VeraCrypt 1.18a

Milestone information

Release registered:
No. Drivers cannot target bugs and blueprints to this milestone.  

Download RDF metadata


Assigned to you:
No blueprints or bugs assigned to you.
No users assigned to blueprints and bugs.
No blueprints are targeted to this milestone.
No bugs are targeted to this milestone.

Download files for this release

After you've downloaded a file, you can verify its authenticity using its MD5 sum or signature. (How do I verify a download?)

File Description Downloads
download icon veracrypt-1.18a-sha256sum.txt (md5) SHA256 sums for VeraCrypt 1.18a release files 45
last downloaded 6 weeks ago
download icon veracrypt-1.18a-sha512sum.txt (md5) SHA512 sums for VeraCrypt 1.18a release files 31
last downloaded 6 weeks ago
download icon VeraCrypt_1.18a_Bundle.7z (md5, sig) VeraCrypt 1.18a Bundle (All files and their signatures) 86
last downloaded 6 weeks ago
download icon VeraCrypt Setup 1.18a.exe (md5, sig) VeraCrypt Windows Setup 1.18a 111
last downloaded 24 hours ago
download icon veracrypt-1.18-setup.tar.bz2 (md5, sig) VeraCrypt Linux Setup 1.18 65
last downloaded 5 weeks ago
download icon VeraCrypt_1.18.dmg (md5, sig) VeraCrypt MacOSX Setup 1.18 38
last downloaded 6 weeks ago
download icon (md5, sig) VeraCrypt DCS EFI Bootloader 1.18 Source (LGPL) 36
last downloaded 7 weeks ago
download icon (md5, sig) VeraCrypt 1.18 Source (Windows Format) 32
last downloaded 5 weeks ago
download icon VeraCrypt_1.18_Source.tar.bz2 (md5, sig) VeraCrypt 1.18 Source (UNIX Format) 31
last downloaded 6 weeks ago
download icon VeraCrypt User Guide.pdf (md5, sig) VeraCrypt 1.18 user Guide 42
last downloaded 6 weeks ago
Total downloads: 517

Release notes 

VeraCrypt 1.18 brings EFI system encryption support for Windows and solves a critical TrueCrypt vulnerability that allows an attacker to detect the presence of a hidden volume.
Moreover, new encryption algorithms were added and several enhancements and fixes were done. You can find the details in the changelog.


View the full changelog

Changes between 1.17 and 1.18 (17 August 2016) :

  - All OSs:
    * Support Japanese encryption standard Camellia, including for Windows system encryption (MBR & EFI).
    * Support Russian encryption and hash standards Kuznyechik, Magma and Streebog, including for Windows EFI system encryption.
 - Windows:
    * Support of EFI system encryption (limitatations: no hidden os, no boot custom message)
    * Fix TrueCrypt vulnerability that enables detection of presence of hidden volumes (reported by Ivanov Aleksey Mikhailovich, alekc96 [at] mail dot ru)
    * Add benchmarking of hash algorithms and PRF with PIM (including for pre-boot).
    * Move build system to Visual C++ 2010 for better stability.
    * Fix boot issues on some machines by increasing required memory by 1 KiB
    * Workaround for AES-NI support under Hyper-V on Windows Server 2008 R2.
    * Enhanced protection against dll hijacking attacks.
    * Correctly remove driver file veracrypt.sys during uninstall on Windows 64-bit.
    * Implement passing smart card PIN as command line argument (/tokenpin) when explicitly mounting a volume.
    * When no drive letter specified, choose A: or B: only when no other free drive letter is available.
    * Reduce CPU usage caused by the option to disable use of disconnected network drives.
    * Add new volume ID mechanism to be used to identify disks/partitions instead of their device name.
    * Add option to avoid PIM prompt in pre-boot authentication by storing PIM value unencrypted in MBR.
    * Add option and command line switch to hide waiting dialog when performing operations.
    * Add checkbox in "VeraCrypt Format" wizard GUI to skip Rescue Disk verification during system encryption procedure.
    * Allow files drag-n-drop when VeraCrypt is running as elevated process.
    * Minor GUI and translations fixes.
 - Linux:
    * Fix mount issue on Fedora 23.
    * Fix mount failure when compiling source code using gcc 5.x.
    * Adhere to XDG Desktop Specification by using XDG_CONFIG_HOME to determine location of configuration files.
 - Mac OSX:
    * Solve compatibility issue with newer versions of OSXFuse.

0 blueprints and 0 bugs targeted

There are no feature specifications or bug tasks targeted to this milestone. The project's maintainer, driver, or bug supervisor can target specifications and bug tasks to this milestone to track the things that are expected to be completed for the release.

This milestone contains Public information
Everyone can see this information.