diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2020-07-22 17:25:51 +0200 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2020-07-22 17:28:06 +0200 |
commit | 699a0a3ca5da5ba3189a4c9257920789a5f07dac (patch) | |
tree | 3b17cb70428530c3b8e27355de40e3746380f423 /doc/html | |
parent | 587e6db4f16291d8b6f22d0937a4bff87bc8ffc0 (diff) | |
download | VeraCrypt-699a0a3ca5da5ba3189a4c9257920789a5f07dac.tar.gz VeraCrypt-699a0a3ca5da5ba3189a4c9257920789a5f07dac.zip |
Increment internal version to 1.24.20 and update release notes
Diffstat (limited to 'doc/html')
-rw-r--r-- | doc/html/Release Notes.html | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/doc/html/Release Notes.html b/doc/html/Release Notes.html index 1c8681a2..6a712962 100644 --- a/doc/html/Release Notes.html +++ b/doc/html/Release Notes.html @@ -39,12 +39,13 @@ <strong>Note to users who created volumes with 1.17 version of VeraCrypt or earlier: </strong><br/> <span style="color:#ff0000;">To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes/OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1.18a version of VeraCrypt.</span></li> </p> -<p><strong style="text-align:left">1.24-Update7</strong>(July 6<sup>th</sup>, 2020):</p> +<p><strong style="text-align:left">1.24-Update7</strong>(July 22<sup>nd</sup>, 2020):</p> <ul> <li><strong>All OSes:</strong> <ul> <li>Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume</li> <li>Fix random crash in 32-bit builds when using Streebog.</li> +<li>Enable FIPS mode in JitterEntropy random generator.</li> <li>Minor code cleanup</li> </ul> </li> @@ -58,6 +59,9 @@ <li>Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.</li> <li>Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.</li> <li>Don't allow to encrypt the system drive if it is already encrypted by BitLocker.</li> +<li>Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.</li> +<li>Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.</li> +<li>Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.</li> <li>Update translations.</li> </ul> </li> |