diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2019-02-01 12:56:19 +0100 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2019-02-01 13:02:01 +0100 |
commit | 5d3278bcf20d7b8039747a430f86b7dd5ef49a04 (patch) | |
tree | 707e22a8564f7cbb5b16e22e894195c1459a4e24 /doc/html | |
parent | 0b8e768721bc3751de937861246c0a71c20030ed (diff) | |
download | VeraCrypt-5d3278bcf20d7b8039747a430f86b7dd5ef49a04.tar.gz VeraCrypt-5d3278bcf20d7b8039747a430f86b7dd5ef49a04.zip |
Update Release Notes and other files for 1.24-Beta2 release
Diffstat (limited to 'doc/html')
-rw-r--r-- | doc/html/Release Notes.html | 20 |
1 files changed, 18 insertions, 2 deletions
diff --git a/doc/html/Release Notes.html b/doc/html/Release Notes.html index 0264026e..c56bd1a9 100644 --- a/doc/html/Release Notes.html +++ b/doc/html/Release Notes.html @@ -39,20 +39,36 @@ <strong>Note to users who created volumes with 1.17 version of VeraCrypt or earlier: </strong><br/> <span style="color:#ff0000;">To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes/OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1.18a version of VeraCrypt.</span></li> </p> -<p><strong style="text-align:left">1.24-Beta1 </strong>(January 21<sup>th</sup>, 2019):</p> +<p><strong style="text-align:left">1.24-Beta2 </strong>(January 31<sup>th</sup>, 2019):</p> <ul> +<li><strong>All OSs:</strong> +<ul> +<li>Increase password maximum length to 128 bytes in UTF-8 encoding.</li> +<li>Speed optimization of XTS mode on 64-bit machine using SSE2 (up to 10% faster).</li> +<li>Fix detection of CPU features AVX2/BMI2. Add detection of RDRAND/RDSEED CPU features. Detect Hygon CPU as AMD one.</li> +</ul> +</li> <li><strong>Windows:</strong> <ul> <li>MBR Bootloader: dynamically determine boot loader memory segment instead of hardcoded values (proposed by neos6464)</li> <li>MBR Bootloader: workaround for issue affecting creation of hidden OS on some SSD drives.</li> <li>Fix issue related to Windows Update breaking VeraCrypt UEFI bootloader.</li> -<li>Support Multi-boot for EFI system encryption.</li> +<li>Several enhancements and fixes for EFI bootloader:</li> +<ul> +<li>Implement timeout mechanism for password input. Set default timeout value to 3 minutes and default timeout action to "shutdown".</li> +<li>Implement new actions "shutdown" and "reboot" for EFI DcsProp config file.</li> +<li>Enhance Rescue Disk implementation of restoring VeraCrypt loader.</li> +<li>Fix ESC on password prompt during Pre-Test not starting Windows.</li> +<li>Add menu entry in Rescue Disk that enables starting original Windows loader.</li> +</ul> +<li>Better support Multi-boot for EFI system encryption.</li> <li>New security features:</li> <ul> <li>Erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks</li> <li>Add option when system encryption is used to erase all encryption keys from memory when a new device is connected to the system.</li> <li>Add new driver entry point that can be called by applications to erase encryption keys from memory in case of emergency.</li> </ul> +<li>Use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available.</li> <li>Add mount option that allows mounting a volume without attaching it to the specified drive letter.</li> <li>Update libzip to version 1.5.1</li> <li>Do not create uninstall shortcut in startmenu when installing VeraCrypt. (by Sven Strickroth)</li> |