VeraCrypt 1.25.9 Encryption Software fixes BSOD on Windows

Martin Brinkmann
Feb 22, 2022
Encryption
|
13

VeraCrypt is a popular open source encryption software that is based on the abandoned TrueCrypt application. VeraCrypt 1.25.9 was released on February 19, 2022 to the public.

The new version of the encryption software is already available. New and existing users may download the latest version from the official website for all supported operating systems. Select Help > About in the application interface to find out which version of VeraCrypt is installed.

VeraCrypt 1.25.9 includes fixes for the three supported operating systems Windows, Mac OS and Linux. Most changes apply only to the Windows version, including a fix for a BSOD that could happen on shutdown.

VeraCrypt erases the system encryption keys on shutdown by default; this procedure caused Blue Screens of Death on some Windows devices. The developers have created a new Registry key that toggles the erasing of the encryption keys on Windows devices.

  1. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt
  2. Right-click on the VeraCrypt value and select New > Dword (32-bit) Value.
  3. Name it VeraCryptEraseKeysShutdown.
  4. Set the value to 0 to disable the erasing of security keys during shutdown.

The workaround is only required on systems that are affected by BSOD errors during shutdown. The Windows version of VeraCrypt includes several other changes:

  • The size of the .exe installer was almost halved by switching from Deflate compression to LZMA.
  • The minimum supported operating system version for MSI installs was set to Windows 7; this is a bit strange, as the download page lists Windows 10 as the minimum requirement for the MSI installer.
  • The MSI installer is compatible with system encryption.
  • The error that prevented Traveler Disks from being created using MSI has been fixed.
  • Double-clicking mounted drives did not work in some cases in the VeraCrypt user interface.
  • The outer volume password is not cached anymore when mounting with hidden volume protection if the wrong hidden volume password was specified.

Linux and Mac OS builds of VeraCrypt share a fix, which is also the only fix for Mac OS. Both address a hidden volume settings display issue when enabling hidden volume protection in the mount options window.

The Linux version has three additional fixes and improvements, including one crash fix. You can check out the entire changelog here.

Now You: do you use encryption software?

Summary
VeraCrypt 1.25.9 Encryption Software fixes BSOD on Windows
Article Name
VeraCrypt 1.25.9 Encryption Software fixes BSOD on Windows
Description
VeraCrypt is a popular open source encryption software that is based on the abandoned TrueCrypt application. VeraCrypt 1.25.9 was released on February 19, 2022 to the public.
Author
Publisher
Ghacks Technology News
Logo
Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. ilev said on January 24, 2012 at 7:08 pm
    Reply

    The Electronic Frontier Foundation has issued guidance for getting your mobile device across the border safely and protecting the data on it should it get seized.

    https://www.eff.org/sites/default/files/EFF-border-search_2.pdf

    1. Martin Brinkmann said on January 24, 2012 at 7:37 pm
      Reply

      Great read, thanks for posting Ilev.

  2. Rodalpho said on January 24, 2012 at 8:23 pm
    Reply

    Yes, I was just about to post that. They specifically address the hidden volume. To fill its purpose, you need to lie to law enforcement/homeland security, which is in of itself a crime. Of course once you get to court you can try to plead the fifth, but you may be forced to reveal its existence and the password in the same vein as the non-hidden volume anyway.

    The best solution to someone asking for your password isn’t to plead the fifth, but to simply say you forgot it. This is of course also perjury, but nobody can look inside your head to prove it, so unless you told your cellmate about your cunning master plan, you’re good to go.

    1. Martin Brinkmann said on January 24, 2012 at 8:32 pm
      Reply

      Or unless you write on a blog about it ;)

    2. Mikey said on July 22, 2012 at 2:19 pm
      Reply

      Rodalpho, isn’t a Truecrypt hidden volume 100% unidentifiable anyways? I don’t know, maybe an extreme expert would “recognize” certain patterns even if it’s hidden.

      Once inside your outer volume, assuming they coerced you enough to get into it, would the US Gov’t have the right to manipulate / alter / delete files as a bargaining technique? I would think it unlawful “officially”, but a little imagination brings up some issues.

  3. Rodalpho said on January 24, 2012 at 8:57 pm
    Reply

    Ahh but I am pure as the driven snow! (Except for posting on a blog during work.)

    1. jmjsquared said on January 25, 2012 at 9:01 pm
      Reply

      … and except for being Bernie Maddoff’s tax advisor!

  4. berttie said on January 24, 2012 at 11:12 pm
    Reply

    I used to be a regular visitor to the United States. About every second year. But I stopped going 7 years ago, largely because of border hassles like this. The Canadians now get my money. I know I’m not alone in this.

  5. Crodol said on January 25, 2012 at 12:45 am
    Reply

    I was travelling to the USA once or twice a year but I also a few years ago. Not going to go there again until the craze has disappeared… might be a while!

  6. DanTe said on January 25, 2012 at 4:43 am
    Reply

    Just a legal clarification: You are not required to provide your password as this is covered under the 5th Amendment against self incrimination. But should the authorities be made aware that there are files located in certain “areas” than you must provide the authorities with an unencrypted version of those files. As the authorities have a “right” to access the files once they know where it is. I would just say “I’m not aware of any”, and claim my tech guy handles everything, I don’t know tech.

    I also travel around with the following file: “a little boy and his priest.avs”. Should anyone seize and opens said file, their computers FRY :)

    But this TrueCrypt matryoshka concept is intriguing. Gotta try it out.

    1. Yes said on January 25, 2012 at 8:55 am
      Reply

      DanTe, how can I obtain said file that makes computers fry? How does it work?

      1. DanTe said on January 25, 2012 at 3:56 pm
        Reply

        Do like I do: troll the usenet for “free software” and see which one promptly got pass your virus scan and kills your stand alone PC. I do this about once a year to get the latest in killer software. Use something like the free SBNews Android or Newsbin Pro and just massively download. I generally look for the small (below 5mB) files that purports to be celebrity sex movies.

  7. Joey said on January 25, 2012 at 11:16 pm
    Reply

    This is a really good app. I tested it out by partitioning a hard drive that I planned to use for data. Then I encrypted that partition with True Crypt. I noticed that the partition was visible when I opened up Computer to view all my drives. So I went into Disk Management and removed the drive letter from the partition which made it invisible. True Crypt also has a portable app version so no need to install it on the PC. This makes it hard for even a tech saavy person to get into your guarded files. (unless they know your password, lol)

    Of course if you are accused of doing something illegal and are forced to give up your PC to the government forensic labs none of the above will help. Just get a lawyer and see what info/passwords you have to give up :-)

    1. ... said on January 27, 2012 at 10:32 am
      Reply

      “Of course if you are accused of doing something illegal and are forced to give up your PC to the government forensic labs none of the above will help.”

      Not to be rude but you don’t know what you’re talking about. :/

      1. DanTe said on January 30, 2012 at 12:01 am
        Reply

        Not to be rude … , but you don’t know what you’re talking about. Have you tried the various TrueCrypt encryption modes? And no, Da Gov’ment don’t have no magic pixie dust that allows them to crack everything.

  8. Mikey said on July 22, 2012 at 2:25 pm
    Reply

    I also have another question — this article is about the gov’t agents seizing laptops. What’s the issue on DESKtops? Also can be seized, or a different story?

    1. Martin Brinkmann said on July 22, 2012 at 2:30 pm
      Reply

      They can also be seized, no difference.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.