diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2019-10-27 10:44:47 +0100 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2019-10-27 10:46:32 +0100 |
commit | 1ae99f2e67eb5e613ae577714dcf4240d9f232de (patch) | |
tree | 1f286aa04c48b6f3828e673e7254c668efd16897 /doc/html/Release Notes.html | |
parent | 94084525b1a16b8c8721716a6bdc96d5a65a00fd (diff) | |
download | VeraCrypt-1ae99f2e67eb5e613ae577714dcf4240d9f232de.tar.gz VeraCrypt-1ae99f2e67eb5e613ae577714dcf4240d9f232de.zip |
Windows: Update Release Notes and set 1.24-Hotfix1 release date to October 27th.
Diffstat (limited to 'doc/html/Release Notes.html')
-rw-r--r-- | doc/html/Release Notes.html | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/doc/html/Release Notes.html b/doc/html/Release Notes.html index 8064a949..09e5d1ed 100644 --- a/doc/html/Release Notes.html +++ b/doc/html/Release Notes.html @@ -40,11 +40,12 @@ <span style="color:#ff0000;">To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes/OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1.18a version of VeraCrypt.</span></li> </p> -<p><strong style="text-align:left">1.24-Hotfix1 </strong>(October 25<sup>rd</sup>, 2019):</p> +<p><strong style="text-align:left">1.24-Hotfix1 </strong>(October 27<sup>rd</sup>, 2019):</p> <ul> <li><strong>Windows:</strong> <ul> <li>Fix 1.24 regression that caused system favorites not to mount at boot if VeraCrypt freshly installed.</li> +<li>Fix failure to encrypt system if the current Windows username contains a Unicode non-ASCII character.</li> <li>Make VeraCrypt Expander able to resume expansion of volumes whose previous expansion was aborted before it finishes.</li> <li>Add "Quick Expand" option to VeraCrypt Expander to accelarate the expansion of large file containers.</li> <li>Add several robustness checks and validation in case of system encryption to better handle some corner cases.</li> |