Security Software

VeraCrypt 1.22 final is out

Holy moly, so many updates recently from VeraCrypt. Well, I like to see it positive and I like to remind you that this update is important, not only because it brings several new algorithm, it also fixes the bootloader problems in Windows.



You can see the versions history here. The changelog seems identically to the previous released 1.22 Beta 7 and 8. I’m not sure if you need to update your VeraCrypt in case you’re on 1.22 Beta 8 since it seems it only got re-labeled but to be on the safe side, just update.

The download is as always available over the official homepage.

  • All OSs:
    • SIMD speed optimization for Kuznyechik cipher implementation (up to 2x speedup).
    • Add 5 new cascades of cipher algorithms: Camellia-Kuznyechik, Camellia-Serpent, Kuznyechik-AES, Kuznyechik-Serpent-Camellia and Kuznyechik-Twofish.
  • Windows:
    • MBR Bootloader: Fix failure to boot hidden OS on some machines.
    • MBR Bootloader: Reduce CPU usage during password prompt.
    • Security enhancement: Add option to block TRIM command for system encryption on SSD drives.
    • Implement TRIM support for non-system SSD drives and add option to enable it (TRIM is disabled by default for non-system volumes).
    • Better fix for “Parameter Incorrect” issues during EFI system encryption in some machines.
    • Driver: remove unnecessary dependency to wcsstr which can cause issues on some machines.
    • Driver: Fix “Incorrect Parameter” error when mounting volumes on some machines.
    • Fix failure to mount system favorites during boot on some machines.
    • Fix current application losing focus when VeraCrypt is run in command line with /quit /silent switches.
    • Fix some cases of external applications freezing during mount/dismount.
    • Fix rare cases of secure desktop for password dialog not visible which caused UI to block.
    • Update libzip to version 1.5.0 that include fixes for some security issues.
    • Extend Secure Desktop feature to smart card PIN entry dialog.
    • Fix truncated license text in installer wizard.
    • Add portable package that allows extracting binaries without asking for admin privileges.
    • Simplify format of language XML files.
    • Workaround for cases where password dialog doesn’t get keyboard focus if Secure Desktop is not enabled.
  • Linux:
    • Fix failure to install GUI version under recent versions of KDE.
    • Fix wxWidgets assertion failed when backing up/restoring volume header.
  • MacOSX:
    • Fix issue preventing some local help files from opening in the browser.

More speed, more bugfixes everything is better!

The release brings several speed improvements and this is always a good thing, the version works well on all my Windows and Linux test machines and I could’t find any problem (so far?). The new algorithm can be chosen within the application and are optional, since the default settings are good enough for a daily usage. You can test them and report you findings back if you like and I will mention it.

The release is basically a bugfix release and fixes a lot of things reported over the official forums.

Closing Words

VeraCrypt is still the number one full disk or partition encryption utility and it deserves to be supported. It does a good job, the developer(s) and contributors putting a lot of effort in this program in order to provide alternatives for BitLocker & Co. Sadly a mobile version isn’t available which is a shame, since on e.g. Android only the integrated mechanism exist, I’m not sure about Apple but I think it’s the same situation.

Encryption (FDE or partially) is still important and helps in a lot of scenarios to reduce the attack surface drastically. I see such programs as essential and everyone should be aware of them. It takes some time to understand them but it’s well documented – and that’s what I like.

1 reply on “VeraCrypt 1.22 final is out”

I’m a little skeptical since veracrypt moved domain to .fr and DL links are from lauchpadlibrarian(.)net. Whatever that is…

That doesn’t mean anything but it’s known state actors targeted encryption tools before.


Comments are closed.