VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/doc/html
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2020-07-22 15:25:51 (GMT)
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2020-07-22 15:28:06 (GMT)
commit699a0a3ca5da5ba3189a4c9257920789a5f07dac (patch)
tree3b17cb70428530c3b8e27355de40e3746380f423 /doc/html
parent587e6db4f16291d8b6f22d0937a4bff87bc8ffc0 (diff)
downloadVeraCrypt-699a0a3ca5da5ba3189a4c9257920789a5f07dac.zip
VeraCrypt-699a0a3ca5da5ba3189a4c9257920789a5f07dac.tar.gz
Increment internal version to 1.24.20 and update release notes
Diffstat (limited to 'doc/html')
-rw-r--r--doc/html/Release Notes.html6
1 files changed, 5 insertions, 1 deletions
diff --git a/doc/html/Release Notes.html b/doc/html/Release Notes.html
index 1c8681a..6a71296 100644
--- a/doc/html/Release Notes.html
+++ b/doc/html/Release Notes.html
@@ -39,12 +39,13 @@
<strong>Note to users who created volumes with 1.17 version of VeraCrypt or earlier: </strong><br/>
<span style="color:#ff0000;">To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes/OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1.18a version of VeraCrypt.</span></li>
</p>
-<p><strong style="text-align:left">1.24-Update7</strong>(July 6<sup>th</sup>, 2020):</p>
+<p><strong style="text-align:left">1.24-Update7</strong>(July 22<sup>nd</sup>, 2020):</p>
<ul>
<li><strong>All OSes:</strong>
<ul>
<li>Don't allow Hidden volume to have the same password, PIM and keyfiles as Outer volume</li>
<li>Fix random crash in 32-bit builds when using Streebog.</li>
+<li>Enable FIPS mode in JitterEntropy random generator.</li>
<li>Minor code cleanup</li>
</ul>
</li>
@@ -58,6 +59,9 @@
<li>Use native Windows format program to perform formatting of volume since it is more reliable and only fallback to FormatEx function from fmifs.dll in case of issue.</li>
<li>Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.</li>
<li>Don't allow to encrypt the system drive if it is already encrypted by BitLocker.</li>
+<li>Implement detection of Hibernate and Fast Startup and disable them if RAM encryption is activated.</li>
+<li>Warn about Fast Startup if it is enabled during VeraCrypt installation/upgrade, when starting system encryption or when creating a volume, and propose to disable it.</li>
+<li>Add UI options to control the behavior of automatic bootloader fixing when System Encryption used.</li>
<li>Update translations.</li>
</ul>
</li>