VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/doc/html/Release Notes.html
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2019-10-27 10:44:47 +0100
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2019-10-27 10:46:32 +0100
commit1ae99f2e67eb5e613ae577714dcf4240d9f232de (patch)
tree1f286aa04c48b6f3828e673e7254c668efd16897 /doc/html/Release Notes.html
parent94084525b1a16b8c8721716a6bdc96d5a65a00fd (diff)
downloadVeraCrypt-1ae99f2e67eb5e613ae577714dcf4240d9f232de.tar.gz
VeraCrypt-1ae99f2e67eb5e613ae577714dcf4240d9f232de.zip
Windows: Update Release Notes and set 1.24-Hotfix1 release date to October 27th.
Diffstat (limited to 'doc/html/Release Notes.html')
-rw-r--r--doc/html/Release Notes.html3
1 files changed, 2 insertions, 1 deletions
diff --git a/doc/html/Release Notes.html b/doc/html/Release Notes.html
index 8064a949..09e5d1ed 100644
--- a/doc/html/Release Notes.html
+++ b/doc/html/Release Notes.html
@@ -40,11 +40,12 @@
<span style="color:#ff0000;">To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes/OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1.18a version of VeraCrypt.</span></li>
</p>
-<p><strong style="text-align:left">1.24-Hotfix1 </strong>(October 25<sup>rd</sup>, 2019):</p>
+<p><strong style="text-align:left">1.24-Hotfix1 </strong>(October 27<sup>rd</sup>, 2019):</p>
<ul>
<li><strong>Windows:</strong>
<ul>
<li>Fix 1.24 regression that caused system favorites not to mount at boot if VeraCrypt freshly installed.</li>
+<li>Fix failure to encrypt system if the current Windows username contains a Unicode non-ASCII character.</li>
<li>Make VeraCrypt Expander able to resume expansion of volumes whose previous expansion was aborted before it finishes.</li>
<li>Add "Quick Expand" option to VeraCrypt Expander to accelarate the expansion of large file containers.</li>
<li>Add several robustness checks and validation in case of system encryption to better handle some corner cases.</li>