<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Activity for VeraCrypt</title><link>https://sourceforge.net/p/veracrypt/activity/</link><description>Recent activity for VeraCrypt</description><language>en</language><lastBuildDate>Mon, 27 Apr 2026 18:56:05 -0000</lastBuildDate><item><title>Martin posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/b9fa695c2e/?limit=25#f456</link><description>I want to connect and use an internal SATA HDD, encrypted as a VeraCrypt volume (non-system), in an external USB enclosure. Are there any potential encryption problems if the SATA HDD was originally connected internally when the VeraCrypt volume was created?</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Martin</dc:creator><pubDate>Mon, 27 Apr 2026 18:56:05 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/b9fa695c2e/?limit=25#f456</guid></item><item><title>George posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#74f1</link><description>Directory of S:\EFI\VeraCrypt 24.04.2026 22:44 . 24.04.2026 22:44 .. 24.04.2026 22:44 25 160 DcsBoot.efi 24.04.2026 22:44 934 744 DcsInt.dcs 24.04.2026 22:44 976 168 DcsCfg.dcs 24.04.2026 22:44 10 888 LegacySpeaker.dcs 24.04.2026 22:44 38 216 DcsInfo.dcs 24.04.2026 22:44 779 DcsProp 24.04.2026 22:50 2 255 PlatformInfo 7 File(s) 1 988 210 bytes 2 Dir(s) 70 473 728 bytes free</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">George</dc:creator><pubDate>Mon, 27 Apr 2026 07:47:51 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#74f1</guid></item><item><title>George posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#a0f4</link><description>Directory of S:\EFI\Boot 07.07.2021 17:54 . 07.07.2021 17:54 .. 09.04.2021 05:49 1 558 864 original_bootx64.vc_backup 24.04.2026 22:44 25 160 bootx64.efi 2 File(s) 1 584 024 bytes 2 Dir(s) 70 473 728 bytes free</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">George</dc:creator><pubDate>Mon, 27 Apr 2026 07:47:42 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#a0f4</guid></item><item><title>George modified a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#9f43</link><description>C:\Windows\system32&gt;dir S:\EFI\Microsoft\Boot\bootmgfw* Volume in drive S has no label. Volume Serial Number is Directory of S:\EFI\Microsoft\Boot 24.04.2026 22:44 25 160 bootmgfw.efi 15.10.2025 11:53 1 604 016 bootmgfw_ms.vc 2 File(s) 1 629 176 bytes 0 Dir(s) 70 473 728 bytes free</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">George</dc:creator><pubDate>Mon, 27 Apr 2026 07:47:27 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#9f43</guid></item><item><title>George posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#9f43</link><description>C:\Windows\system32&gt;dir S:\EFI\Microsoft\Boot\bootmgfw* Volume in drive S has no label. Volume Serial Number is Directory of S:\EFI\Microsoft\Boot 24.04.2026 22:44 25 160 bootmgfw.efi 15.10.2025 11:53 1 604 016 bootmgfw_ms.vc 2 File(s) 1 629 176 bytes 0 Dir(s) 70 473 728 bytes free Directory of S:\EFI\Boot 07.07.2021 17:54 . 07.07.2021 17:54 .. 09.04.2021 05:49 1 558 864 original_bootx64.vc_backup 24.04.2026 22:44 25 160 bootx64.efi 2 File(s) 1 584 024 bytes 2 Dir(s) 70 473 728 bytes free Directory...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">George</dc:creator><pubDate>Mon, 27 Apr 2026 07:46:16 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#9f43</guid></item><item><title>George posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#7bd5</link><description>C:\Windows\system32&gt;bcdedit /enum firmware Firmware Boot Manager identifier {fwbootmgr} displayorder {bootmgr} timeout 1 Windows Boot Manager identifier {bootmgr} device partition=\Device\HarddiskVolume3 path \EFI\MICROSOFT\BOOT\BOOTMGFW.EFI description Windows Boot Manager locale en-US inherit {globalsettings} default {current} resumeobject {e3c97977-df8e-11eb-b098-94c7dd1d002d} displayorder {current} toolsdisplayorder {memdiag} timeout 30</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">George</dc:creator><pubDate>Mon, 27 Apr 2026 07:43:39 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#7bd5</guid></item><item><title>George modified a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#2bbf</link><description>Thank you for explanation. I've uninstalled VeraCrypt to 1.26.24. Installed VeraCrypt 1.24-Update7 (I had it in my backups). System &gt; Permanently Decrypt System Partition/Drive is still available in the menu. When I select it VeraCrypt says "System partition/drive does not appear to be encrypted". I no longer have VeraCrypt recovery U-disk. I'll try Startup Repair from Windows Recovery Environment. Windows Startup Repair "couldn't fix my PC".</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">George</dc:creator><pubDate>Mon, 27 Apr 2026 07:43:32 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#2bbf</guid></item><item><title>George posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#2bbf</link><description>Thank you for explanation. I've uninstalled VeraCrypt to 1.26.24. Installed VeraCrypt 1.24-Update7 (I had it in my backups). System &gt; Permanently Decrypt System Partition/Drive is still available in the menu. When I select it VeraCrypt says "System partition/drive does not appear to be encrypted". I no longer have VeraCrypt recovery U-disk. I'll try Startup Repair from Windows Recovery Environment.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">George</dc:creator><pubDate>Mon, 27 Apr 2026 07:29:05 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#2bbf</guid></item><item><title>Jack Omen posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/3866b9cc1e/?limit=25#9160</link><description>That's great! Thank you so much!</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jack Omen</dc:creator><pubDate>Sun, 26 Apr 2026 11:07:23 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/3866b9cc1e/?limit=25#9160</guid></item><item><title>VeraCrypt updated /VeraCrypt 1.26.24/veracrypt-1.26.24-sha256sum.txt</title><link>https://sourceforge.net/projects/veracrypt/files/VeraCrypt%201.26.24/veracrypt-1.26.24-sha256sum.txt/download</link><description/><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">VeraCrypt</dc:creator><pubDate>Sun, 26 Apr 2026 03:21:13 -0000</pubDate><guid>https://sourceforge.net/projects/veracrypt/files/VeraCrypt 1.26.24/veracrypt-1.26.24-sha256sum.txt/download</guid></item><item><title>VeraCrypt updated /VeraCrypt 1.26.24/veracrypt-1.26.24-sha512sum.txt.sig</title><link>https://sourceforge.net/projects/veracrypt/files/VeraCrypt%201.26.24/veracrypt-1.26.24-sha512sum.txt.sig/download</link><description/><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">VeraCrypt</dc:creator><pubDate>Sun, 26 Apr 2026 03:21:13 -0000</pubDate><guid>https://sourceforge.net/projects/veracrypt/files/VeraCrypt 1.26.24/veracrypt-1.26.24-sha512sum.txt.sig/download</guid></item><item><title>VeraCrypt updated /VeraCrypt 1.26.24/veracrypt-1.26.24-sha512sum.txt</title><link>https://sourceforge.net/projects/veracrypt/files/VeraCrypt%201.26.24/veracrypt-1.26.24-sha512sum.txt/download</link><description/><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">VeraCrypt</dc:creator><pubDate>Sun, 26 Apr 2026 03:21:13 -0000</pubDate><guid>https://sourceforge.net/projects/veracrypt/files/VeraCrypt 1.26.24/veracrypt-1.26.24-sha512sum.txt/download</guid></item><item><title>VeraCrypt updated /VeraCrypt 1.26.24/veracrypt-1.26.24-sha256sum.txt.sig</title><link>https://sourceforge.net/projects/veracrypt/files/VeraCrypt%201.26.24/veracrypt-1.26.24-sha256sum.txt.sig/download</link><description/><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">VeraCrypt</dc:creator><pubDate>Sun, 26 Apr 2026 03:21:13 -0000</pubDate><guid>https://sourceforge.net/projects/veracrypt/files/VeraCrypt 1.26.24/veracrypt-1.26.24-sha256sum.txt.sig/download</guid></item><item><title>Mounir IDRASSI posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/3866b9cc1e/?limit=25#1faa</link><description>Thank you for the report. I have just built Ubuntu 26.04 packages for version 1.26.24 and they are now available on the download page and also here on Sourceforge</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sun, 26 Apr 2026 03:20:38 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/3866b9cc1e/?limit=25#1faa</guid></item><item><title>VeraCrypt released /VeraCrypt 1.26.24/Linux/veracrypt-1.26.24-Ubuntu-26.04-amd64.deb</title><link>https://sourceforge.net/projects/veracrypt/files/VeraCrypt%201.26.24/Linux/veracrypt-1.26.24-Ubuntu-26.04-amd64.deb/download</link><description/><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">VeraCrypt</dc:creator><pubDate>Sun, 26 Apr 2026 03:20:16 -0000</pubDate><guid>https://sourceforge.net/projects/veracrypt/files/VeraCrypt 1.26.24/Linux/veracrypt-1.26.24-Ubuntu-26.04-amd64.deb/download</guid></item><item><title>VeraCrypt released /VeraCrypt 1.26.24/Linux/veracrypt-console-1.26.24-Ubuntu-26.04-amd64.deb</title><link>https://sourceforge.net/projects/veracrypt/files/VeraCrypt%201.26.24/Linux/veracrypt-console-1.26.24-Ubuntu-26.04-amd64.deb/download</link><description/><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">VeraCrypt</dc:creator><pubDate>Sun, 26 Apr 2026 03:20:16 -0000</pubDate><guid>https://sourceforge.net/projects/veracrypt/files/VeraCrypt 1.26.24/Linux/veracrypt-console-1.26.24-Ubuntu-26.04-amd64.deb/download</guid></item><item><title>VeraCrypt released /VeraCrypt 1.26.24/Linux/veracrypt-console-1.26.24-Ubuntu-26.04-amd64.deb.sig</title><link>https://sourceforge.net/projects/veracrypt/files/VeraCrypt%201.26.24/Linux/veracrypt-console-1.26.24-Ubuntu-26.04-amd64.deb.sig/download</link><description/><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">VeraCrypt</dc:creator><pubDate>Sun, 26 Apr 2026 03:20:16 -0000</pubDate><guid>https://sourceforge.net/projects/veracrypt/files/VeraCrypt 1.26.24/Linux/veracrypt-console-1.26.24-Ubuntu-26.04-amd64.deb.sig/download</guid></item><item><title>VeraCrypt released /VeraCrypt 1.26.24/Linux/veracrypt-1.26.24-Ubuntu-26.04-amd64.deb.sig</title><link>https://sourceforge.net/projects/veracrypt/files/VeraCrypt%201.26.24/Linux/veracrypt-1.26.24-Ubuntu-26.04-amd64.deb.sig/download</link><description/><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">VeraCrypt</dc:creator><pubDate>Sun, 26 Apr 2026 03:20:16 -0000</pubDate><guid>https://sourceforge.net/projects/veracrypt/files/VeraCrypt 1.26.24/Linux/veracrypt-1.26.24-Ubuntu-26.04-amd64.deb.sig/download</guid></item><item><title>Jack Omen posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/3866b9cc1e/?limit=25#5773</link><description>Hi, I noticed last Ubuntu package is 25.04, though Ubuntu 26.04 is out now. Could you please make the package for the latest release available in the download section? Many thanks</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jack Omen</dc:creator><pubDate>Sat, 25 Apr 2026 17:07:16 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/3866b9cc1e/?limit=25#5773</guid></item><item><title>Mounir IDRASSI posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#4ee3</link><description>Since pressing ESC at the VeraCrypt password prompt starts Windows, your system partition is not encrypted anymore. The remaining issue is that your firmware is still starting a VeraCrypt EFI loader. Deleting a boot option in UEFI setup only removes a firmware/NVRAM entry. It does not necessarily restore the EFI boot files on the EFI System Partition. During UEFI system encryption, VeraCrypt also works with the Windows Boot Manager path and keeps a backup of the original Windows loader. Please do...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 14:59:12 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#4ee3</guid></item><item><title>Mounir IDRASSI posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e31656dc7c/?limit=25#caa0</link><description>The best tools for identifying the process that has open handle on mounted volume are Microsoft Sysinternals Process Explorer or Handle. Run them as Administrator. In Process Explorer, use Find &gt; Find Handle or DLL and search for the mounted drive letter, for example X:. If nothing appears, also search for the VeraCrypt virtual device name \Device\VeraCryptVolumeX where X is the drive letter. From an elevated command prompt you can also use: handle64.exe -u X:\ handle64.exe -a -u \Device\VeraCryptVolumeX...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 07:08:12 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e31656dc7c/?limit=25#caa0</guid></item><item><title>Mounir IDRASSI posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/46c4277bee/?limit=25#bdd3</link><description>There was no behavior change in VeraCrypt 1.26.24 related to this. The option "VeraCrypt Background Task -&gt; Exit when there are no mounted volumes" applies only to the background task, i.e. after the main VeraCrypt window has been closed/hidden to the tray. If the main VeraCrypt window is left open, auto-unmount will unmount the volume, but it will not automatically close the visible GUI. What you are describing is a new feature: making the whole VeraCrypt process exit after auto-unmount if no volumes...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 06:35:30 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/46c4277bee/?limit=25#bdd3</guid></item><item><title>Mounir IDRASSI committed [f0f238] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/f0f238dd25df516024b4d861d13b24424bebb32b/</link><description>Update Language.de.xml (#1692)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 01:39:19 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/f0f238dd25df516024b4d861d13b24424bebb32b/</guid></item><item><title>Mounir IDRASSI committed [1b9058] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/1b9058d7525bd29523c76fcec195649b8152f450/</link><description>Update Dutch translations (#1691)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 01:39:19 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/1b9058d7525bd29523c76fcec195649b8152f450/</guid></item><item><title>Mounir IDRASSI committed [f30efa] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/f30efa1f96c5a47b38a4ccf8b6c48d1b09a6ea3d/</link><description>Update Swedish translation (#1688)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 01:39:19 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/f30efa1f96c5a47b38a4ccf8b6c48d1b09a6ea3d/</guid></item><item><title>Mounir IDRASSI committed [9e387f] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/9e387f6e64b8c148a86ff4c9ee5c2115656b80fc/</link><description>Fix undefined behavior in StartElevated stderr read loop (#1550) (#1687)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 01:39:19 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/9e387f6e64b8c148a86ff4c9ee5c2115656b80fc/</guid></item><item><title>Mounir IDRASSI committed [6b802a] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/6b802afa53354d8bafacbeb980c3ee6979ca1186/</link><description>macOS: harden FUSE-T SMB metadata handling</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 01:39:18 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/6b802afa53354d8bafacbeb980c3ee6979ca1186/</guid></item><item><title>Mounir IDRASSI committed [0b554f] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/0b554fa37859a03869eab29e1d650b8ff941447b/</link><description>macOS: stabilize FUSE-T SMB mount metadata</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 01:39:18 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/0b554fa37859a03869eab29e1d650b8ff941447b/</guid></item><item><title>Mounir IDRASSI committed [380f49] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/380f499a257ccc6282f4b80ed42411cfc655974e/</link><description>macOS: stabilize FUSE-T SMB auxiliary mounts</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 01:39:18 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/380f499a257ccc6282f4b80ed42411cfc655974e/</guid></item><item><title>Mounir IDRASSI committed [114788] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/11478869618ebbfb7fe64e4f58c14fa02c3ea689/</link><description>Windows: honor EFI boot menu options in PostOOBE repair</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 01:39:18 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/11478869618ebbfb7fe64e4f58c14fa02c3ea689/</guid></item><item><title>Mounir IDRASSI committed [b58cee] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/b58ceed0f69727f956cd0d473ebd886417f61b51/</link><description>Update Polish translation (#1685)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 01:39:18 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/b58ceed0f69727f956cd0d473ebd886417f61b51/</guid></item><item><title>Mounir IDRASSI posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/9662639c30/?limit=25#61d0</link><description>This did not reach the GPT generation stage. The key line is: Encrypted already The preceding "Success" only means the H_OS password/header was accepted. It doesn't mean that -oshideprepcompleted. In this state the system header already has a non-zero EncryptedAreaLength, so DCS stops before asking for gpt_enc / gpt_hidden. For EFI hidden OS, -oshideprep must be run after the system-encryption header/test stage exists, but before H_OS in-place encryption has actually completed. Running it after H_OS...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 01:06:41 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/9662639c30/?limit=25#61d0</guid></item><item><title>George posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#df55</link><description>Several years ago I've encrypted my system partition with VeraCrypt 1.24-Update7. On 09.04.2026 I've updated to VeraCrypt to 1.26.24. Why or why? I'm still running Windows 10. Since then after mounting encrypted devices I sometimes got errors and VeraCrypt exited. Also, I've noticed that VeraCrypt lost icon in Windows start menu. And I couldn't launch VeraCrypt from start menu. Also, today I faced very strange behavior from my notebook: it started to work really slow. I've checked Task Manager. There...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">George</dc:creator><pubDate>Fri, 24 Apr 2026 21:33:33 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e88c24fc01/?limit=25#df55</guid></item><item><title>Tim posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e31656dc7c/?limit=25#8e08</link><description>I have an external drive using full drive encryption. When I try to unmount that drive I get the message: "Some volumes contain files or folders being used by application or system. Force unmount?" My question is what would be the best tool to figure out exactly what file or folder is causing this message? The message offers no further info. All files and folders open correctly and I have no issues with the drive functioning. There have been no other issues with this drive other than the force unmount...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tim</dc:creator><pubDate>Fri, 24 Apr 2026 20:47:09 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/e31656dc7c/?limit=25#8e08</guid></item><item><title>Jeff Stanat posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/46c4277bee/?limit=25#2452</link><description>The VeraCrypt 1.26.24 GUI no longer closes after auto-unmount. This results in the GUI being constantly open and visible which displays the name and location of the last file holding the volume container. Seems like this reduces the security and privacy of VeraCrypt. I seem to recall previous versions of VeraCrypt would automatically close the GUI. Any thoughts as to how to address this are appreciated. fwiw I have the following preferences checked: VeraCrypt background task ENABLED VeraCrypt background...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jeff Stanat</dc:creator><pubDate>Fri, 24 Apr 2026 20:02:32 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/46c4277bee/?limit=25#2452</guid></item><item><title>Sara posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/9662639c30/?limit=25#ec79</link><description>Hello, I am trying to build a hidden OS on a Windows 11 Home x64 machine using the EFI/GPT manual DCS method on VeraCrypt 1.26, and I seem to be stuck in an ambiguous state after -oshideprep. I am posting here because I do not want to continue writing to disk blindly, and I also do not want to restore yet if there is still a way forward. Environment VeraCrypt version: 1.26 CPU architecture: x86-64 Boot mode: UEFI/GPT Secure Boot: normally enabled, temporarily disabled only to boot a custom UEFI shell...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sara</dc:creator><pubDate>Fri, 24 Apr 2026 03:35:43 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/9662639c30/?limit=25#ec79</guid></item><item><title>Sailor posted a comment on discussion Feature requests</title><link>https://sourceforge.net/p/veracrypt/discussion/features/thread/8efaa4d11b/?limit=25#ab47</link><description>Hi there For christmas I have a litle whish: Could you integrate an option where veracrypt moves to tray icon after it successfully mounted the container? Thanks a lot! Best regards Sailor</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sailor</dc:creator><pubDate>Thu, 23 Apr 2026 11:35:19 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/features/thread/8efaa4d11b/?limit=25#ab47</guid></item><item><title>Bert Cuzeau posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/8465742c91/?limit=25#f0fa</link><description>Miracle ! I guess the latest win 11 update solved it ! (:fingers-crossed:) I don't have to restart Explorer any more : all the files from the encrypted drive have a normal ("not unsafe") status, pdfs are previewed etc ... Hopinge next update won't regress.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bert Cuzeau</dc:creator><pubDate>Thu, 23 Apr 2026 06:11:30 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/8465742c91/?limit=25#f0fa</guid></item><item><title>Thomas Navara posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#a968/755e</link><description>Are you able to share the reason so many accounts were disabled without appeal?</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Thomas Navara</dc:creator><pubDate>Thu, 23 Apr 2026 00:10:29 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#a968/755e</guid></item><item><title>Shane Taylor posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/857a854a34/?limit=25#1e77</link><description>I have a question I'm hoping someone can answer for me. I have a primary workstation at home that I access remotely while away from home. I have refrained from encrypting my system drive since I cannot enter the password when I am away to complete the Windows startup in the case of a power failure, or manual remote restart. My workstation has a second physical Ethernet port, which is designed for network/remote support use, but I'm not sure if it could be set up to access the machine in such a way...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Shane Taylor</dc:creator><pubDate>Wed, 22 Apr 2026 19:47:46 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/857a854a34/?limit=25#1e77</guid></item><item><title>Fully Named posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/63e8a75548/?limit=25#dbb3/d1bd</link><description>Thank you for this detailed explanation! You saved me a lot of confusion.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Fully Named</dc:creator><pubDate>Wed, 22 Apr 2026 09:03:59 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/63e8a75548/?limit=25#dbb3/d1bd</guid></item><item><title>Mounir IDRASSI posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/63e8a75548/?limit=25#dbb3</link><description>This is caused by the new Windows screen protection feature introduced in VeraCrypt 1.26.24. It is enabled by default and prevents VeraCrypt windows from being captured by screenshots or screen-recording tools. Some remote desktop tools, including RustDesk depending on capture mode, rely on the same Windows capture APIs, so the VeraCrypt GUI may appear invisible remotely. You can disable it if you need remote access: GUI: open VeraCrypt locally, go to Settings -&gt; Performance/Driver Configuration,...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Wed, 22 Apr 2026 08:31:38 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/63e8a75548/?limit=25#dbb3</guid></item><item><title>Fully Named posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/63e8a75548/?limit=25#d596</link><description>I upgraded to the latest VeraCrypt release, and have encountered an issue when using RustDesk. I regularly access the Windows 10 machine in question remotely, so this is a big issue for me. The GUI doesn't show up on the remote desktop viewer at all. What changed with VeraCrypt from the last release to the latest, and is there a way to fix this? Thank you for any info.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Fully Named</dc:creator><pubDate>Wed, 22 Apr 2026 07:56:35 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/63e8a75548/?limit=25#d596</guid></item><item><title>RichardH posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#80dd</link><description>Indeed. And the design better allow registering more than 1 key (so one more XOR is needed to compensate for key differences) otherwise you'll loose access to the disk if the security key is lost/damaged/whatever.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">RichardH</dc:creator><pubDate>Tue, 21 Apr 2026 12:57:03 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#80dd</guid></item><item><title>Mounir IDRASSI posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#f20b</link><description>@huvisoft This is a good direction. FIDO2 hmac-secret is much more suitable than OTP/TOTP because it produces a deterministic secret from a hardware key, so it can participate in key derivation. As you noted, the main difficulty is metadata storage and its incompatibility with VeraCrypt's plausible deniability. Because of this, I think FIDO2 can only be realistically used as a second factor together with the main password, not as a standalone unlock method. One possible design would be: The user...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Tue, 21 Apr 2026 12:48:53 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#f20b</guid></item><item><title>RichardH posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#b620</link><description>Building on those ideas, it might be worth considering support for FIDO2 security keys via the hmac-secret extension. A few concrete benefits: Works with any FIDO2 key (YubiKey, SoloKey, Nitrokey, etc.), not tied to proprietary APIs like YubiKey challenge-response The credential/secret remains entirely inside the security key; VeraCrypt only receives a derived value Strong phishing resistance and origin binding: FIDO2 credentials are scoped and protected by the authenticator The protocol is relatively...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">RichardH</dc:creator><pubDate>Tue, 21 Apr 2026 09:52:57 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#b620</guid></item><item><title>Mounir IDRASSI posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#c42e</link><description>@daemotrix This is an interesting idea. Unfortunately, OTP codes don't map well to VeraCrypt design. VeraCrypt unlocks a volume by deriving the same header key from the password, keyfiles, PIM and salt. Therefore the inputs used for key derivation must be reproducible. A TOTP/HOTP code changes, while the volume header is static. If the OTP value were used directly as the PIM or as part of the key derivation, the header would only decrypt with that exact value and future OTP values would fail. There...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Tue, 21 Apr 2026 09:15:38 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#c42e</guid></item><item><title>Mounir IDRASSI posted a comment on discussion Feature requests</title><link>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#4fda</link><description>Thank you for the suggestions. The proposed boot screen would be great. The current bootloader already has some building blocks for graphics mode, but achieving such a result would require significant work, especially around testing on different types of machines. It is definitely on the TODO list. For the specific font size request, I will explore how to support this in the bootloader without reworking the graphical interface. I think it should be possible without too much effort. I will let you...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Tue, 21 Apr 2026 08:53:18 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#4fda</guid></item><item><title>Das Xardas posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#a235</link><description>@idrassi I have one more idea but take it please only as hypotetical option. Will be possible to use OTP generators (doesn't matter if RSA tokens, google Auth, etc...) as source of PIM? For example when drive will be encrypted I type my password and as PIM source I use authenticator, so some QR will be displayed. That means Passwd will be the same but PIM is changing, that can improve security. But I'm not sure if that can be implement or if something like that can work especially in pre-boot en...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Das Xardas</dc:creator><pubDate>Tue, 21 Apr 2026 08:37:53 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#a235</guid></item><item><title>Mounir IDRASSI posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#8f37</link><description>@daemotrix Regarding YubiKey, smart cards and fingerprint readers: VeraCrypt already supports PKCS#11 security tokens and smart cards as keyfiles for non-system volumes. VeraCrypt also support EMV credit/debit cards natively as source for keyfile without the need of PKCS#11. However, security tokens and smart cards are not currently supported for pre-boot authentication of system encryption. Some Yubikeys don't support storing keyfiles used by VeraCrypt. In such case, the only solution is to support...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Tue, 21 Apr 2026 08:18:47 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#8f37</guid></item><item><title>风之暇想 posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#fe05/5c24</link><description>@idrassi Perhaps we could add a layer of quantum computing to this algorithm? https://github.com/idrassi/Charybdis</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">风之暇想</dc:creator><pubDate>Tue, 21 Apr 2026 07:13:16 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#fe05/5c24</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . Issues with Custom PIM Whenever the new KDF is different from the current KDF, the current KDF's custom PIM value is used in the new KDF's custom PIM value instead of new KDF's using its default PIM to prevent accidental large or small custom PIM values being used for the new KDF. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:36:47 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . Issues with Custom PIM Whenever the new KDF is different from the current KDF, the current KDF's custom PIM value is used in the new KDF's custom PIM value instead of new KDF's using its default PIM to prevent accidental large or small custom PIM values being used for the new KDF. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:33:53 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . Issues with Custom PIM Whenever the new KDF is different from the current KDF, the current KDF's custom PIM value is used in the new KDF's custom PIM value instead of new KDF's using its default PIM to prevent accidental large or small custom PIM values being used for the new KDF. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:31:49 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . Issues with Custom PIM Whenever the new KDF is different from the current KDF, the current KDF's custom PIM value is used in the new KDF's custom PIM value instead of new KDF's using its default PIM to prevent accidental large or small custom PIM values being used for the new KDF. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:30:55 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . Issues with Custom PIM Whenever the new KDF is different from the current KDF, the current KDF's custom PIM value is used in the new KDF's custom PIM value instead of new KDF's using its default PIM to prevent accidental large or small custom PIM values being used for the new KDF. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:28:59 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . Issues with Custom PIM Whenever the new KDF is different from the current KDF, the current KDF's custom PIM value is used in the new KDF's custom PIM value instead of new KDF's using its default PIM to prevent accidental large or small custom PIM values being used for the new KDF. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:25:03 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . Issues with Custom PIM Whenever the new KDF is different from the current KDF, the current KDF's custom PIM value is used in the new KDF's custom PIM value instead of new KDF's using the default PIM to prevent accidental large or small custom PIM values being used against the new KDF. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:16:55 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . Issues with Custom PIM Whenever the new KDF is different from the current KDF, the current KDF's PIM value is used in the new KDF's PIM value instead of new KDF's default PIM to prevent accidental large or small PIM values being used against the new KDF PIM value. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and change it to Argon2...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:14:59 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . Issues with Custom PIM Whenever the new KDF is different from the current KDF, the current KDF's PIM value is used in the new KDF's PIM value to prevent accidental large or small PIM values being used against the new KDF PIM value. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and change it to Argon2 automatically uses PIM 490 for...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:13:55 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . VeraCrypt should reset the PIM to default value when a change to the KDF is made to prevent accidental large or small PIM values being used against the new KDF PIM value. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and change it to Argon2 automatically uses PIM 490 for Argon2. Users may not know PIM value of 490 using Argon2 is...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:06:44 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm . VeraCrypt should reset the PIM to default value when a change to the KDF is made to prevent accidental large or small PIM values being used against the new KDF PIM value. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and change it to Argon2 automatically uses PIM 490 for Argon2. Users may not know PIM value of 490 using Argon2 is...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:03:02 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>@idrassi Issues with custom PIM values when changing KDF in: Tools &gt; Password Change or Keyfiles Tools &gt; Set Header Key Derivation Algorithm VeraCrypt should reset the PIM to default value when a change to the KDF is made to prevent accidental large or small PIM values being used against the new KDF PIM value. Using a test file container set to KDF =&gt; Whirlpool using custom PIM 490 and change it to Argon2 automatically uses PIM 490 for Argon2. Users may not know PIM value of 490 using Argon2 is extremely...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:02:36 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</guid></item><item><title>Enigma2Illusion posted a comment on discussion Feature requests</title><link>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#6dae/7e8f/7df2</link><description>No problem. :)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Mon, 20 Apr 2026 18:04:48 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#6dae/7e8f/7df2</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</link><description>Regarding Argon2id: 1.26.27 Currently in the 1.26.27 Beta and the near future 1.26.27 production release, you can use Argon2id on: Windows OS 10/11 for non-system encryption drives/devices and file containers. NEW: Not in the current 1.26.27 Beta version, Argon2id support for Linux non-system drives/partitions and file containers. . EDIT: From the Source Code modifications that I viewed on 2026 0420, it appears Mounir is adding Argon2id to Linux &amp; MacOS to the 1.26.27 version. 1.26.28 Windows Only...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Mon, 20 Apr 2026 17:26:06 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</link><description>Regarding Argon2id: 1.26.27 Currently in the 1.26.27 Beta and the near future 1.26.27 production release, you can use Argon2id on: Windows OS 10/11 for non-system encryption drives/devices and file containers. NEW: Not in the current 1.26.27Beta version. Argon2id support for Linux non-system drives/partitions and file containers. . EDIT: From the Source Code modifications that I viewed on 2026 0420, it appears Mounir is adding Argon2id to Linux &amp; MacOS to the 1.26.27 version. 1.26.28 Windows Only...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Mon, 20 Apr 2026 17:25:35 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</guid></item><item><title>Das Xardas posted a comment on discussion Feature requests</title><link>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#6dae/7e8f</link><description>Oh, many thanks. My misunderstood.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Das Xardas</dc:creator><pubDate>Mon, 20 Apr 2026 17:25:25 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#6dae/7e8f</guid></item><item><title>Enigma2Illusion posted a comment on discussion Feature requests</title><link>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#6dae</link><description>@daemotrix I modified your post to clarify my request for custom font sizing when using Secure Desktop. Thank you for creating this feature request.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Mon, 20 Apr 2026 17:23:50 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#6dae</guid></item><item><title>Enigma2Illusion modified a comment on discussion Feature requests</title><link>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#5dd2</link><description>I'd like to ask if is possible to add an option for the font size change, because on hiDPi displays it is really small, or if it could be customizable for example to look like a bitlocker screen. Something like on the attached picture. MOD EDIT: Also Enigma2Illusion had a good idea to implement Windows Secure Desktop custom font size to help read the VeraCrypt screens.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Mon, 20 Apr 2026 17:22:12 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#5dd2</guid></item><item><title>Das Xardas modified a comment on discussion Feature requests</title><link>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#5dd2</link><description>I'd like to ask if is possible to add an option for the font size change, because on hiDPi displays it is really small, or if it could be customizable for example to look like a bitlocker screen. Something like on the attached picture. Also Enigma2Illusion had a good idea to implement Windows Secure Desktop to prevent read passwords by Recall etc...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Das Xardas</dc:creator><pubDate>Mon, 20 Apr 2026 16:17:14 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#5dd2</guid></item><item><title>Das Xardas posted a comment on discussion Feature requests</title><link>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#5dd2</link><description>I'd like to ask if is possible to add an option for the font size change, because on hiDPi displays it is really small, or if it could be customizable for example to look like a bitlocker screen. Something like on the attached picture</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Das Xardas</dc:creator><pubDate>Mon, 20 Apr 2026 16:14:06 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/features/thread/884327c23d/?limit=25#5dd2</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</link><description>Regarding Argon2id: 1.26.27 Currently in the 1.26.27 Beta and the near future 1.26.27 production release, you can use Argon2id on: Windows OS 10/11 for non-system encryption drives/devices and file containers. Argon2id support for Linux non-system drives/partitions and file containers. . EDIT: From the Source Code modifications that I viewed on 2026 0420, it appears Mounir is adding Argon2id to Linux &amp; MacOS to the 1.26.27 version. 1.26.28 Windows Only Update Windows UEFI systems with Secure Boot...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Mon, 20 Apr 2026 15:35:21 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</link><description>Regarding Argon2id: 1.26.27 Currently in the 1.26.27 Beta and the near future 1.26.27 production release, you can use Argon2id only on Windows OS 10/11 for non-system encryption drives/devices and file containers. Argon2id support for Linux non-system drives/partitions and file containers. . EDIT: From the Source Code modifications that I viewed on 2026 0420, it appears Mounir is adding Argon2id to Linux &amp; MacOS to 1.26.27 version. 1.26.28 Windows Only Update Windows UEFI systems with Secure Boot...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Mon, 20 Apr 2026 15:33:42 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</guid></item><item><title>Mounir IDRASSI committed [ac08ec] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/ac08ecaf70022c9994067fac0b56351c31609753/</link><description>Windows: handle Argon2 derivation failures</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Mon, 20 Apr 2026 14:43:40 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/ac08ecaf70022c9994067fac0b56351c31609753/</guid></item><item><title>Mounir IDRASSI committed [1cdf36] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/1cdf3653bcba73675f31ce4832eaf361f55c3cb0/</link><description>Linux/macOS: Implement missing Argon2 KDF support on Unix</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Mon, 20 Apr 2026 14:43:40 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/1cdf3653bcba73675f31ce4832eaf361f55c3cb0/</guid></item><item><title>Mounir IDRASSI committed [3e9dc6] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/3e9dc6273eeba1c04c05811a275bfb8c328360e3/</link><description>Windows: Validate PIM on KDF-only password changes</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Mon, 20 Apr 2026 14:43:40 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/3e9dc6273eeba1c04c05811a275bfb8c328360e3/</guid></item><item><title>Mounir IDRASSI committed [9c90f1] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/9c90f12e2e82d150d31fcb67b30c9ebfd9756553/</link><description>Windows: fix favorite volume mount race</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Mon, 20 Apr 2026 14:43:40 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/9c90f12e2e82d150d31fcb67b30c9ebfd9756553/</guid></item><item><title>Mounir IDRASSI committed [20bb01] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/20bb01dcbb4d9ddaea3a5a9901873939d0cadcd0/</link><description>Windows bootloader: Add EFI DCS guard for Argon2 support</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Mon, 20 Apr 2026 14:43:40 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/20bb01dcbb4d9ddaea3a5a9901873939d0cadcd0/</guid></item><item><title>Mounir IDRASSI committed [28912f] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/28912f439de540ed53ce65cbfef775345d5f11c3/</link><description>Added line break between AM Crypto and IDRIX (#1679)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Mon, 20 Apr 2026 14:43:40 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/28912f439de540ed53ce65cbfef775345d5f11c3/</guid></item><item><title>Mounir IDRASSI committed [0e12ed] on Source Code</title><link>https://sourceforge.net/p/veracrypt/code/ci/0e12edab5485c38efe312519b49c79c5787dd290/</link><description>Windows: Fix elevated COM format drive validation and device path normalization (#1670)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Mon, 20 Apr 2026 14:43:40 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/code/ci/0e12edab5485c38efe312519b49c79c5787dd290/</guid></item><item><title>Marcos Morar posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be/598c</link><description>Thanks for explaining this!</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marcos Morar</dc:creator><pubDate>Mon, 20 Apr 2026 11:11:39 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be/598c</guid></item><item><title>Enigma2Illusion posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</link><description>Regarding Argon2id: 1.26.27 Currently in the 1.26.27 Beta and the near future 1.26.27 production release, you can use Argon2id only on Windows OS 10/11 for non-system encryption drives/devices and file containers. 1.26.28 Windows Only Update Windows UEFI systems with Secure Boot enabled updated to add the newer Microsoft UEFI CA 2023. Windows users with system encryption must create a new VeraCrypt Rescue Disk after updating to 1.26.28 or later version. Detailed technical explanation on GitHub here:...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sun, 19 Apr 2026 23:32:39 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</guid></item><item><title>Marcos Morar posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d</link><description>Oh, my bad! I got confused between 1.26.27 and 1.27. So, version 1.26.28 will add Argon2id support for containers and non-system drives, but only on Windows. If I understand correctly, it will also include Argon2id support for non-UEFI system drives. However, Argon2id support for UEFI system drives and for Linux will only be available in version 1.27. Is that right?</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marcos Morar</dc:creator><pubDate>Sun, 19 Apr 2026 22:04:09 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#0199/3d9d</link><description>I think you are confusing the 1.26.27 Beta with the future release of 1.27.x version which will be released after the 1.26.28 version. VeraCrypt 1.26.27 release: https://sourceforge.net/p/veracrypt/discussion/general/thread/bbfb10089a/#350a VeraCrypt 1.26.28 release: https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?page=1&amp;limit=25#e4ed/9e8d I have decided to prepare a VeraCrypt 1.26.28 maintenance release whose purpose will be to provide newly Microsoft-signed EFI bootloader...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sun, 19 Apr 2026 20:42:51 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#0199/3d9d</guid></item><item><title>Enigma2Illusion posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#0199/3d9d</link><description>I think you are confusing the 1.26.27 with the future release of 1.27.x version which will be released after the 1.26.28 version. VeraCrypt 1.26.27 release: https://sourceforge.net/p/veracrypt/discussion/general/thread/bbfb10089a/#350a VeraCrypt 1.26.28 release: https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?page=1&amp;limit=25#e4ed/9e8d I have decided to prepare a VeraCrypt 1.26.28 maintenance release whose purpose will be to provide newly Microsoft-signed EFI bootloader components...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sun, 19 Apr 2026 20:42:08 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#0199/3d9d</guid></item><item><title>Marcos Morar posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#0199</link><description>Does releasing the 1.26.28 emergency release mean that the stable 1.27 version might be released after June 27, 2026? It's been in beta for a long time, is the stable version really that far away?"</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marcos Morar</dc:creator><pubDate>Sun, 19 Apr 2026 19:20:55 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#0199</guid></item><item><title>Enigma2Illusion modified a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#fe05</link><description>Here are a couple of good posts regarding post-quantum cryptography and VeraCrypt for your perusal. https://sourceforge.net/p/veracrypt/discussion/general/thread/4a6aef09ee/#7f6b https://sourceforge.net/p/veracrypt/discussion/features/thread/e490cce0ab/?limit=25#5456 I would create a new topic in the Feature requests to make it easier for the developer to track/reject requests regarding the font size issue. Title suggestion: Custom Font Size Also your idea can be expanded for Windows Secure Desktop...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sun, 19 Apr 2026 18:01:06 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#fe05</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/46a8</link><description>Please excuse my ignorance, but does the new signed bootloader and all that mean that 1.27 will be a required update? . Required Recommended update per the developer's response below for those users that are using VeraCrypt system encryption. https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/#3470/56c8/81e5 What happens if someone with all their system drives encrypted doesn't update to 1.27 before the old bootloader expires? . I don't know. @idrassi will have to provide answer....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sun, 19 Apr 2026 17:59:34 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/46a8</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/46a8</link><description>Please excuse my ignorance, but does the new signed bootloader and all that mean that 1.27 will be a required update? . Required Recommended update per the developer's response below for those users that are using VeraCrypt system encryption. https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/#3470/56c8/81e5 What happens if someone with all their system drives encrypted doesn't update to 1.27 before the old bootloader expires? . I don't know. @idrassi will have to provide answer....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sun, 19 Apr 2026 17:56:24 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/46a8</guid></item><item><title>Das Xardas posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#fe05/4cc0</link><description>Okay, many thanks. :)</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Das Xardas</dc:creator><pubDate>Sun, 19 Apr 2026 16:59:49 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#fe05/4cc0</guid></item><item><title>Enigma2Illusion posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#fe05</link><description>Here are a couple of good posts regarding post-quantum cryptography and VeraCrypt for your perusal. https://sourceforge.net/p/veracrypt/discussion/general/thread/4a6aef09ee/#7f6b https://sourceforge.net/p/veracrypt/discussion/features/thread/e490cce0ab/?limit=25#5456 I would create a new topic in the Feature requests to make it easier for the developer to track/reject requests regarding the font size issue. Title suggestions: Custom Font Size Also your idea can be expanded for Windows Secure Desktop...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sun, 19 Apr 2026 16:44:34 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#fe05</guid></item><item><title>Enigma2Illusion modified a comment on discussion Feature requests</title><link>https://sourceforge.net/p/veracrypt/discussion/features/thread/9321e621fc/?limit=25#fac1</link><description>Can anyone in the user community determine how VeraCrypt source code and executable binaries could be scanned by the AI Anthropic Mythos and have the security issues reported to the developer of VeraCrypt Mounir Idrassi? Currently the Anthropic Mythos access is limited to approximately 40 companies to find security vulnerabilities. From Google search: https://fortune.com/2026/04/07/anthropic-claude-mythos-model-project-glasswing-cybersecurity/ The initiative, called Project Glasswing, allows companies,...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sun, 19 Apr 2026 16:00:14 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/features/thread/9321e621fc/?limit=25#fac1</guid></item><item><title>Enigma2Illusion posted a comment on discussion Feature requests</title><link>https://sourceforge.net/p/veracrypt/discussion/features/thread/9321e621fc/?limit=25#fac1</link><description>Can anyone in the user community determine how VeraCrypt source code could be scanned by the AI Anthropic Mythos and have the security issues reported to the developer of VeraCrypt Mounir Idrassi? Currently the Anthropic Mythos access is limited to approximately 40 companies to find security vulnerabilities. From Google search: https://fortune.com/2026/04/07/anthropic-claude-mythos-model-project-glasswing-cybersecurity/ The initiative, called Project Glasswing, allows companies, including Amazon...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sun, 19 Apr 2026 15:42:40 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/features/thread/9321e621fc/?limit=25#fac1</guid></item><item><title>Marconius posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/9e8d/44bc</link><description>Great, thanks for the explanation!</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marconius</dc:creator><pubDate>Sun, 19 Apr 2026 15:39:20 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/9e8d/44bc</guid></item><item><title>Mounir IDRASSI posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/9e8d</link><description>@marconius: No, VeraCrypt 1.27 will not be required specifically because of this Secure Boot certificate transition. I posted a detailed technical explanation on GitHub here: https://github.com/veracrypt/VeraCrypt/issues/1655#issuecomment-4276186649 The short version is that, after investigating Microsoft's guidance and how other Secure Boot projects are handling this, I have decided to prepare a VeraCrypt 1.26.28 maintenance release whose purpose will be to provide newly Microsoft-signed EFI bootloader...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sun, 19 Apr 2026 15:20:14 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/9e8d</guid></item><item><title>Das Xardas modified a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#0d0b</link><description>Hello, I'd like to ask if there will be added some post-quantum cryptography algorythms. Also I'd like to ask about yubikey, or other security keys or smartcards support. For example fingerprint + password instead of PIM. And my last question is about the font size and and pre-boot screen if there is any option to edit that screen for larger font, because on hiDPi displays it is really small, or if it could be customizable for example to look like a bitlocker screen. Thank you very much. I'm really...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Das Xardas</dc:creator><pubDate>Sun, 19 Apr 2026 14:04:53 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#0d0b</guid></item><item><title>Das Xardas posted a comment on discussion Technical Topics</title><link>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#0d0b</link><description>Hello, I'd like to ask if there will be added some post-quantum cryptography algorythms. Also I'd like to ask about yubikey, or other security keys or smartcards support. For example fingerprint + password instead of PIM. And my last question is about the font size and and pre-boot screen if there is any option to edit that screen for larger font, because on hiDPi displays it is really small, or if it could be customizable for example to look like a bitlocker screen. Thank you very much. I'm really...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Das Xardas</dc:creator><pubDate>Sun, 19 Apr 2026 14:02:45 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/technical/thread/f1c63bf020/?limit=25#0d0b</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/0cc5a5acc6/?limit=25&amp;page=3#9fcf/5393</link><description>There is one often overlooked avenue for these notifications. Go to this page... https://sourceforge.net/projects/veracrypt/files/ ...and click on the blue button labeled "Get Updates." The minimum information required is your email address and any name you want to use. Naturally, that information will be sent straight to government 3-lettered agencies and you'll be put on any number of terrorist or dissident watch lists because of your suspicious use of encryption, but that's a small price to pay...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sat, 18 Apr 2026 23:22:59 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/0cc5a5acc6/?limit=25&amp;page=3#9fcf/5393</guid></item><item><title>Enigma2Illusion modified a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/46a8</link><description>Please excuse my ignorance, but does the new signed bootloader and all that mean that 1.27 will be a required update? . Required update for those users that are using VeraCrypt system encryption. https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/#3470/56c8/81e5 What happens if someone with all their system drives encrypted doesn't update to 1.27 before the old bootloader expires? . I don't know. @idrassi will have to provide answer. If the update is required, does VeraCrypt...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sat, 18 Apr 2026 22:57:34 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/46a8</guid></item><item><title>Enigma2Illusion posted a comment on discussion General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/46a8</link><description>Please excuse my ignorance, but does the new signed bootloader and all that mean that 1.27 will be a required update? . Required update for those users that are using VeraCrypt system encryption. https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/#3470/56c8/81e5 What happens if someone with all their system drives encrypted doesn't update to 1.27 before the old bootloader expires? . I don't know. @idrassi will have to provide answer. If the update is required, does VeraCrypt...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sat, 18 Apr 2026 22:57:07 -0000</pubDate><guid>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#e4ed/46a8</guid></item></channel></rss>