diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2020-06-23 15:06:02 +0200 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2020-06-23 16:48:54 +0200 |
commit | cb1efdc9ae47d13d2c1a10bf7ec3a5308ffbfa32 (patch) | |
tree | 7936aa799a7d0793f9c39a26906c18322108ce6c /doc | |
parent | cf449a443e629d09b2e0e7a0a271082ffe5a6573 (diff) | |
download | VeraCrypt-cb1efdc9ae47d13d2c1a10bf7ec3a5308ffbfa32.tar.gz VeraCrypt-cb1efdc9ae47d13d2c1a10bf7ec3a5308ffbfa32.zip |
Increment version to 1.24-Update7
Diffstat (limited to 'doc')
-rw-r--r-- | doc/chm/VeraCrypt User Guide.chm | bin | 1977751 -> 1978333 bytes | |||
-rw-r--r-- | doc/html/Release Notes.html | 22 |
2 files changed, 22 insertions, 0 deletions
diff --git a/doc/chm/VeraCrypt User Guide.chm b/doc/chm/VeraCrypt User Guide.chm Binary files differindex 0467d50c..53ff2125 100644 --- a/doc/chm/VeraCrypt User Guide.chm +++ b/doc/chm/VeraCrypt User Guide.chm diff --git a/doc/html/Release Notes.html b/doc/html/Release Notes.html index b4526fed..39cb2045 100644 --- a/doc/html/Release Notes.html +++ b/doc/html/Release Notes.html @@ -39,6 +39,28 @@ <strong>Note to users who created volumes with 1.17 version of VeraCrypt or earlier: </strong><br/> <span style="color:#ff0000;">To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes/OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1.18a version of VeraCrypt.</span></li> </p> +<p><strong style="text-align:left">1.24-Update7</strong>(June 23<sup>rd</sup>, 2020):</p> +<ul> +<li><strong>All OSes:</strong> +<ul> +<li>Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume</li> +<li>Minor code cleanup</li> +</ul> +</li> +<li><strong>Windows:</strong> +<ul> +<li>Fix wrong results in benchmark of encryption algorithms when RAM encryption is enabled</li> +<li>Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected.</li> +<li>Update translations.</li> +</ul> +</li> +<li><strong>Linux/MacOSX:</strong> +<ul> +<li>Force reading of at least 32 bytes from /dev/random before allowing it to fail gracefully</li> +</ul> +</li> +</ul> + <p><strong style="text-align:left">1.24-Update6 </strong>(March 10<sup>th</sup>, 2020):</p> <ul> <li><strong>Windows:</strong> |