@iesushartz Yes, VeraCrypt is Free Software although there are some people who have some reserves about the TrueCrypt License that VeraCrypt inherited from TrueCrypt.
Like what we did when forking TrueCrypt, people a welcomed to fork VeraCrypt and make any change they want without any constraints, provided that modified source code is released and that references to VeraCrypt or IDRIX are removed.
#VeraCrypt 1.24-Update4 is out. It fixes regressions and brings some changes. Windows users are advised to update if they use RAM encryption to avoid issues when creating volumes or using Expander. Linux users who need to create hidden volumes should update to this version. List of changes at https://www.veracrypt.fr/en/Release%20Notes.html.
For future integrity checks, the checksums and PGP signature of the bundle file for this version are published at:
This video is also a #VeraCrypt container (password = test). You can read more on how to achieve this on the following forum post: https://sourceforge.net/p/veracrypt/discussion/general/thread/66496da807/#77d8
We are sharing an encrypted pastbin based on PrivateBin, with file upload and URL shortening (shortner on same server with no URL logging): https://bin.veracry.pt
We have been using it internally for some time and we hope it will be useful to others.
For Linux users of #VeraCrypt: a know issue exists in version 1.24 where on some distribution VeraCrypt would request the admin password for every mount or dismount. A workaround is to launch VeraCrypt form Terminal.
We are working on a fix for this.
FYI, this issue is caused by a change done in version 1.24 where we use the command "sudo -n uptime" to query if a sudo session is active instead of the method used in previous versions where VeraCrypt was authenticating with a dummy password.
@cypherpunk The current hash algorithms provide good security and before adding new algorithms we need to first implement a mechanism to dynamically set supported algorithms otherwise mounting with auto-detection will be extremely slow.
Concerning BLAKE2, we will certainly choose original BLAKE instead which was part of the SHA-3 selection process. Security is more important than speed and we prefer to stick with standardized algorithms that went through some sort of formal validation process.
Open source disk encryption based with strong security for the Paranoid
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!