CarderPlanet
Professional
After a year and a half of development, the release of the VeraCrypt 1.26.7 project has been published, which develops a fork of the TrueCrypt disk partition encryption system, which has ceased to exist. VeraCrypt is notable for replacing the RIPEMD-160 algorithm used in TrueCrypt with SHA-512 and SHA-256, increasing the number of hash iterations, simplifying the build process for Linux and macOS, and eliminating problems identified during the TrueCrypt source code audit. The last official release of VeraCrypt 1.25.9 was published in February 2022. The code developed by the VeraCrypt project is distributed under the Apache 2.0 license, and borrowings from TrueCrypt continue to be delivered under the TrueCrypt 3.0 license. Ready-made builds are formed for Linux, FreeBSD, Windows, and macOS.
Among the changes in the new version::
* Added support for using bank smart cards that comply with the EMV standard as a key storage for accessing non-system partitions. EMV cards can be used in VeraCrypt without the need for separate configuration of the PKCS#11 module and without entering a PIN code. The contents of the key file are generated based on the unique data present on the map.
* Removed TrueCrypt compatibility mode. The latest version with support for mounting or converting TrueCrypt partitions is VeraCrypt 1.25.9.
* Completely removed support for the RIPEMD160 and GOST89 encryption algorithms. Partitions created using these algorithms can no longer be mounted using VeraCrypt.
• For standard and system encrypted partitions, it is possible to use a new pseudo-random sequence generation algorithm (PRF, Pseudo-Random Function) that uses the BLAKE2s hash function.
* Changes in the Linux version:
* Improved compatibility with the Alpine Linux distribution and the musl standard C library.
* Fixed compatibility issues with Ubuntu 23.04 and wxWidgets 3.1.6+.
* The version of the wxWidgets framework in static builds has been updated to 3.2.2.1.
* The implementation of the pseudo-random number generator corresponds to the official documentation and is similar in behavior to the Windows implementation.
* Fixed a bug in the pseudo-random number generator that caused test execution to fail when using the Blake2s algorithm.
* Fixed issues with running the fsck utility.
* Fixed an issue with selecting the wrong size for hidden partitions when using the full disk space usage mode.
Fixed a crash when creating hidden partitions via the command-line interface.
* Fixed errors in the text mode of the interface. It is forbidden to select exFAT and BTRFS file systems if they are not compatible with the partitions being created.
* Improved compatibility with classic installers of older Linux distributions.
* Implemented a recommendation to add an additional check that excludes whether the primary and secondary keys match when creating partitions. Due to the use of a pseudorandom number generator when generating keys, key matching is unlikely, and verification is added rather to completely exclude hypothetical attacks.
* In builds for the Windows platform, memory protection mode is enabled by default, which prohibits reading the contents of VeraCrypt memory by processes that do not have administrator privileges (this may affect compatibility with screen readers). Added protection against code substitution in VeraCrypt memory by other processes. Improved implementation of memory encryption and fast file container creation mode. EFI Bootloader improves support for the original Windows bootloader in crash recovery mode. An option to mount without using the cache has been added to the menu. Fixed problems with increasing slow-down of Encrypt-In-Place encryption in large partitions. Expander adds support for moving files and keys in drag&drop mode. A more modern file and directory selection dialog is used, which is better combined with Windows 11. The safe DLL loading mode is improved.
* Discontinued support for older versions of Windows. The minimum supported version is Windows 10. Theoretically, VeraCrypt can still run on Windows 7 and Windows 8/8. 1, but it is no longer tested correctly on these platforms.
Among the changes in the new version::
* Added support for using bank smart cards that comply with the EMV standard as a key storage for accessing non-system partitions. EMV cards can be used in VeraCrypt without the need for separate configuration of the PKCS#11 module and without entering a PIN code. The contents of the key file are generated based on the unique data present on the map.
* Removed TrueCrypt compatibility mode. The latest version with support for mounting or converting TrueCrypt partitions is VeraCrypt 1.25.9.
* Completely removed support for the RIPEMD160 and GOST89 encryption algorithms. Partitions created using these algorithms can no longer be mounted using VeraCrypt.
• For standard and system encrypted partitions, it is possible to use a new pseudo-random sequence generation algorithm (PRF, Pseudo-Random Function) that uses the BLAKE2s hash function.
* Changes in the Linux version:
* Improved compatibility with the Alpine Linux distribution and the musl standard C library.
* Fixed compatibility issues with Ubuntu 23.04 and wxWidgets 3.1.6+.
* The version of the wxWidgets framework in static builds has been updated to 3.2.2.1.
* The implementation of the pseudo-random number generator corresponds to the official documentation and is similar in behavior to the Windows implementation.
* Fixed a bug in the pseudo-random number generator that caused test execution to fail when using the Blake2s algorithm.
* Fixed issues with running the fsck utility.
* Fixed an issue with selecting the wrong size for hidden partitions when using the full disk space usage mode.
Fixed a crash when creating hidden partitions via the command-line interface.
* Fixed errors in the text mode of the interface. It is forbidden to select exFAT and BTRFS file systems if they are not compatible with the partitions being created.
* Improved compatibility with classic installers of older Linux distributions.
* Implemented a recommendation to add an additional check that excludes whether the primary and secondary keys match when creating partitions. Due to the use of a pseudorandom number generator when generating keys, key matching is unlikely, and verification is added rather to completely exclude hypothetical attacks.
* In builds for the Windows platform, memory protection mode is enabled by default, which prohibits reading the contents of VeraCrypt memory by processes that do not have administrator privileges (this may affect compatibility with screen readers). Added protection against code substitution in VeraCrypt memory by other processes. Improved implementation of memory encryption and fast file container creation mode. EFI Bootloader improves support for the original Windows bootloader in crash recovery mode. An option to mount without using the cache has been added to the menu. Fixed problems with increasing slow-down of Encrypt-In-Place encryption in large partitions. Expander adds support for moving files and keys in drag&drop mode. A more modern file and directory selection dialog is used, which is better combined with Windows 11. The safe DLL loading mode is improved.
* Discontinued support for older versions of Windows. The minimum supported version is Windows 10. Theoretically, VeraCrypt can still run on Windows 7 and Windows 8/8. 1, but it is no longer tested correctly on these platforms.