<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent posts to General Discussion</title><link>https://sourceforge.net/p/veracrypt/discussion/general/</link><description>Recent posts to General Discussion</description><atom:link href="https://sourceforge.net/p/veracrypt/discussion/general/feed.rss" rel="self"/><language>en</language><lastBuildDate>Sun, 26 Apr 2026 03:20:37 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/veracrypt/discussion/general/feed.rss" rel="self" type="application/rss+xml"/><item><title>Ubuntu 26.04 package</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/3866b9cc1e/?limit=25#1faa</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Thank you for the report.&lt;br/&gt;
I have just built Ubuntu 26.04 packages for version 1.26.24 and they are now available on the download page and also here on Sourceforge&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sun, 26 Apr 2026 03:20:37 -0000</pubDate><guid>https://sourceforge.net8d7b322ecb16966606577ced4de792f48e88c374</guid></item><item><title>Ubuntu 26.04 package</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/3866b9cc1e/?limit=25#5773</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi, I noticed last Ubuntu package is 25.04, though Ubuntu 26.04 is out now. Could you please make the package for the latest release available in the download section?&lt;br/&gt;
Many thanks&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jack Omen</dc:creator><pubDate>Sat, 25 Apr 2026 17:07:15 -0000</pubDate><guid>https://sourceforge.netc60f9cd8899566b07cb71d5e6eb357499b9d2362</guid></item><item><title>VeraCrypt 1.26.24 GUI won't close after auto dismount</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/46c4277bee/?limit=25#bdd3</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;There was no behavior change in VeraCrypt 1.26.24 related to this. The option "VeraCrypt Background Task -&amp;gt; Exit when there are no mounted volumes" applies only to the background task, i.e. after the main VeraCrypt window has been closed/hidden to the tray.&lt;/p&gt;
&lt;p&gt;If the main VeraCrypt window is left open, auto-unmount will unmount the volume, but it will not automatically close the visible GUI.&lt;/p&gt;
&lt;p&gt;What you are describing is a new feature: making the whole VeraCrypt process exit after auto-unmount if no volumes remain, with no UI and no system tray icon. This is new behavior and it would require a new explicit option.&lt;/p&gt;
&lt;p&gt;For example, we could add an option such as "Close VeraCrypt window after auto-unmount if no volumes remain". If this is combined with "VeraCrypt Background Task -&amp;gt; Exit when there are no mounted volumes", then the whole VeraCrypt process would terminate after auto-unmount when no volumes remain.&lt;/p&gt;
&lt;p&gt;Concerning the path of the last selected container file, it is indeed not cleared automatically after auto-unmount, but this is also not part of the current auto-unmount functionality. There is already the "Never save history" setting, which helps, but we could also consider adding an option to clear the volume field after auto-unmount.&lt;/p&gt;
&lt;p&gt;VeraCrypt tries to be as customizable as possible, but at the same time, adding more and more options makes usage more complex.&lt;/p&gt;
&lt;p&gt;For your use case, I would advise always closing the UI after mounting is done, or preferably using the command line for mounting. Many power users on this forum use VeraCrypt from batch files or PowerShell scripts, since this avoids exposing information through the UI.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mounir IDRASSI</dc:creator><pubDate>Sat, 25 Apr 2026 06:35:29 -0000</pubDate><guid>https://sourceforge.neta9daa5ec6ad68ee5a51ad512a970ed7443f86ca3</guid></item><item><title>win 11 preview impossible for Veracrypt drive files</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/8465742c91/?limit=25#f0fa</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Miracle !&lt;br/&gt;
I guess the latest win 11 update solved it ! (:fingers-crossed:)&lt;br/&gt;
I don't have to restart Explorer any more : all the files from the encrypted drive have a normal ("not unsafe") status, pdfs are previewed etc ...&lt;br/&gt;
Hopinge next update won't regress.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bert Cuzeau</dc:creator><pubDate>Thu, 23 Apr 2026 06:11:19 -0000</pubDate><guid>https://sourceforge.netc8c720f3862c6b3d443d110cd694205d09159ab7</guid></item><item><title>Project Update</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#a968/755e</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Are you able to share the reason so many accounts were disabled without appeal?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Thomas Navara</dc:creator><pubDate>Thu, 23 Apr 2026 00:10:28 -0000</pubDate><guid>https://sourceforge.net5148be761623f7c3714ddcb31b7aee6744cc3562</guid></item><item><title>Remote reboot of encrypted system</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/857a854a34/?limit=25#1e77</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I have a question I'm hoping someone can answer for me. I have a primary workstation at home that I access remotely while away from home. I have refrained from encrypting my system drive since I cannot enter the password when I am away to complete the  Windows startup in the case of a power failure, or manual remote restart. My workstation has a second physical Ethernet port, which is designed for network/remote support use, but I'm not sure if it could be set up to access the machine in such a way as to facilitate entering the pre-boot Veracrypt password? Does anyone know, or does anyone who needs remote access (over possible reboots) utilize system encryption? Thank you in advance for any insight and/or advice.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Shane Taylor</dc:creator><pubDate>Wed, 22 Apr 2026 19:47:45 -0000</pubDate><guid>https://sourceforge.net1ae301e1f6f5fab7b1e9aeeccaa7e88ac64fb31c</guid></item><item><title>1.26.27 BETA Released 2025/9/20</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/90471499cb/?limit=25&amp;page=1#9223</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;&lt;a class="user-mention" href="/u/idrassi/profile/"&gt;@idrassi&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Issues with custom PIM values when changing KDF in:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Tools &amp;gt; Password Change or Keyfiles&lt;/li&gt;
&lt;li&gt;Tools &amp;gt; Set Header Key Derivation Algorithm&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;VeraCrypt should reset the PIM to default value when a change to the KDF is made to prevent accidental large or small PIM values being used against the new KDF PIM value.&lt;/p&gt;
&lt;p&gt;Using a test file container set to KDF =&amp;gt; Whirlpool using custom PIM 490 and change it to Argon2  automatically uses PIM 490 for Argon2.&lt;/p&gt;
&lt;p&gt;Users may not know PIM value of 490 using Argon2 is extremely too large. &lt;br/&gt;
Conversely using a custom PIM 8 for Argon2 is extremely too small for the other KDFs.&lt;/p&gt;
&lt;p&gt;Attached are two examples of using 490 PIM with KDF Whirlpool to Argon2.&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;strong&gt;Proposed Solution&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Whenever the new KDF is different from the current KDF, the PIM value should default to the correct PIM value of the new KDF with a warning message to the user that the PIM of new KDF has been set to default and to refer to the appropriate section of the manual for PIM default values.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://veracrypt.jp/en/Header%20Key%20Derivation.html" rel="nofollow"&gt;https://veracrypt.jp/en/Header%20Key%20Derivation.html&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Tue, 21 Apr 2026 04:02:35 -0000</pubDate><guid>https://sourceforge.net22baea2e9e0fefc7d3ac36f2f0462ad949467005</guid></item><item><title>Project Update</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be/598c</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Thanks for explaining this!&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Mon, 20 Apr 2026 10:09:48 -0000</pubDate><guid>https://sourceforge.net6af1f1595c3e34626d4d6025b8da9af686152f6d</guid></item><item><title>Project Update</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d/d6be</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Regarding Argon2id:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.26.27&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Currently in the 1.26.27 Beta and the near future 1.26.27 production release, you can use Argon2id only on &lt;a href="https://veracrypt.jp/en/Conversion_Guide_VeraCrypt_1.26_and_Later.html" rel="nofollow"&gt;Windows OS 10/11&lt;/a&gt; for non-system encryption drives/devices and file containers.&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;strong&gt;1.26.28 Windows Only Update&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Windows UEFI systems with Secure Boot enabled updated to add the newer Microsoft UEFI CA 2023.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Windows users with system encryption must create a new VeraCrypt Rescue Disk after updating to 1.26.28 or later version.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Detailed technical explanation on GitHub here:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/veracrypt/VeraCrypt/issues/1655#issuecomment-4276186649" rel="nofollow"&gt;https://github.com/veracrypt/VeraCrypt/issues/1655#issuecomment-4276186649&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;strong&gt;1.27.x&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Argon2id support for Windows UEFI system encryption.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;strong&gt;Unsure which version Mounir was referencing for Argon2Id for Linux non-system drives/partitions and file containers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Mounir &lt;a href="https://sourceforge.net/p/veracrypt/discussion/general/thread/bbfb10089a/#6401"&gt;wrote&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Argon2id support for Linux non-system volumes/containers is much more feasible. This is planned and I will work on it.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Argon2id support for Linux non-system drives/partitions and file containers.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Enigma2Illusion</dc:creator><pubDate>Sun, 19 Apr 2026 23:32:37 -0000</pubDate><guid>https://sourceforge.net488bee6be39a23b61c394e602d3c9b4e04decf30</guid></item><item><title>Project Update</title><link>https://sourceforge.net/p/veracrypt/discussion/general/thread/9620d7a4b3/?limit=25&amp;page=1#312d</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Oh, my bad! I got confused between 1.26.27 and 1.27.&lt;/p&gt;
&lt;p&gt;So, version 1.26.28 will add Argon2id support for containers and non-system drives, but only on Windows. If I understand correctly, it will also include Argon2id support for non-UEFI system drives. However, Argon2id support for UEFI system drives and for Linux will only be available in version 1.27. Is that right?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marcos Morar</dc:creator><pubDate>Sun, 19 Apr 2026 22:04:09 -0000</pubDate><guid>https://sourceforge.netf1d9a1cfcdec511b4b3c18a3f9146e37c6ad3b8f</guid></item></channel></rss>