VeraCrypt Changelog

What's new in VeraCrypt 1.26.10 Nightly

Nov 10, 2023
  • All OSes:
  • Update translations and documentation
  • Windows:
  • Better fix for Secure Desktop issues under Windows 11 22H2
  • VeraCrypt Expander: Fix expansion of volumes on disks with a sector size different from 512 (by skl0n6)
  • Fix writing wrong EFI System Encryption Advanced Options to registry
  • Don't close Setup when exiting VeraCrypt process through system tray Exit menu
  • Windows: Fix failure to format some disks (e.g. VHDX) caused by virtual partition offset not 4K aligned
  • Windows: fallback to absolute positioning when accessing disks if relative positioning fails

New in VeraCrypt 1.26.9 Nightly (Oct 12, 2023)

  • All OSes:
  • Update translations and documentation
  • Windows:
  • Better fix for Secure Desktop issues under Windows 11 22H2
  • VeraCrypt Expander: Fix expansion of volumes on disks with a sector size different from 512 (by skl0n6)
  • Fix writing wrong EFI System Encryption Advanced Options to registry
  • Don't close Setup when exiting VeraCrypt process through system tray Exit menu

New in VeraCrypt 1.26.8 Nightly (Oct 9, 2023)

  • All OSes:
  • Update translations and documentation
  • Windows:
  • Better fix for Secure Desktop issues under Windows 11 22H2

New in VeraCrypt 1.26.7 (Oct 1, 2023)

  • All OSes:
  • Security: Ensure that XTS primary key is different from the secondary key when creating volumes
  • Issue unlikely to happen thanks to random generator properties but this check must be added to prevent attacks
  • Reference: CCSS,NSA comment at page 3: https://csrc.nist.gov/csrc/media/Projects/crypto-publication-review-project/documents/initial-comments/sp800-38e-initial-public-comments-2021.pdf
  • Remove TrueCrypt Mode support. Version 1.25.9 can be used to mount or convert TrueCrypt volumes.
  • Complete removal of RIPEMD160 and GOST89 algorithms. Legacy volumes using any of them cannot be mounted by VeraCrypt anymore.
  • Add support for BLAKE2s as new PRF algorithm for both system encryption and standard volumes.
  • Introducing support for EMV banking smart cards as keyfiles for non-system volumes.
  • No need for a separate PKCS#11 module configuration.
  • Card PIN isn't required.
  • Generates secure keyfile content from unique, encoded data present on the banking card.
  • Supports all EMV standard-compliant banking cards.
  • Can be enabled in settings (go to Settings->Security Tokens).
  • Developed by a team of students from the Institut national des sciences appliquées de Rennes.
  • More details about the team and the project are available at https://projets-info.insa-rennes.fr/projets/2022/VeraCrypt/index_en.html.
  • When overwriting an existing file container during volume creation, add its current size to the available free space
  • Add Corsican language support. Update several translations.
  • Update documentation
  • Windows:
  • Officially, the minimum supported version is now <strong>Windows 10</strong>. VeraCrypt may still run on Windows 7 and Windows 8/8.1, but no active tests are done on these platforms.
  • EFI Bootloader:
  • Fix bug in PasswordTimeout value handling that caused it to be limited to 255 seconds.
  • Rescue Disk: enhance "Boot Original Windows Loader" by using embedded backup of original Windows loader if it is missing from disk
  • Addition of Blake2s and removal of RIPEMD160 & GOST89
  • Enable memory protection by default. Add option under Performance/Driver Configuration to disable it if needed.
  • Memory protection blocks non-admin processes from reading VeraCrypt memory
  • It may block Screen Readers (Accessibility support) from reading VeraCrypt UI, in which case it can be disabled
  • It can be disabled by setting registry value "VeraCryptEnableMemoryProtection" to 0 under "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesveracrypt"
  • Add process mitigation policy to prevent VeraCrypt from being injected by other processes
  • Minor enhancements to RAM Encryption implementation
  • Fix Secure Desktop issues under Windows 11 22H2
  • Implement support for mounting partially encrypted system partitions.
  • Fix false positive detection of new device insertion when Clear Encryption Keys option is enable (System Encryption case only)
  • Better implementation of Fast Create when creating file containers that uses UAC to request required privilege if not already held
  • Allow choosing Fast Create in Format Wizard UI when creating file containers
  • Fix formatting issues during volume creation on some machines.
  • Fix stall issue caused by Quick Format of large file containers
  • Add dropdown menu to Mount button to allow mounting without using the cache.
  • Possible workaround for logarithmic slowdown for Encrypt-In-Place on large volumes.
  • Make Expander first check file existence before proceeding further
  • Allow selecting size unit (KB/MB/GB) for generated keyfiles
  • Display full list of supported cluster sizes for NTFS, ReFS and exFAT filesystems when creating volumes
  • Support drag-n-drop of files and keyfiles in Expander.
  • Implement translation of Expander UI
  • Replace legacy file/dir selection APIs with modern IFileDialog interface for better Windows 11 compatibility
  • Enhancements to dependency dlls safe loading, including delay loading.
  • Remove recommendation of keyfiles files extensions and update documentation to mention risks of third-party file extensions.
  • Add support for more language in the setup installer
  • Update LZMA library to version 23.01
  • Update libzip to version 1.10.1 and zlib to version 1.3.

New in VeraCrypt 1.26.4 Nightly (Aug 3, 2023)

  • Changes between 1.25.9 and 1.26.4 (24 July 2023) :
  • All OSes:
  • Remove TrueCrypt Mode support
  • Complete removal of RIPEMD160 and GOST89 algorithms. Legacy volumes using any of them cannot be mounted by VeraCrypt anymore.
  • Add support for BLAKE2s as new PRF algorithm for both system encryption and standard volumes.
  • Introducing support for EMV banking smart cards as keyfiles for non-system volumes.
  • No need for a separate PKCS#11 module configuration.
  • Card PIN isn't required.
  • Generates secure keyfile content from unique, encoded data present on the banking card.
  • Supports all EMV standard-compliant banking cards.
  • Can be enabled in settings (go to Settings->Security Tokens).
  • Developed by a team of students from the Institut national des sciences appliquées de Rennes.
  • More details about the team and the project are available at https://projets-info.insa-rennes.fr/projets/2022/VeraCrypt/index_en.html.
  • When overwriting an existing file container during volume creation, add its current size to the available free space
  • Add Corsican language support. Update several translations.
  • Update documentation
  • Windows:
  • EFI Bootloader:
  • Fix bug in PasswordTimeout value handling that caused it to be limited to 255 seconds.
  • Rescue Disk: enhance "Boot Original Windows Loader" by using embedded backup of original Windows loader if it is missing from disk
  • Addition of Blake2s and removal of RIPEMD160 & GOST89
  • Fix Secure Desktop issues under Windows 11 22H2
  • Avoid silent failure of Fast Create when creating file containers by displaying warning if required privilege is not held
  • Allow choosing Fast Create in Format Wizard UI when creating file containers
  • Fix formatting issues during volume creation on some machines.
  • Fix stall issue caused by Quick Format of large file containers
  • Add dropdown menu to Mount button to allow mounting without using the cache.
  • Possible workaround for logarithmic slowdown for Encrypt-In-Place on large volumes.
  • Make Expander first check file existence before proceeding further
  • Allow selecting size unit (KB/MB/GB) for generated keyfiles
  • Display full list of supported cluster sizes for NTFS, ReFS and exFAT filesystems when creating volumes
  • Support drag-n-drop of files and keyfiles in Expander.
  • Implement translation of Expander UI
  • Update LZMA library to version 23.01
  • Update libzip to version 1.10.0 and zlib to version 1.2.13.

New in VeraCrypt 1.26.2 Nightly (Jun 18, 2023)

  • All OSes:
  • Add support for BLAKE2s as new PRF algorithm for both system encryption and standard volumes.
  • Complete removal of RIPEMD16 and GOST89 algorithms. Legacy volumes using any of them cannot be mounted by VeraCrypt anymore.
  • Add Corsican language support. Update translations (French, German, Russian).
  • Windows:
  • EFI Bootloader:
  • Fix bug in PasswordTimeout value handling that caused it to be limited to 255 seconds.
  • Rescue Disk: enhance "Boot Original Windows Loader" by using embedded backup of original Windows loader if it is missing from disk
  • Addition of Blake2s and removal of RIPEMD160 & GOST89
  • Add dropdown menu to Mount button to allow mounting without using the cache.
  • Possible workaround for logarithmic slowdown for Encrypt-In-Place on large volumes.
  • Update libzip to version 1.9.2 and zlib to version 1.2.13.

New in VeraCrypt 1.26.0 Nightly (Mar 22, 2022)

  • All OSes:
  • Add support for BLAKE2s as new PRF algorithm for both system encryption and standard volumes.
  • Complete removal of RIPEMD16 and GOST89 algorithms. Legacy volumes using any of them cannot be mounted by VeraCrypt anymore.
  • Add Corsican language support. Update translations (French, German, Russian).
  • Windows:
  • EFI Bootloader:
  • Fix bug in PasswordTimeout value handling that caused it to be limited to 255 seconds.
  • Rescue Disk: enhance "Boot Original Windows Loader" by using embedded backup of original Windows loader if it is missing from disk
  • Addition of Blake2s and removal of RIPEMD160 & GOST89

New in VeraCrypt 1.25.9 (Feb 21, 2022)

  • All OSes:
  • Update translations (Chinese, Dutch, French, German, Turkish).
  • Windows:
  • Make MSI installer compatible with system encryption.
  • Set minimum support for MSI installation to Windows 7.
  • Fix failure to create Traveler Disk when VeraCrypt is installed using MSI.
  • Don't cache the outer volume password when mounting with hidden volume protection if wrong hidden volume password was specified.
  • Reduce the size of EXE installers by almost 50% by using LZMA compression instead of DEFLATE.
  • Fix double-clicking mounted drive in VeraCrypt UI not working in some special Windows configurations.
  • Add registry key to fix BSOD during shutdown/reboot on some machines when using system encryption.
  • Under "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesveracrypt", create a REG_DWORD value named "VeraCryptEraseKeysShutdown".
  • Setting this registry value to 0 disables erasing system encryption keys which is the cause of BSOD during shutdown on some machines.

New in VeraCrypt 1.25.7 (Jan 9, 2022)

  • All OSes:
  • Update translations.
  • Windows:
  • Restore support of Windows Vista, Windows 7 and Windows 8/8.1.
  • Windows 7 support requires that either KB3033929 or KB4474419 is installed.
  • Windows Vista support requires that either KB4039648 or KB4474419 is installed.
  • MSI installation only: Fix double-clicking .hc file container inserting %1 instead of volume name in path field.
  • Add registry settings to control driver internal encryption queue to allow tuning performance for SSD disks and having better stability under heavy load:
  • Under registry key HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesveracrypt:
  • VeraCryptEncryptionFragmentSize (REG_DWORD): size of encryption data fragment in KiB. Default is 256. Maximum is 2048.
  • VeraCryptEncryptionIoRequestCount (REG_DWORD): maximum number of parallel I/O requests. Default is 16. Maximum is 8192.
  • VeraCryptEncryptionItemCount (REG_DWORD): maximum number of encryption queue items processed in parallel. Default as well as maximum is half of VeraCryptEncryptionIoRequestCount.
  • The triplet (FragmentSize=512, IoRequestCount=128, ItemCount=64) is an example of parameters that enhance sequential read speed on some SSD NVMe systems.

New in VeraCrypt 1.25.6 Nightly (Jan 3, 2022)

  • Windows:
  • Restore support of Windows Vista, Windows 7 and Windows 8/8.1.
  • Windows 7 support requires that either KB3033929 or KB4474419 is installed.
  • Windows Vista support requires that either KB4039648 or KB4474419 is installed.
  • MSI installation only: Fix double-clicking .hc file container inserting %1 instead of volume name in path field.
  • Add registry settings to control driver internal encryption queue to allow tuning performance for SSD disks and having better stability under heavy load:
  • Under registry key HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesveracrypt:
  • VeraCryptEncryptionFragmentSize (REG_DWORD): size of encryption data fragment in KiB. Default is 256. Maximum is 2048.
  • VeraCryptEncryptionIoRequestCount (REG_DWORD): maximum number of parallel I/O requests. Default is 16. Maximum is 8192.
  • VeraCryptEncryptionItemCount (REG_DWORD): maximum number of encryption queue items processed in parallel. Default as well as maximum is half of VeraCryptEncryptionIoRequestCount.
  • The triplet (FragmentSize=512, IoRequestCount=128, ItemCount=64) is an example of parameters that enhance sequential read speed on some SSD NVMe systems.

New in VeraCrypt 1.25.4 (Dec 4, 2021)

  • All OSes:
  • Speed optimization of Streebog.
  • Update translations.
  • Windows:
  • Add support for Windows on ARM64 (e.g. Microsoft Surface Pro X) but system encryption not yet supported.
  • Add MSI installer for silent mode deployment (ACCEPTLICENSE=YES must be set in msiexec command line).
  • For now, MSI installer cannot be used if system partition is encrypted with VeraCrypt
  • MSI installer requires Windows 10 or newer
  • Drop support of Windows Vista, Windows 7, Windows 8 and Windows 8.1 because of new requirement for driver code signing.
  • Reduce time of mount when PRF auto-detection is selected.
  • Fix potential memory corruption in driver caused by integer overflow in IOCTL_STORAGE_MANAGE_DATA_SET_ATTRIBUTES (reported by Ilja van Sprundel).
  • Replace insecure wcscpy/wcscat/strcpy runtime functions with secure equivalents.
  • Changes EFI Bootloader:
  • Fix memory leak in some cases caused by wrong check of pointer for calling MEM_FREE
  • Clear bootParams variable that may contain sensitive information when halting the system in case of fatal error
  • Add option "KeyboardInputDelay" in DcsProp to control the minimum delay supported between two key strokes
  • Try to workaround Windows Feature Updates issues with system encryption by fixing of bootloader and SetupConfig.ini when system resumes or when session is opened/unlocked
  • Fix failure to load local HTML documentation if application running with administrative privileges
  • Fix freeze when password dialog displayed in secure desktop and try to access token keyfiles protected by PIN
  • Fix failure to launch keyfile generator in secure desktop mode
  • Block Windows from resizing system partition if it is encrypted
  • Add keyboard shortcut to "TrueCrypt mode" in the mount dialog.

New in VeraCrypt 1.25 (Nov 30, 2021)

  • Speed optimization of Streebog.
  • Update translations.
  • Add support for Windows on ARM64 (e.g. Microsoft Surface Pro X) but system encryption not yet supported.
  • Add MSI installer for silent mode deployment (ACCEPTLICENSE=YES must be set in msiexec command line).
  • For now, MSI installer cannot be used if system partition is encrypted with VeraCrypt
  • MSI installer requires Windows 10 or newer
  • Drop support of Windows Vista, Windows 7, Windows 8 and Windows 8.1 because of new requirement for driver code signing.
  • Reduce time of mount when PRF auto-detection is selected.
  • Fix potential memory corruption in driver caused by integer overflow in IOCTL_STORAGE_MANAGE_DATA_SET_ATTRIBUTES (reported by Ilja van Sprundel).
  • Replace insecure wcscpy/wcscat/strcpy runtime functions with secure equivalents.
  • Changes EFI Bootloader:
  • Fix memory leak in some cases caused by wrong check of pointer for calling MEM_FREE
  • Clear bootParams variable that may contain sensitive information when halting the system in case of fatal error
  • Add option "KeyboardInputDelay" in DcsProp to control the minimum delay supported between two key strokes
  • Try to workaround Windows Feature Updates issues with system encryption by fixing of bootloader and SetupConfig.ini when system resumes or when session is opened/unlocked
  • Fix failure to load local HTML documentation if application running with administrative privileges
  • Fix freeze when password dialog displayed in secure desktop and try to access token keyfiles protected by PIN
  • Fix failure to launch keyfile generator in secure desktop mode
  • Block Windows from resizing system partition if it is encrypted
  • Add keyboard shortcut to "TrueCrypt mode" in the mount dialog.

New in VeraCrypt 1.25 RC 1 (Sep 6, 2021)

  • All OSes:
  • Speed optimization of Streebog.
  • Update translations.
  • Windows:
  • Add support for Windows on ARM64 (e.g. Microsoft Surface Pro X) but system encryption not yet supported.
  • Add MSI installer for silent mode deployment (ACCEPTLICENSE=YES must be set in msiexec command line).
  • For now, MSI installer cannot be used if system partition is encrypted with VeraCrypt
  • Drop support of Windows XP, Windows Vista and Windows 7. Windows 8 is now the minimum supported Windows version.
  • Reduce time of mount when PRF auto-detection is selected.
  • Fix potential memory corruption in driver caused by integer overflow in IOCTL_STORAGE_MANAGE_DATA_SET_ATTRIBUTES (reported by Ilja van Sprundel).
  • Replace insecure wcscpy/wcscat/strcpy runtime functions with secure equivalents.
  • EFI Bootloader:
  • Fix memory leak in some cases caused by wrong check of pointer for calling MEM_FREE
  • Clear bootParams variable that may contain sensitive information when halting the system in case of fatal error
  • Add option "KeyboardInputDelay" in DcsProp to control the minimum delay supported between two key strokes
  • Fix failure to load local HTML documentation if application running with administrative privileges
  • Fix freeze when password dialog displayed in secure desktop and try to access token keyfiles protected by PIN
  • Fix failure to launch keyfile generator in secure desktop mode
  • Block Windows from resizing system partition if it is encrypted
  • Add keyboard shortcut to "TrueCrypt mode" in the mount dialog.

New in VeraCrypt 1.24 Update 9 Beta (Aug 8, 2021)

  • All OSes:
  • Speed optimization of Streebog.
  • Update translations.
  • Windows:
  • Add support for Windows on ARM64 (e.g. Microsoft Surface Pro X) but system encryption not yet supported.
  • Add MSI installer for silent mode deployment (ACCEPTLICENSE=YES must be set in msiexec command line).
  • Reduce time of mount when PRF auto-detection is selected.
  • Replace insecure wcscpy/wcscat/strcpy runtime functions with secure equivalents.
  • Fix failure to load local HTML documentation if application running with administrative privileges
  • Fix freeze when password dialog displayed in secure desktop and try to access token keyfiles protected by PIN
  • Fix failure to launch keyfile generator in secure desktop mode
  • Block Windows from resizing system partition if it is encrypted
  • Add keyboard shortcut to "TrueCrypt mode" in the mount dialog.

New in VeraCrypt 1.24 Update 7 (Aug 9, 2020)

  • All OSes:
  • Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume
  • Fix random crash in 32-bit builds when using Streebog.
  • Enable FIPS mode in JitterEntropy random generator.
  • Update Beginner's Tutorial in documentation to use "MyVolume.hc" instead of "My Volume" for file container name in order to avoid confusion about nature of file nature.
  • Minor code cleanup
  • Windows:
  • Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled
  • Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.
  • Fix UI for blocking TRIM in system encryption not working in MBR boot mode.
  • Support password drag-n-drop from external applications (e.g. KeePass) to password UI fields which is more secure than using clipboard.
  • Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entring power saving mode more reliable.
  • Avoid displaying waiting dialog when /silent specified for "VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT.
  • Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
  • Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
  • Don't allow to encrypt the system drive if it is already encrypted by BitLocker.
  • Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.
  • Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.
  • Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.
  • Don't allow a directory path to be entered for the file container to be created in Format wizard.
  • Don't try to use fix for CVE-2019-19501 if Windows Shell has been modified or is not running since there is no reliable way to fix it in such non standard configuation.
  • MBR bootloader: fix incorrect compressed data size passed to decompressor in boot sector.
  • Add warning message when typed password reaches maximum length during the system encryption wizard.
  • Fix wrong error message when UTF-8 encoding of entered password exceeds the maximum supported length.
  • Update libzip to latest version 1.7.3.
  • Update translations.

New in VeraCrypt 1.24 Update 7 Preview 7 (Jul 25, 2020)

  • All OSes:
  • Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume
  • Fix random crash in 32-bit builds when using Streebog.
  • Enable FIPS mode in JitterEntropy random generator.
  • Minor code cleanup
  • Windows:
  • Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled
  • Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.
  • Support password drag-n-drop from external applications (e.g. KeePass) to password UI fields which is more secure than using clipboard.
  • Implements compatibility with Windows 10 Modern Standby and Windows 8.1 Connected Standby power model. This makes detection of entring power saving mode more reliable.
  • Avoid displaying waiting dialog when /silent specified for "VeraCrypt Format" during creating of file container using /create switch and a filesystem other than FAT.
  • Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.
  • Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
  • Don't allow to encrypt the system drive if it is already encrypted by BitLocker.
  • Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.
  • Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.
  • Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.
  • Update translations.

New in VeraCrypt 1.24 Update 6 (Mar 11, 2020)

  • Fix PIM label text truncation in password dialog
  • Fix wrong language used in installer if user selects a language other than English and then selects English before clicking OK on language selection dialog.

New in VeraCrypt 1.24 Update 5 (Mar 10, 2020)

  • Орtіmіzе реrfоrmаnсе fоr СРUѕ thаt hаvе mоrе thаn 64 lоgісаl рrосеѕѕоrѕ (соntrіbutеd bу Ѕасhіn Кеѕwаnі frоm АМD)
  • Ѕuрроrt ѕресіfуіng kеуfіlеѕ (bоth іn tоkеnѕ аnd іn fіlеѕуѕtеm) whеn сrеаtіng fіlе соntаіnеrѕ uѕіng соmmаnd lіnе (ѕwіtсhеѕ /kеуfіlе, /tоkеnlіb аnd /tоkеnріn ѕuрроrtеd іn VеrаСrурt Fоrmаt)
  • Fіх lеаk оf kеуfіlеѕ раth аnd nаmе аftеr VеrаСrурt рrосеѕѕ ехіtѕ.
  • Аdd СLІ ѕwіtсh /ѕесurеDеѕktор tо VеrаСrурt Fоrmаt.
  • Uрdаtе lіbzір tо vеrѕіоn 1.6.1
  • Міnоr UІ fіхеѕ

New in VeraCrypt 1.24 Update 4 (Jan 24, 2020)

  • Fix regression in Expander and Format when RAM encryption is enable that was causing volume headers to be corrupted.
  • Fix failure of Screen Readers (Accessibility support) to read UI by disabling newly introduced memory protection by default and adding a CLI switch (/protectMemory) to enable it when needed.
  • Fix side effects related to the fix for CVE-2019-19501 which caused links in UI not to open.
  • Add switch /signalExit to support notifying WAITFOR Windows command when VeraCrypt.exe exits if /q was specified in CLI (cf documentation for usage).
  • Don't display mount/dismount examples in help dialog for command line in Format and Expander.
  • Documentation and translation updates.

New in VeraCrypt 1.24 Update 2 (Dec 26, 2019)

  • Clear AES key from stack memory when using non-optimized implementation. Doesn't apply to VeraCrypt official build (Reported and fixed by Hanno Böck)
  • Update Jitterentropy RNG Library to version 2.2.0
  • Start following IEEE 1541 agreed naming of bytes (KiB, MiB, GiB, TiB, PiB).
  • Various documentation enhancements.
  • Fix possible local privilege escalation vulnerability during execution of VeraCrypt Expander (CVE-2019-19501)
  • MBR bootloader:
  • - workaround for SSD disks that don't allow write operations in BIOS mode with buffers less than 4096 bytes.
  • - Don't restore MBR to VeraCrypt value if it is coming from a loader different from us or different from Microsoft one.
  • EFI bootloader:
  • - Fix "ActionFailed" not working and add "ActionCancelled" to customize handling of user hitting ESC on password prompt
  • - Fix F5 showing previous password after failed authentication attempt. Ensure that even wrong password value are cleared from memory.
  • Fix multi-OS boot compatibility by only setting VeraCrypt as first bootloader of the system if the current first bootloader is Windows one.
  • Add new registry flags for SystemFavoritesService to control updating of EFI BIOS boot menu on shutdown.
  • Allow system encrypted drive to be mounted in WindowsPE even if changing keyboard layout fails (reported and fixed by Sven Strickroth)
  • Enhancements to the mechanism preserving file timestamps, especially for keyfiles.
  • Fix RDRAND instruction not detected on AMD CPUs.
  • Detect cases where RDRAND is flawed (e.g. AMD Ryzen) to avoid using it if enabled by user.
  • Don't write extra 0x00 byte at the end of DcsProp file when modifying it through UI
  • Reduce memory usage of IOCTL_DISK_VERIFY handler used in disk verification by Windows.
  • Add switch /FastCreateFile for VeraCrypt Format.exe to speedup creation of large file container if quick format is selected.
  • Fix the checkbox for skipping verification of Rescue Disk not reflecting the value of /noisocheck switch specified in VeraCrypt Format command line.
  • check "TrueCrypt Mode" in password dialog when mounting a file container with .tc extension
  • Update XML languages files.

New in VeraCrypt 1.24 Hotfix 1 (Oct 28, 2019)

  • Wіndоwѕ:Fіх 1.24 rеgrеѕѕіоn thаt саuѕеd ѕуѕtеm fаvоrіtеѕ nоt tо mоunt аt bооt іf VеrаСrурt frеѕhlу іnѕtаllеd.
  • Fіх fаіlurе tо еnсrурt ѕуѕtеm іf thе сurrеnt Wіndоwѕ uѕеrnаmе соntаіnѕ а Unісоdе nоn-АЅСІІ сhаrасtеr.
  • Маkе VеrаСrурt Ехраndеr аblе tо rеѕumе ехраnѕіоn оf vоlumеѕ whоѕе рrеvіоuѕ ехраnѕіоn wаѕ аbоrtеd bеfоrе іt fіnіѕhеѕ.
  • Аdd „Quісk Ехраnd“ орtіоn tо VеrаСrурt Ехраndеr tо ассеlаrаtе thе ехраnѕіоn оf lаrgе fіlе соntаіnеrѕ.
  • Аdd ѕеvеrаl rоbuѕtnеѕѕ сhесkѕ аnd vаlіdаtіоn іn саѕе оf ѕуѕtеm еnсrурtіоn tо bеttеr hаndlе ѕоmе соrnеr саѕеѕ.
  • Міnоr UІ аnd dосumеntаtіоn сhаngеѕ.
  • Lіnuх:Wоrkаrоund gсс 4.4.7 bug undеr СеntОЅ 6 thаt саuѕеd VеrаСrурt buіlt undеr СеntОЅ 6 tо сrаѕh whеn Whіrlрооl hаѕh іѕ uѕеd.
  • Fіх „іnсоrrесt раѕѕwоrd аttеmрt“ wrіttеn tо /vаr/lоg/аuth.lоg whеn mоuntіng vоlumеѕ.
  • Fіх drорріng fіlе іn UІ nоt ѕhоwіng іtѕ соrrесt раth , ѕресіfісаllу undеr GТК-3.
  • Аdd mіѕѕіng ЈіttеrЕntrору іmрlеmеntаtіоn/
  • МасОЅХ:Fіх ѕоmе dеvісеѕ аnd раrtіtіоnѕ nоt ѕhоwіng іn thе dеvісе ѕеlесtіоn dіаlоg undеr ОЅХ 10.13 аnd nеwеr.
  • Fіх kеуbоаrd tаb nаvіgаtіоn bеtwееn раѕѕwоrd fіеldѕ іn „Vоlumе Раѕѕwоrd“ раgе оf vоlumе сrеаtіоn wіzаrd.
  • Аdd mіѕѕіng ЈіttеrЕntrору іmрlеmеntаtіоn/
  • Ѕuрроrt АРFЅ fіlеѕуѕtеm fоr сrеаtіоn vоlumеѕ.
  • Ѕuрроrt Dаrk Моdе.

New in VeraCrypt 1.24 (Oct 7, 2019)

  • Increase password maximum length to 128 bytes in UTF-8 encoding for non-system volumes.
  • Add option to use legacy maximum password length (64) instead of new one for compatibility reasons.
  • Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to CPU RDRAND (http://www.chronox.de/jent.html)
  • Speed optimization of XTS mode on 64-bit machine using SSE2 (up to 10% faster).
  • Fix detection of CPU features AVX2/BMI2. Add detection of RDRAND/RDSEED CPU features. Detect Hygon CPU as AMD one.
  • Implement RAM encryption for keys and passwords using ChaCha12 cipher, t1ha non-cryptographic fast hash and ChaCha20 based CSPRNG.
  • Available only on 64-bit machines.
  • Disabled by default. Can be enabled using option in UI.
  • Less than 10% overhead on modern CPUs.
  • Mitigate some memory attacks by making VeraCrypt applications memory inaccessible to non-admin users (based on KeePassXC implementation)
  • New security features:
  • Erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks
  • Add option when system encryption is used to erase all encryption keys from memory when a new device is connected to the system.
  • Add new driver entry point that can be called by applications to erase encryption keys from memory in case of emergency.
  • MBR Bootloader: dynamically determine boot loader memory segment instead of hardcoded values (proposed by neos6464)
  • MBR Bootloader: workaround for issue affecting creation of hidden OS on some SSD drives.
  • Fix issue related to Windows Update breaking VeraCrypt UEFI bootloader.
  • Several enhancements and fixes for EFI bootloader:
  • Implement timeout mechanism for password input. Set default timeout value to 3 minutes and default timeout action to "shutdown".
  • Implement new actions "shutdown" and "reboot" for EFI DcsProp config file.
  • Enhance Rescue Disk implementation of restoring VeraCrypt loader.
  • Fix ESC on password prompt during Pre-Test not starting Windows.
  • Add menu entry in Rescue Disk that enables starting original Windows loader.
  • Fix issue that was preventing Streebog hash from being selected manually during Pre-Boot authentication.
  • If "VeraCrypt" folder is missing from Rescue Disk, it will boot PC directly from bootloader stored on hard drive
  • This makes it easy to create a bootable disk for VeraCrypt from Rescue Disk just by removing/renaming its "VeraCrypt" folder.
  • Add option (disabled by default) to use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available.
  • Add mount option (both UI and command line) that allows mounting a volume without attaching it to the specified drive letter.
  • Update libzip to version 1.5.1
  • Do not create uninstall shortcut in startmenu when installing VeraCrypt. (by Sven Strickroth)
  • Enable selection of Quick Format for file containers creation. Separate Quick Format and Dynamic Volume options in the wizard UI.
  • Fix editor of EFI system encryption configuration file not accepting ENTER key to add new lines.
  • Avoid simultaneous calls of favorites mounting, for example if corresponding hotkey is pressed multiple times.
  • Ensure that only one thread at a time can create a secure desktop.
  • Updates and corrections to translations and documentation.
  • Resize some dialogs in Format and Mount Options to to fix some text truncation issues with non-English languages.
  • Fix high CPU usage when using favorites and add switch to disable periodic check on devices to reduce CPU load.
  • Minor UI changes.

New in VeraCrypt 1.24 Beta 5 (Mar 22, 2019)

  • Increase password maximum length to 128 bytes in UTF-8 encoding for non-system volumes.
  • Add option to use legacy maximum password length (64) instead of new one for compatibility reasons.
  • Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to CPU RDRAND (http://www.chronox.de/jent.html)
  • Speed optimization of XTS mode on 64-bit machine using SSE2 (up to 10% faster).
  • Fix detection of CPU features AVX2/BMI2. Add detection of RDRAND/RDSEED CPU features. Detect Hygon CPU as AMD one.
  • Implement RAM encryption for keys and passwords using ChaCha12 cipher, t1ha non-cryptographic fast hash and ChaCha20 based CSPRNG.
  • Available only on 64-bit machines.
  • Disabled by default. Can be enabled using option in UI.
  • Less than 10% overhead on modern CPUs.Mitigate some memory attacks by making VeraCrypt applications memory inaccessible to non-admin users (based on KeePassXC implementation)
  • MBR Bootloader: dynamically determine boot loader memory segment instead of hardcoded values (proposed by neos6464)
  • MBR Bootloader: workaround for issue affecting creation of hidden OS on some SSD drives.
  • Fix issue related to Windows Update breaking VeraCrypt UEFI bootloader.
  • Add option (disabled by default) to use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available.
  • Add mount option (both UI and command line) that allows mounting a volume without attaching it to the specified drive letter.
  • Update libzip to version 1.5.1
  • Do not create uninstall shortcut in startmenu when installing VeraCrypt. (by Sven Strickroth)
  • Enable selection of Quick Format for file containers creation. Separate Quick Format and Dynamic Volume options in the wizard UI.
  • Fix editor of EFI system encryption configuration file not accepting ENTER key to add new lines.
  • Avoid simultaneous calls of favorites mounting, for example if corresponding hotkey is pressed multiple times.
  • Ensure that only one thread at a time can create a secure desktop.
  • Updates and corrections to translations and documentation.
  • New security features:
  • Erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks.
  • Add option when system encryption is used to erase all encryption keys from memory when a new device is connected to the system.
  • Add new driver entry point that can be called by applications to erase encryption keys from memory in case of emergency.
  • Several enhancements and fixes for EFI bootloader:
  • Implement timeout mechanism for password input. Set default timeout value to 3 minutes and default timeout action to "shutdown".
  • Implement new actions "shutdown" and "reboot" for EFI DcsProp config file.
  • Enhance Rescue Disk implementation of restoring VeraCrypt loader.
  • Fix ESC on password prompt during Pre-Test not starting Windows.
  • Add menu entry in Rescue Disk that enables starting original Windows loader.

New in VeraCrypt 1.23 Hotfix 2 (Oct 10, 2018)

  • Windows:
  • Fix low severity vulnerability inherited from TrueCrypt that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison.
  • Disable quick format when creating file containers from command line. Add /quick switch to enable it in this case if needed.
  • Add /nosizecheck switch to disable checking container size against available free space during its creation. This enables to workaround a bug in Microsoft Distributed File System (DFS)

New in VeraCrypt 1.23 (Sep 13, 2018)

  • Windows:
  • VeraCrypt is now compatible with default EFI SecureBoot configuration for system encryption.
  • Fix EFI system encryption issues on some machines (e.g. HP, Acer).
  • Support EFI system encryption on Windows LTSB.
  • Add compatibility of system encryption with Windows 10 upgrade using ReflectDrivers mechanism.
  • Make EFI Rescue Disk decrypt partition correctly when Windows Repair overwrites first partition sector.
  • Add Driver option in the UI to explicitly allow Windows 8.1 and Windows 10 defragmenter to see VeraCrypt encrypted disks.
  • Add internal verification of binaries embedded signature to protect against some types to tampering attacks.
  • Fix Secure Desktop not working for favorites set to mount at logon on Windows 10 under some circumstances.
  • when Secure Desktop is enabled, use it for Mount Options dialog if it is displayed before password dialog.
  • when extracting files in Setup or Portable mode, decompress zip files docs.zip and Languages.zip in order to have ready to use configuration.
  • Display a balloon tip warning message when text pasted to password field is longer than maximum length and so it will be truncated.
  • Implement language selection mechanism at the start of the installer to make easier for international users.
  • Add check on size of file container during creation to ensure it's smaller than available free disk space.
  • Fix buttons at the bottom not shown when user sets a large system font under Window 7.
  • Fix compatibility issues with some disk drivers that don't support IOCTL_DISK_GET_DRIVE_GEOMETRY_EX ioctl.
  • MacOSX:
  • Support pasting values to password fields using keyboard (CMD+V and CMD+A now working properly).
  • Add CheckBox in mount option dialog to force the use of embedded backup header during mount.
  • When performing backup of volume header, automatically try to use embedded backup header if using the main header fails.
  • Implement benchmarking UI for Hash and PKCS-5 PRF algorithms.
  • Linux:
  • Don't allow waiting dialog to be closed before the associated operation is finished. This fix a crash under Lubuntu 16.04.
  • Add CheckBox in mount option dialog to force the use of embedded backup header during mount.
  • When performing backup of volume header, automatically try to use embedded backup header if using the main header fails.
  • Implement benchmarking UI for Hash and PKCS-5 PRF algorithms.
  • Remove limitation of hidden volume protection on disk with sector size larger than 512 bytes.

New in VeraCrypt 1.22 (Mar 31, 2018)

  • All OSs:
  • SIMD speed optimization for Kuznyechik cipher implementation (up to 2x speedup).
  • Add 5 new cascades of cipher algorithms (Camellia-Kuznyechik, Camellia-Serpent, Kuznyechik-AES, Kuznyechik-Serpent-Camellia and Kuznyechik-Twofish).
  • Windows:
  • MBR Bootloader: Fix failure to boot hidden OS on some machines.
  • MBR Bootloader: Reduce CPU usage during password prompt.
  • Security enhancement: Add option to block TRIM command for system encryption on SSD drives.
  • Implement TRIM support for non-system SSD drives and add option to enable it (TRIM is disabled by default for non-system volumes).
  • Better fix for "Parameter Incorrect" issues during EFI system encryption in some machines.
  • Driver: remove unnecessary dependency to wcsstr which can cause issues on some machines.
  • Driver: Fix "Incorrect Parameter" error when mounting volumes on some machines.
  • Fix failure to mount system favorites during boot on some machines.
  • Fix current application losing focus when VeraCrypt is run in command line with /quit /silent switches.
  • Fix some cases of external applications freezing during mount/dismount.
  • Fix rare cases of secure desktop for password dialog not visible which caused UI to block.
  • Update libzip to version 1.5.0 that include fixes for some security issues.
  • Extend Secure Desktop feature to smart card PIN entry dialog
  • Fix truncated license text in installer wizard.
  • Add portable package that allows extracting binaries without asking for admin privileges.
  • Simplify format of language XML files.
  • Workaround for cases where password dialog doesn't get keyboard focus if Secure Desktop is not enabled.
  • Linux:
  • Fix failure to install GUI version under recent versions of KDE.
  • Fix wxWidgets assertion failed when backing up/restoring volume header.
  • MacOSX:
  • Fix issue preventing some local help files from opening in the browser.

New in VeraCrypt 1.21 (Jul 3, 2017)

  • Fix 1.20 regression causing crash when running on a CPU supporting SSE2 but not SSSE3.
  • Fix 1.20 regression that caused PIM value stored in favorites to be ignored during mount.
  • Fix some cases of "Parameter Incorrect" error during EFI system encryption wizard.

New in VeraCrypt 1.20 (Jun 30, 2017)

  • Use 64-bit optimized assembly implementation of Twofish and Camellia by Jussi Kivilinna.
  • Camellia 2.5 faster when AES-NI supported by CPU. 30% faster without it.
  • Use optimized implementation for SHA-512/SHA256.
  • % speedup on 64-bit systems.
  • Deploy local HTML documentation instead of User Guide PDF.
  • Change links in UI from ones on Codeplex to ones hosted at veracrypt.fr
  • Security build binaries with support for Address Space Layout Randomization (ASLR).
  • Fix bug in EFI system decryption using EFI Rescue Disk
  • Enable using Secure Desktop for password entry. Add preferences option and command line switch (/secureDesktop) to activate it.
  • Use default mount parameters when mounting multiple favorites with password caching.
  • Enable specifying PRF and TrueCryptMode for favorites.
  • Preliminary driver changes to support EFI hidden OS functionality.
  • Fix Streebog not recognized by /hash command line.
  • Add support for ReFS filesystem on Windows 10 when creating normal volumes
  • Fix high CPU usage when favorite configured to mount with VolumeID on arrival.
  • Use CHM file for User Guide instead of PDF.
  • Fix false warning in case of EFI system encryption about Windows not installed on boot drive.
  • Enhancements to driver handling of various disk IOCTL.
  • Enhancements to EFI bootloader. Add possibility to manually edit EFI configuration file.
  • Driver Security Use enhanced protection of NX pool under Windows 8 and later.
  • Reduce performance impact of internal check for disconnected network drives.
  • Minor fixes.

New in VeraCrypt 1.20 Beta2 (May 12, 2017)

  • All OSes:
  • Use 64-bit optimized assembly implementation of Twofish by Jussi Kivilinna.
  • Windows:
  • Fix bug in EFI system decryption using EFI Rescue Disk
  • Enable using Secure Desktop for password entry. Add preferences option and command line switch (/secureDesktop) to activate it. Use default mount parameters when mounting multiple favorites with password caching. Enable specifying PRF and TrueCryptMode for favorites.
  • Preliminary driver changes to support EFI hidden OS functionality.

New in VeraCrypt 1.19 (Oct 18, 2016)

  • All OSs:
  • Use SSE2 optimized Serpent algorithm implementation from Botan project (2.5 times faster on 64-bit platforms).
  • Fix issues raised by Quarkslab audit:
  • Remove GOST89 encryption algorithm.
  • Make PBKDF2 and HMAC code clearer and easier to analyze.
  • Add test vectors for Kuznyechik.
  • Update documentation to warn about risks of using command line switch ”tokenpin”.
  • Windows:
  • Fix keyboard issues in EFI Boot Loader.
  • Fix crash on 32-bit machines when creating a volume that uses Streebog as PRF.
  • Fix false positive detection of Evil-Maid attacks in some cases (e.g. hidden OS creation)
  • Fix failure to access EFS data on VeraCrypt volumes under Windows 10.
  • Fix wrong password error in the process of copying hidden OS.
  • Support EFI system encryption for 32-bit Windows.
  • Perform shutdown instead of reboot during Pre-Test of EFI system encryption to detect incompatible motherboards.
  • Minor GUI and translations fixes.
  • Fix issues raised by Quarkslab audit:
  • Fix leak of password length in MBR bootloader inherited from TrueCrypt.
  • EFI bootloader: Fix various leaks and erase keyboard buffer after password is typed.
  • Use libzip library for handling zip Rescue Disk file instead of vulnerable XUnzip library.

New in VeraCrypt 1.19 Beta (Sep 21, 2016)

  • Fix keyboard issues in EFI Boot Loader.
  • Fix crash on 32-bit machines when creating a volume that uses Streebog as PRF

New in VeraCrypt 1.18 (Aug 18, 2016)

  • All OSs:
  • Support Japanese encryption standard Camellia, including for Windows system encryption (MBR & EFI).
  • Support Russian encryption and hash standards Kuznyechik, Magma and Streebog, including for Windows EFI system encryption.
  • Windows:
  • Support EFI Windows system encryption (limitations: no hidden os, no boot custom message)
  • Fix TrueCrypt vulnerability allowing detection of hidden volumes presence (reported by Ivanov Aleksey Mikhailovich, alekc96 (at) mail dot ru)
  • Enhanced protection against dll hijacking attacks.
  • Fix boot issues on some machines by increasing required memory by 1 KiB
  • Add benchmarking of hash algorithms and PRF with PIM (including for pre-boot).
  • Move build system to Visual C++ 2010 for better stability.
  • Workaround for AES-NI support under Hyper-V on Windows Server 2008 R2.
  • Correctly remove driver file veracrypt.sys during uninstall on Windows 64-bit.
  • Implement passing smart card PIN as command line argument (/tokenpin) when explicitly mounting a volume.
  • When no drive letter specified, choose A: or B: only when no other free drive letter is available.
  • Reduce CPU usage caused by the option to disable use of disconnected network drives.
  • Add new volume ID mechanism to be used to identify disks/partitions instead of their device name.
  • Add option to avoid PIM prompt in pre-boot authentication by storing PIM value unencrypted in MBR.
  • Add option and command line switch to hide waiting dialog when performing operations.
  • Add checkbox in "VeraCrypt Format" wizard GUI to skip Rescue Disk verification during system encryption procedure.
  • Allow files drag-n-drop when VeraCrypt is running as elevated process.
  • Minor GUI and translations fixes.

New in VeraCrypt 1.17 (Feb 15, 2016)

  • All OSs:
  • Support UNICODE passwords: all characters are now accepted in passwords (except Windows system encryption)
  • Cut mount/boot time by half thanks to a clever optimization of key derivation
  • Optimize Whirlpool code by using assembly (25% speed gain compared to previous code).
  • Add support for creating exFAT volumes.
  • Add GUI indicator for the amount of randomness gathered using mouse movement.
  • Include new icons and graphics
  • Windows:
  • Fix dll hijacking issue affecting installer that allows code execution with elevation of privilege (CVE-2016-1281).
  • Sign binaries using both SHA-1 and SHA-256 to follow new Microsoft recommendations.
  • Solve issues under Comodo/Kaspersky when running an application from a VeraCrypt volume
  • Bootloader: Protect password/PIM length by filling the fields to maximum length with '*' after ENTER
  • Solve issue with system favorites not being able to be mounted to drive A:
  • Solve lost focus issues for after displaying the waiting dialog
  • Solve rare issue where some partitions where associated with wrong disk the "Select Device" dialog.
  • Implement PIM caching, for both system encryption and normal volumes. Add options to activate it.
  • Don't try mounting using cached passwords if password and/or keyfile are specified in the command line.
  • Internal rewrite to make VeraCrypt native UNICODE application.
  • Workaround to avoid false positive detection by some anti-virus software.
  • Hide disconnected network drives in the list of available drives. Add option to make them available for mounting.
  • Solve issue that caused in some cases configuration and history XML files to be updated even when not needed.
  • Fix leak of path of selected keyfiles in RAM.
  • Fix TB unit can't be deselected in VeraCryptExpander.
  • Add Alt+i keyboard shortcut for "Use PIM" checkbox.
  • Minor GUI and translations fixes.

New in VeraCrypt 1.16 (Oct 7, 2015)

  • Modify patch for CVE-2015-7358 vulnerability to solve side effects on Windows while still making it very hard to abuse drive letter handling.
  • Fix failure to restore volume header from an external file in some configurations.
  • Add option to disable “Evil Maid” attack detection for those encountering false positive cases (e.g. FLEXnet/Adobe issue).
  • By default, don’t try to mount using empty password when default keyfile configured or keyfile specified in command line. Add option to restore the old behavior. If mounting using empty password is needed, explicitly specify so in the command line using: /p ""

New in VeraCrypt 1.15 (Sep 28, 2015)

  • Windows:
  • Fix two TrueCrypt vulnerabilities reported by James Forshaw (Google Project Zero)
  • CVE-2015-7358 (critical): Local Elevation of Privilege on Windows by abusing drive letter handling.
  • CVE-2015-7359: Local Elevation of Privilege on Windows caused by incorrect Impersonation Token Handling.
  • Fix display of some Unicode languages (e.g. Chinese) in formatting wizard.
  • Allow Application key to open context menu on drive letters list
  • Support specifying volumes size in TB in the GUI (command line already supports this)

New in VeraCrypt 1.15 Beta (Sep 20, 2015)

  • Fix privately reported critical TrueCrypt vulnerability (details and credits to be announced later).
  • Fix regression in mounting of favorite volumes at user logon.
  • Set keyboard focus to PIM field when "Use PIM" is checked.

New in VeraCrypt 1.14 (Sep 17, 2015)

  • Mask and unmask PIM value in GUI and bootloader like the password.
  • Solve Rescue Disk damaged error when using cascade ciphers and SHA256 for system encryption.
  • Solve option "Cache password in drive memory" always disabled even if checked in preferences.
  • Solve UI language change not taken into account for new install unless a preference is changed.
  • Implement creating file containers using command line.
  • Driver: disable support of IOCTLSTORAGEQUERY_PROPERTY by default and add option to enable it.
  • Driver: Support returning StorageDeviceProperty if IOCTLSTORAGEQUERY_PROPERTY is supported.
  • Support setting volume label in Explorer through mount option or favorite label value.
  • Fix for Hot Keys assignment dialog issue where OEM-233 is always displayed and can't be changed.
  • Always copy both 32-bit and 64-bit executable binaries during install and in Traveler Disk Setup.
  • Traveler Disk will again use 32-bit exe by default while also offering 64-bit exe.
  • On Windows 64-bit, 32-bit exe files are now available(e.g. if needed to use 32-bit PKCS#11 dll)
  • Include Volume Expander in Traveler Disk Setup.
  • Don't offer creating a restore point if it is disabled in Windows.
  • Add possibility to verify a Rescue Disk ISO image file.
  • Minors fixes in the installer, GUI and driver.

New in VeraCrypt 1.13 (Aug 10, 2015)

  • Solve TOR crashing when run from a VeraCrypt volume.

New in VeraCrypt 1.12 (Aug 10, 2015)

  • Implement "Dynamic Mode" by supporting a Personal Iterations Multiplier (PIM). See documentation for more information.
  • Detect Boot Loader tampering ("Evil Maid" attacks) for system encryption and propose recovery options.
  • Fix buffer overrun issue and other memory related bugs when parsing language XML files.
  • Fix wrongly reported bad sectors by chkdsk caused by a bug in IOCTL_DISK_VERIFY handling.
  • Fix privacy issue caused by configuration and history files being updated whenever VeraCrypt is used (reported by Liran Elharar)
  • Fix system favorites not always mounting after cold start.
  • Solve installer error when updating VeraCrypt on Windows 10.
  • Implement decryption of non-system partition/drive.
  • Include 64-bit exe files in the installer and deploy them on 64-bit machines for better performances.
  • Allow using drive letters A: and B: for mounting volumes
  • Make command line argument parsing more strict and robust (e.g. /lz rejected, must be /l z)
  • Add possibility to show system encryption password in Windows GUI and bootloader
  • Solve "Class Already exists" error that was happening for some users.
  • Solve some menu items and GUI fields not translatable
  • Make volumes correctly report Physical Sector size to Windows.
  • Correctly detect switch user/RDP disconnect operations for autodismount on session locked.
  • Add manual selection of partition when resuming in-place encryption.
  • Add command line option (/cache f) to temporarily cache password during favorites mounting.
  • Add waiting dialog for Auto-Mount Devices operations to avoid freezing GUI.
  • Add extra information to displayed error message in order to help analyze reported issues.
  • Disable menu entry for changing system encryption PRF since it's not yet implemented.
  • Fix failure to change password when UAC required (inherited from TrueCrypt)
  • Minor fixes and changes (see Git history for more details)

New in VeraCrypt 1.0f-2 (Apr 7, 2015)

  • All OSes:
  • Mounting speed improvement, up to 20% quicker on 64-bit (contributed by Nils Maier)
  • Add option to set default hash/TrueCryptMode used for mounting volumes.
  • Use TrueCryptMode/Hash specified in command line in password dialog.
  • Windows:
  • Solve CryptAcquireContext vulnerability reported by Open Crypto Audit Phase II.
  • Proper handling of random generator failures. Inform user in such cases.
  • TrueCrypt Mode related changes
  • Support mounting TrueCrypt system partition (no conversion yet)
  • Support TrueCrypt volumes as System Favorites.
  • Correct displaying wrong TrueCrypt mode in volume properties when SHA-256 is used.
  • Solve PIN BLOCKED issue with smart cards in a special case.
  • Correctly handle file access errors when mounting containers.
  • Solve several issues reported by the Static Code Analysis too Coverity.
  • Bootloader: Add "Verifying Password..." message.
  • When UAC prompt fails (for example timeout), offer the user to retry the operation.
  • Uninstall link now open the standard "Add/Remove Programs" window.
  • On uninstall, remove all VeraCrypt references from registry and disk.
  • Included VeraCryptExpander in the Setup.
  • Add option to temporary cache password when mounting multiple favorites.
  • Minor fixes and enhancements (see git history for more information)

New in VeraCrypt 1.0f-1 (Jan 26, 2015)

  • All OSs:
  • Add support for old TrueCrypt 6.0.
  • Change naming of cascades algorithms in GUI for a better description.
  • Windows:
  • For Windows XP, correct the installer graphical artefacts.
  • Add TrueCrypt mode to the mounted volume information.

New in VeraCrypt 1.0f (Jan 3, 2015)

  • Add support for mounting TrueCrypt volumes.
  • Add support for converting TrueCrypt containers and non-system partitions.
  • Add support for SHA-256 for volume encryption.
  • Make SHA-512 the default key derivation algorithm and change the order of preference of derivation algorithms : SHA-512 -> Whirlpool -> SHA-256 -> RIPEMD160
  • Deprecate RIPEMD160 for non-system encryption.
  • Speedup mount operation by enabling choice of correct hash algorithm.
  • Display a wait dialog during lengthy operations to avoid freezing the GUI.
  • Implement creation of multiple keyfiles at once, with predefined or random size.
  • Always display random gathering dialog before performing sensitive operations.
  • Links in the application now points to the online resources on Codeplex
  • First version of proper VeraCrypt User Guide
  • Security: fix vulnerability in bootloader detected by Open Crypto Audit and make it more robust.
  • Add support for SHA-256 in system boot encryption.
  • Various optimizations in bootloader.
  • Complete fix of ShellExecute security issue.
  • Kernel driver: check that the password length received from bootloader is less or equal to 64.
  • Correct a random crash when clicking the link for more information on keyfiles
  • Implement option to auto-dismount when user session is locked
  • Add self-test vectors for SHA-256
  • Modern look-and-feel by enabling visual styles.
  • few minor fixed.

New in VeraCrypt 1.0f Beta (Nov 3, 2014)

  • Add support for SHA-256 for volume encryption.
  • Make SHA-512 the default key derivation algorithm instead of RIPEMD160.
  • Change the order of preference of derivation algorithms : SHA-512 -> Whirlpool -> SHA-256 -> RIPEMD160
  • Security: fix vulnerability in bootloader detected by Open Crypto Audit and make it more robust.
  • Add support for SHA-256 in system boot encryption.
  • Various optimizations in bootloader.
  • Complete fix of ShellExecute security issue.
  • Kernel driver: check that the password length received from bootloader is less or equal to 64.

New in VeraCrypt 1.0e (Sep 22, 2014)

  • Correct most of the security vulnerabilities reported by the Open Crypto Audit Project
  • Correct security issues detected by Static Code Analysis, mainly under Windows
  • Correct issue of unresponsiveness when changing password/key file of a volume. Reduce overall time taken for creating encrypted volume/partition
  • Minor fixes (look at git history for more details)

New in VeraCrypt 1.0d (Jun 3, 2014)

  • Correct issue while creating hidden operating system.
  • Minor fixes (look at git history for more details).

New in VeraCrypt 1.0c (Nov 5, 2013)

  • Set correctly the minimum required version in volumes header (this value must always follow the program version after any major changes).
  • This also solves also the hidden volume issue