diff options
-rw-r--r-- | doc/chm/VeraCrypt User Guide.chm | bin | 1927521 -> 1932579 bytes | |||
-rw-r--r-- | doc/html/Release Notes.html | 5 |
2 files changed, 3 insertions, 2 deletions
diff --git a/doc/chm/VeraCrypt User Guide.chm b/doc/chm/VeraCrypt User Guide.chm Binary files differindex 2a993ef3..d74c9e81 100644 --- a/doc/chm/VeraCrypt User Guide.chm +++ b/doc/chm/VeraCrypt User Guide.chm diff --git a/doc/html/Release Notes.html b/doc/html/Release Notes.html index 49df7cc3..a62f3f16 100644 --- a/doc/html/Release Notes.html +++ b/doc/html/Release Notes.html @@ -35,13 +35,14 @@ <div class="wikidoc"> <h1>Release Notes</h1> -<p><strong style="text-align:left">1.23-BETA1 </strong>(May 2<sup>nd</sup>, 2018):</p> +<p><strong style="text-align:left">1.23-BETA2 </strong>(July 5<sup>nd</sup>, 2018):</p> <ul> <li><strong>Windows:</strong> <ul> <li>Fix EFI system encryption issues on some machines (e.g. HP, Acer).</li> <li>Support EFI system encryption on Windows LTSB.</li> -<li>First implementation of compatibility of system encryption with Windows 10 upgrade using ReflectDrivers mechanism</li> +<li>Add compatibility of system encryption with Windows 10 upgrade using ReflectDrivers mechanism</li> +<li>Make EFI Rescue Disk decrypt partition correctly when Windows Repair overwrites first partition sector.</li> <li>Don't start EFI system encryption process if SecureBoot is enabled and VeraCrypt-DCS custom keys are not loaded in the machine's firmware.</li> <li>Add internal verification of binaries embedded signature to protect against some types to tampering attacks.</li> <li>when Secure Desktop is enabled, use it for Mount Options dialog if it is displayed before password dialog.</li> |