.</li>
  585. </ul>
  586. <li>Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to CPU RDRAND (<a href="http://www.chronox.de/jent.html" target="_blank">http://www.chronox.de/jent.html</a>)</li>
  587. <li>Speed optimization of XTS mode on 64-bit machine using SSE2 (up to 10% faster).</li>
  588. <li>Fix detection of CPU features AVX2/BMI2. Add detection of RDRAND/RDSEED CPU features. Detect Hygon CPU as AMD one.</li>
  589. </ul>
  590. </li>
  591. <li><strong>Windows:</strong>
  592. <ul>
  593. <li>Implement RAM encryption for keys and passwords using ChaCha12 cipher, t1ha non-cryptographic fast hash and ChaCha20 based CSPRNG.</li>
  594. <ul>
  595. <li>Available only on 64-bit machines.</li>
  596. <li>Disabled by default. Can be enabled using option in UI.</li>
  597. <li>Less than 10% overhead on modern CPUs.</li>
  598. <li>Side effect: Windows Hibernate is not possible if VeraCrypt System Encryption is also being used.</li>
  599. </ul>
  600. <li>Mitigate some memory attacks by making VeraCrypt applications memory inaccessible to non-admin users (based on KeePassXC implementation)</li>
  601. <li>New security features:</li>
  602. <ul>
  603. <li>Erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks</li>
  604. <li>Add option when system encryption is used to erase all encryption keys from memory when a new device is connected to the system.</li>
  605. <li>Add new driver entry point that can be called by applications to erase encryption keys from memory in case of emergency.</li>
  606. </ul>
  607. <li>MBR Bootloader: dynamically determine boot loader memory segment instead of hardcoded values (proposed by neos6464)</li>
  608. <li>MBR Bootloader: workaround for issue affecting creation of hidden OS on some SSD drives.</li>
  609. <li>Fix issue related to Windows Update breaking VeraCrypt UEFI bootloader.</li>
  610. <li>Several enhancements and fixes for EFI bootloader:</li>
  611. <ul>
  612. <li>Implement timeout mechanism for password input. Set default timeout value to 3 minutes and default timeout action to "shutdown".</li>
  613. <li>Implement new actions "shutdown" and "reboot" for EFI DcsProp config file.</li>
  614. <li>Enhance Rescue Disk implementation of restoring VeraCrypt loader.</li>
  615. <li>Fix ESC on password prompt during Pre-Test not starting Windows.</li>
  616. <li>Add menu entry in Rescue Disk that enables starting original Windows loader.</li>
  617. <li>Fix issue that was preventing Streebog hash from being selected manually during Pre-Boot authentication.</li>
  618. <li>If "VeraCrypt" folder is missing from Rescue Disk, it will boot PC directly from bootloader stored on hard drive</li>
  619. <ul>
  620. <li>This makes it easy to create a bootable disk for VeraCrypt from Rescue Disk just by removing/renaming its "VeraCrypt" folder.</li>
  621. </ul>
  622. </ul>
  623. <li>Add option (disabled by default) to use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available.</li>
  624. <li>Add mount option (both UI and command line) that allows mounting a volume without attaching it to the specified drive letter.</li>
  625. <li>Update libzip to version 1.5.2</li>
  626. <li>Do not create uninstall shortcut in startmenu when installing VeraCrypt. (by Sven Strickroth)</li>
  627. <li>Enable selection of Quick Format for file containers creation. Separate Quick Format and Dynamic Volume options in the wizard UI.</li>
  628. <li>Fix editor of EFI system encryption configuration file not accepting ENTER key to add new lines.</li>
  629. <li>Avoid simultaneous calls of favorites mounting, for example if corresponding hotkey is pressed multiple times.</li>
  630. <li>Ensure that only one thread at a time can create a secure desktop.</li>
  631. <li>Resize some dialogs in Format and Mount Options to to fix some text truncation issues with non-English languages.</li>
  632. <li>Fix high CPU usage when using favorites and add switch to disable periodic check on devices to reduce CPU load.</li>
  633. <li>Minor UI changes.</li>
  634. <li>Updates and corrections to translations and documentation.</li>
  635. </ul>
  636. </li>
  637. <li><strong>MacOSX:</strong>
  638. <ul>
  639. <li>Add check on size of file container during creation to ensure it's smaller than available free disk space. Add CLI switch --no-size-check to disable this check.</li>
  640. </ul>
  641. </li>
  642. <li><strong>Linux:</strong>
  643. <ul>
  644. <li>Make CLI switch --import-token-keyfiles compatible with Non-Interactive mode.</li>
  645. <li>Add check on size of file container during creation to ensure it's smaller than available free disk space. Add CLI switch --no-size-check to disable this check.</li>
  646. </ul>
  647. </li>
  648. </ul>
  649. <p><strong style="text-align:left">1.23-Hotfix-2 </strong>(October 8<sup>th</sup>, 2018):</p>
  650. <ul>
  651. <li><strong>Windows:</strong>
  652. <ul>
  653. <li>Fix low severity vulnerability inherited from TrueCrypt that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes).
  654. <ul>
  655. <li>Reported by Tim Harrison.</li>
  656. </ul>
  657. </li>
  658. <li>Disable quick format when creating file containers from command line. Add /quick switch to enable it in this case if needed.</li>
  659. <li>Add /nosizecheck switch to disable checking container size against available free space during its creation.
  660. <ul>
  661. <li>This enables to workaround a bug in Microsoft Distributed File System (DFS).</li>
  662. </ul>
  663. </li>
  664. </ul>
  665. </li>
  666. </ul>
  667. <p><strong style="text-align:left">1.23 </strong>(September 12<sup>th</sup>, 2018):</p>
  668. <ul>
  669. <li><strong>Windows:</strong>
  670. <ul>
  671. <li>VeraCrypt is now compatible with default EFI SecureBoot configuration for system encryption.</li>
  672. <li>Fix EFI system encryption issues on some machines (e.g. HP, Acer).</li>
  673. <li>Support EFI system encryption on Windows LTSB.</li>
  674. <li>Add compatibility of system encryption with Windows 10 upgrade using ReflectDrivers mechanism</li>
  675. <li>Make EFI Rescue Disk decrypt partition correctly when Windows Repair overwrites first partition sector.</li>
  676. <li>Add Driver option in the UI to explicitly allow Windows 8.1 and Windows 10 defragmenter to see VeraCrypt encrypted disks.</li>
  677. <li>Add internal verification of binaries embedded signature to protect against some types to tampering attacks.</li>
  678. <li>Fix Secure Desktop not working for favorites set to mount at logon on Windows 10 under some circumstances.</li>
  679. <li>when Secure Desktop is enabled, use it for Mount Options dialog if it is displayed before password dialog.</li>
  680. <li>when extracting files in Setup or Portable mode, decompress zip files docs.zip and Languages.zip in order to have ready to use configuration.</li>
  681. <li>Display a balloon tip warning message when text pasted to password field is longer than maximum length and so it will be truncated.</li>
  682. <li>Implement language selection mechanism at the start of the installer to make easier for international users.</li>
  683. <li>Add check on size of file container during creation to ensure it's smaller than available free disk space.</li>
  684. <li>Fix buttons at the bottom not shown when user sets a large system font under Window 7.</li>
  685. <li>Fix compatibility issues with some disk drivers that don't support IOCTL_DISK_GET_DRIVE_GEOMETRY_EX ioctl.</li>
  686. </ul>
  687. </li>
  688. <li><strong>MacOSX:</strong>
  689. <ul>
  690. <li>Support pasting values to password fields using keyboard (CMD+V and CMD+A now working properly).
  691. <li>Add CheckBox in mount option dialog to force the use of embedded backup header during mount.</li>
  692. <li>When performing backup of volume header, automatically try to use embedded backup header if using the main header fails.</li>
  693. <li>Implement benchmarking UI for Hash and PKCS-5 PRF algorithms.</li>
  694. </ul>
  695. </li>
  696. <li><strong>Linux:</strong>
  697. <ul>
  698. <li>Don't allow waiting dialog to be closed before the associated operation is finished. This fix a crash under Lubuntu 16.04.
  699. <li>Add CheckBox in mount option dialog to force the use of embedded backup header during mount.</li>
  700. <li>When performing backup of volume header, automatically try to use embedded backup header if using the main header fails.</li>
  701. <li>Implement benchmarking UI for Hash and PKCS-5 PRF algorithms.</li>
  702. <li>Remove limitation of hidden volume protection on disk with sector size larger than 512 bytes.</li>
  703. </ul>
  704. </li>
  705. </ul>
  706. <p><strong style="text-align:left">1.22 </strong>(March 30<sup>th</sup>, 2018):</p>
  707. <ul>
  708. <li><strong>All OSs:</strong>
  709. <ul>
  710. <li>SIMD speed optimization for Kuznyechik cipher implementation (up to 2x speedup).</li>
  711. <li>Add 5 new cascades of cipher algorithms: Camellia-Kuznyechik, Camellia-Serpent, Kuznyechik-AES, Kuznyechik-Serpent-Camellia and Kuznyechik-Twofish.</li>
  712. </ul>
  713. </li>
  714. <li><strong>Windows:</strong>
  715. <ul>
  716. <li>MBR Bootloader: Fix failure to boot hidden OS on some machines.</li>
  717. <li>MBR Bootloader: Reduce CPU usage during password prompt.</li>
  718. <li>Security enhancement: Add option to block TRIM command for system encryption on SSD drives.</li>
  719. <li>Implement TRIM support for non-system SSD drives and add option to enable it (TRIM is disabled by default for non-system volumes).</li>
  720. <li>Better fix for "Parameter Incorrect" issues during EFI system encryption in some machines.</li>
  721. <li>Driver: remove unnecessary dependency to wcsstr which can cause issues on some machines.</li>
  722. <li>Driver: Fix "Incorrect Parameter" error when mounting volumes on some machines.</li>
  723. <li>Fix failure to mount system favorites during boot on some machines.</li>
  724. <li>Fix current application losing focus when VeraCrypt is run in command line with /quit /silent switches.</li>
  725. <li>Fix some cases of external applications freezing during mount/dismount.</li>
  726. <li>Fix rare cases of secure desktop for password dialog not visible which caused UI to block.</li>
  727. <li>Update libzip to version 1.5.0 that include fixes for some security issues.</li>
  728. <li>Extend Secure Desktop feature to smart card PIN entry dialog.</li>
  729. <li>Fix truncated license text in installer wizard.</li>
  730. <li>Add portable package that allows extracting binaries without asking for admin privileges.</li>
  731. <li>Simplify format of language XML files.</li>
  732. <li>Workaround for cases where password dialog doesn't get keyboard focus if Secure Desktop is not enabled.</li>
  733. </ul>
  734. <li><strong>Linux:</strong>
  735. <ul>
  736. <li>Fix failure to install GUI version under recent versions of KDE.</li>
  737. <li>Fix wxWidgets assertion failed when backing up/restoring volume header.</li>
  738. </ul>
  739. </li>
  740. <li><strong>MacOSX:</strong>
  741. <ul>
  742. <li>Fix issue preventing some local help files from opening in the browser.</li>
  743. </ul>
  744. </li>
  745. </ul>
  746. <p><strong style="text-align:left">1.21 </strong>(July 9<sup>th</sup>, 2017):</p>
  747. <ul>
  748. <li><strong>All OSs:</strong>
  749. <ul>
  750. <li>Fix 1.20 regression crash when running on CPU not supporting extended features.</li>
  751. </ul>
  752. </li>
  753. <li><strong>Windows:</strong>
  754. <ul>
  755. <li>Fix 1.20 regression that caused PIM value stored in favorites to be ignored during mount.</li>
  756. <li>Fix 1.20 regression that causes system favorites not to mount in some cases.</li>
  757. <li>Fix some cases of "Parameter Incorrect" error during EFI system encryption wizard.</li>
  758. <li>Install PDF documents related to EFI system encryption configuration for advanced users:
  759. <ul>
  760. <li>disk_encryption_v1_2.pdf related to EFI hidden OS and full fisk encryption</li>
  761. <li>dcs_tpm_owner_02.pdf related to TPM configuration for EFI system encryption.</li>
  762. </li>
  763. </ul>
  764. </ul>
  765. </li>
  766. <li><strong>FreeBSD:</strong>
  767. <ul>
  768. <li>Add support for building on FreeBSD.</li>
  769. </ul>
  770. </li>
  771. </ul>
  772. <p><strong style="text-align:left">1.20 </strong>(June 29<sup>th</sup>, 2017):</p>
  773. <ul>
  774. <li><strong>All OSs:</strong>
  775. <ul>
  776. <li>Use 64-bit optimized assembly implementation of Twofish and Camellia by Jussi Kivilinna.
  777. <ul>
  778. <li>Camellia 2.5 faster when AES-NI supported by CPU. 30% faster without it.</li>
  779. </ul>
  780. </li>
  781. <li>Use optimized implementation for SHA-512/SHA256.
  782. <ul>
  783. <li>33% speedup on 64-bit systems.</li>
  784. </ul>
  785. </li>
  786. <li>Deploy local HTML documentation instead of User Guide PDF.</li>
  787. <li>Change links in UI from ones on Codeplex to ones hosted at veracrypt.fr </li>
  788. <li>Security: build binaries with support for Address Space Layout Randomization (ASLR).</li>
  789. </ul>
  790. </li>
  791. <li><strong>Windows:</strong>
  792. <ul>
  793. <li>Several fixes and modifications for EFI System Encryption:
  794. <ul>
  795. <li>Fix bug in EFI system decryption using EFI Rescue Disk</li>
  796. <li>Add support for TPM 1.2 and TPM 2.0 (experimental) through DCS low level configuration.
  797. <ul>
  798. <li><a href="https://dc5.sourceforge.io/docs/dcs_tpm_owner_02.pdf" target="_blank">https://dc5.sourceforge.io/docs/dcs_tpm_owner_02.pdf</a>
  799. </li>
  800. </ul>
  801. <li>Add Support for EFI full disk encryption and hidden OS using manual procedure (not exposed in UI).
  802. <ul>
  803. <li><a href="https://dc5.sourceforge.io/docs/disk_encryption_v1_2.pdf" target="_blank">https://dc5.sourceforge.io/docs/disk_encryption_v1_2.pdf</a>
  804. </li>
  805. </ul>
  806. </li>
  807. </li>
  808. </ul>
  809. </li>
  810. <li>Enable using Secure Desktop for password entry. Add preferences option and command line switch (/secureDesktop) to activate it.</li>
  811. <li>Use default mount parameters when mounting multiple favorites with password caching.</li>
  812. <li>Enable specifying PRF and TrueCryptMode for favorites.</li>
  813. <li>Preliminary driver changes to support EFI hidden OS functionality.</li>
  814. <li>Fix Streebog not recognized by /hash command line.</li>
  815. <li>Add support for ReFS filesystem on Windows 10 when creating normal volumes</li>
  816. <li>Fix high CPU usage when favorite configured to mount with VolumeID on arrival.</li>
  817. <li>Use CHM file for User Guide instead of PDF.</li>
  818. <li>Fix false warning in case of EFI system encryption about Windows not installed on boot drive.</li>
  819. <li>Enhancements to driver handling of various disk IOCTL.</li>
  820. <li>Enhancements to EFI bootloader. Add possibility to manually edit EFI configuration file.</li>
  821. <li>Driver Security: Use enhanced protection of NX pool under Windows 8 and later.</li>
  822. <li>Reduce performance impact of internal check for disconnected network drives.</li>
  823. <li>Minor fixes.</li>
  824. </ul>
  825. </li>
  826. <li><strong>MacOSX:</strong>
  827. <ul>
  828. <li>OSX 10.7 or newer is required to run VeraCrypt.</li>
  829. <li>Make VeraCrypt default handler of .hc & .tc files.</li>
  830. <li>Add custom VeraCrypt icon to .hc and .tc files in Finder.</li>
  831. <li>Check TrueCryptMode in password dialog when opening container file with .tc extension.</li>
  832. </ul>
  833. </li>
  834. <li><strong>Linux:</strong>
  835. <ul>
  836. <li>Check TrueCryptMode in password dialog when opening container file with .tc extension.</li>
  837. <li>Fix executable stack in resulting binary which was caused by crypto assembly files missing the GNU-stack note.</li>
  838. </ul>
  839. </li>
  840. </ul>
  841. <p><strong style="text-align:left">1.19 </strong>(October 17<sup>th</sup>, 2016):</p>
  842. <ul>
  843. <li><strong>All OSs:</strong>
  844. <ul>
  845. <li>Fix issues raised by Quarkslab audit.
  846. <ul>
  847. <li>Remove GOST89 encryption algorithm. </li><li>Make PBKDF2 and HMAC code clearer and easier to analyze. </li><li>Add test vectors for Kuznyechik. </li><li>Update documentation to warn about risks of using command line switch &rdquo;tokenpin&rdquo;.
  848. </li></ul>
  849. </li><li>Use SSE2 optimized Serpent algorithm implementation from Botan project (2.5 times faster on 64-bit platforms).
  850. </li></ul>
  851. </li><li><strong>Windows:</strong>
  852. <ul>
  853. <li>Fix keyboard issues in EFI Boot Loader. </li><li>Fix crash on 32-bit machines when creating a volume that uses Streebog as PRF.
  854. </li><li>Fix false positive detection of Evil-Maid attacks in some cases (e.g. hidden OS creation)
  855. </li><li>Fix failure to access EFS data on VeraCrypt volumes under Windows 10. </li><li>Fix wrong password error in the process of copying hidden OS. </li><li>Fix issues raised by Quarkslab audit:
  856. <ul>
  857. <li>Fix leak of password length in MBR bootloader inherited from TrueCrypt. </li><li>EFI bootloader: Fix various leaks and erase keyboard buffer after password is typed.
  858. </li><li>Use libzip library for handling zip Rescue Disk file instead of vulnerable XUnzip library.
  859. </li></ul>
  860. </li><li>Support EFI system encryption for 32-bit Windows. </li><li>Perform shutdown instead of reboot during Pre-Test of EFI system encryption to detect incompatible motherboards.
  861. </li><li>Minor GUI and translations fixes. </li></ul>
  862. </li><li><strong>MacOSX:</strong>
  863. <ul>
  864. <li>Remove dependency to MacFUSE compatibility layer in OSXFuse. </li></ul>
  865. </li></ul>
  866. <p>&nbsp;</p>
  867. <p><strong style="text-align:left">1.18a </strong>(August 17<sup>th</sup>, 2016):</p>
  868. <ul>
  869. <li><strong>All OSs:</strong>
  870. <ul>
  871. <li>Support Japanese encryption standard Camellia, including for Windows system encryption (MBR &amp; EFI).
  872. </li><li>Support Russian encryption and hash standards Kuznyechik, Magma and Streebog, including for Windows EFI system encryption.
  873. </li><li>Fix TrueCrypt vulnerability allowing detection of hidden volumes presence (reported by Ivanov Aleksey Mikhailovich, alekc96 [at] mail dot ru)
  874. <ul><li> <strong style="color:#ff0000;">To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes/OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1.18a version of VeraCrypt.</strong></li></ul>
  875. </li></ul>
  876. </li><li><strong>Windows:</strong>
  877. <ul>
  878. <li>Support EFI Windows system encryption (limitations: no hidden os, no boot custom message)
  879. </li><li>Enhanced protection against dll hijacking attacks. </li><li>Fix boot issues on some machines by increasing required memory by 1 KiB </li><li>Add benchmarking of hash algorithms and PRF with PIM (including for pre-boot).
  880. </li><li>Move build system to Visual C&#43;&#43; 2010 for better stability. </li><li>Workaround for AES-NI support under Hyper-V on Windows Server 2008 R2. </li><li>Correctly remove driver file veracrypt.sys during uninstall on Windows 64-bit.
  881. </li><li>Implement passing smart card PIN as command line argument (/tokenpin) when explicitly mounting a volume.
  882. </li><li>When no drive letter specified, choose A: or B: only when no other free drive letter is available.
  883. </li><li>Reduce CPU usage caused by the option to disable use of disconnected network drives.
  884. </li><li>Add new volume ID mechanism to be used to identify disks/partitions instead of their device name.
  885. </li><li>Add option to avoid PIM prompt in pre-boot authentication by storing PIM value unencrypted in MBR.
  886. </li><li>Add option and command line switch to hide waiting dialog when performing operations.
  887. </li><li>Add checkbox in &quot;VeraCrypt Format&quot; wizard GUI to skip Rescue Disk verification during system encryption procedure.
  888. </li><li>Allow files drag-n-drop when VeraCrypt is running as elevated process. </li><li>Minor GUI and translations fixes. </li></ul>
  889. </li><li><strong>Linux:</strong>
  890. <ul>
  891. <li>Fix mount issue on Fedora 23. </li><li>Fix mount failure when compiling source code using gcc 5.x. </li><li>Adhere to XDG Desktop Specification by using XDG_CONFIG_HOME to determine location of configuration files.
  892. </li></ul>
  893. </li><li><strong>MacOSX:</strong>
  894. <ul>
  895. <li>Solve compatibility issue with newer versions of OSXFuse. </li></ul>
  896. </li></ul>
  897. <p>&nbsp;</p>
  898. <p><strong style="text-align:left">1.17 </strong>(February 13<sup>th</sup>, 2016):</p>
  899. <ul>
  900. <li><strong>All OSs:</strong>
  901. <ul>
  902. <li>Support UNICODE passwords: all characters are now accepted in passwords (except Windows system encryption)
  903. </li><li>Cut mount/boot time by half thanks to a clever optimization of key derivation (found by
  904. <a href="https://madiba.encs.concordia.ca/~x_decarn/" target="_blank">Xavier de Carn&eacute; de Carnavalet</a>)
  905. </li><li>Optimize Whirlpool PRF speed by using assembly (25% speed gain compared to previous code).
  906. </li><li>Add support for creating exFAT volumes. </li><li>Add GUI indicator for the amount of randomness gathered using mouse movement.
  907. </li><li>Include new icons and graphics contributed by <em>Andreas Becker</em> (<a href="http://www.andreasbecker.de" target="_blank">http://www.andreasbecker.de</a>)
  908. </li></ul>
  909. </li><li><strong>Windows:</strong>
  910. <ul>
  911. <li>Fix dll hijacking issue affecting installer that allows code execution with elevation of privilege (CVE-2016-1281). Reported by Stefan Kanthak (<a href="http://home.arcor.de/skanthak/" target="_blank">http://home.arcor.de/skanthak/</a>)
  912. </li><li>Sign binaries using both SHA-1 and SHA-256 to follow new Microsoft recommendations.
  913. </li><li>Solve issues under Comodo/Kaspersky when running an application from a VeraCrypt volume (Reported and fixed by Robert Geisler).
  914. </li><li>Bootloader: Protect password/PIM length by filling the fields to maximum length with '*' after ENTER
  915. </li><li>Solve issue with system favorites not being able to be mounted to drive A: </li><li>Solve lost focus issues for after displaying the waiting dialog </li><li>Solve rare issue where some partitions where asscoiated with wrong disk the &quot;Select Device&quot; dialog.
  916. </li><li>Implement PIM caching, for both system encryption and normal volumes. Add option to activate it.
  917. </li><li>Don't try mounting using cached passwords if password and/or keyfile are specified in the command line.
  918. </li><li>Internal rewrite to make VeraCrypt native UNICODE application. </li><li>Workaround to avoid false positive detection by some anti-virus software. </li><li>Hide disconnected network drives in the list of available drives. Add option to make them available for mounting.
  919. </li><li>Solve issue that caused in some cases configuration and history XML files to be updated even when not needed.
  920. </li><li>Fix leak of path of selected keyfiles in RAM. </li><li>Fix TB unit can't be deselected in VeraCryptExpander. </li><li>Add Alt&#43;i keyboard shortcut for &quot;Use PIM&quot; checkbox in GUI. </li><li>Minor GUI and translations fixes. </li></ul>
  921. </li><li><strong>Linux/MacOSX:</strong>
  922. <ul>
  923. <li>Fix issue of --stdin option not handling correctly passwords that contain a space character (reported and fixed by Codeplex user horsley1953).
  924. </li><li>Fix issue creating volumes using command line with a filesystem other than FAT.
  925. </li><li>Support K/M/G/T suffixes for --size switch to indicate unit to use for size value.
  926. </li></ul>
  927. </li></ul>
  928. <p id="116"><strong style="text-align:left">1.16 (October 7<sup>th</sup>, 2015):</strong></p>
  929. <ul>
  930. <li><strong><strong>Windows:</strong></strong>
  931. <ul>
  932. <li>Modify patch for CVE-2015-7358 vulnerability to solve side effects on Windows while still making it very hard to abuse drive letter handling.
  933. </li><li>Fix failure to restore volume header from an external file in some configurations.
  934. </li><li>Add option to disable &ldquo;Evil Maid&rdquo; attack detection for those encountering false positive cases (e.g. FLEXnet/Adobe issue).
  935. </li><li>By default, don&rsquo;t try to mount using empty password when default keyfile configured or keyfile specified in command line. Add option to restore the old behavior.
  936. <ul>
  937. <li>If mounting using empty password is needed, explicitly specify so in the command line using: /p &quot;&quot;
  938. </li></ul>
  939. </li></ul>
  940. </li></ul>
  941. <p><strong style="text-align:left">1.15 </strong>(September 26<sup>th</sup>, 2015):</p>
  942. <ul>
  943. <li><strong>Windows:</strong>
  944. <ul>
  945. <li>Fix two TrueCrypt vulnerabilities reported by James Forshaw (Google Project<br>
  946. Zero)
  947. <ul>
  948. <li><a href="https://code.google.com/p/google-security-research/issues/detail?id=538" target="_blank">CVE-2015-7358</a>&nbsp;(critical): Local Elevation of Privilege on Windows by<br>
  949. abusing drive letter handling. </li><li><a href="https://code.google.com/p/google-security-research/issues/detail?id=537" target="_blank">CVE-2015-7359</a>: Local Elevation of Privilege on Windows caused by<br>
  950. incorrect Impersonation Token Handling. </li></ul>
  951. </li><li>Fix regression in mounting of favorite volumes at user logon. </li><li>Fix display of some Unicode languages (e.g. Chinese) in formatting wizard. </li><li>Set keyboard focus to PIM field when &quot;Use PIM&quot; is checked. </li><li>Allow Application key to open context menu on drive letters list </li><li>Support specifying volumes size in TB in the GUI (command line already supports this)
  952. </li></ul>
  953. </li></ul>
  954. <p><strong style="text-align:left">1.14 </strong>(September 16<sup>th</sup>, 2015):</p>
  955. <ul>
  956. <li><strong>All OSs:</strong>
  957. <ul>
  958. <li>Mask and unmask PIM value in GUI and bootloader like the password. </li></ul>
  959. </li></ul>
  960. <ul>
  961. <li><strong>Windows:</strong>
  962. <ul>
  963. <li>Solve Rescue Disk damaged error when using cascade ciphers and SHA256 for system encryption.
  964. </li><li>Solve option &quot;Cache password in drive memory&quot; always disabled even if checked in preferences.
  965. </li><li>Solve UI language change not taken into account for new install unless a preference is changed.
  966. </li><li>Implement creating file containers using command line. </li><li>Driver: disable support of IOCTL_STORAGE_QUERY_PROPERTY by default and add option to enable it.
  967. </li><li>Driver:&nbsp; Support returning StorageDeviceProperty when queried through IOCTL_STORAGE_QUERY_PROPERTY.
  968. </li><li>Support setting volume label in Explorer through mount option or favorite label value.
  969. </li><li>Fix for Hot Keys assignment dialog issue where OEM-233 is always displayed and can't be changed.
  970. </li><li>Always copy both 32-bit and 64-bit executable binaries during install and in Traveler Disk Setup.
  971. <ul>
  972. <li>Traveler Disk will again use 32-bit exe by default while also offering 64-bit exe.
  973. </li><li>On Windows 64-bit, 32-bit exe files are now available(e.g. if needed to use 32-bit PKCS#11 dll)
  974. </li></ul>
  975. </li><li>Include Volume Expander in Traveler Disk Setup. </li><li>Don't offer creating a restore point if it is disabled in Windows. </li><li>Add possibility to verify a Rescue Disk ISO image file. </li><li>Minors fixes in the installer, GUI and driver. </li></ul>
  976. </li></ul>
  977. <ul>
  978. <li><strong>Linux:</strong>
  979. <ul>
  980. <li>Support supplying password using stdin in non interactive mode (contributed by
  981. <a href="https://github.com/LouisTakePILLz" target="_blank">LouisTakePILLz</a>)
  982. <ul>
  983. <li>Example: <code>veracrypt -t ${IMAGE_PATH} ${MOUNT_PATH} --mount --non-interactive --stdin &lt;&lt;&lt; &quot;$PWD&quot;</code>
  984. </li></ul>
  985. </li></ul>
  986. </li></ul>
  987. <p><strong style="text-align:left">1.13 </strong>(August 9<sup>th</sup>, 2015):</p>
  988. <ul>
  989. <li><strong>Windows:</strong>
  990. <ul>
  991. <li>Solve TOR crashing when run from a VeraCrypt volume. </li></ul>
  992. </li></ul>
  993. <p><strong style="text-align:left">1.12 </strong>(August 5<sup>th</sup>, 2015):</p>
  994. <ul>
  995. <li><strong>All OSs:</strong>
  996. <ul>
  997. <li>Implement &quot;Dynamic Mode&quot; by supporting a Personal Iterations Multiplier (PIM). See documentation for more information.
  998. </li></ul>
  999. </li></ul>
  1000. <ul>
  1001. <li><strong>Windows:</strong>
  1002. <ul>
  1003. <li>Detect Boot Loader tampering (&quot;Evil Maid&quot; attacks) for system encryption and propose recovery options.
  1004. </li><li>Fix buffer overrun issue and other memory related bugs when parsing language XML files.
  1005. </li><li>Fix wrongly reported bad sectors by chkdsk caused by a bug in&nbsp;IOCTL_DISK_VERIFY handling.
  1006. </li><li>Fix privacy issue caused by configuration and history files being updated whenever VeraCrypt is used (reported by Liran Elharar)
  1007. </li><li>Fix system favorites not always mounting after cold start. </li><li>Solve installer error when updating VeraCrypt on Windows 10. </li><li>Implement decryption of non-system partition/drive. </li><li>Include 64-bit exe files in the installer and deploy them on 64-bit machines for better performances.
  1008. </li><li>Allow using drive letters A: and B: for mounting volumes </li><li>Make command line argument parsing more strict and robust (e.g. /lz rejected, must be /l z)
  1009. </li><li>Add possibility to show system encryption password in Windows GUI and bootloader
  1010. </li><li>Solve &quot;Class Already exists&quot; error that was happening for some users. </li><li>Solve some menu items and GUI fields not translatable </li><li>Make volumes correctly report Physical Sector size to Windows. </li><li>Correctly detect switch user/RDP disconnect operations for autodismount on session locked.
  1011. </li><li>Add manual selection of partition when resuming in-place encryption. </li><li>Add command line option (/cache f) to temporarily cache password during favorites mounting.
  1012. </li><li>Add waiting dialog for Auto-Mount Devices operations to avoid freezing GUI. </li><li>Add extra information to displayed error message in order to help analyze reported issues.
  1013. </li><li>Disable menu entry for changing system encryption PRF since it's not yet implemented.
  1014. </li><li>Fix failure to change password when UAC required (inherited from TrueCrypt) </li><li>Minor fixes and changes (see Git history for more details) </li></ul>
  1015. </li></ul>
  1016. <ul>
  1017. <li><strong>Linux:</strong>
  1018. <ul>
  1019. <li>Solve installer issue under KDE when xterm not available </li><li>Fix warnings on about/LegalNotice dialogs when wxWidgets linked dynamically (N/A for official binary)
  1020. </li><li>Support hash names with '-' in command line (sha-256, sha-512 and ripemd-160)
  1021. </li><li>Remove &quot;--current-hash&quot; switch and add &quot;--new-hash&quot; to be more coherent with existing switches.
  1022. </li><li>When only keyfile specified in command line, don't try to mount using empty password.
  1023. <ul>
  1024. <li>If mounting using empty password is needed, explicitly specify so using: -p &quot;&quot;
  1025. </li></ul>
  1026. </li></ul>
  1027. </li></ul>
  1028. <p id="1.0f-2"><strong style="text-align:left">1.0f-2</strong>(April 5<sup>th</sup>, 2015):</p>
  1029. <ul>
  1030. <li><strong>All OSs:</strong>
  1031. <ul>
  1032. <li>Mounting speed improvement, up to 20% quicker on 64-bit (contributed by Nils Maier)
  1033. </li><li>Add option to set default hash/TrueCryptMode used for mounting volumes. </li><li>Use TrueCryptMode/Hash specified in command line in password dialog. </li></ul>
  1034. </li><li><strong>Windows:</strong>
  1035. <ul>
  1036. <li>Solve CryptAcquireContext vulnerability reported by Open Crypto Audit Phase II.
  1037. </li><li>Proper handling of random generator failures. Inform user in such cases. </li><li>TrueCrypt Mode related changes:
  1038. <ul>
  1039. <li>Support mounting TrueCrypt system partition (no conversion yet) </li><li>Support TrueCrypt volumes as System Favorites. </li><li>Correct displaying wrong TrueCrypt mode in volume properties when SHA-256 is used.
  1040. </li></ul>
  1041. </li><li>Solve PIN BLOCKED issue with smart cards in a special case. </li><li>Correctly handle file access errors when mounting containers. </li><li>Solve several issues reported by the Static Code Analysis too Coverity. </li><li>Bootloader: Add &quot;Verifying Password...&quot; message. </li><li>When UAC prompt fails (for example timeout), offer the user to retry the operation.
  1042. </li><li>Uninstall link now open the standard &quot;Add/Remove Programs&quot; window. </li><li>On uninstall, remove all VeraCrypt references from registry and disk. </li><li>Included VeraCryptExpander in the Setup. </li><li>Add option to temporary cache password when mounting multiple favorites. </li><li>Minor fixes and enhancements (see git history for more information) </li></ul>
  1043. </li><li><strong>MacOSX:</strong>
  1044. <ul>
  1045. <li>Solve issue volumes not auto-dismounting when quitting VeraCrypt<strong>.</strong>
  1046. </li><li>Solve issue VeraCrypt window not reopening by clicking dock icon. </li></ul>
  1047. </li><li><strong>Linux/MacOSX:</strong>
  1048. <ul>
  1049. <li>Solve preferences dialog not closing when clicking on the 'X' icon. </li><li>Solve read-only issue when mounting non-FAT volumes in some cases. </li><li>Support opening/exploring mounted volumes on desktops other than Gnome/KDE. </li><li>Solve various installer issues when running on less common configurations </li><li>Minor fixes (see git history for more information) </li></ul>
  1050. </li></ul>
  1051. <p><strong style="text-align:left">1.0f-1 </strong>(January 4<sup>th</sup>, 2015)</p>
  1052. <ul>
  1053. <li><strong>All OSs</strong>:
  1054. <ul>
  1055. <li>Add support for old TrueCrypt 6.0. </li><li>Change naming of cascades algorithms in GUI for a better description. </li></ul>
  1056. </li><li><strong>Linux/MacOSX:</strong>
  1057. <ul>
  1058. <li>Make cancel button of the preference dialog working. </li><li>Solve impossibility to enter a one digit size for the volume. </li><li>Add wait dialog to the benchmark calculation. </li></ul>
  1059. </li><li><strong>Windows:</strong>
  1060. <ul>
  1061. <li>Add TrueCrypt mode to the mounted volume information. </li><li>For Windows XP, correct the installer graphical artefacts. </li></ul>
  1062. </li></ul>
  1063. <p><strong style="text-align:left">1.0f </strong>(December 30, 2014)</p>
  1064. <ul>
  1065. <li><strong>All OSs</strong>:
  1066. <ul>
  1067. <li>Add support for mounting TrueCrypt volumes. </li><li>Add support for converting TrueCrypt containers and non-system partitions. </li><li>Add support for SHA-256 for volume encryption. </li><li>Make SHA-512 the default key derivation algorithm and change the order of preference of derivation algorithms : SHA-512 -&gt; Whirlpool -&gt; SHA-256 -&gt; RIPEMD160
  1068. </li><li>Deprecate RIPEMD160 for non-system encryption. </li><li>Speedup mount operation by enabling choice of correct hash algorithm. </li><li>Display a wait dialog during lengthy operations to avoid freezing the GUI. </li><li>Implement creation of multiple keyfiles at once, with predefined or random size.
  1069. </li><li>Always display random gathering dialog before performing sensitive operations.
  1070. </li><li>Links in the application now points to the online resources on Codeplex </li><li>First version of proper VeraCrypt User Guide </li></ul>
  1071. </li><li><strong>MacOSX:</strong>
  1072. <ul>
  1073. <li>Implement support for hard drives with a large sector size (&gt; 512). </li><li>Link against new wxWidgets version 3.0.2. </li><li>Solve truncated text in some Wizard windows. </li></ul>
  1074. </li><li><strong>Linux:</strong>
  1075. <ul>
  1076. <li>Add support of NTFS formatting of volumes. </li><li>Correct issue on opening of the user guide PDF. </li><li>Better support for hard drives with a large sector size (&gt; 512). </li><li>Link against new wxWidgets version 3.0.2. </li></ul>
  1077. </li><li><strong>Windows:</strong><br>
  1078. <ul>
  1079. <li>Security: fix vulnerability in bootloader detected by Open Crypto Audit and make it more robust.
  1080. </li><li>Add support for SHA-256 in system boot encryption. </li><li>Various optimizations in bootloader. </li><li>Complete fix of ShellExecute security issue. </li><li>Kernel driver: check that the password length received from bootloader is less or equal to 64.
  1081. </li><li>Correct a random crash when clicking the link for more information on keyfiles
  1082. </li><li>Implement option to auto-dismount when user session is locked </li><li>Add self-test vectors for SHA-256 </li><li>Modern look-and-feel by enabling visual styles </li><li>few minor fixed. </li></ul>
  1083. </li></ul>
  1084. <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
  1085. <strong style="text-align:left">1.0e </strong>(September 4, 2014)</div>
  1086. <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
  1087. <ul>
  1088. <li><strong style="text-align:left">Improvements and bug fixes:</strong>
  1089. <ul>
  1090. <li>Correct most of the security vulnerabilities reported by the Open Crypto Audit Project.
  1091. </li><li>Correct security issues detected by Static Code Analysis, mainly under Windows.
  1092. </li><li>Correct issue of unresponsiveness when changing password/key file of a volume. Reduce overall time taken for creating encrypted volume/partition.
  1093. </li><li>Minor improvements and bug fixes (look at git history for more details). </li></ul>
  1094. </li></ul>
  1095. </div>
  1096. <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
  1097. <br style="text-align:left">
  1098. <strong style="text-align:left">1.0d </strong>(June 3, 2014)</div>
  1099. <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
  1100. <ul>
  1101. <li><strong style="text-align:left">Improvements and bug fixes:</strong>
  1102. <ul>
  1103. <li>Correct issue while creating hidden operating system. </li><li>Minor improvements and bug fixes. </li></ul>
  1104. </li></ul>
  1105. </div>
  1106. </div><div class="ClearBoth"></div></body></html>